xref: /openbsd-src/gnu/llvm/clang/lib/StaticAnalyzer/Checkers/PthreadLockChecker.cpp (revision 12c855180aad702bbcca06e0398d774beeafb155)
1e5dd7070Spatrick //===--- PthreadLockChecker.cpp - Check for locking problems ---*- C++ -*--===//
2e5dd7070Spatrick //
3e5dd7070Spatrick // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4e5dd7070Spatrick // See https://llvm.org/LICENSE.txt for license information.
5e5dd7070Spatrick // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6e5dd7070Spatrick //
7e5dd7070Spatrick //===----------------------------------------------------------------------===//
8e5dd7070Spatrick //
9ec727ea7Spatrick // This file defines:
10ec727ea7Spatrick //  * PthreadLockChecker, a simple lock -> unlock checker.
11ec727ea7Spatrick //    Which also checks for XNU locks, which behave similarly enough to share
12ec727ea7Spatrick //    code.
13ec727ea7Spatrick //  * FuchsiaLocksChecker, which is also rather similar.
14ec727ea7Spatrick //  * C11LockChecker which also closely follows Pthread semantics.
15ec727ea7Spatrick //
16ec727ea7Spatrick //  TODO: Path notes.
17e5dd7070Spatrick //
18e5dd7070Spatrick //===----------------------------------------------------------------------===//
19e5dd7070Spatrick 
20e5dd7070Spatrick #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
21e5dd7070Spatrick #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
22e5dd7070Spatrick #include "clang/StaticAnalyzer/Core/Checker.h"
23e5dd7070Spatrick #include "clang/StaticAnalyzer/Core/CheckerManager.h"
24*12c85518Srobert #include "clang/StaticAnalyzer/Core/PathSensitive/CallDescription.h"
25ec727ea7Spatrick #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
26e5dd7070Spatrick #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
27e5dd7070Spatrick 
28e5dd7070Spatrick using namespace clang;
29e5dd7070Spatrick using namespace ento;
30e5dd7070Spatrick 
31e5dd7070Spatrick namespace {
32e5dd7070Spatrick 
33e5dd7070Spatrick struct LockState {
34e5dd7070Spatrick   enum Kind {
35e5dd7070Spatrick     Destroyed,
36e5dd7070Spatrick     Locked,
37e5dd7070Spatrick     Unlocked,
38e5dd7070Spatrick     UntouchedAndPossiblyDestroyed,
39e5dd7070Spatrick     UnlockedAndPossiblyDestroyed
40e5dd7070Spatrick   } K;
41e5dd7070Spatrick 
42e5dd7070Spatrick private:
LockState__anoned0ba6cb0111::LockState43e5dd7070Spatrick   LockState(Kind K) : K(K) {}
44e5dd7070Spatrick 
45e5dd7070Spatrick public:
getLocked__anoned0ba6cb0111::LockState46e5dd7070Spatrick   static LockState getLocked() { return LockState(Locked); }
getUnlocked__anoned0ba6cb0111::LockState47e5dd7070Spatrick   static LockState getUnlocked() { return LockState(Unlocked); }
getDestroyed__anoned0ba6cb0111::LockState48e5dd7070Spatrick   static LockState getDestroyed() { return LockState(Destroyed); }
getUntouchedAndPossiblyDestroyed__anoned0ba6cb0111::LockState49e5dd7070Spatrick   static LockState getUntouchedAndPossiblyDestroyed() {
50e5dd7070Spatrick     return LockState(UntouchedAndPossiblyDestroyed);
51e5dd7070Spatrick   }
getUnlockedAndPossiblyDestroyed__anoned0ba6cb0111::LockState52e5dd7070Spatrick   static LockState getUnlockedAndPossiblyDestroyed() {
53e5dd7070Spatrick     return LockState(UnlockedAndPossiblyDestroyed);
54e5dd7070Spatrick   }
55e5dd7070Spatrick 
operator ==__anoned0ba6cb0111::LockState56ec727ea7Spatrick   bool operator==(const LockState &X) const { return K == X.K; }
57e5dd7070Spatrick 
isLocked__anoned0ba6cb0111::LockState58e5dd7070Spatrick   bool isLocked() const { return K == Locked; }
isUnlocked__anoned0ba6cb0111::LockState59e5dd7070Spatrick   bool isUnlocked() const { return K == Unlocked; }
isDestroyed__anoned0ba6cb0111::LockState60e5dd7070Spatrick   bool isDestroyed() const { return K == Destroyed; }
isUntouchedAndPossiblyDestroyed__anoned0ba6cb0111::LockState61e5dd7070Spatrick   bool isUntouchedAndPossiblyDestroyed() const {
62e5dd7070Spatrick     return K == UntouchedAndPossiblyDestroyed;
63e5dd7070Spatrick   }
isUnlockedAndPossiblyDestroyed__anoned0ba6cb0111::LockState64e5dd7070Spatrick   bool isUnlockedAndPossiblyDestroyed() const {
65e5dd7070Spatrick     return K == UnlockedAndPossiblyDestroyed;
66e5dd7070Spatrick   }
67e5dd7070Spatrick 
Profile__anoned0ba6cb0111::LockState68ec727ea7Spatrick   void Profile(llvm::FoldingSetNodeID &ID) const { ID.AddInteger(K); }
69e5dd7070Spatrick };
70e5dd7070Spatrick 
71ec727ea7Spatrick class PthreadLockChecker : public Checker<check::PostCall, check::DeadSymbols,
72ec727ea7Spatrick                                           check::RegionChanges> {
73e5dd7070Spatrick public:
74ec727ea7Spatrick   enum LockingSemantics { NotApplicable = 0, PthreadSemantics, XNUSemantics };
75ec727ea7Spatrick   enum CheckerKind {
76ec727ea7Spatrick     CK_PthreadLockChecker,
77ec727ea7Spatrick     CK_FuchsiaLockChecker,
78ec727ea7Spatrick     CK_C11LockChecker,
79ec727ea7Spatrick     CK_NumCheckKinds
80ec727ea7Spatrick   };
81*12c85518Srobert   bool ChecksEnabled[CK_NumCheckKinds] = {false};
82ec727ea7Spatrick   CheckerNameRef CheckNames[CK_NumCheckKinds];
83e5dd7070Spatrick 
84ec727ea7Spatrick private:
85ec727ea7Spatrick   typedef void (PthreadLockChecker::*FnCheck)(const CallEvent &Call,
86ec727ea7Spatrick                                               CheckerContext &C,
87a9ac8606Spatrick                                               CheckerKind CheckKind) const;
88ec727ea7Spatrick   CallDescriptionMap<FnCheck> PThreadCallbacks = {
89ec727ea7Spatrick       // Init.
