xref: /freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/PthreadLockChecker.cpp (revision 06c3fb2749bda94cb5201f81ffdb8fa6c3161b2e)
10b57cec5SDimitry Andric //===--- PthreadLockChecker.cpp - Check for locking problems ---*- C++ -*--===//
20b57cec5SDimitry Andric //
30b57cec5SDimitry Andric // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
40b57cec5SDimitry Andric // See https://llvm.org/LICENSE.txt for license information.
50b57cec5SDimitry Andric // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
60b57cec5SDimitry Andric //
70b57cec5SDimitry Andric //===----------------------------------------------------------------------===//
80b57cec5SDimitry Andric //
95ffd83dbSDimitry Andric // This file defines:
105ffd83dbSDimitry Andric //  * PthreadLockChecker, a simple lock -> unlock checker.
115ffd83dbSDimitry Andric //    Which also checks for XNU locks, which behave similarly enough to share
125ffd83dbSDimitry Andric //    code.
135ffd83dbSDimitry Andric //  * FuchsiaLocksChecker, which is also rather similar.
145ffd83dbSDimitry Andric //  * C11LockChecker which also closely follows Pthread semantics.
155ffd83dbSDimitry Andric //
165ffd83dbSDimitry Andric //  TODO: Path notes.
170b57cec5SDimitry Andric //
180b57cec5SDimitry Andric //===----------------------------------------------------------------------===//
190b57cec5SDimitry Andric 
200b57cec5SDimitry Andric #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
210b57cec5SDimitry Andric #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
220b57cec5SDimitry Andric #include "clang/StaticAnalyzer/Core/Checker.h"
230b57cec5SDimitry Andric #include "clang/StaticAnalyzer/Core/CheckerManager.h"
24349cc55cSDimitry Andric #include "clang/StaticAnalyzer/Core/PathSensitive/CallDescription.h"
255ffd83dbSDimitry Andric #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
260b57cec5SDimitry Andric #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
270b57cec5SDimitry Andric 
280b57cec5SDimitry Andric using namespace clang;
290b57cec5SDimitry Andric using namespace ento;
300b57cec5SDimitry Andric 
310b57cec5SDimitry Andric namespace {
320b57cec5SDimitry Andric 
330b57cec5SDimitry Andric struct LockState {
340b57cec5SDimitry Andric   enum Kind {
350b57cec5SDimitry Andric     Destroyed,
360b57cec5SDimitry Andric     Locked,
370b57cec5SDimitry Andric     Unlocked,
380b57cec5SDimitry Andric     UntouchedAndPossiblyDestroyed,
390b57cec5SDimitry Andric     UnlockedAndPossiblyDestroyed
400b57cec5SDimitry Andric   } K;
410b57cec5SDimitry Andric 
420b57cec5SDimitry Andric private:
430b57cec5SDimitry Andric   LockState(Kind K) : K(K) {}
440b57cec5SDimitry Andric 
450b57cec5SDimitry Andric public:
460b57cec5SDimitry Andric   static LockState getLocked() { return LockState(Locked); }
470b57cec5SDimitry Andric   static LockState getUnlocked() { return LockState(Unlocked); }
480b57cec5SDimitry Andric   static LockState getDestroyed() { return LockState(Destroyed); }
490b57cec5SDimitry Andric   static LockState getUntouchedAndPossiblyDestroyed() {
500b57cec5SDimitry Andric     return LockState(UntouchedAndPossiblyDestroyed);
510b57cec5SDimitry Andric   }
520b57cec5SDimitry Andric   static LockState getUnlockedAndPossiblyDestroyed() {
530b57cec5SDimitry Andric     return LockState(UnlockedAndPossiblyDestroyed);
540b57cec5SDimitry Andric   }
550b57cec5SDimitry Andric 
565ffd83dbSDimitry Andric   bool operator==(const LockState &X) const { return K == X.K; }
570b57cec5SDimitry Andric 
580b57cec5SDimitry Andric   bool isLocked() const { return K == Locked; }
590b57cec5SDimitry Andric   bool isUnlocked() const { return K == Unlocked; }
600b57cec5SDimitry Andric   bool isDestroyed() const { return K == Destroyed; }
610b57cec5SDimitry Andric   bool isUntouchedAndPossiblyDestroyed() const {
620b57cec5SDimitry Andric     return K == UntouchedAndPossiblyDestroyed;
630b57cec5SDimitry Andric   }
640b57cec5SDimitry Andric   bool isUnlockedAndPossiblyDestroyed() const {
650b57cec5SDimitry Andric     return K == UnlockedAndPossiblyDestroyed;
660b57cec5SDimitry Andric   }
670b57cec5SDimitry Andric 
685ffd83dbSDimitry Andric   void Profile(llvm::FoldingSetNodeID &ID) const { ID.AddInteger(K); }
690b57cec5SDimitry Andric };
700b57cec5SDimitry Andric 
715ffd83dbSDimitry Andric class PthreadLockChecker : public Checker<check::PostCall, check::DeadSymbols,
725ffd83dbSDimitry Andric                                           check::RegionChanges> {
730b57cec5SDimitry Andric public:
745ffd83dbSDimitry Andric   enum LockingSemantics { NotApplicable = 0, PthreadSemantics, XNUSemantics };
755ffd83dbSDimitry Andric   enum CheckerKind {
765ffd83dbSDimitry Andric     CK_PthreadLockChecker,
775ffd83dbSDimitry Andric     CK_FuchsiaLockChecker,
785ffd83dbSDimitry Andric     CK_C11LockChecker,
795ffd83dbSDimitry Andric     CK_NumCheckKinds
805ffd83dbSDimitry Andric   };
8181ad6265SDimitry Andric   bool ChecksEnabled[CK_NumCheckKinds] = {false};
825ffd83dbSDimitry Andric   CheckerNameRef CheckNames[CK_NumCheckKinds];
830b57cec5SDimitry Andric 
845ffd83dbSDimitry Andric private:
855ffd83dbSDimitry Andric   typedef void (PthreadLockChecker::*FnCheck)(const CallEvent &Call,
865ffd83dbSDimitry Andric                                               CheckerContext &C,
87e8d8bef9SDimitry Andric                                               CheckerKind CheckKind) const;
885ffd83dbSDimitry Andric   CallDescriptionMap<FnCheck> PThreadCallbacks = {
895ffd83dbSDimitry Andric       // Init.
90bdd1243dSDimitry Andric       {{{"pthread_mutex_init"}, 2}, &PthreadLockChecker::InitAnyLock},
915ffd83dbSDimitry Andric       // TODO: pthread_rwlock_init(2 arguments).
925ffd83dbSDimitry Andric       // TODO: lck_mtx_init(3 arguments).
935ffd83dbSDimitry Andric       // TODO: lck_mtx_alloc_init(2 arguments) => returns the mutex.
945ffd83dbSDimitry Andric       // TODO: lck_rw_init(3 arguments).
955ffd83dbSDimitry Andric       // TODO: lck_rw_alloc_init(2 arguments) => returns the mutex.
960b57cec5SDimitry Andric 
975ffd83dbSDimitry Andric       // Acquire.
