1e5dd7070Spatrick //===--- PthreadLockChecker.cpp - Check for locking problems ---*- C++ -*--===//
2e5dd7070Spatrick //
3e5dd7070Spatrick // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4e5dd7070Spatrick // See https://llvm.org/LICENSE.txt for license information.
5e5dd7070Spatrick // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6e5dd7070Spatrick //
7e5dd7070Spatrick //===----------------------------------------------------------------------===//
8e5dd7070Spatrick //
9ec727ea7Spatrick // This file defines:
10ec727ea7Spatrick // * PthreadLockChecker, a simple lock -> unlock checker.
11ec727ea7Spatrick // Which also checks for XNU locks, which behave similarly enough to share
12ec727ea7Spatrick // code.
13ec727ea7Spatrick // * FuchsiaLocksChecker, which is also rather similar.
14ec727ea7Spatrick // * C11LockChecker which also closely follows Pthread semantics.
15ec727ea7Spatrick //
16ec727ea7Spatrick // TODO: Path notes.
17e5dd7070Spatrick //
18e5dd7070Spatrick //===----------------------------------------------------------------------===//
19e5dd7070Spatrick
20e5dd7070Spatrick #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
21e5dd7070Spatrick #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
22e5dd7070Spatrick #include "clang/StaticAnalyzer/Core/Checker.h"
23e5dd7070Spatrick #include "clang/StaticAnalyzer/Core/CheckerManager.h"
24*12c85518Srobert #include "clang/StaticAnalyzer/Core/PathSensitive/CallDescription.h"
25ec727ea7Spatrick #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
26e5dd7070Spatrick #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
27e5dd7070Spatrick
28e5dd7070Spatrick using namespace clang;
29e5dd7070Spatrick using namespace ento;
30e5dd7070Spatrick
31e5dd7070Spatrick namespace {
32e5dd7070Spatrick
33e5dd7070Spatrick struct LockState {
34e5dd7070Spatrick enum Kind {
35e5dd7070Spatrick Destroyed,
36e5dd7070Spatrick Locked,
37e5dd7070Spatrick Unlocked,
38e5dd7070Spatrick UntouchedAndPossiblyDestroyed,
39e5dd7070Spatrick UnlockedAndPossiblyDestroyed
40e5dd7070Spatrick } K;
41e5dd7070Spatrick
42e5dd7070Spatrick private:
LockState__anoned0ba6cb0111::LockState43e5dd7070Spatrick LockState(Kind K) : K(K) {}
44e5dd7070Spatrick
45e5dd7070Spatrick public:
getLocked__anoned0ba6cb0111::LockState46e5dd7070Spatrick static LockState getLocked() { return LockState(Locked); }
getUnlocked__anoned0ba6cb0111::LockState47e5dd7070Spatrick static LockState getUnlocked() { return LockState(Unlocked); }
getDestroyed__anoned0ba6cb0111::LockState48e5dd7070Spatrick static LockState getDestroyed() { return LockState(Destroyed); }
getUntouchedAndPossiblyDestroyed__anoned0ba6cb0111::LockState49e5dd7070Spatrick static LockState getUntouchedAndPossiblyDestroyed() {
50e5dd7070Spatrick return LockState(UntouchedAndPossiblyDestroyed);
51e5dd7070Spatrick }
getUnlockedAndPossiblyDestroyed__anoned0ba6cb0111::LockState52e5dd7070Spatrick static LockState getUnlockedAndPossiblyDestroyed() {
53e5dd7070Spatrick return LockState(UnlockedAndPossiblyDestroyed);
54e5dd7070Spatrick }
55e5dd7070Spatrick
operator ==__anoned0ba6cb0111::LockState56ec727ea7Spatrick bool operator==(const LockState &X) const { return K == X.K; }
57e5dd7070Spatrick
isLocked__anoned0ba6cb0111::LockState58e5dd7070Spatrick bool isLocked() const { return K == Locked; }
isUnlocked__anoned0ba6cb0111::LockState59e5dd7070Spatrick bool isUnlocked() const { return K == Unlocked; }
isDestroyed__anoned0ba6cb0111::LockState60e5dd7070Spatrick bool isDestroyed() const { return K == Destroyed; }
isUntouchedAndPossiblyDestroyed__anoned0ba6cb0111::LockState61e5dd7070Spatrick bool isUntouchedAndPossiblyDestroyed() const {
62e5dd7070Spatrick return K == UntouchedAndPossiblyDestroyed;
63e5dd7070Spatrick }
isUnlockedAndPossiblyDestroyed__anoned0ba6cb0111::LockState64e5dd7070Spatrick bool isUnlockedAndPossiblyDestroyed() const {
65e5dd7070Spatrick return K == UnlockedAndPossiblyDestroyed;
66e5dd7070Spatrick }
67e5dd7070Spatrick
Profile__anoned0ba6cb0111::LockState68ec727ea7Spatrick void Profile(llvm::FoldingSetNodeID &ID) const { ID.AddInteger(K); }
69e5dd7070Spatrick };
70e5dd7070Spatrick
71ec727ea7Spatrick class PthreadLockChecker : public Checker<check::PostCall, check::DeadSymbols,
72ec727ea7Spatrick check::RegionChanges> {
73e5dd7070Spatrick public:
74ec727ea7Spatrick enum LockingSemantics { NotApplicable = 0, PthreadSemantics, XNUSemantics };
75ec727ea7Spatrick enum CheckerKind {
76ec727ea7Spatrick CK_PthreadLockChecker,
77ec727ea7Spatrick CK_FuchsiaLockChecker,
78ec727ea7Spatrick CK_C11LockChecker,
79ec727ea7Spatrick CK_NumCheckKinds
80ec727ea7Spatrick };
81*12c85518Srobert bool ChecksEnabled[CK_NumCheckKinds] = {false};
82ec727ea7Spatrick CheckerNameRef CheckNames[CK_NumCheckKinds];
83e5dd7070Spatrick
84ec727ea7Spatrick private:
85ec727ea7Spatrick typedef void (PthreadLockChecker::*FnCheck)(const CallEvent &Call,
86ec727ea7Spatrick CheckerContext &C,
87a9ac8606Spatrick CheckerKind CheckKind) const;
88ec727ea7Spatrick CallDescriptionMap<FnCheck> PThreadCallbacks = {
89ec727ea7Spatrick // Init.