90*12c85518Srobert       {{{"pthread_mutex_init"}, 2}, &PthreadLockChecker::InitAnyLock},
91ec727ea7Spatrick       // TODO: pthread_rwlock_init(2 arguments).
92ec727ea7Spatrick       // TODO: lck_mtx_init(3 arguments).
93ec727ea7Spatrick       // TODO: lck_mtx_alloc_init(2 arguments) => returns the mutex.
94ec727ea7Spatrick       // TODO: lck_rw_init(3 arguments).
95ec727ea7Spatrick       // TODO: lck_rw_alloc_init(2 arguments) => returns the mutex.
96e5dd7070Spatrick 
97ec727ea7Spatrick       // Acquire.
98*12c85518Srobert       {{{"pthread_mutex_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
99*12c85518Srobert       {{{"pthread_rwlock_rdlock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
100*12c85518Srobert       {{{"pthread_rwlock_wrlock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
101*12c85518Srobert       {{{"lck_mtx_lock"}, 1}, &PthreadLockChecker::AcquireXNULock},
102*12c85518Srobert       {{{"lck_rw_lock_exclusive"}, 1}, &PthreadLockChecker::AcquireXNULock},
103*12c85518Srobert       {{{"lck_rw_lock_shared"}, 1}, &PthreadLockChecker::AcquireXNULock},
104ec727ea7Spatrick 
105ec727ea7Spatrick       // Try.
106*12c85518Srobert       {{{"pthread_mutex_trylock"}, 1}, &PthreadLockChecker::TryPthreadLock},
107*12c85518Srobert       {{{"pthread_rwlock_tryrdlock"}, 1}, &PthreadLockChecker::TryPthreadLock},
108*12c85518Srobert       {{{"pthread_rwlock_trywrlock"}, 1}, &PthreadLockChecker::TryPthreadLock},
109*12c85518Srobert       {{{"lck_mtx_try_lock"}, 1}, &PthreadLockChecker::TryXNULock},
110*12c85518Srobert       {{{"lck_rw_try_lock_exclusive"}, 1}, &PthreadLockChecker::TryXNULock},
111*12c85518Srobert       {{{"lck_rw_try_lock_shared"}, 1}, &PthreadLockChecker::TryXNULock},
112ec727ea7Spatrick 
113ec727ea7Spatrick       // Release.
114*12c85518Srobert       {{{"pthread_mutex_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
115*12c85518Srobert       {{{"pthread_rwlock_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
116*12c85518Srobert       {{{"lck_mtx_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
117*12c85518Srobert       {{{"lck_rw_unlock_exclusive"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
118*12c85518Srobert       {{{"lck_rw_unlock_shared"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
119*12c85518Srobert       {{{"lck_rw_done"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
120ec727ea7Spatrick 
121ec727ea7Spatrick       // Destroy.
122*12c85518Srobert       {{{"pthread_mutex_destroy"}, 1}, &PthreadLockChecker::DestroyPthreadLock},
123*12c85518Srobert       {{{"lck_mtx_destroy"}, 2}, &PthreadLockChecker::DestroyXNULock},
124ec727ea7Spatrick       // TODO: pthread_rwlock_destroy(1 argument).
125ec727ea7Spatrick       // TODO: lck_rw_destroy(2 arguments).
126ec727ea7Spatrick   };
127ec727ea7Spatrick 
128ec727ea7Spatrick   CallDescriptionMap<FnCheck> FuchsiaCallbacks = {
129ec727ea7Spatrick       // Init.
130*12c85518Srobert       {{{"spin_lock_init"}, 1}, &PthreadLockChecker::InitAnyLock},
131ec727ea7Spatrick 
132ec727ea7Spatrick       // Acquire.
133*12c85518Srobert       {{{"spin_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
134*12c85518Srobert       {{{"spin_lock_save"}, 3}, &PthreadLockChecker::AcquirePthreadLock},
135*12c85518Srobert       {{{"sync_mutex_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
136*12c85518Srobert       {{{"sync_mutex_lock_with_waiter"}, 1},
137ec727ea7Spatrick        &PthreadLockChecker::AcquirePthreadLock},
138ec727ea7Spatrick 
139ec727ea7Spatrick       // Try.
140*12c85518Srobert       {{{"spin_trylock"}, 1}, &PthreadLockChecker::TryFuchsiaLock},
141*12c85518Srobert       {{{"sync_mutex_trylock"}, 1}, &PthreadLockChecker::TryFuchsiaLock},
142*12c85518Srobert       {{{"sync_mutex_timedlock"}, 2}, &PthreadLockChecker::TryFuchsiaLock},
143ec727ea7Spatrick 
144ec727ea7Spatrick       // Release.