98bdd1243dSDimitry Andric       {{{"pthread_mutex_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
99bdd1243dSDimitry Andric       {{{"pthread_rwlock_rdlock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
100bdd1243dSDimitry Andric       {{{"pthread_rwlock_wrlock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
101bdd1243dSDimitry Andric       {{{"lck_mtx_lock"}, 1}, &PthreadLockChecker::AcquireXNULock},
102bdd1243dSDimitry Andric       {{{"lck_rw_lock_exclusive"}, 1}, &PthreadLockChecker::AcquireXNULock},
103bdd1243dSDimitry Andric       {{{"lck_rw_lock_shared"}, 1}, &PthreadLockChecker::AcquireXNULock},
1045ffd83dbSDimitry Andric 
1055ffd83dbSDimitry Andric       // Try.
106bdd1243dSDimitry Andric       {{{"pthread_mutex_trylock"}, 1}, &PthreadLockChecker::TryPthreadLock},
107bdd1243dSDimitry Andric       {{{"pthread_rwlock_tryrdlock"}, 1}, &PthreadLockChecker::TryPthreadLock},
108bdd1243dSDimitry Andric       {{{"pthread_rwlock_trywrlock"}, 1}, &PthreadLockChecker::TryPthreadLock},
109bdd1243dSDimitry Andric       {{{"lck_mtx_try_lock"}, 1}, &PthreadLockChecker::TryXNULock},
110bdd1243dSDimitry Andric       {{{"lck_rw_try_lock_exclusive"}, 1}, &PthreadLockChecker::TryXNULock},
111bdd1243dSDimitry Andric       {{{"lck_rw_try_lock_shared"}, 1}, &PthreadLockChecker::TryXNULock},
1125ffd83dbSDimitry Andric 
1135ffd83dbSDimitry Andric       // Release.
114bdd1243dSDimitry Andric       {{{"pthread_mutex_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
115bdd1243dSDimitry Andric       {{{"pthread_rwlock_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
116bdd1243dSDimitry Andric       {{{"lck_mtx_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
117bdd1243dSDimitry Andric       {{{"lck_rw_unlock_exclusive"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
118bdd1243dSDimitry Andric       {{{"lck_rw_unlock_shared"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
119bdd1243dSDimitry Andric       {{{"lck_rw_done"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
1205ffd83dbSDimitry Andric 
1215ffd83dbSDimitry Andric       // Destroy.
122bdd1243dSDimitry Andric       {{{"pthread_mutex_destroy"}, 1}, &PthreadLockChecker::DestroyPthreadLock},
123bdd1243dSDimitry Andric       {{{"lck_mtx_destroy"}, 2}, &PthreadLockChecker::DestroyXNULock},
1245ffd83dbSDimitry Andric       // TODO: pthread_rwlock_destroy(1 argument).
1255ffd83dbSDimitry Andric       // TODO: lck_rw_destroy(2 arguments).
1265ffd83dbSDimitry Andric   };
1275ffd83dbSDimitry Andric 
1285ffd83dbSDimitry Andric   CallDescriptionMap<FnCheck> FuchsiaCallbacks = {
1295ffd83dbSDimitry Andric       // Init.
130bdd1243dSDimitry Andric       {{{"spin_lock_init"}, 1}, &PthreadLockChecker::InitAnyLock},
1315ffd83dbSDimitry Andric 
1325ffd83dbSDimitry Andric       // Acquire.
133bdd1243dSDimitry Andric       {{{"spin_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
134bdd1243dSDimitry Andric       {{{"spin_lock_save"}, 3}, &PthreadLockChecker::AcquirePthreadLock},
135bdd1243dSDimitry Andric       {{{"sync_mutex_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
136bdd1243dSDimitry Andric       {{{"sync_mutex_lock_with_waiter"}, 1},
1375ffd83dbSDimitry Andric        &PthreadLockChecker::AcquirePthreadLock},
1385ffd83dbSDimitry Andric 
1395ffd83dbSDimitry Andric       // Try.
140bdd1243dSDimitry Andric       {{{"spin_trylock"}, 1}, &PthreadLockChecker::TryFuchsiaLock},
141bdd1243dSDimitry Andric       {{{"sync_mutex_trylock"}, 1}, &PthreadLockChecker::TryFuchsiaLock},
142bdd1243dSDimitry Andric       {{{"sync_mutex_timedlock"}, 2}, &PthreadLockChecker::TryFuchsiaLock},
1435ffd83dbSDimitry Andric 
1445ffd83dbSDimitry Andric       // Release.
145bdd1243dSDimitry Andric       {{{"spin_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
146bdd1243dSDimitry Andric       {{{"spin_unlock_restore"}, 3}, &PthreadLockChecker::ReleaseAnyLock},
147bdd1243dSDimitry Andric       {{{"sync_mutex_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
1485ffd83dbSDimitry Andric   };
1495ffd83dbSDimitry Andric 
1505ffd83dbSDimitry Andric   CallDescriptionMap<FnCheck> C11Callbacks = {
1515ffd83dbSDimitry Andric       // Init.
152bdd1243dSDimitry Andric       {{{"mtx_init"}, 2}, &PthreadLockChecker::InitAnyLock},
1535ffd83dbSDimitry Andric 
1545ffd83dbSDimitry Andric       // Acquire.
155bdd1243dSDimitry Andric       {{{"mtx_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
1565ffd83dbSDimitry Andric 
1575ffd83dbSDimitry Andric       // Try.
158bdd1243dSDimitry Andric       {{{"mtx_trylock"}, 1}, &PthreadLockChecker::TryC11Lock},
159bdd1243dSDimitry Andric       {{{"mtx_timedlock"}, 2}, &PthreadLockChecker::TryC11Lock},
1605ffd83dbSDimitry Andric 
1615ffd83dbSDimitry Andric       // Release.
162bdd1243dSDimitry Andric       {{{"mtx_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
1635ffd83dbSDimitry Andric 
1645ffd83dbSDimitry Andric       // Destroy
165bdd1243dSDimitry Andric       {{{"mtx_destroy"}, 1}, &PthreadLockChecker::DestroyPthreadLock},
1665ffd83dbSDimitry Andric   };
1675ffd83dbSDimitry Andric 
1680b57cec5SDimitry Andric   ProgramStateRef resolvePossiblyDestroyedMutex(ProgramStateRef state,
1690b57cec5SDimitry Andric                                                 const MemRegion *lockR,
1700b57cec5SDimitry Andric                                                 const SymbolRef *sym) const;
171e8d8bef9SDimitry Andric   void reportBug(CheckerContext &C, std::unique_ptr<BugType> BT[],
172e8d8bef9SDimitry Andric                  const Expr *MtxExpr, CheckerKind CheckKind,
173e8d8bef9SDimitry Andric                  StringRef Desc) const;
1745ffd83dbSDimitry Andric 
1755ffd83dbSDimitry Andric   // Init.