90*12c85518Srobert {{{"pthread_mutex_init"}, 2}, &PthreadLockChecker::InitAnyLock},
91ec727ea7Spatrick // TODO: pthread_rwlock_init(2 arguments).
92ec727ea7Spatrick // TODO: lck_mtx_init(3 arguments).
93ec727ea7Spatrick // TODO: lck_mtx_alloc_init(2 arguments) => returns the mutex.
94ec727ea7Spatrick // TODO: lck_rw_init(3 arguments).
95ec727ea7Spatrick // TODO: lck_rw_alloc_init(2 arguments) => returns the mutex.
96e5dd7070Spatrick
97ec727ea7Spatrick // Acquire.
98*12c85518Srobert {{{"pthread_mutex_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
99*12c85518Srobert {{{"pthread_rwlock_rdlock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
100*12c85518Srobert {{{"pthread_rwlock_wrlock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
101*12c85518Srobert {{{"lck_mtx_lock"}, 1}, &PthreadLockChecker::AcquireXNULock},
102*12c85518Srobert {{{"lck_rw_lock_exclusive"}, 1}, &PthreadLockChecker::AcquireXNULock},
103*12c85518Srobert {{{"lck_rw_lock_shared"}, 1}, &PthreadLockChecker::AcquireXNULock},
104ec727ea7Spatrick
105ec727ea7Spatrick // Try.
106*12c85518Srobert {{{"pthread_mutex_trylock"}, 1}, &PthreadLockChecker::TryPthreadLock},
107*12c85518Srobert {{{"pthread_rwlock_tryrdlock"}, 1}, &PthreadLockChecker::TryPthreadLock},
108*12c85518Srobert {{{"pthread_rwlock_trywrlock"}, 1}, &PthreadLockChecker::TryPthreadLock},
109*12c85518Srobert {{{"lck_mtx_try_lock"}, 1}, &PthreadLockChecker::TryXNULock},
110*12c85518Srobert {{{"lck_rw_try_lock_exclusive"}, 1}, &PthreadLockChecker::TryXNULock},
111*12c85518Srobert {{{"lck_rw_try_lock_shared"}, 1}, &PthreadLockChecker::TryXNULock},
112ec727ea7Spatrick
113ec727ea7Spatrick // Release.
114*12c85518Srobert {{{"pthread_mutex_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
115*12c85518Srobert {{{"pthread_rwlock_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
116*12c85518Srobert {{{"lck_mtx_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
117*12c85518Srobert {{{"lck_rw_unlock_exclusive"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
118*12c85518Srobert {{{"lck_rw_unlock_shared"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
119*12c85518Srobert {{{"lck_rw_done"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
120ec727ea7Spatrick
121ec727ea7Spatrick // Destroy.
122*12c85518Srobert {{{"pthread_mutex_destroy"}, 1}, &PthreadLockChecker::DestroyPthreadLock},
123*12c85518Srobert {{{"lck_mtx_destroy"}, 2}, &PthreadLockChecker::DestroyXNULock},
124ec727ea7Spatrick // TODO: pthread_rwlock_destroy(1 argument).
125ec727ea7Spatrick // TODO: lck_rw_destroy(2 arguments).
126ec727ea7Spatrick };
127ec727ea7Spatrick
128ec727ea7Spatrick CallDescriptionMap<FnCheck> FuchsiaCallbacks = {
129ec727ea7Spatrick // Init.
130*12c85518Srobert {{{"spin_lock_init"}, 1}, &PthreadLockChecker::InitAnyLock},
131ec727ea7Spatrick
132ec727ea7Spatrick // Acquire.
133*12c85518Srobert {{{"spin_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
134*12c85518Srobert {{{"spin_lock_save"}, 3}, &PthreadLockChecker::AcquirePthreadLock},
135*12c85518Srobert {{{"sync_mutex_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
136*12c85518Srobert {{{"sync_mutex_lock_with_waiter"}, 1},
137ec727ea7Spatrick &PthreadLockChecker::AcquirePthreadLock},
138ec727ea7Spatrick
139ec727ea7Spatrick // Try.
140*12c85518Srobert {{{"spin_trylock"}, 1}, &PthreadLockChecker::TryFuchsiaLock},
141*12c85518Srobert {{{"sync_mutex_trylock"}, 1}, &PthreadLockChecker::TryFuchsiaLock},
142*12c85518Srobert {{{"sync_mutex_timedlock"}, 2}, &PthreadLockChecker::TryFuchsiaLock},
143ec727ea7Spatrick
144ec727ea7Spatrick // Release.
145*12c85518Srobert {{{"spin_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
146*12c85518Srobert {{{"spin_unlock_restore"}, 3}, &PthreadLockChecker::ReleaseAnyLock},
147*12c85518Srobert {{{"sync_mutex_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
148ec727ea7Spatrick };
149ec727ea7Spatrick
150ec727ea7Spatrick CallDescriptionMap<FnCheck> C11Callbacks = {
151ec727ea7Spatrick // Init.
152*12c85518Srobert {{{"mtx_init"}, 2}, &PthreadLockChecker::InitAnyLock},
153ec727ea7Spatrick
154ec727ea7Spatrick // Acquire.
155*12c85518Srobert {{{"mtx_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
156ec727ea7Spatrick
157ec727ea7Spatrick // Try.
158*12c85518Srobert {{{"mtx_trylock"}, 1}, &PthreadLockChecker::TryC11Lock},
159*12c85518Srobert {{{"mtx_timedlock"}, 2}, &PthreadLockChecker::TryC11Lock},
160ec727ea7Spatrick
161ec727ea7Spatrick // Release.
162*12c85518Srobert {{{"mtx_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
163ec727ea7Spatrick
164ec727ea7Spatrick // Destroy
165*12c85518Srobert {{{"mtx_destroy"}, 1}, &PthreadLockChecker::DestroyPthreadLock},
166ec727ea7Spatrick };
167ec727ea7Spatrick
168e5dd7070Spatrick ProgramStateRef resolvePossiblyDestroyedMutex(ProgramStateRef state,
169e5dd7070Spatrick const MemRegion *lockR,
170e5dd7070Spatrick const SymbolRef *sym) const;
171a9ac8606Spatrick void reportBug(CheckerContext &C, std::unique_ptr<BugType> BT[],
172a9ac8606Spatrick const Expr *MtxExpr, CheckerKind CheckKind,
173a9ac8606Spatrick StringRef Desc) const;
174ec727ea7Spatrick
175ec727ea7Spatrick // Init.