145*12c85518Srobert       {{{"spin_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
146*12c85518Srobert       {{{"spin_unlock_restore"}, 3}, &PthreadLockChecker::ReleaseAnyLock},
147*12c85518Srobert       {{{"sync_mutex_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
148ec727ea7Spatrick   };
149ec727ea7Spatrick 
150ec727ea7Spatrick   CallDescriptionMap<FnCheck> C11Callbacks = {
151ec727ea7Spatrick       // Init.
152*12c85518Srobert       {{{"mtx_init"}, 2}, &PthreadLockChecker::InitAnyLock},
153ec727ea7Spatrick 
154ec727ea7Spatrick       // Acquire.
155*12c85518Srobert       {{{"mtx_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock},
156ec727ea7Spatrick 
157ec727ea7Spatrick       // Try.
158*12c85518Srobert       {{{"mtx_trylock"}, 1}, &PthreadLockChecker::TryC11Lock},
159*12c85518Srobert       {{{"mtx_timedlock"}, 2}, &PthreadLockChecker::TryC11Lock},
160ec727ea7Spatrick 
161ec727ea7Spatrick       // Release.
162*12c85518Srobert       {{{"mtx_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock},
163ec727ea7Spatrick 
164ec727ea7Spatrick       // Destroy
165*12c85518Srobert       {{{"mtx_destroy"}, 1}, &PthreadLockChecker::DestroyPthreadLock},
166ec727ea7Spatrick   };
167ec727ea7Spatrick 
168e5dd7070Spatrick   ProgramStateRef resolvePossiblyDestroyedMutex(ProgramStateRef state,
169e5dd7070Spatrick                                                 const MemRegion *lockR,
170e5dd7070Spatrick                                                 const SymbolRef *sym) const;
171a9ac8606Spatrick   void reportBug(CheckerContext &C, std::unique_ptr<BugType> BT[],
172a9ac8606Spatrick                  const Expr *MtxExpr, CheckerKind CheckKind,
173a9ac8606Spatrick                  StringRef Desc) const;
174ec727ea7Spatrick 
175ec727ea7Spatrick   // Init.
176ec727ea7Spatrick   void InitAnyLock(const CallEvent &Call, CheckerContext &C,
177a9ac8606Spatrick                    CheckerKind CheckKind) const;
178a9ac8606Spatrick   void InitLockAux(const CallEvent &Call, CheckerContext &C,
179a9ac8606Spatrick                    const Expr *MtxExpr, SVal MtxVal,
180a9ac8606Spatrick                    CheckerKind CheckKind) const;
181ec727ea7Spatrick 
182ec727ea7Spatrick   // Lock, Try-lock.
183ec727ea7Spatrick   void AcquirePthreadLock(const CallEvent &Call, CheckerContext &C,
184a9ac8606Spatrick                           CheckerKind CheckKind) const;
185ec727ea7Spatrick   void AcquireXNULock(const CallEvent &Call, CheckerContext &C,
186a9ac8606Spatrick                       CheckerKind CheckKind) const;
187ec727ea7Spatrick   void TryPthreadLock(const CallEvent &Call, CheckerContext &C,
188a9ac8606Spatrick                       CheckerKind CheckKind) const;
189ec727ea7Spatrick   void TryXNULock(const CallEvent &Call, CheckerContext &C,
190a9ac8606Spatrick                   CheckerKind CheckKind) const;
191ec727ea7Spatrick   void TryFuchsiaLock(const CallEvent &Call, CheckerContext &C,
192a9ac8606Spatrick                       CheckerKind CheckKind) const;
193ec727ea7Spatrick   void TryC11Lock(const CallEvent &Call, CheckerContext &C,
194a9ac8606Spatrick                   CheckerKind CheckKind) const;
195a9ac8606Spatrick   void AcquireLockAux(const CallEvent &Call, CheckerContext &C,
196a9ac8606Spatrick                       const Expr *MtxExpr, SVal MtxVal, bool IsTryLock,
197a9ac8606Spatrick                       LockingSemantics Semantics, CheckerKind CheckKind) const;
198ec727ea7Spatrick 
199ec727ea7Spatrick   // Release.
200ec727ea7Spatrick   void ReleaseAnyLock(const CallEvent &Call, CheckerContext &C,
201a9ac8606Spatrick                       CheckerKind CheckKind) const;
202a9ac8606Spatrick   void ReleaseLockAux(const CallEvent &Call, CheckerContext &C,
203a9ac8606Spatrick                       const Expr *MtxExpr, SVal MtxVal,
204a9ac8606Spatrick                       CheckerKind CheckKind) const;
205ec727ea7Spatrick 
206ec727ea7Spatrick   // Destroy.