1765ffd83dbSDimitry Andric   void InitAnyLock(const CallEvent &Call, CheckerContext &C,
177e8d8bef9SDimitry Andric                    CheckerKind CheckKind) const;
178e8d8bef9SDimitry Andric   void InitLockAux(const CallEvent &Call, CheckerContext &C,
179e8d8bef9SDimitry Andric                    const Expr *MtxExpr, SVal MtxVal,
180e8d8bef9SDimitry Andric                    CheckerKind CheckKind) const;
1815ffd83dbSDimitry Andric 
1825ffd83dbSDimitry Andric   // Lock, Try-lock.
1835ffd83dbSDimitry Andric   void AcquirePthreadLock(const CallEvent &Call, CheckerContext &C,
184e8d8bef9SDimitry Andric                           CheckerKind CheckKind) const;
1855ffd83dbSDimitry Andric   void AcquireXNULock(const CallEvent &Call, CheckerContext &C,
186e8d8bef9SDimitry Andric                       CheckerKind CheckKind) const;
1875ffd83dbSDimitry Andric   void TryPthreadLock(const CallEvent &Call, CheckerContext &C,
188e8d8bef9SDimitry Andric                       CheckerKind CheckKind) const;
1895ffd83dbSDimitry Andric   void TryXNULock(const CallEvent &Call, CheckerContext &C,
190e8d8bef9SDimitry Andric                   CheckerKind CheckKind) const;
1915ffd83dbSDimitry Andric   void TryFuchsiaLock(const CallEvent &Call, CheckerContext &C,
192e8d8bef9SDimitry Andric                       CheckerKind CheckKind) const;
1935ffd83dbSDimitry Andric   void TryC11Lock(const CallEvent &Call, CheckerContext &C,
194e8d8bef9SDimitry Andric                   CheckerKind CheckKind) const;
195e8d8bef9SDimitry Andric   void AcquireLockAux(const CallEvent &Call, CheckerContext &C,
196e8d8bef9SDimitry Andric                       const Expr *MtxExpr, SVal MtxVal, bool IsTryLock,
197e8d8bef9SDimitry Andric                       LockingSemantics Semantics, CheckerKind CheckKind) const;
1985ffd83dbSDimitry Andric 
1995ffd83dbSDimitry Andric   // Release.
2005ffd83dbSDimitry Andric   void ReleaseAnyLock(const CallEvent &Call, CheckerContext &C,
201e8d8bef9SDimitry Andric                       CheckerKind CheckKind) const;
202e8d8bef9SDimitry Andric   void ReleaseLockAux(const CallEvent &Call, CheckerContext &C,
203e8d8bef9SDimitry Andric                       const Expr *MtxExpr, SVal MtxVal,
204e8d8bef9SDimitry Andric                       CheckerKind CheckKind) const;
2055ffd83dbSDimitry Andric 
2065ffd83dbSDimitry Andric   // Destroy.
2075ffd83dbSDimitry Andric   void DestroyPthreadLock(const CallEvent &Call, CheckerContext &C,
208e8d8bef9SDimitry Andric                           CheckerKind CheckKind) const;
2095ffd83dbSDimitry Andric   void DestroyXNULock(const CallEvent &Call, CheckerContext &C,
210e8d8bef9SDimitry Andric                       CheckerKind CheckKind) const;
211e8d8bef9SDimitry Andric   void DestroyLockAux(const CallEvent &Call, CheckerContext &C,
212e8d8bef9SDimitry Andric                       const Expr *MtxExpr, SVal MtxVal,
213e8d8bef9SDimitry Andric                       LockingSemantics Semantics, CheckerKind CheckKind) const;
2145ffd83dbSDimitry Andric 
2155ffd83dbSDimitry Andric public:
2165ffd83dbSDimitry Andric   void checkPostCall(const CallEvent &Call, CheckerContext &C) const;
2175ffd83dbSDimitry Andric   void checkDeadSymbols(SymbolReaper &SymReaper, CheckerContext &C) const;
2185ffd83dbSDimitry Andric   ProgramStateRef
2195ffd83dbSDimitry Andric   checkRegionChanges(ProgramStateRef State, const InvalidatedSymbols *Symbols,
2205ffd83dbSDimitry Andric                      ArrayRef<const MemRegion *> ExplicitRegions,
2215ffd83dbSDimitry Andric                      ArrayRef<const MemRegion *> Regions,
2225ffd83dbSDimitry Andric                      const LocationContext *LCtx, const CallEvent *Call) const;
2235ffd83dbSDimitry Andric   void printState(raw_ostream &Out, ProgramStateRef State, const char *NL,
2245ffd83dbSDimitry Andric                   const char *Sep) const override;
2255ffd83dbSDimitry Andric 
2265ffd83dbSDimitry Andric private:
2275ffd83dbSDimitry Andric   mutable std::unique_ptr<BugType> BT_doublelock[CK_NumCheckKinds];
2285ffd83dbSDimitry Andric   mutable std::unique_ptr<BugType> BT_doubleunlock[CK_NumCheckKinds];
2295ffd83dbSDimitry Andric   mutable std::unique_ptr<BugType> BT_destroylock[CK_NumCheckKinds];
2305ffd83dbSDimitry Andric   mutable std::unique_ptr<BugType> BT_initlock[CK_NumCheckKinds];
2315ffd83dbSDimitry Andric   mutable std::unique_ptr<BugType> BT_lor[CK_NumCheckKinds];
2325ffd83dbSDimitry Andric 
233e8d8bef9SDimitry Andric   void initBugType(CheckerKind CheckKind) const {
234e8d8bef9SDimitry Andric     if (BT_doublelock[CheckKind])
2355ffd83dbSDimitry Andric       return;
236e8d8bef9SDimitry Andric     BT_doublelock[CheckKind].reset(
237e8d8bef9SDimitry Andric         new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"});
238e8d8bef9SDimitry Andric     BT_doubleunlock[CheckKind].reset(
239e8d8bef9SDimitry Andric         new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"});
240e8d8bef9SDimitry Andric     BT_destroylock[CheckKind].reset(new BugType{
241e8d8bef9SDimitry Andric         CheckNames[CheckKind], "Use destroyed lock", "Lock checker"});
242e8d8bef9SDimitry Andric     BT_initlock[CheckKind].reset(new BugType{
243e8d8bef9SDimitry Andric         CheckNames[CheckKind], "Init invalid lock", "Lock checker"});
244e8d8bef9SDimitry Andric     BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind],
2455ffd83dbSDimitry Andric                                         "Lock order reversal", "Lock checker"});
2465ffd83dbSDimitry Andric   }
2470b57cec5SDimitry Andric };
2480b57cec5SDimitry Andric } // end anonymous namespace
2490b57cec5SDimitry Andric 
2500b57cec5SDimitry Andric // A stack of locks for tracking lock-unlock order.
2510b57cec5SDimitry Andric REGISTER_LIST_WITH_PROGRAMSTATE(LockSet, const MemRegion *)
2520b57cec5SDimitry Andric 
2530b57cec5SDimitry Andric // An entry for tracking lock states.
2540b57cec5SDimitry Andric REGISTER_MAP_WITH_PROGRAMSTATE(LockMap, const MemRegion *, LockState)
2550b57cec5SDimitry Andric 
2560b57cec5SDimitry Andric // Return values for unresolved calls to pthread_mutex_destroy().