176ec727ea7Spatrick void InitAnyLock(const CallEvent &Call, CheckerContext &C,
177a9ac8606Spatrick CheckerKind CheckKind) const;
178a9ac8606Spatrick void InitLockAux(const CallEvent &Call, CheckerContext &C,
179a9ac8606Spatrick const Expr *MtxExpr, SVal MtxVal,
180a9ac8606Spatrick CheckerKind CheckKind) const;
181ec727ea7Spatrick
182ec727ea7Spatrick // Lock, Try-lock.
183ec727ea7Spatrick void AcquirePthreadLock(const CallEvent &Call, CheckerContext &C,
184a9ac8606Spatrick CheckerKind CheckKind) const;
185ec727ea7Spatrick void AcquireXNULock(const CallEvent &Call, CheckerContext &C,
186a9ac8606Spatrick CheckerKind CheckKind) const;
187ec727ea7Spatrick void TryPthreadLock(const CallEvent &Call, CheckerContext &C,
188a9ac8606Spatrick CheckerKind CheckKind) const;
189ec727ea7Spatrick void TryXNULock(const CallEvent &Call, CheckerContext &C,
190a9ac8606Spatrick CheckerKind CheckKind) const;
191ec727ea7Spatrick void TryFuchsiaLock(const CallEvent &Call, CheckerContext &C,
192a9ac8606Spatrick CheckerKind CheckKind) const;
193ec727ea7Spatrick void TryC11Lock(const CallEvent &Call, CheckerContext &C,
194a9ac8606Spatrick CheckerKind CheckKind) const;
195a9ac8606Spatrick void AcquireLockAux(const CallEvent &Call, CheckerContext &C,
196a9ac8606Spatrick const Expr *MtxExpr, SVal MtxVal, bool IsTryLock,
197a9ac8606Spatrick LockingSemantics Semantics, CheckerKind CheckKind) const;
198ec727ea7Spatrick
199ec727ea7Spatrick // Release.
200ec727ea7Spatrick void ReleaseAnyLock(const CallEvent &Call, CheckerContext &C,
201a9ac8606Spatrick CheckerKind CheckKind) const;
202a9ac8606Spatrick void ReleaseLockAux(const CallEvent &Call, CheckerContext &C,
203a9ac8606Spatrick const Expr *MtxExpr, SVal MtxVal,
204a9ac8606Spatrick CheckerKind CheckKind) const;
205ec727ea7Spatrick
206ec727ea7Spatrick // Destroy.
207ec727ea7Spatrick void DestroyPthreadLock(const CallEvent &Call, CheckerContext &C,
208a9ac8606Spatrick CheckerKind CheckKind) const;
209ec727ea7Spatrick void DestroyXNULock(const CallEvent &Call, CheckerContext &C,
210a9ac8606Spatrick CheckerKind CheckKind) const;
211a9ac8606Spatrick void DestroyLockAux(const CallEvent &Call, CheckerContext &C,
212a9ac8606Spatrick const Expr *MtxExpr, SVal MtxVal,
213a9ac8606Spatrick LockingSemantics Semantics, CheckerKind CheckKind) const;
214ec727ea7Spatrick
215ec727ea7Spatrick public:
216ec727ea7Spatrick void checkPostCall(const CallEvent &Call, CheckerContext &C) const;
217ec727ea7Spatrick void checkDeadSymbols(SymbolReaper &SymReaper, CheckerContext &C) const;
218ec727ea7Spatrick ProgramStateRef
219ec727ea7Spatrick checkRegionChanges(ProgramStateRef State, const InvalidatedSymbols *Symbols,
220ec727ea7Spatrick ArrayRef<const MemRegion *> ExplicitRegions,
221ec727ea7Spatrick ArrayRef<const MemRegion *> Regions,
222ec727ea7Spatrick const LocationContext *LCtx, const CallEvent *Call) const;
223ec727ea7Spatrick void printState(raw_ostream &Out, ProgramStateRef State, const char *NL,
224ec727ea7Spatrick const char *Sep) const override;
225ec727ea7Spatrick
226ec727ea7Spatrick private:
227ec727ea7Spatrick mutable std::unique_ptr<BugType> BT_doublelock[CK_NumCheckKinds];
228ec727ea7Spatrick mutable std::unique_ptr<BugType> BT_doubleunlock[CK_NumCheckKinds];
229ec727ea7Spatrick mutable std::unique_ptr<BugType> BT_destroylock[CK_NumCheckKinds];
230ec727ea7Spatrick mutable std::unique_ptr<BugType> BT_initlock[CK_NumCheckKinds];
231ec727ea7Spatrick mutable std::unique_ptr<BugType> BT_lor[CK_NumCheckKinds];
232ec727ea7Spatrick
initBugType(CheckerKind CheckKind) const233a9ac8606Spatrick void initBugType(CheckerKind CheckKind) const {
234a9ac8606Spatrick if (BT_doublelock[CheckKind])
235ec727ea7Spatrick return;
236a9ac8606Spatrick BT_doublelock[CheckKind].reset(
237a9ac8606Spatrick new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"});
238a9ac8606Spatrick BT_doubleunlock[CheckKind].reset(
239a9ac8606Spatrick new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"});
240a9ac8606Spatrick BT_destroylock[CheckKind].reset(new BugType{
241a9ac8606Spatrick CheckNames[CheckKind], "Use destroyed lock", "Lock checker"});
242a9ac8606Spatrick BT_initlock[CheckKind].reset(new BugType{
243a9ac8606Spatrick CheckNames[CheckKind], "Init invalid lock", "Lock checker"});
244a9ac8606Spatrick BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind],
245ec727ea7Spatrick "Lock order reversal", "Lock checker"});
246ec727ea7Spatrick }
247e5dd7070Spatrick };
248e5dd7070Spatrick } // end anonymous namespace
249e5dd7070Spatrick
250e5dd7070Spatrick // A stack of locks for tracking lock-unlock order.
REGISTER_LIST_WITH_PROGRAMSTATE(LockSet,const MemRegion *)251e5dd7070Spatrick REGISTER_LIST_WITH_PROGRAMSTATE(LockSet, const MemRegion *)
252e5dd7070Spatrick
253e5dd7070Spatrick // An entry for tracking lock states.
254e5dd7070Spatrick REGISTER_MAP_WITH_PROGRAMSTATE(LockMap, const MemRegion *, LockState)
255e5dd7070Spatrick
256e5dd7070Spatrick // Return values for unresolved calls to pthread_mutex_destroy().