207ec727ea7Spatrick   void DestroyPthreadLock(const CallEvent &Call, CheckerContext &C,
208a9ac8606Spatrick                           CheckerKind CheckKind) const;
209ec727ea7Spatrick   void DestroyXNULock(const CallEvent &Call, CheckerContext &C,
210a9ac8606Spatrick                       CheckerKind CheckKind) const;
211a9ac8606Spatrick   void DestroyLockAux(const CallEvent &Call, CheckerContext &C,
212a9ac8606Spatrick                       const Expr *MtxExpr, SVal MtxVal,
213a9ac8606Spatrick                       LockingSemantics Semantics, CheckerKind CheckKind) const;
214ec727ea7Spatrick 
215ec727ea7Spatrick public:
216ec727ea7Spatrick   void checkPostCall(const CallEvent &Call, CheckerContext &C) const;
217ec727ea7Spatrick   void checkDeadSymbols(SymbolReaper &SymReaper, CheckerContext &C) const;
218ec727ea7Spatrick   ProgramStateRef
219ec727ea7Spatrick   checkRegionChanges(ProgramStateRef State, const InvalidatedSymbols *Symbols,
220ec727ea7Spatrick                      ArrayRef<const MemRegion *> ExplicitRegions,
221ec727ea7Spatrick                      ArrayRef<const MemRegion *> Regions,
222ec727ea7Spatrick                      const LocationContext *LCtx, const CallEvent *Call) const;
223ec727ea7Spatrick   void printState(raw_ostream &Out, ProgramStateRef State, const char *NL,
224ec727ea7Spatrick                   const char *Sep) const override;
225ec727ea7Spatrick 
226ec727ea7Spatrick private:
227ec727ea7Spatrick   mutable std::unique_ptr<BugType> BT_doublelock[CK_NumCheckKinds];
228ec727ea7Spatrick   mutable std::unique_ptr<BugType> BT_doubleunlock[CK_NumCheckKinds];
229ec727ea7Spatrick   mutable std::unique_ptr<BugType> BT_destroylock[CK_NumCheckKinds];
230ec727ea7Spatrick   mutable std::unique_ptr<BugType> BT_initlock[CK_NumCheckKinds];
231ec727ea7Spatrick   mutable std::unique_ptr<BugType> BT_lor[CK_NumCheckKinds];
232ec727ea7Spatrick 
initBugType(CheckerKind CheckKind) const233a9ac8606Spatrick   void initBugType(CheckerKind CheckKind) const {
234a9ac8606Spatrick     if (BT_doublelock[CheckKind])
235ec727ea7Spatrick       return;
236a9ac8606Spatrick     BT_doublelock[CheckKind].reset(
237a9ac8606Spatrick         new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"});
238a9ac8606Spatrick     BT_doubleunlock[CheckKind].reset(
239a9ac8606Spatrick         new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"});
240a9ac8606Spatrick     BT_destroylock[CheckKind].reset(new BugType{
241a9ac8606Spatrick         CheckNames[CheckKind], "Use destroyed lock", "Lock checker"});
242a9ac8606Spatrick     BT_initlock[CheckKind].reset(new BugType{
243a9ac8606Spatrick         CheckNames[CheckKind], "Init invalid lock", "Lock checker"});
244a9ac8606Spatrick     BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind],
245ec727ea7Spatrick                                         "Lock order reversal", "Lock checker"});
246ec727ea7Spatrick   }
247e5dd7070Spatrick };
248e5dd7070Spatrick } // end anonymous namespace
249e5dd7070Spatrick 
250e5dd7070Spatrick // A stack of locks for tracking lock-unlock order.
REGISTER_LIST_WITH_PROGRAMSTATE(LockSet,const MemRegion *)251e5dd7070Spatrick REGISTER_LIST_WITH_PROGRAMSTATE(LockSet, const MemRegion *)
252e5dd7070Spatrick 
253e5dd7070Spatrick // An entry for tracking lock states.
254e5dd7070Spatrick REGISTER_MAP_WITH_PROGRAMSTATE(LockMap, const MemRegion *, LockState)
255e5dd7070Spatrick 
256e5dd7070Spatrick // Return values for unresolved calls to pthread_mutex_destroy().
257e5dd7070Spatrick REGISTER_MAP_WITH_PROGRAMSTATE(DestroyRetVal, const MemRegion *, SymbolRef)
258e5dd7070Spatrick 
259ec727ea7Spatrick void PthreadLockChecker::checkPostCall(const CallEvent &Call,
260e5dd7070Spatrick                                        CheckerContext &C) const {
261ec727ea7Spatrick   // An additional umbrella check that all functions modeled by this checker
262ec727ea7Spatrick   // are global C functions.
263ec727ea7Spatrick   // TODO: Maybe make this the default behavior of CallDescription
264ec727ea7Spatrick   // with exactly one identifier?
265ec727ea7Spatrick   // FIXME: Try to handle cases when the implementation was inlined rather
266ec727ea7Spatrick   // than just giving up.
267ec727ea7Spatrick   if (!Call.isGlobalCFunction() || C.wasInlined)
268e5dd7070Spatrick     return;
269e5dd7070Spatrick 
270ec727ea7Spatrick   if (const FnCheck *Callback = PThreadCallbacks.lookup(Call))
271ec727ea7Spatrick     (this->**Callback)(Call, C, CK_PthreadLockChecker);
272ec727ea7Spatrick   else if (const FnCheck *Callback = FuchsiaCallbacks.lookup(Call))
273ec727ea7Spatrick     (this->**Callback)(Call, C, CK_FuchsiaLockChecker);
274ec727ea7Spatrick   else if (const FnCheck *Callback = C11Callbacks.lookup(Call))
275ec727ea7Spatrick     (this->**Callback)(Call, C, CK_C11LockChecker);
276e5dd7070Spatrick }
277e5dd7070Spatrick 
278e5dd7070Spatrick // When a lock is destroyed, in some semantics(like PthreadSemantics) we are not
279e5dd7070Spatrick // sure if the destroy call has succeeded or failed, and the lock enters one of
280e5dd7070Spatrick // the 'possibly destroyed' state. There is a short time frame for the
281e5dd7070Spatrick // programmer to check the return value to see if the lock was successfully
282e5dd7070Spatrick // destroyed. Before we model the next operation over that lock, we call this
283e5dd7070Spatrick // function to see if the return value was checked by now and set the lock state
284e5dd7070Spatrick // - either to destroyed state or back to its previous state.