2570b57cec5SDimitry Andric REGISTER_MAP_WITH_PROGRAMSTATE(DestroyRetVal, const MemRegion *, SymbolRef)
2580b57cec5SDimitry Andric 
2595ffd83dbSDimitry Andric void PthreadLockChecker::checkPostCall(const CallEvent &Call,
2600b57cec5SDimitry Andric                                        CheckerContext &C) const {
2615ffd83dbSDimitry Andric   // An additional umbrella check that all functions modeled by this checker
2625ffd83dbSDimitry Andric   // are global C functions.
2635ffd83dbSDimitry Andric   // TODO: Maybe make this the default behavior of CallDescription
2645ffd83dbSDimitry Andric   // with exactly one identifier?
2655ffd83dbSDimitry Andric   // FIXME: Try to handle cases when the implementation was inlined rather
2665ffd83dbSDimitry Andric   // than just giving up.
2675ffd83dbSDimitry Andric   if (!Call.isGlobalCFunction() || C.wasInlined)
2680b57cec5SDimitry Andric     return;
2690b57cec5SDimitry Andric 
2705ffd83dbSDimitry Andric   if (const FnCheck *Callback = PThreadCallbacks.lookup(Call))
2715ffd83dbSDimitry Andric     (this->**Callback)(Call, C, CK_PthreadLockChecker);
2725ffd83dbSDimitry Andric   else if (const FnCheck *Callback = FuchsiaCallbacks.lookup(Call))
2735ffd83dbSDimitry Andric     (this->**Callback)(Call, C, CK_FuchsiaLockChecker);
2745ffd83dbSDimitry Andric   else if (const FnCheck *Callback = C11Callbacks.lookup(Call))
2755ffd83dbSDimitry Andric     (this->**Callback)(Call, C, CK_C11LockChecker);
2760b57cec5SDimitry Andric }
2770b57cec5SDimitry Andric 
2780b57cec5SDimitry Andric // When a lock is destroyed, in some semantics(like PthreadSemantics) we are not
2790b57cec5SDimitry Andric // sure if the destroy call has succeeded or failed, and the lock enters one of
2800b57cec5SDimitry Andric // the 'possibly destroyed' state. There is a short time frame for the
2810b57cec5SDimitry Andric // programmer to check the return value to see if the lock was successfully
2820b57cec5SDimitry Andric // destroyed. Before we model the next operation over that lock, we call this
2830b57cec5SDimitry Andric // function to see if the return value was checked by now and set the lock state
2840b57cec5SDimitry Andric // - either to destroyed state or back to its previous state.
2850b57cec5SDimitry Andric 
2860b57cec5SDimitry Andric // In PthreadSemantics, pthread_mutex_destroy() returns zero if the lock is
2870b57cec5SDimitry Andric // successfully destroyed and it returns a non-zero value otherwise.
2880b57cec5SDimitry Andric ProgramStateRef PthreadLockChecker::resolvePossiblyDestroyedMutex(
2890b57cec5SDimitry Andric     ProgramStateRef state, const MemRegion *lockR, const SymbolRef *sym) const {
2900b57cec5SDimitry Andric   const LockState *lstate = state->get<LockMap>(lockR);
2910b57cec5SDimitry Andric   // Existence in DestroyRetVal ensures existence in LockMap.
2920b57cec5SDimitry Andric   // Existence in Destroyed also ensures that the lock state for lockR is either
2930b57cec5SDimitry Andric   // UntouchedAndPossiblyDestroyed or UnlockedAndPossiblyDestroyed.
294*06c3fb27SDimitry Andric   assert(lstate);
2950b57cec5SDimitry Andric   assert(lstate->isUntouchedAndPossiblyDestroyed() ||
2960b57cec5SDimitry Andric          lstate->isUnlockedAndPossiblyDestroyed());
2970b57cec5SDimitry Andric 
2980b57cec5SDimitry Andric   ConstraintManager &CMgr = state->getConstraintManager();
2990b57cec5SDimitry Andric   ConditionTruthVal retZero = CMgr.isNull(state, *sym);
3000b57cec5SDimitry Andric   if (retZero.isConstrainedFalse()) {
3010b57cec5SDimitry Andric     if (lstate->isUntouchedAndPossiblyDestroyed())
3020b57cec5SDimitry Andric       state = state->remove<LockMap>(lockR);
3030b57cec5SDimitry Andric     else if (lstate->isUnlockedAndPossiblyDestroyed())
3040b57cec5SDimitry Andric       state = state->set<LockMap>(lockR, LockState::getUnlocked());
3050b57cec5SDimitry Andric   } else
3060b57cec5SDimitry Andric     state = state->set<LockMap>(lockR, LockState::getDestroyed());
3070b57cec5SDimitry Andric 
3080b57cec5SDimitry Andric   // Removing the map entry (lockR, sym) from DestroyRetVal as the lock state is
3090b57cec5SDimitry Andric   // now resolved.
3100b57cec5SDimitry Andric   state = state->remove<DestroyRetVal>(lockR);
3110b57cec5SDimitry Andric   return state;
3120b57cec5SDimitry Andric }
3130b57cec5SDimitry Andric 
3140b57cec5SDimitry Andric void PthreadLockChecker::printState(raw_ostream &Out, ProgramStateRef State,
3150b57cec5SDimitry Andric                                     const char *NL, const char *Sep) const {
3160b57cec5SDimitry Andric   LockMapTy LM = State->get<LockMap>();
3170b57cec5SDimitry Andric   if (!LM.isEmpty()) {
3180b57cec5SDimitry Andric     Out << Sep << "Mutex states:" << NL;
3190b57cec5SDimitry Andric     for (auto I : LM) {
3200b57cec5SDimitry Andric       I.first->dumpToStream(Out);
3210b57cec5SDimitry Andric       if (I.second.isLocked())
3220b57cec5SDimitry Andric         Out << ": locked";
3230b57cec5SDimitry Andric       else if (I.second.isUnlocked())
3240b57cec5SDimitry Andric         Out << ": unlocked";
3250b57cec5SDimitry Andric       else if (I.second.isDestroyed())
3260b57cec5SDimitry Andric         Out << ": destroyed";
3270b57cec5SDimitry Andric       else if (I.second.isUntouchedAndPossiblyDestroyed())
3280b57cec5SDimitry Andric         Out << ": not tracked, possibly destroyed";
3290b57cec5SDimitry Andric       else if (I.second.isUnlockedAndPossiblyDestroyed())
3300b57cec5SDimitry Andric         Out << ": unlocked, possibly destroyed";
3310b57cec5SDimitry Andric       Out << NL;
3320b57cec5SDimitry Andric     }
3330b57cec5SDimitry Andric   }
3340b57cec5SDimitry Andric 
3350b57cec5SDimitry Andric   LockSetTy LS = State->get<LockSet>();
3360b57cec5SDimitry Andric   if (!LS.isEmpty()) {
3370b57cec5SDimitry Andric     Out << Sep << "Mutex lock order:" << NL;
3380b57cec5SDimitry Andric     for (auto I : LS) {
3390b57cec5SDimitry Andric       I->dumpToStream(Out);
3400b57cec5SDimitry Andric       Out << NL;
3410b57cec5SDimitry Andric     }
3420b57cec5SDimitry Andric   }
3430b57cec5SDimitry Andric 
344fe6060f1SDimitry Andric   DestroyRetValTy DRV = State->get<DestroyRetVal>();
345fe6060f1SDimitry Andric   if (!DRV.isEmpty()) {
346fe6060f1SDimitry Andric     Out << Sep << "Mutexes in unresolved possibly destroyed state:" << NL;
347fe6060f1SDimitry Andric     for (auto I : DRV) {