257e5dd7070Spatrick REGISTER_MAP_WITH_PROGRAMSTATE(DestroyRetVal, const MemRegion *, SymbolRef)
258e5dd7070Spatrick
259ec727ea7Spatrick void PthreadLockChecker::checkPostCall(const CallEvent &Call,
260e5dd7070Spatrick CheckerContext &C) const {
261ec727ea7Spatrick // An additional umbrella check that all functions modeled by this checker
262ec727ea7Spatrick // are global C functions.
263ec727ea7Spatrick // TODO: Maybe make this the default behavior of CallDescription
264ec727ea7Spatrick // with exactly one identifier?
265ec727ea7Spatrick // FIXME: Try to handle cases when the implementation was inlined rather
266ec727ea7Spatrick // than just giving up.
267ec727ea7Spatrick if (!Call.isGlobalCFunction() || C.wasInlined)
268e5dd7070Spatrick return;
269e5dd7070Spatrick
270ec727ea7Spatrick if (const FnCheck *Callback = PThreadCallbacks.lookup(Call))
271ec727ea7Spatrick (this->**Callback)(Call, C, CK_PthreadLockChecker);
272ec727ea7Spatrick else if (const FnCheck *Callback = FuchsiaCallbacks.lookup(Call))
273ec727ea7Spatrick (this->**Callback)(Call, C, CK_FuchsiaLockChecker);
274ec727ea7Spatrick else if (const FnCheck *Callback = C11Callbacks.lookup(Call))
275ec727ea7Spatrick (this->**Callback)(Call, C, CK_C11LockChecker);
276e5dd7070Spatrick }
277e5dd7070Spatrick
278e5dd7070Spatrick // When a lock is destroyed, in some semantics(like PthreadSemantics) we are not
279e5dd7070Spatrick // sure if the destroy call has succeeded or failed, and the lock enters one of
280e5dd7070Spatrick // the 'possibly destroyed' state. There is a short time frame for the
281e5dd7070Spatrick // programmer to check the return value to see if the lock was successfully
282e5dd7070Spatrick // destroyed. Before we model the next operation over that lock, we call this
283e5dd7070Spatrick // function to see if the return value was checked by now and set the lock state
284e5dd7070Spatrick // - either to destroyed state or back to its previous state.
285e5dd7070Spatrick
286e5dd7070Spatrick // In PthreadSemantics, pthread_mutex_destroy() returns zero if the lock is
287e5dd7070Spatrick // successfully destroyed and it returns a non-zero value otherwise.
resolvePossiblyDestroyedMutex(ProgramStateRef state,const MemRegion * lockR,const SymbolRef * sym) const288e5dd7070Spatrick ProgramStateRef PthreadLockChecker::resolvePossiblyDestroyedMutex(
289e5dd7070Spatrick ProgramStateRef state, const MemRegion *lockR, const SymbolRef *sym) const {
290e5dd7070Spatrick const LockState *lstate = state->get<LockMap>(lockR);
291e5dd7070Spatrick // Existence in DestroyRetVal ensures existence in LockMap.
292e5dd7070Spatrick // Existence in Destroyed also ensures that the lock state for lockR is either
293e5dd7070Spatrick // UntouchedAndPossiblyDestroyed or UnlockedAndPossiblyDestroyed.
294e5dd7070Spatrick assert(lstate->isUntouchedAndPossiblyDestroyed() ||
295e5dd7070Spatrick lstate->isUnlockedAndPossiblyDestroyed());
296e5dd7070Spatrick
297e5dd7070Spatrick ConstraintManager &CMgr = state->getConstraintManager();
298e5dd7070Spatrick ConditionTruthVal retZero = CMgr.isNull(state, *sym);
299e5dd7070Spatrick if (retZero.isConstrainedFalse()) {
300e5dd7070Spatrick if (lstate->isUntouchedAndPossiblyDestroyed())
301e5dd7070Spatrick state = state->remove<LockMap>(lockR);
302e5dd7070Spatrick else if (lstate->isUnlockedAndPossiblyDestroyed())
303e5dd7070Spatrick state = state->set<LockMap>(lockR, LockState::getUnlocked());
304e5dd7070Spatrick } else
305e5dd7070Spatrick state = state->set<LockMap>(lockR, LockState::getDestroyed());
306e5dd7070Spatrick
307e5dd7070Spatrick // Removing the map entry (lockR, sym) from DestroyRetVal as the lock state is
308e5dd7070Spatrick // now resolved.
309e5dd7070Spatrick state = state->remove<DestroyRetVal>(lockR);
310e5dd7070Spatrick return state;
311e5dd7070Spatrick }
312e5dd7070Spatrick
printState(raw_ostream & Out,ProgramStateRef State,const char * NL,const char * Sep) const313e5dd7070Spatrick void PthreadLockChecker::printState(raw_ostream &Out, ProgramStateRef State,
314e5dd7070Spatrick const char *NL, const char *Sep) const {
315e5dd7070Spatrick LockMapTy LM = State->get<LockMap>();
316e5dd7070Spatrick if (!LM.isEmpty()) {
317e5dd7070Spatrick Out << Sep << "Mutex states:" << NL;
318e5dd7070Spatrick for (auto I : LM) {
319e5dd7070Spatrick I.first->dumpToStream(Out);
320e5dd7070Spatrick if (I.second.isLocked())
321e5dd7070Spatrick Out << ": locked";
322e5dd7070Spatrick else if (I.second.isUnlocked())
323e5dd7070Spatrick Out << ": unlocked";
324e5dd7070Spatrick else if (I.second.isDestroyed())
325e5dd7070Spatrick Out << ": destroyed";
326e5dd7070Spatrick else if (I.second.isUntouchedAndPossiblyDestroyed())
327e5dd7070Spatrick Out << ": not tracked, possibly destroyed";
328e5dd7070Spatrick else if (I.second.isUnlockedAndPossiblyDestroyed())
329e5dd7070Spatrick Out << ": unlocked, possibly destroyed";
330e5dd7070Spatrick Out << NL;
331e5dd7070Spatrick }
332e5dd7070Spatrick }
333e5dd7070Spatrick
334e5dd7070Spatrick LockSetTy LS = State->get<LockSet>();
335e5dd7070Spatrick if (!LS.isEmpty()) {
336e5dd7070Spatrick Out << Sep << "Mutex lock order:" << NL;
337e5dd7070Spatrick for (auto I : LS) {
338e5dd7070Spatrick I->dumpToStream(Out);
339e5dd7070Spatrick Out << NL;
340e5dd7070Spatrick }
341e5dd7070Spatrick }
342e5dd7070Spatrick
343a9ac8606Spatrick DestroyRetValTy DRV = State->get<DestroyRetVal>();
344a9ac8606Spatrick if (!DRV.isEmpty()) {