285e5dd7070Spatrick 
286e5dd7070Spatrick // In PthreadSemantics, pthread_mutex_destroy() returns zero if the lock is
287e5dd7070Spatrick // successfully destroyed and it returns a non-zero value otherwise.
resolvePossiblyDestroyedMutex(ProgramStateRef state,const MemRegion * lockR,const SymbolRef * sym) const288e5dd7070Spatrick ProgramStateRef PthreadLockChecker::resolvePossiblyDestroyedMutex(
289e5dd7070Spatrick     ProgramStateRef state, const MemRegion *lockR, const SymbolRef *sym) const {
290e5dd7070Spatrick   const LockState *lstate = state->get<LockMap>(lockR);
291e5dd7070Spatrick   // Existence in DestroyRetVal ensures existence in LockMap.
292e5dd7070Spatrick   // Existence in Destroyed also ensures that the lock state for lockR is either
293e5dd7070Spatrick   // UntouchedAndPossiblyDestroyed or UnlockedAndPossiblyDestroyed.
294e5dd7070Spatrick   assert(lstate->isUntouchedAndPossiblyDestroyed() ||
295e5dd7070Spatrick          lstate->isUnlockedAndPossiblyDestroyed());
296e5dd7070Spatrick 
297e5dd7070Spatrick   ConstraintManager &CMgr = state->getConstraintManager();
298e5dd7070Spatrick   ConditionTruthVal retZero = CMgr.isNull(state, *sym);
299e5dd7070Spatrick   if (retZero.isConstrainedFalse()) {
300e5dd7070Spatrick     if (lstate->isUntouchedAndPossiblyDestroyed())
301e5dd7070Spatrick       state = state->remove<LockMap>(lockR);
302e5dd7070Spatrick     else if (lstate->isUnlockedAndPossiblyDestroyed())
303e5dd7070Spatrick       state = state->set<LockMap>(lockR, LockState::getUnlocked());
304e5dd7070Spatrick   } else
305e5dd7070Spatrick     state = state->set<LockMap>(lockR, LockState::getDestroyed());
306e5dd7070Spatrick 
307e5dd7070Spatrick   // Removing the map entry (lockR, sym) from DestroyRetVal as the lock state is
308e5dd7070Spatrick   // now resolved.
309e5dd7070Spatrick   state = state->remove<DestroyRetVal>(lockR);
310e5dd7070Spatrick   return state;
311e5dd7070Spatrick }
312e5dd7070Spatrick 
printState(raw_ostream & Out,ProgramStateRef State,const char * NL,const char * Sep) const313e5dd7070Spatrick void PthreadLockChecker::printState(raw_ostream &Out, ProgramStateRef State,
314e5dd7070Spatrick                                     const char *NL, const char *Sep) const {
315e5dd7070Spatrick   LockMapTy LM = State->get<LockMap>();
316e5dd7070Spatrick   if (!LM.isEmpty()) {
317e5dd7070Spatrick     Out << Sep << "Mutex states:" << NL;
318e5dd7070Spatrick     for (auto I : LM) {
319e5dd7070Spatrick       I.first->dumpToStream(Out);
320e5dd7070Spatrick       if (I.second.isLocked())
321e5dd7070Spatrick         Out << ": locked";
322e5dd7070Spatrick       else if (I.second.isUnlocked())
323e5dd7070Spatrick         Out << ": unlocked";
324e5dd7070Spatrick       else if (I.second.isDestroyed())
325e5dd7070Spatrick         Out << ": destroyed";
326e5dd7070Spatrick       else if (I.second.isUntouchedAndPossiblyDestroyed())
327e5dd7070Spatrick         Out << ": not tracked, possibly destroyed";
328e5dd7070Spatrick       else if (I.second.isUnlockedAndPossiblyDestroyed())
329e5dd7070Spatrick         Out << ": unlocked, possibly destroyed";
330e5dd7070Spatrick       Out << NL;
331e5dd7070Spatrick     }
332e5dd7070Spatrick   }
333e5dd7070Spatrick 
334e5dd7070Spatrick   LockSetTy LS = State->get<LockSet>();
335e5dd7070Spatrick   if (!LS.isEmpty()) {
336e5dd7070Spatrick     Out << Sep << "Mutex lock order:" << NL;
337e5dd7070Spatrick     for (auto I : LS) {
338e5dd7070Spatrick       I->dumpToStream(Out);
339e5dd7070Spatrick       Out << NL;
340e5dd7070Spatrick     }
341e5dd7070Spatrick   }
342e5dd7070Spatrick 
343a9ac8606Spatrick   DestroyRetValTy DRV = State->get<DestroyRetVal>();
344a9ac8606Spatrick   if (!DRV.isEmpty()) {
345a9ac8606Spatrick     Out << Sep << "Mutexes in unresolved possibly destroyed state:" << NL;
346a9ac8606Spatrick     for (auto I : DRV) {
347a9ac8606Spatrick       I.first->dumpToStream(Out);
348a9ac8606Spatrick       Out << ": ";
349a9ac8606Spatrick       I.second->dumpToStream(Out);
350a9ac8606Spatrick       Out << NL;
351a9ac8606Spatrick     }
352a9ac8606Spatrick   }
353e5dd7070Spatrick }
354e5dd7070Spatrick 
AcquirePthreadLock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const355ec727ea7Spatrick void PthreadLockChecker::AcquirePthreadLock(const CallEvent &Call,
356ec727ea7Spatrick                                             CheckerContext &C,
357a9ac8606Spatrick                                             CheckerKind CheckKind) const {
358a9ac8606Spatrick   AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), false,
359a9ac8606Spatrick                  PthreadSemantics, CheckKind);
360ec727ea7Spatrick }
361ec727ea7Spatrick 
AcquireXNULock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const362ec727ea7Spatrick void PthreadLockChecker::AcquireXNULock(const CallEvent &Call,
363ec727ea7Spatrick                                         CheckerContext &C,
364a9ac8606Spatrick                                         CheckerKind CheckKind) const {
365a9ac8606Spatrick   AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), false,