348fe6060f1SDimitry Andric       I.first->dumpToStream(Out);
349fe6060f1SDimitry Andric       Out << ": ";
350fe6060f1SDimitry Andric       I.second->dumpToStream(Out);
351fe6060f1SDimitry Andric       Out << NL;
352fe6060f1SDimitry Andric     }
353fe6060f1SDimitry Andric   }
3540b57cec5SDimitry Andric }
3550b57cec5SDimitry Andric 
3565ffd83dbSDimitry Andric void PthreadLockChecker::AcquirePthreadLock(const CallEvent &Call,
3575ffd83dbSDimitry Andric                                             CheckerContext &C,
358e8d8bef9SDimitry Andric                                             CheckerKind CheckKind) const {
359e8d8bef9SDimitry Andric   AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), false,
360e8d8bef9SDimitry Andric                  PthreadSemantics, CheckKind);
3615ffd83dbSDimitry Andric }
3625ffd83dbSDimitry Andric 
3635ffd83dbSDimitry Andric void PthreadLockChecker::AcquireXNULock(const CallEvent &Call,
3645ffd83dbSDimitry Andric                                         CheckerContext &C,
365e8d8bef9SDimitry Andric                                         CheckerKind CheckKind) const {
366e8d8bef9SDimitry Andric   AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), false,
367e8d8bef9SDimitry Andric                  XNUSemantics, CheckKind);
3685ffd83dbSDimitry Andric }
3695ffd83dbSDimitry Andric 
3705ffd83dbSDimitry Andric void PthreadLockChecker::TryPthreadLock(const CallEvent &Call,
3715ffd83dbSDimitry Andric                                         CheckerContext &C,
372e8d8bef9SDimitry Andric                                         CheckerKind CheckKind) const {
373e8d8bef9SDimitry Andric   AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true,
374e8d8bef9SDimitry Andric                  PthreadSemantics, CheckKind);
3755ffd83dbSDimitry Andric }
3765ffd83dbSDimitry Andric 
3775ffd83dbSDimitry Andric void PthreadLockChecker::TryXNULock(const CallEvent &Call, CheckerContext &C,
378e8d8bef9SDimitry Andric                                     CheckerKind CheckKind) const {
379e8d8bef9SDimitry Andric   AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true,
380e8d8bef9SDimitry Andric                  PthreadSemantics, CheckKind);
3815ffd83dbSDimitry Andric }
3825ffd83dbSDimitry Andric 
3835ffd83dbSDimitry Andric void PthreadLockChecker::TryFuchsiaLock(const CallEvent &Call,
3845ffd83dbSDimitry Andric                                         CheckerContext &C,
385e8d8bef9SDimitry Andric                                         CheckerKind CheckKind) const {
386e8d8bef9SDimitry Andric   AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true,
387e8d8bef9SDimitry Andric                  PthreadSemantics, CheckKind);
3885ffd83dbSDimitry Andric }
3895ffd83dbSDimitry Andric 
3905ffd83dbSDimitry Andric void PthreadLockChecker::TryC11Lock(const CallEvent &Call, CheckerContext &C,
391e8d8bef9SDimitry Andric                                     CheckerKind CheckKind) const {
392e8d8bef9SDimitry Andric   AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true,
393e8d8bef9SDimitry Andric                  PthreadSemantics, CheckKind);
3945ffd83dbSDimitry Andric }
3955ffd83dbSDimitry Andric 
3965ffd83dbSDimitry Andric void PthreadLockChecker::AcquireLockAux(const CallEvent &Call,
397e8d8bef9SDimitry Andric                                         CheckerContext &C, const Expr *MtxExpr,
398e8d8bef9SDimitry Andric                                         SVal MtxVal, bool IsTryLock,
399e8d8bef9SDimitry Andric                                         enum LockingSemantics Semantics,
400e8d8bef9SDimitry Andric                                         CheckerKind CheckKind) const {
401e8d8bef9SDimitry Andric   if (!ChecksEnabled[CheckKind])
4025ffd83dbSDimitry Andric     return;
4030b57cec5SDimitry Andric 
404e8d8bef9SDimitry Andric   const MemRegion *lockR = MtxVal.getAsRegion();
4050b57cec5SDimitry Andric   if (!lockR)
4060b57cec5SDimitry Andric     return;
4070b57cec5SDimitry Andric 
4080b57cec5SDimitry Andric   ProgramStateRef state = C.getState();
4090b57cec5SDimitry Andric   const SymbolRef *sym = state->get<DestroyRetVal>(lockR);
4100b57cec5SDimitry Andric   if (sym)
4110b57cec5SDimitry Andric     state = resolvePossiblyDestroyedMutex(state, lockR, sym);
4120b57cec5SDimitry Andric 
4130b57cec5SDimitry Andric   if (const LockState *LState = state->get<LockMap>(lockR)) {
4140b57cec5SDimitry Andric     if (LState->isLocked()) {
415e8d8bef9SDimitry Andric       reportBug(C, BT_doublelock, MtxExpr, CheckKind,
416e8d8bef9SDimitry Andric                 "This lock has already been acquired");
4170b57cec5SDimitry Andric       return;
4180b57cec5SDimitry Andric     } else if (LState->isDestroyed()) {
419e8d8bef9SDimitry Andric       reportBug(C, BT_destroylock, MtxExpr, CheckKind,
420e8d8bef9SDimitry Andric                 "This lock has already been destroyed");
4210b57cec5SDimitry Andric       return;
4220b57cec5SDimitry Andric     }
4230b57cec5SDimitry Andric   }
4240b57cec5SDimitry Andric 
4250b57cec5SDimitry Andric   ProgramStateRef lockSucc = state;
426e8d8bef9SDimitry Andric   if (IsTryLock) {
4270b57cec5SDimitry Andric     // Bifurcate the state, and allow a mode where the lock acquisition fails.
4285ffd83dbSDimitry Andric     SVal RetVal = Call.getReturnValue();
4295ffd83dbSDimitry Andric     if (auto DefinedRetVal = RetVal.getAs<DefinedSVal>()) {
4300b57cec5SDimitry Andric       ProgramStateRef lockFail;
431e8d8bef9SDimitry Andric       switch (Semantics) {
4320b57cec5SDimitry Andric       case PthreadSemantics:
4335ffd83dbSDimitry Andric         std::tie(lockFail, lockSucc) = state->assume(*DefinedRetVal);
4340b57cec5SDimitry Andric         break;
4350b57cec5SDimitry Andric       case XNUSemantics:
4365ffd83dbSDimitry Andric         std::tie(lockSucc, lockFail) = state->assume(*DefinedRetVal);
4370b57cec5SDimitry Andric         break;
4380b57cec5SDimitry Andric       default:
4390b57cec5SDimitry Andric         llvm_unreachable("Unknown tryLock locking semantics");
4400b57cec5SDimitry Andric       }
4410b57cec5SDimitry Andric       assert(lockFail && lockSucc);
4420b57cec5SDimitry Andric       C.addTransition(lockFail);
4435ffd83dbSDimitry Andric     }
4445ffd83dbSDimitry Andric     // We might want to handle the case when the mutex lock function was inlined
4455ffd83dbSDimitry Andric     // and returned an Unknown or Undefined value.