345a9ac8606Spatrick Out << Sep << "Mutexes in unresolved possibly destroyed state:" << NL;
346a9ac8606Spatrick for (auto I : DRV) {
347a9ac8606Spatrick I.first->dumpToStream(Out);
348a9ac8606Spatrick Out << ": ";
349a9ac8606Spatrick I.second->dumpToStream(Out);
350a9ac8606Spatrick Out << NL;
351a9ac8606Spatrick }
352a9ac8606Spatrick }
353e5dd7070Spatrick }
354e5dd7070Spatrick
AcquirePthreadLock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const355ec727ea7Spatrick void PthreadLockChecker::AcquirePthreadLock(const CallEvent &Call,
356ec727ea7Spatrick CheckerContext &C,
357a9ac8606Spatrick CheckerKind CheckKind) const {
358a9ac8606Spatrick AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), false,
359a9ac8606Spatrick PthreadSemantics, CheckKind);
360ec727ea7Spatrick }
361ec727ea7Spatrick
AcquireXNULock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const362ec727ea7Spatrick void PthreadLockChecker::AcquireXNULock(const CallEvent &Call,
363ec727ea7Spatrick CheckerContext &C,
364a9ac8606Spatrick CheckerKind CheckKind) const {
365a9ac8606Spatrick AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), false,
366a9ac8606Spatrick XNUSemantics, CheckKind);
367ec727ea7Spatrick }
368ec727ea7Spatrick
TryPthreadLock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const369ec727ea7Spatrick void PthreadLockChecker::TryPthreadLock(const CallEvent &Call,
370ec727ea7Spatrick CheckerContext &C,
371a9ac8606Spatrick CheckerKind CheckKind) const {
372a9ac8606Spatrick AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true,
373a9ac8606Spatrick PthreadSemantics, CheckKind);
374ec727ea7Spatrick }
375ec727ea7Spatrick
TryXNULock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const376ec727ea7Spatrick void PthreadLockChecker::TryXNULock(const CallEvent &Call, CheckerContext &C,
377a9ac8606Spatrick CheckerKind CheckKind) const {
378a9ac8606Spatrick AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true,
379a9ac8606Spatrick PthreadSemantics, CheckKind);
380ec727ea7Spatrick }
381ec727ea7Spatrick
TryFuchsiaLock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const382ec727ea7Spatrick void PthreadLockChecker::TryFuchsiaLock(const CallEvent &Call,
383ec727ea7Spatrick CheckerContext &C,
384a9ac8606Spatrick CheckerKind CheckKind) const {
385a9ac8606Spatrick AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true,
386a9ac8606Spatrick PthreadSemantics, CheckKind);
387ec727ea7Spatrick }
388ec727ea7Spatrick
TryC11Lock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const389ec727ea7Spatrick void PthreadLockChecker::TryC11Lock(const CallEvent &Call, CheckerContext &C,
390a9ac8606Spatrick CheckerKind CheckKind) const {
391a9ac8606Spatrick AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true,
392a9ac8606Spatrick PthreadSemantics, CheckKind);
393ec727ea7Spatrick }
394ec727ea7Spatrick
AcquireLockAux(const CallEvent & Call,CheckerContext & C,const Expr * MtxExpr,SVal MtxVal,bool IsTryLock,enum LockingSemantics Semantics,CheckerKind CheckKind) const395ec727ea7Spatrick void PthreadLockChecker::AcquireLockAux(const CallEvent &Call,
396a9ac8606Spatrick CheckerContext &C, const Expr *MtxExpr,
397a9ac8606Spatrick SVal MtxVal, bool IsTryLock,
398a9ac8606Spatrick enum LockingSemantics Semantics,
399a9ac8606Spatrick CheckerKind CheckKind) const {
400a9ac8606Spatrick if (!ChecksEnabled[CheckKind])
401ec727ea7Spatrick return;
402e5dd7070Spatrick
403a9ac8606Spatrick const MemRegion *lockR = MtxVal.getAsRegion();
404e5dd7070Spatrick if (!lockR)
405e5dd7070Spatrick return;
406e5dd7070Spatrick
407e5dd7070Spatrick ProgramStateRef state = C.getState();
408e5dd7070Spatrick const SymbolRef *sym = state->get<DestroyRetVal>(lockR);
409e5dd7070Spatrick if (sym)
410e5dd7070Spatrick state = resolvePossiblyDestroyedMutex(state, lockR, sym);
411e5dd7070Spatrick
412e5dd7070Spatrick if (const LockState *LState = state->get<LockMap>(lockR)) {
413e5dd7070Spatrick if (LState->isLocked()) {
414a9ac8606Spatrick reportBug(C, BT_doublelock, MtxExpr, CheckKind,
415a9ac8606Spatrick "This lock has already been acquired");
416e5dd7070Spatrick return;
417e5dd7070Spatrick } else if (LState->isDestroyed()) {
418a9ac8606Spatrick reportBug(C, BT_destroylock, MtxExpr, CheckKind,
419a9ac8606Spatrick "This lock has already been destroyed");
420e5dd7070Spatrick return;
421e5dd7070Spatrick }
422e5dd7070Spatrick }
423e5dd7070Spatrick
424e5dd7070Spatrick ProgramStateRef lockSucc = state;
425a9ac8606Spatrick if (IsTryLock) {
426e5dd7070Spatrick // Bifurcate the state, and allow a mode where the lock acquisition fails.
427ec727ea7Spatrick SVal RetVal = Call.getReturnValue();
428ec727ea7Spatrick if (auto DefinedRetVal = RetVal.getAs<DefinedSVal>()) {
429e5dd7070Spatrick ProgramStateRef lockFail;
430a9ac8606Spatrick switch (Semantics) {
431e5dd7070Spatrick case PthreadSemantics:
432ec727ea7Spatrick std::tie(lockFail, lockSucc) = state->assume(*DefinedRetVal);
433e5dd7070Spatrick break;
434e5dd7070Spatrick case XNUSemantics:
435ec727ea7Spatrick std::tie(lockSucc, lockFail) = state->assume(*DefinedRetVal);
436e5dd7070Spatrick break;
437e5dd7070Spatrick default:
438e5dd7070Spatrick llvm_unreachable("Unknown tryLock locking semantics");
439e5dd7070Spatrick }
440e5dd7070Spatrick assert(lockFail && lockSucc);
441e5dd7070Spatrick C.addTransition(lockFail);
442ec727ea7Spatrick }
443ec727ea7Spatrick // We might want to handle the case when the mutex lock function was inlined
444ec727ea7Spatrick // and returned an Unknown or Undefined value.