366a9ac8606Spatrick                  XNUSemantics, CheckKind);
367ec727ea7Spatrick }
368ec727ea7Spatrick 
TryPthreadLock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const369ec727ea7Spatrick void PthreadLockChecker::TryPthreadLock(const CallEvent &Call,
370ec727ea7Spatrick                                         CheckerContext &C,
371a9ac8606Spatrick                                         CheckerKind CheckKind) const {
372a9ac8606Spatrick   AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true,
373a9ac8606Spatrick                  PthreadSemantics, CheckKind);
374ec727ea7Spatrick }
375ec727ea7Spatrick 
TryXNULock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const376ec727ea7Spatrick void PthreadLockChecker::TryXNULock(const CallEvent &Call, CheckerContext &C,
377a9ac8606Spatrick                                     CheckerKind CheckKind) const {
378a9ac8606Spatrick   AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true,
379a9ac8606Spatrick                  PthreadSemantics, CheckKind);
380ec727ea7Spatrick }
381ec727ea7Spatrick 
TryFuchsiaLock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const382ec727ea7Spatrick void PthreadLockChecker::TryFuchsiaLock(const CallEvent &Call,
383ec727ea7Spatrick                                         CheckerContext &C,
384a9ac8606Spatrick                                         CheckerKind CheckKind) const {
385a9ac8606Spatrick   AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true,
386a9ac8606Spatrick                  PthreadSemantics, CheckKind);
387ec727ea7Spatrick }
388ec727ea7Spatrick 
TryC11Lock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const389ec727ea7Spatrick void PthreadLockChecker::TryC11Lock(const CallEvent &Call, CheckerContext &C,
390a9ac8606Spatrick                                     CheckerKind CheckKind) const {
391a9ac8606Spatrick   AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true,
392a9ac8606Spatrick                  PthreadSemantics, CheckKind);
393ec727ea7Spatrick }
394ec727ea7Spatrick 
AcquireLockAux(const CallEvent & Call,CheckerContext & C,const Expr * MtxExpr,SVal MtxVal,bool IsTryLock,enum LockingSemantics Semantics,CheckerKind CheckKind) const395ec727ea7Spatrick void PthreadLockChecker::AcquireLockAux(const CallEvent &Call,
396a9ac8606Spatrick                                         CheckerContext &C, const Expr *MtxExpr,
397a9ac8606Spatrick                                         SVal MtxVal, bool IsTryLock,
398a9ac8606Spatrick                                         enum LockingSemantics Semantics,
399a9ac8606Spatrick                                         CheckerKind CheckKind) const {
400a9ac8606Spatrick   if (!ChecksEnabled[CheckKind])
401ec727ea7Spatrick     return;
402e5dd7070Spatrick 
403a9ac8606Spatrick   const MemRegion *lockR = MtxVal.getAsRegion();
404e5dd7070Spatrick   if (!lockR)
405e5dd7070Spatrick     return;
406e5dd7070Spatrick 
407e5dd7070Spatrick   ProgramStateRef state = C.getState();
408e5dd7070Spatrick   const SymbolRef *sym = state->get<DestroyRetVal>(lockR);
409e5dd7070Spatrick   if (sym)
410e5dd7070Spatrick     state = resolvePossiblyDestroyedMutex(state, lockR, sym);
411e5dd7070Spatrick 
412e5dd7070Spatrick   if (const LockState *LState = state->get<LockMap>(lockR)) {
413e5dd7070Spatrick     if (LState->isLocked()) {
414a9ac8606Spatrick       reportBug(C, BT_doublelock, MtxExpr, CheckKind,
415a9ac8606Spatrick                 "This lock has already been acquired");
416e5dd7070Spatrick       return;
417e5dd7070Spatrick     } else if (LState->isDestroyed()) {
418a9ac8606Spatrick       reportBug(C, BT_destroylock, MtxExpr, CheckKind,
419a9ac8606Spatrick                 "This lock has already been destroyed");
420e5dd7070Spatrick       return;
421e5dd7070Spatrick     }
422e5dd7070Spatrick   }
423e5dd7070Spatrick 
424e5dd7070Spatrick   ProgramStateRef lockSucc = state;
425a9ac8606Spatrick   if (IsTryLock) {
426e5dd7070Spatrick     // Bifurcate the state, and allow a mode where the lock acquisition fails.
427ec727ea7Spatrick     SVal RetVal = Call.getReturnValue();
428ec727ea7Spatrick     if (auto DefinedRetVal = RetVal.getAs<DefinedSVal>()) {
429e5dd7070Spatrick       ProgramStateRef lockFail;
430a9ac8606Spatrick       switch (Semantics) {
431e5dd7070Spatrick       case PthreadSemantics:
432ec727ea7Spatrick         std::tie(lockFail, lockSucc) = state->assume(*DefinedRetVal);
433e5dd7070Spatrick         break;
434e5dd7070Spatrick       case XNUSemantics:
435ec727ea7Spatrick         std::tie(lockSucc, lockFail) = state->assume(*DefinedRetVal);
436e5dd7070Spatrick         break;
437e5dd7070Spatrick       default:
438e5dd7070Spatrick         llvm_unreachable("Unknown tryLock locking semantics");
439e5dd7070Spatrick       }
440e5dd7070Spatrick       assert(lockFail && lockSucc);
441e5dd7070Spatrick       C.addTransition(lockFail);
442ec727ea7Spatrick     }
443ec727ea7Spatrick     // We might want to handle the case when the mutex lock function was inlined
444ec727ea7Spatrick     // and returned an Unknown or Undefined value.