446e8d8bef9SDimitry Andric   } else if (Semantics == PthreadSemantics) {
4470b57cec5SDimitry Andric     // Assume that the return value was 0.
4485ffd83dbSDimitry Andric     SVal RetVal = Call.getReturnValue();
4495ffd83dbSDimitry Andric     if (auto DefinedRetVal = RetVal.getAs<DefinedSVal>()) {
4505ffd83dbSDimitry Andric       // FIXME: If the lock function was inlined and returned true,
4515ffd83dbSDimitry Andric       // we need to behave sanely - at least generate sink.
4525ffd83dbSDimitry Andric       lockSucc = state->assume(*DefinedRetVal, false);
4530b57cec5SDimitry Andric       assert(lockSucc);
4545ffd83dbSDimitry Andric     }
4555ffd83dbSDimitry Andric     // We might want to handle the case when the mutex lock function was inlined
4565ffd83dbSDimitry Andric     // and returned an Unknown or Undefined value.
4570b57cec5SDimitry Andric   } else {
4580b57cec5SDimitry Andric     // XNU locking semantics return void on non-try locks
459e8d8bef9SDimitry Andric     assert((Semantics == XNUSemantics) && "Unknown locking semantics");
4600b57cec5SDimitry Andric     lockSucc = state;
4610b57cec5SDimitry Andric   }
4620b57cec5SDimitry Andric 
4630b57cec5SDimitry Andric   // Record that the lock was acquired.
4640b57cec5SDimitry Andric   lockSucc = lockSucc->add<LockSet>(lockR);
4650b57cec5SDimitry Andric   lockSucc = lockSucc->set<LockMap>(lockR, LockState::getLocked());
4660b57cec5SDimitry Andric   C.addTransition(lockSucc);
4670b57cec5SDimitry Andric }
4680b57cec5SDimitry Andric 
4695ffd83dbSDimitry Andric void PthreadLockChecker::ReleaseAnyLock(const CallEvent &Call,
4705ffd83dbSDimitry Andric                                         CheckerContext &C,
471e8d8bef9SDimitry Andric                                         CheckerKind CheckKind) const {
472e8d8bef9SDimitry Andric   ReleaseLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), CheckKind);
4735ffd83dbSDimitry Andric }
4745ffd83dbSDimitry Andric 
4755ffd83dbSDimitry Andric void PthreadLockChecker::ReleaseLockAux(const CallEvent &Call,
476e8d8bef9SDimitry Andric                                         CheckerContext &C, const Expr *MtxExpr,
477e8d8bef9SDimitry Andric                                         SVal MtxVal,
478e8d8bef9SDimitry Andric                                         CheckerKind CheckKind) const {
479e8d8bef9SDimitry Andric   if (!ChecksEnabled[CheckKind])
4805ffd83dbSDimitry Andric     return;
4810b57cec5SDimitry Andric 
482e8d8bef9SDimitry Andric   const MemRegion *lockR = MtxVal.getAsRegion();
4830b57cec5SDimitry Andric   if (!lockR)
4840b57cec5SDimitry Andric     return;
4850b57cec5SDimitry Andric 
4860b57cec5SDimitry Andric   ProgramStateRef state = C.getState();
4870b57cec5SDimitry Andric   const SymbolRef *sym = state->get<DestroyRetVal>(lockR);
4880b57cec5SDimitry Andric   if (sym)
4890b57cec5SDimitry Andric     state = resolvePossiblyDestroyedMutex(state, lockR, sym);
4900b57cec5SDimitry Andric 
4910b57cec5SDimitry Andric   if (const LockState *LState = state->get<LockMap>(lockR)) {
4920b57cec5SDimitry Andric     if (LState->isUnlocked()) {
493e8d8bef9SDimitry Andric       reportBug(C, BT_doubleunlock, MtxExpr, CheckKind,
494e8d8bef9SDimitry Andric                 "This lock has already been unlocked");
4950b57cec5SDimitry Andric       return;
4960b57cec5SDimitry Andric     } else if (LState->isDestroyed()) {
497e8d8bef9SDimitry Andric       reportBug(C, BT_destroylock, MtxExpr, CheckKind,
498e8d8bef9SDimitry Andric                 "This lock has already been destroyed");
4990b57cec5SDimitry Andric       return;
5000b57cec5SDimitry Andric     }
5010b57cec5SDimitry Andric   }
5020b57cec5SDimitry Andric 
5030b57cec5SDimitry Andric   LockSetTy LS = state->get<LockSet>();
5040b57cec5SDimitry Andric 
5050b57cec5SDimitry Andric   if (!LS.isEmpty()) {
5060b57cec5SDimitry Andric     const MemRegion *firstLockR = LS.getHead();
5070b57cec5SDimitry Andric     if (firstLockR != lockR) {
508e8d8bef9SDimitry Andric       reportBug(C, BT_lor, MtxExpr, CheckKind,
509e8d8bef9SDimitry Andric                 "This was not the most recently acquired lock. Possible lock "
510e8d8bef9SDimitry Andric                 "order reversal");
5110b57cec5SDimitry Andric       return;
5120b57cec5SDimitry Andric     }
5130b57cec5SDimitry Andric     // Record that the lock was released.