445a9ac8606Spatrick } else if (Semantics == PthreadSemantics) {
446e5dd7070Spatrick // Assume that the return value was 0.
447ec727ea7Spatrick SVal RetVal = Call.getReturnValue();
448ec727ea7Spatrick if (auto DefinedRetVal = RetVal.getAs<DefinedSVal>()) {
449ec727ea7Spatrick // FIXME: If the lock function was inlined and returned true,
450ec727ea7Spatrick // we need to behave sanely - at least generate sink.
451ec727ea7Spatrick lockSucc = state->assume(*DefinedRetVal, false);
452e5dd7070Spatrick assert(lockSucc);
453ec727ea7Spatrick }
454ec727ea7Spatrick // We might want to handle the case when the mutex lock function was inlined
455ec727ea7Spatrick // and returned an Unknown or Undefined value.
456e5dd7070Spatrick } else {
457e5dd7070Spatrick // XNU locking semantics return void on non-try locks
458a9ac8606Spatrick assert((Semantics == XNUSemantics) && "Unknown locking semantics");
459e5dd7070Spatrick lockSucc = state;
460e5dd7070Spatrick }
461e5dd7070Spatrick
462e5dd7070Spatrick // Record that the lock was acquired.
463e5dd7070Spatrick lockSucc = lockSucc->add<LockSet>(lockR);
464e5dd7070Spatrick lockSucc = lockSucc->set<LockMap>(lockR, LockState::getLocked());
465e5dd7070Spatrick C.addTransition(lockSucc);
466e5dd7070Spatrick }
467e5dd7070Spatrick
ReleaseAnyLock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const468ec727ea7Spatrick void PthreadLockChecker::ReleaseAnyLock(const CallEvent &Call,
469ec727ea7Spatrick CheckerContext &C,
470a9ac8606Spatrick CheckerKind CheckKind) const {
471a9ac8606Spatrick ReleaseLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), CheckKind);
472ec727ea7Spatrick }
473ec727ea7Spatrick
ReleaseLockAux(const CallEvent & Call,CheckerContext & C,const Expr * MtxExpr,SVal MtxVal,CheckerKind CheckKind) const474ec727ea7Spatrick void PthreadLockChecker::ReleaseLockAux(const CallEvent &Call,
475a9ac8606Spatrick CheckerContext &C, const Expr *MtxExpr,
476a9ac8606Spatrick SVal MtxVal,
477a9ac8606Spatrick CheckerKind CheckKind) const {
478a9ac8606Spatrick if (!ChecksEnabled[CheckKind])
479ec727ea7Spatrick return;
480e5dd7070Spatrick
481a9ac8606Spatrick const MemRegion *lockR = MtxVal.getAsRegion();
482e5dd7070Spatrick if (!lockR)
483e5dd7070Spatrick return;
484e5dd7070Spatrick
485e5dd7070Spatrick ProgramStateRef state = C.getState();
486e5dd7070Spatrick const SymbolRef *sym = state->get<DestroyRetVal>(lockR);
487e5dd7070Spatrick if (sym)
488e5dd7070Spatrick state = resolvePossiblyDestroyedMutex(state, lockR, sym);
489e5dd7070Spatrick
490e5dd7070Spatrick if (const LockState *LState = state->get<LockMap>(lockR)) {
491e5dd7070Spatrick if (LState->isUnlocked()) {
492a9ac8606Spatrick reportBug(C, BT_doubleunlock, MtxExpr, CheckKind,
493a9ac8606Spatrick "This lock has already been unlocked");
494e5dd7070Spatrick return;
495e5dd7070Spatrick } else if (LState->isDestroyed()) {
496a9ac8606Spatrick reportBug(C, BT_destroylock, MtxExpr, CheckKind,
497a9ac8606Spatrick "This lock has already been destroyed");
498e5dd7070Spatrick return;
499e5dd7070Spatrick }
500e5dd7070Spatrick }
501e5dd7070Spatrick
502e5dd7070Spatrick LockSetTy LS = state->get<LockSet>();
503e5dd7070Spatrick
504e5dd7070Spatrick if (!LS.isEmpty()) {
505e5dd7070Spatrick const MemRegion *firstLockR = LS.getHead();
506e5dd7070Spatrick if (firstLockR != lockR) {
507a9ac8606Spatrick reportBug(C, BT_lor, MtxExpr, CheckKind,
508a9ac8606Spatrick "This was not the most recently acquired lock. Possible lock "
509a9ac8606Spatrick "order reversal");
510e5dd7070Spatrick return;
511e5dd7070Spatrick }
512e5dd7070Spatrick // Record that the lock was released.