445a9ac8606Spatrick   } else if (Semantics == PthreadSemantics) {
446e5dd7070Spatrick     // Assume that the return value was 0.
447ec727ea7Spatrick     SVal RetVal = Call.getReturnValue();
448ec727ea7Spatrick     if (auto DefinedRetVal = RetVal.getAs<DefinedSVal>()) {
449ec727ea7Spatrick       // FIXME: If the lock function was inlined and returned true,
450ec727ea7Spatrick       // we need to behave sanely - at least generate sink.
451ec727ea7Spatrick       lockSucc = state->assume(*DefinedRetVal, false);
452e5dd7070Spatrick       assert(lockSucc);
453ec727ea7Spatrick     }
454ec727ea7Spatrick     // We might want to handle the case when the mutex lock function was inlined
455ec727ea7Spatrick     // and returned an Unknown or Undefined value.
456e5dd7070Spatrick   } else {
457e5dd7070Spatrick     // XNU locking semantics return void on non-try locks
458a9ac8606Spatrick     assert((Semantics == XNUSemantics) && "Unknown locking semantics");
459e5dd7070Spatrick     lockSucc = state;
460e5dd7070Spatrick   }
461e5dd7070Spatrick 
462e5dd7070Spatrick   // Record that the lock was acquired.
463e5dd7070Spatrick   lockSucc = lockSucc->add<LockSet>(lockR);
464e5dd7070Spatrick   lockSucc = lockSucc->set<LockMap>(lockR, LockState::getLocked());
465e5dd7070Spatrick   C.addTransition(lockSucc);
466e5dd7070Spatrick }
467e5dd7070Spatrick 
ReleaseAnyLock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const468ec727ea7Spatrick void PthreadLockChecker::ReleaseAnyLock(const CallEvent &Call,
469ec727ea7Spatrick                                         CheckerContext &C,
470a9ac8606Spatrick                                         CheckerKind CheckKind) const {
471a9ac8606Spatrick   ReleaseLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), CheckKind);
472ec727ea7Spatrick }
473ec727ea7Spatrick 
ReleaseLockAux(const CallEvent & Call,CheckerContext & C,const Expr * MtxExpr,SVal MtxVal,CheckerKind CheckKind) const474ec727ea7Spatrick void PthreadLockChecker::ReleaseLockAux(const CallEvent &Call,
475a9ac8606Spatrick                                         CheckerContext &C, const Expr *MtxExpr,
476a9ac8606Spatrick                                         SVal MtxVal,
477a9ac8606Spatrick                                         CheckerKind CheckKind) const {
478a9ac8606Spatrick   if (!ChecksEnabled[CheckKind])
479ec727ea7Spatrick     return;
480e5dd7070Spatrick 
481a9ac8606Spatrick   const MemRegion *lockR = MtxVal.getAsRegion();
482e5dd7070Spatrick   if (!lockR)
483e5dd7070Spatrick     return;
484e5dd7070Spatrick 
485e5dd7070Spatrick   ProgramStateRef state = C.getState();
486e5dd7070Spatrick   const SymbolRef *sym = state->get<DestroyRetVal>(lockR);
487e5dd7070Spatrick   if (sym)
488e5dd7070Spatrick     state = resolvePossiblyDestroyedMutex(state, lockR, sym);
489e5dd7070Spatrick 
490e5dd7070Spatrick   if (const LockState *LState = state->get<LockMap>(lockR)) {
491e5dd7070Spatrick     if (LState->isUnlocked()) {
492a9ac8606Spatrick       reportBug(C, BT_doubleunlock, MtxExpr, CheckKind,
493a9ac8606Spatrick                 "This lock has already been unlocked");
494e5dd7070Spatrick       return;
495e5dd7070Spatrick     } else if (LState->isDestroyed()) {
496a9ac8606Spatrick       reportBug(C, BT_destroylock, MtxExpr, CheckKind,
497a9ac8606Spatrick                 "This lock has already been destroyed");
498e5dd7070Spatrick       return;
499e5dd7070Spatrick     }
500e5dd7070Spatrick   }
501e5dd7070Spatrick 
502e5dd7070Spatrick   LockSetTy LS = state->get<LockSet>();
503e5dd7070Spatrick 
504e5dd7070Spatrick   if (!LS.isEmpty()) {
505e5dd7070Spatrick     const MemRegion *firstLockR = LS.getHead();
506e5dd7070Spatrick     if (firstLockR != lockR) {
507a9ac8606Spatrick       reportBug(C, BT_lor, MtxExpr, CheckKind,
508a9ac8606Spatrick                 "This was not the most recently acquired lock. Possible lock "
509a9ac8606Spatrick                 "order reversal");
510e5dd7070Spatrick       return;
511e5dd7070Spatrick     }
512e5dd7070Spatrick     // Record that the lock was released.