5140b57cec5SDimitry Andric     state = state->set<LockSet>(LS.getTail());
5150b57cec5SDimitry Andric   }
5160b57cec5SDimitry Andric 
5170b57cec5SDimitry Andric   state = state->set<LockMap>(lockR, LockState::getUnlocked());
5180b57cec5SDimitry Andric   C.addTransition(state);
5190b57cec5SDimitry Andric }
5200b57cec5SDimitry Andric 
5215ffd83dbSDimitry Andric void PthreadLockChecker::DestroyPthreadLock(const CallEvent &Call,
5225ffd83dbSDimitry Andric                                             CheckerContext &C,
523e8d8bef9SDimitry Andric                                             CheckerKind CheckKind) const {
524e8d8bef9SDimitry Andric   DestroyLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0),
525e8d8bef9SDimitry Andric                  PthreadSemantics, CheckKind);
5265ffd83dbSDimitry Andric }
5275ffd83dbSDimitry Andric 
5285ffd83dbSDimitry Andric void PthreadLockChecker::DestroyXNULock(const CallEvent &Call,
5295ffd83dbSDimitry Andric                                         CheckerContext &C,
530e8d8bef9SDimitry Andric                                         CheckerKind CheckKind) const {
531e8d8bef9SDimitry Andric   DestroyLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), XNUSemantics,
532e8d8bef9SDimitry Andric                  CheckKind);
5335ffd83dbSDimitry Andric }
5345ffd83dbSDimitry Andric 
5355ffd83dbSDimitry Andric void PthreadLockChecker::DestroyLockAux(const CallEvent &Call,
536e8d8bef9SDimitry Andric                                         CheckerContext &C, const Expr *MtxExpr,
537e8d8bef9SDimitry Andric                                         SVal MtxVal,
538e8d8bef9SDimitry Andric                                         enum LockingSemantics Semantics,
539e8d8bef9SDimitry Andric                                         CheckerKind CheckKind) const {
540e8d8bef9SDimitry Andric   if (!ChecksEnabled[CheckKind])
5415ffd83dbSDimitry Andric     return;
5420b57cec5SDimitry Andric 
543e8d8bef9SDimitry Andric   const MemRegion *LockR = MtxVal.getAsRegion();
5440b57cec5SDimitry Andric   if (!LockR)
5450b57cec5SDimitry Andric     return;
5460b57cec5SDimitry Andric 
5470b57cec5SDimitry Andric   ProgramStateRef State = C.getState();
5480b57cec5SDimitry Andric 
5490b57cec5SDimitry Andric   const SymbolRef *sym = State->get<DestroyRetVal>(LockR);
5500b57cec5SDimitry Andric   if (sym)
5510b57cec5SDimitry Andric     State = resolvePossiblyDestroyedMutex(State, LockR, sym);
5520b57cec5SDimitry Andric 
5530b57cec5SDimitry Andric   const LockState *LState = State->get<LockMap>(LockR);
5540b57cec5SDimitry Andric   // Checking the return value of the destroy method only in the case of
5550b57cec5SDimitry Andric   // PthreadSemantics
556e8d8bef9SDimitry Andric   if (Semantics == PthreadSemantics) {
5570b57cec5SDimitry Andric     if (!LState || LState->isUnlocked()) {
5585ffd83dbSDimitry Andric       SymbolRef sym = Call.getReturnValue().getAsSymbol();
5590b57cec5SDimitry Andric       if (!sym) {
5600b57cec5SDimitry Andric         State = State->remove<LockMap>(LockR);
5610b57cec5SDimitry Andric         C.addTransition(State);
5620b57cec5SDimitry Andric         return;
5630b57cec5SDimitry Andric       }
5640b57cec5SDimitry Andric       State = State->set<DestroyRetVal>(LockR, sym);
5650b57cec5SDimitry Andric       if (LState && LState->isUnlocked())
5660b57cec5SDimitry Andric         State = State->set<LockMap>(
5670b57cec5SDimitry Andric             LockR, LockState::getUnlockedAndPossiblyDestroyed());
5680b57cec5SDimitry Andric       else
5690b57cec5SDimitry Andric         State = State->set<LockMap>(
5700b57cec5SDimitry Andric             LockR, LockState::getUntouchedAndPossiblyDestroyed());
5710b57cec5SDimitry Andric       C.addTransition(State);
5720b57cec5SDimitry Andric       return;
5730b57cec5SDimitry Andric     }
5740b57cec5SDimitry Andric   } else {
5750b57cec5SDimitry Andric     if (!LState || LState->isUnlocked()) {
5760b57cec5SDimitry Andric       State = State->set<LockMap>(LockR, LockState::getDestroyed());
5770b57cec5SDimitry Andric       C.addTransition(State);
5780b57cec5SDimitry Andric       return;
5790b57cec5SDimitry Andric     }
5800b57cec5SDimitry Andric   }
5810b57cec5SDimitry Andric 
582e8d8bef9SDimitry Andric   StringRef Message = LState->isLocked()
583e8d8bef9SDimitry Andric                           ? "This lock is still locked"
584e8d8bef9SDimitry Andric                           : "This lock has already been destroyed";
5850b57cec5SDimitry Andric 
586e8d8bef9SDimitry Andric   reportBug(C, BT_destroylock, MtxExpr, CheckKind, Message);
5870b57cec5SDimitry Andric }
5880b57cec5SDimitry Andric 
5895ffd83dbSDimitry Andric void PthreadLockChecker::InitAnyLock(const CallEvent &Call, CheckerContext &C,
590e8d8bef9SDimitry Andric                                      CheckerKind CheckKind) const {
591e8d8bef9SDimitry Andric   InitLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), CheckKind);
5925ffd83dbSDimitry Andric }
5935ffd83dbSDimitry Andric 
5945ffd83dbSDimitry Andric void PthreadLockChecker::InitLockAux(const CallEvent &Call, CheckerContext &C,
595e8d8bef9SDimitry Andric                                      const Expr *MtxExpr, SVal MtxVal,
596e8d8bef9SDimitry Andric                                      CheckerKind CheckKind) const {
597e8d8bef9SDimitry Andric   if (!ChecksEnabled[CheckKind])
5985ffd83dbSDimitry Andric     return;
5990b57cec5SDimitry Andric 
600e8d8bef9SDimitry Andric   const MemRegion *LockR = MtxVal.getAsRegion();
6010b57cec5SDimitry Andric   if (!LockR)
6020b57cec5SDimitry Andric     return;
6030b57cec5SDimitry Andric 
6040b57cec5SDimitry Andric   ProgramStateRef State = C.getState();
6050b57cec5SDimitry Andric 
6060b57cec5SDimitry Andric   const SymbolRef *sym = State->get<DestroyRetVal>(LockR);
6070b57cec5SDimitry Andric   if (sym)
6080b57cec5SDimitry Andric     State = resolvePossiblyDestroyedMutex(State, LockR, sym);
6090b57cec5SDimitry Andric 
6100b57cec5SDimitry Andric   const struct LockState *LState = State->get<LockMap>(LockR);
6110b57cec5SDimitry Andric   if (!LState || LState->isDestroyed()) {
6120b57cec5SDimitry Andric     State = State->set<LockMap>(LockR, LockState::getUnlocked());
6130b57cec5SDimitry Andric     C.addTransition(State);
6140b57cec5SDimitry Andric     return;
6150b57cec5SDimitry Andric   }
6160b57cec5SDimitry Andric 
617e8d8bef9SDimitry Andric   StringRef Message = LState->isLocked()
618e8d8bef9SDimitry Andric                           ? "This lock is still being held"
619e8d8bef9SDimitry Andric                           : "This lock has already been initialized";
6200b57cec5SDimitry Andric 
621e8d8bef9SDimitry Andric   reportBug(C, BT_initlock, MtxExpr, CheckKind, Message);
6220b57cec5SDimitry Andric }
6230b57cec5SDimitry Andric 
624e8d8bef9SDimitry Andric void PthreadLockChecker::reportBug(CheckerContext &C,
625e8d8bef9SDimitry Andric                                    std::unique_ptr<BugType> BT[],
626e8d8bef9SDimitry Andric                                    const Expr *MtxExpr, CheckerKind CheckKind,
627e8d8bef9SDimitry Andric                                    StringRef Desc) const {
6280b57cec5SDimitry Andric   ExplodedNode *N = C.generateErrorNode();
6290b57cec5SDimitry Andric   if (!N)
6300b57cec5SDimitry Andric     return;
631e8d8bef9SDimitry Andric   initBugType(CheckKind);
632e8d8bef9SDimitry Andric   auto Report =
633e8d8bef9SDimitry Andric       std::make_unique<PathSensitiveBugReport>(*BT[CheckKind], Desc, N);
634e8d8bef9SDimitry Andric   Report->addRange(MtxExpr->getSourceRange());
6350b57cec5SDimitry Andric   C.emitReport(std::move(Report));
6360b57cec5SDimitry Andric }
6370b57cec5SDimitry Andric 
6380b57cec5SDimitry Andric void PthreadLockChecker::checkDeadSymbols(SymbolReaper &SymReaper,
6390b57cec5SDimitry Andric                                           CheckerContext &C) const {
6400b57cec5SDimitry Andric   ProgramStateRef State = C.getState();
6410b57cec5SDimitry Andric 
6425ffd83dbSDimitry Andric   for (auto I : State->get<DestroyRetVal>()) {
6435ffd83dbSDimitry Andric     // Once the return value symbol dies, no more checks can be performed
6445ffd83dbSDimitry Andric     // against it. See if the return value was checked before this point.