513e5dd7070Spatrick state = state->set<LockSet>(LS.getTail());
514e5dd7070Spatrick }
515e5dd7070Spatrick
516e5dd7070Spatrick state = state->set<LockMap>(lockR, LockState::getUnlocked());
517e5dd7070Spatrick C.addTransition(state);
518e5dd7070Spatrick }
519e5dd7070Spatrick
DestroyPthreadLock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const520ec727ea7Spatrick void PthreadLockChecker::DestroyPthreadLock(const CallEvent &Call,
521ec727ea7Spatrick CheckerContext &C,
522a9ac8606Spatrick CheckerKind CheckKind) const {
523a9ac8606Spatrick DestroyLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0),
524a9ac8606Spatrick PthreadSemantics, CheckKind);
525ec727ea7Spatrick }
526ec727ea7Spatrick
DestroyXNULock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const527ec727ea7Spatrick void PthreadLockChecker::DestroyXNULock(const CallEvent &Call,
528ec727ea7Spatrick CheckerContext &C,
529a9ac8606Spatrick CheckerKind CheckKind) const {
530a9ac8606Spatrick DestroyLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), XNUSemantics,
531a9ac8606Spatrick CheckKind);
532ec727ea7Spatrick }
533ec727ea7Spatrick
DestroyLockAux(const CallEvent & Call,CheckerContext & C,const Expr * MtxExpr,SVal MtxVal,enum LockingSemantics Semantics,CheckerKind CheckKind) const534ec727ea7Spatrick void PthreadLockChecker::DestroyLockAux(const CallEvent &Call,
535a9ac8606Spatrick CheckerContext &C, const Expr *MtxExpr,
536a9ac8606Spatrick SVal MtxVal,
537a9ac8606Spatrick enum LockingSemantics Semantics,
538a9ac8606Spatrick CheckerKind CheckKind) const {
539a9ac8606Spatrick if (!ChecksEnabled[CheckKind])
540ec727ea7Spatrick return;
541e5dd7070Spatrick
542a9ac8606Spatrick const MemRegion *LockR = MtxVal.getAsRegion();
543e5dd7070Spatrick if (!LockR)
544e5dd7070Spatrick return;
545e5dd7070Spatrick
546e5dd7070Spatrick ProgramStateRef State = C.getState();
547e5dd7070Spatrick
548e5dd7070Spatrick const SymbolRef *sym = State->get<DestroyRetVal>(LockR);
549e5dd7070Spatrick if (sym)
550e5dd7070Spatrick State = resolvePossiblyDestroyedMutex(State, LockR, sym);
551e5dd7070Spatrick
552e5dd7070Spatrick const LockState *LState = State->get<LockMap>(LockR);
553e5dd7070Spatrick // Checking the return value of the destroy method only in the case of
554e5dd7070Spatrick // PthreadSemantics
555a9ac8606Spatrick if (Semantics == PthreadSemantics) {
556e5dd7070Spatrick if (!LState || LState->isUnlocked()) {
557ec727ea7Spatrick SymbolRef sym = Call.getReturnValue().getAsSymbol();
558e5dd7070Spatrick if (!sym) {
559e5dd7070Spatrick State = State->remove<LockMap>(LockR);
560e5dd7070Spatrick C.addTransition(State);
561e5dd7070Spatrick return;
562e5dd7070Spatrick }
563e5dd7070Spatrick State = State->set<DestroyRetVal>(LockR, sym);
564e5dd7070Spatrick if (LState && LState->isUnlocked())
565e5dd7070Spatrick State = State->set<LockMap>(
566e5dd7070Spatrick LockR, LockState::getUnlockedAndPossiblyDestroyed());
567e5dd7070Spatrick else
568e5dd7070Spatrick State = State->set<LockMap>(
569e5dd7070Spatrick LockR, LockState::getUntouchedAndPossiblyDestroyed());
570e5dd7070Spatrick C.addTransition(State);
571e5dd7070Spatrick return;
572e5dd7070Spatrick }
573e5dd7070Spatrick } else {
574e5dd7070Spatrick if (!LState || LState->isUnlocked()) {
575e5dd7070Spatrick State = State->set<LockMap>(LockR, LockState::getDestroyed());
576e5dd7070Spatrick C.addTransition(State);
577e5dd7070Spatrick return;
578e5dd7070Spatrick }
579e5dd7070Spatrick }
580e5dd7070Spatrick
581a9ac8606Spatrick StringRef Message = LState->isLocked()
582a9ac8606Spatrick ? "This lock is still locked"
583a9ac8606Spatrick : "This lock has already been destroyed";
584e5dd7070Spatrick
585a9ac8606Spatrick reportBug(C, BT_destroylock, MtxExpr, CheckKind, Message);
586e5dd7070Spatrick }
587e5dd7070Spatrick
InitAnyLock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const588ec727ea7Spatrick void PthreadLockChecker::InitAnyLock(const CallEvent &Call, CheckerContext &C,
589a9ac8606Spatrick CheckerKind CheckKind) const {
590a9ac8606Spatrick InitLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), CheckKind);
591ec727ea7Spatrick }
592ec727ea7Spatrick
InitLockAux(const CallEvent & Call,CheckerContext & C,const Expr * MtxExpr,SVal MtxVal,CheckerKind CheckKind) const593ec727ea7Spatrick void PthreadLockChecker::InitLockAux(const CallEvent &Call, CheckerContext &C,
594a9ac8606Spatrick const Expr *MtxExpr, SVal MtxVal,
595a9ac8606Spatrick CheckerKind CheckKind) const {
596a9ac8606Spatrick if (!ChecksEnabled[CheckKind])
597ec727ea7Spatrick return;
598e5dd7070Spatrick
599a9ac8606Spatrick const MemRegion *LockR = MtxVal.getAsRegion();
600e5dd7070Spatrick if (!LockR)
601e5dd7070Spatrick return;
602e5dd7070Spatrick
603e5dd7070Spatrick ProgramStateRef State = C.getState();
604e5dd7070Spatrick
605e5dd7070Spatrick const SymbolRef *sym = State->get<DestroyRetVal>(LockR);
606e5dd7070Spatrick if (sym)
607e5dd7070Spatrick State = resolvePossiblyDestroyedMutex(State, LockR, sym);
608e5dd7070Spatrick
609e5dd7070Spatrick const struct LockState *LState = State->get<LockMap>(LockR);
610e5dd7070Spatrick if (!LState || LState->isDestroyed()) {
611e5dd7070Spatrick State = State->set<LockMap>(LockR, LockState::getUnlocked());
612e5dd7070Spatrick C.addTransition(State);
613e5dd7070Spatrick return;
614e5dd7070Spatrick }
615e5dd7070Spatrick
616a9ac8606Spatrick StringRef Message = LState->isLocked()
617a9ac8606Spatrick ? "This lock is still being held"
618a9ac8606Spatrick : "This lock has already been initialized";
619e5dd7070Spatrick
620a9ac8606Spatrick reportBug(C, BT_initlock, MtxExpr, CheckKind, Message);
621e5dd7070Spatrick }
622e5dd7070Spatrick
reportBug(CheckerContext & C,std::unique_ptr<BugType> BT[],const Expr * MtxExpr,CheckerKind CheckKind,StringRef Desc) const623a9ac8606Spatrick void PthreadLockChecker::reportBug(CheckerContext &C,
624a9ac8606Spatrick std::unique_ptr<BugType> BT[],
625a9ac8606Spatrick const Expr *MtxExpr, CheckerKind CheckKind,
626a9ac8606Spatrick StringRef Desc) const {
627e5dd7070Spatrick ExplodedNode *N = C.generateErrorNode();
628e5dd7070Spatrick if (!N)
629e5dd7070Spatrick return;
630a9ac8606Spatrick initBugType(CheckKind);
631a9ac8606Spatrick auto Report =
632a9ac8606Spatrick std::make_unique<PathSensitiveBugReport>(*BT[CheckKind], Desc, N);
633a9ac8606Spatrick Report->addRange(MtxExpr->getSourceRange());
634e5dd7070Spatrick C.emitReport(std::move(Report));
635e5dd7070Spatrick }
636e5dd7070Spatrick
checkDeadSymbols(SymbolReaper & SymReaper,CheckerContext & C) const637e5dd7070Spatrick void PthreadLockChecker::checkDeadSymbols(SymbolReaper &SymReaper,
638e5dd7070Spatrick CheckerContext &C) const {
639e5dd7070Spatrick ProgramStateRef State = C.getState();
640e5dd7070Spatrick
641ec727ea7Spatrick for (auto I : State->get<DestroyRetVal>()) {
642ec727ea7Spatrick // Once the return value symbol dies, no more checks can be performed
643ec727ea7Spatrick // against it. See if the return value was checked before this point.
644ec727ea7Spatrick // This would remove the symbol from the map as well.
645ec727ea7Spatrick if (SymReaper.isDead(I.second))
646ec727ea7Spatrick State = resolvePossiblyDestroyedMutex(State, I.first, &I.second);
647e5dd7070Spatrick }
648ec727ea7Spatrick
649ec727ea7Spatrick for (auto I : State->get<LockMap>()) {
650ec727ea7Spatrick // Stop tracking dead mutex regions as well.
651a9ac8606Spatrick if (!SymReaper.isLiveRegion(I.first)) {
652ec727ea7Spatrick State = State->remove<LockMap>(I.first);
653a9ac8606Spatrick State = State->remove<DestroyRetVal>(I.first);
654a9ac8606Spatrick }
655ec727ea7Spatrick }
656ec727ea7Spatrick
657ec727ea7Spatrick // TODO: We probably need to clean up the lock stack as well.
658ec727ea7Spatrick // It is tricky though: even if the mutex cannot be unlocked anymore,
659ec727ea7Spatrick // it can still participate in lock order reversal resolution.
660ec727ea7Spatrick
661e5dd7070Spatrick C.addTransition(State);
662e5dd7070Spatrick }
663e5dd7070Spatrick
checkRegionChanges(ProgramStateRef State,const InvalidatedSymbols * Symbols,ArrayRef<const MemRegion * > ExplicitRegions,ArrayRef<const MemRegion * > Regions,const LocationContext * LCtx,const CallEvent * Call) const664ec727ea7Spatrick ProgramStateRef PthreadLockChecker::checkRegionChanges(
665ec727ea7Spatrick ProgramStateRef State, const InvalidatedSymbols *Symbols,
666ec727ea7Spatrick ArrayRef<const MemRegion *> ExplicitRegions,
667ec727ea7Spatrick ArrayRef<const MemRegion *> Regions, const LocationContext *LCtx,
668ec727ea7Spatrick const CallEvent *Call) const {
669ec727ea7Spatrick
670ec727ea7Spatrick bool IsLibraryFunction = false;
671ec727ea7Spatrick if (Call && Call->isGlobalCFunction()) {
672ec727ea7Spatrick // Avoid invalidating mutex state when a known supported function is called.
673ec727ea7Spatrick if (PThreadCallbacks.lookup(*Call) || FuchsiaCallbacks.lookup(*Call) ||
674ec727ea7Spatrick C11Callbacks.lookup(*Call))
675ec727ea7Spatrick return State;
676ec727ea7Spatrick
677ec727ea7Spatrick if (Call->isInSystemHeader())
678ec727ea7Spatrick IsLibraryFunction = true;
679ec727ea7Spatrick }
680ec727ea7Spatrick
681ec727ea7Spatrick for (auto R : Regions) {
682ec727ea7Spatrick // We assume that system library function wouldn't touch the mutex unless
683ec727ea7Spatrick // it takes the mutex explicitly as an argument.
684ec727ea7Spatrick // FIXME: This is a bit quadratic.
685*12c85518Srobert if (IsLibraryFunction && !llvm::is_contained(ExplicitRegions, R))
686ec727ea7Spatrick continue;
687ec727ea7Spatrick
688ec727ea7Spatrick State = State->remove<LockMap>(R);
689ec727ea7Spatrick State = State->remove<DestroyRetVal>(R);
690ec727ea7Spatrick
691ec727ea7Spatrick // TODO: We need to invalidate the lock stack as well. This is tricky
692ec727ea7Spatrick // to implement correctly and efficiently though, because the effects
693ec727ea7Spatrick // of mutex escapes on lock order may be fairly varied.
694ec727ea7Spatrick }
695ec727ea7Spatrick
696ec727ea7Spatrick return State;
697ec727ea7Spatrick }
698ec727ea7Spatrick
registerPthreadLockBase(CheckerManager & mgr)699ec727ea7Spatrick void ento::registerPthreadLockBase(CheckerManager &mgr) {
700e5dd7070Spatrick mgr.registerChecker<PthreadLockChecker>();
701e5dd7070Spatrick }
702e5dd7070Spatrick
shouldRegisterPthreadLockBase(const CheckerManager & mgr)703ec727ea7Spatrick bool ento::shouldRegisterPthreadLockBase(const CheckerManager &mgr) { return true; }
704ec727ea7Spatrick
705ec727ea7Spatrick #define REGISTER_CHECKER(name) \
706ec727ea7Spatrick void ento::register##name(CheckerManager &mgr) { \
707ec727ea7Spatrick PthreadLockChecker *checker = mgr.getChecker<PthreadLockChecker>(); \
708ec727ea7Spatrick checker->ChecksEnabled[PthreadLockChecker::CK_##name] = true; \
709ec727ea7Spatrick checker->CheckNames[PthreadLockChecker::CK_##name] = \
710ec727ea7Spatrick mgr.getCurrentCheckerName(); \
711ec727ea7Spatrick } \
712ec727ea7Spatrick \
713ec727ea7Spatrick bool ento::shouldRegister##name(const CheckerManager &mgr) { return true; }
714ec727ea7Spatrick
715ec727ea7Spatrick REGISTER_CHECKER(PthreadLockChecker)
716ec727ea7Spatrick REGISTER_CHECKER(FuchsiaLockChecker)
717ec727ea7Spatrick REGISTER_CHECKER(C11LockChecker)
718