6455ffd83dbSDimitry Andric     // This would remove the symbol from the map as well.
6465ffd83dbSDimitry Andric     if (SymReaper.isDead(I.second))
6475ffd83dbSDimitry Andric       State = resolvePossiblyDestroyedMutex(State, I.first, &I.second);
6480b57cec5SDimitry Andric   }
6495ffd83dbSDimitry Andric 
6505ffd83dbSDimitry Andric   for (auto I : State->get<LockMap>()) {
6515ffd83dbSDimitry Andric     // Stop tracking dead mutex regions as well.
652fe6060f1SDimitry Andric     if (!SymReaper.isLiveRegion(I.first)) {
6535ffd83dbSDimitry Andric       State = State->remove<LockMap>(I.first);
654fe6060f1SDimitry Andric       State = State->remove<DestroyRetVal>(I.first);
655fe6060f1SDimitry Andric     }
6565ffd83dbSDimitry Andric   }
6575ffd83dbSDimitry Andric 
6585ffd83dbSDimitry Andric   // TODO: We probably need to clean up the lock stack as well.
6595ffd83dbSDimitry Andric   // It is tricky though: even if the mutex cannot be unlocked anymore,
6605ffd83dbSDimitry Andric   // it can still participate in lock order reversal resolution.
6615ffd83dbSDimitry Andric 
6620b57cec5SDimitry Andric   C.addTransition(State);
6630b57cec5SDimitry Andric }
6640b57cec5SDimitry Andric 
6655ffd83dbSDimitry Andric ProgramStateRef PthreadLockChecker::checkRegionChanges(
6665ffd83dbSDimitry Andric     ProgramStateRef State, const InvalidatedSymbols *Symbols,
6675ffd83dbSDimitry Andric     ArrayRef<const MemRegion *> ExplicitRegions,
6685ffd83dbSDimitry Andric     ArrayRef<const MemRegion *> Regions, const LocationContext *LCtx,
6695ffd83dbSDimitry Andric     const CallEvent *Call) const {
6705ffd83dbSDimitry Andric 
6715ffd83dbSDimitry Andric   bool IsLibraryFunction = false;
6725ffd83dbSDimitry Andric   if (Call && Call->isGlobalCFunction()) {
6735ffd83dbSDimitry Andric     // Avoid invalidating mutex state when a known supported function is called.
6745ffd83dbSDimitry Andric     if (PThreadCallbacks.lookup(*Call) || FuchsiaCallbacks.lookup(*Call) ||
6755ffd83dbSDimitry Andric         C11Callbacks.lookup(*Call))
6765ffd83dbSDimitry Andric       return State;
6775ffd83dbSDimitry Andric 
6785ffd83dbSDimitry Andric     if (Call->isInSystemHeader())
6795ffd83dbSDimitry Andric       IsLibraryFunction = true;
6805ffd83dbSDimitry Andric   }
6815ffd83dbSDimitry Andric 
6825ffd83dbSDimitry Andric   for (auto R : Regions) {
6835ffd83dbSDimitry Andric     // We assume that system library function wouldn't touch the mutex unless
6845ffd83dbSDimitry Andric     // it takes the mutex explicitly as an argument.
6855ffd83dbSDimitry Andric     // FIXME: This is a bit quadratic.
686349cc55cSDimitry Andric     if (IsLibraryFunction && !llvm::is_contained(ExplicitRegions, R))
6875ffd83dbSDimitry Andric       continue;
6885ffd83dbSDimitry Andric 
6895ffd83dbSDimitry Andric     State = State->remove<LockMap>(R);
6905ffd83dbSDimitry Andric     State = State->remove<DestroyRetVal>(R);
6915ffd83dbSDimitry Andric 
6925ffd83dbSDimitry Andric     // TODO: We need to invalidate the lock stack as well. This is tricky
6935ffd83dbSDimitry Andric     // to implement correctly and efficiently though, because the effects
6945ffd83dbSDimitry Andric     // of mutex escapes on lock order may be fairly varied.
6955ffd83dbSDimitry Andric   }
6965ffd83dbSDimitry Andric 
6975ffd83dbSDimitry Andric   return State;
6985ffd83dbSDimitry Andric }
6995ffd83dbSDimitry Andric 
7005ffd83dbSDimitry Andric void ento::registerPthreadLockBase(CheckerManager &mgr) {
7010b57cec5SDimitry Andric   mgr.registerChecker<PthreadLockChecker>();
7020b57cec5SDimitry Andric }
7030b57cec5SDimitry Andric 
7045ffd83dbSDimitry Andric bool ento::shouldRegisterPthreadLockBase(const CheckerManager &mgr) { return true; }
7055ffd83dbSDimitry Andric 
7065ffd83dbSDimitry Andric #define REGISTER_CHECKER(name)                                                 \
7075ffd83dbSDimitry Andric   void ento::register##name(CheckerManager &mgr) {                             \
7085ffd83dbSDimitry Andric     PthreadLockChecker *checker = mgr.getChecker<PthreadLockChecker>();        \
7095ffd83dbSDimitry Andric     checker->ChecksEnabled[PthreadLockChecker::CK_##name] = true;              \
7105ffd83dbSDimitry Andric     checker->CheckNames[PthreadLockChecker::CK_##name] =                       \
7115ffd83dbSDimitry Andric         mgr.getCurrentCheckerName();                                           \
7125ffd83dbSDimitry Andric   }                                                                            \
7135ffd83dbSDimitry Andric                                                                                \
7145ffd83dbSDimitry Andric   bool ento::shouldRegister##name(const CheckerManager &mgr) { return true; }
7155ffd83dbSDimitry Andric 
7165ffd83dbSDimitry Andric REGISTER_CHECKER(PthreadLockChecker)
7175ffd83dbSDimitry Andric REGISTER_CHECKER(FuchsiaLockChecker)
7185ffd83dbSDimitry Andric REGISTER_CHECKER(C11LockChecker)
719