513e5dd7070Spatrick     state = state->set<LockSet>(LS.getTail());
514e5dd7070Spatrick   }
515e5dd7070Spatrick 
516e5dd7070Spatrick   state = state->set<LockMap>(lockR, LockState::getUnlocked());
517e5dd7070Spatrick   C.addTransition(state);
518e5dd7070Spatrick }
519e5dd7070Spatrick 
DestroyPthreadLock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const520ec727ea7Spatrick void PthreadLockChecker::DestroyPthreadLock(const CallEvent &Call,
521ec727ea7Spatrick                                             CheckerContext &C,
522a9ac8606Spatrick                                             CheckerKind CheckKind) const {
523a9ac8606Spatrick   DestroyLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0),
524a9ac8606Spatrick                  PthreadSemantics, CheckKind);
525ec727ea7Spatrick }
526ec727ea7Spatrick 
DestroyXNULock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const527ec727ea7Spatrick void PthreadLockChecker::DestroyXNULock(const CallEvent &Call,
528ec727ea7Spatrick                                         CheckerContext &C,
529a9ac8606Spatrick                                         CheckerKind CheckKind) const {
530a9ac8606Spatrick   DestroyLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), XNUSemantics,
531a9ac8606Spatrick                  CheckKind);
532ec727ea7Spatrick }
533ec727ea7Spatrick 
DestroyLockAux(const CallEvent & Call,CheckerContext & C,const Expr * MtxExpr,SVal MtxVal,enum LockingSemantics Semantics,CheckerKind CheckKind) const534ec727ea7Spatrick void PthreadLockChecker::DestroyLockAux(const CallEvent &Call,
535a9ac8606Spatrick                                         CheckerContext &C, const Expr *MtxExpr,
536a9ac8606Spatrick                                         SVal MtxVal,
537a9ac8606Spatrick                                         enum LockingSemantics Semantics,
538a9ac8606Spatrick                                         CheckerKind CheckKind) const {
539a9ac8606Spatrick   if (!ChecksEnabled[CheckKind])
540ec727ea7Spatrick     return;
541e5dd7070Spatrick 
542a9ac8606Spatrick   const MemRegion *LockR = MtxVal.getAsRegion();
543e5dd7070Spatrick   if (!LockR)
544e5dd7070Spatrick     return;
545e5dd7070Spatrick 
546e5dd7070Spatrick   ProgramStateRef State = C.getState();
547e5dd7070Spatrick 
548e5dd7070Spatrick   const SymbolRef *sym = State->get<DestroyRetVal>(LockR);
549e5dd7070Spatrick   if (sym)
550e5dd7070Spatrick     State = resolvePossiblyDestroyedMutex(State, LockR, sym);
551e5dd7070Spatrick 
552e5dd7070Spatrick   const LockState *LState = State->get<LockMap>(LockR);
553e5dd7070Spatrick   // Checking the return value of the destroy method only in the case of
554e5dd7070Spatrick   // PthreadSemantics
555a9ac8606Spatrick   if (Semantics == PthreadSemantics) {
556e5dd7070Spatrick     if (!LState || LState->isUnlocked()) {
557ec727ea7Spatrick       SymbolRef sym = Call.getReturnValue().getAsSymbol();
558e5dd7070Spatrick       if (!sym) {
559e5dd7070Spatrick         State = State->remove<LockMap>(LockR);
560e5dd7070Spatrick         C.addTransition(State);
561e5dd7070Spatrick         return;
562e5dd7070Spatrick       }
563e5dd7070Spatrick       State = State->set<DestroyRetVal>(LockR, sym);
564e5dd7070Spatrick       if (LState && LState->isUnlocked())
565e5dd7070Spatrick         State = State->set<LockMap>(
566e5dd7070Spatrick             LockR, LockState::getUnlockedAndPossiblyDestroyed());
567e5dd7070Spatrick       else
568e5dd7070Spatrick         State = State->set<LockMap>(
569e5dd7070Spatrick             LockR, LockState::getUntouchedAndPossiblyDestroyed());
570e5dd7070Spatrick       C.addTransition(State);
571e5dd7070Spatrick       return;
572e5dd7070Spatrick     }
573e5dd7070Spatrick   } else {
574e5dd7070Spatrick     if (!LState || LState->isUnlocked()) {
575e5dd7070Spatrick       State = State->set<LockMap>(LockR, LockState::getDestroyed());
576e5dd7070Spatrick       C.addTransition(State);
577e5dd7070Spatrick       return;
578e5dd7070Spatrick     }
579e5dd7070Spatrick   }
580e5dd7070Spatrick 
581a9ac8606Spatrick   StringRef Message = LState->isLocked()
582a9ac8606Spatrick                           ? "This lock is still locked"
583a9ac8606Spatrick                           : "This lock has already been destroyed";
584e5dd7070Spatrick 
585a9ac8606Spatrick   reportBug(C, BT_destroylock, MtxExpr, CheckKind, Message);
586e5dd7070Spatrick }
587e5dd7070Spatrick 
InitAnyLock(const CallEvent & Call,CheckerContext & C,CheckerKind CheckKind) const588ec727ea7Spatrick void PthreadLockChecker::InitAnyLock(const CallEvent &Call, CheckerContext &C,
589a9ac8606Spatrick                                      CheckerKind CheckKind) const {
590a9ac8606Spatrick   InitLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), CheckKind);
591ec727ea7Spatrick }
592ec727ea7Spatrick 
InitLockAux(const CallEvent & Call,CheckerContext & C,const Expr * MtxExpr,SVal MtxVal,CheckerKind CheckKind) const593ec727ea7Spatrick void PthreadLockChecker::InitLockAux(const CallEvent &Call, CheckerContext &C,
594a9ac8606Spatrick                                      const Expr *MtxExpr, SVal MtxVal,
595a9ac8606Spatrick                                      CheckerKind CheckKind) const {
596a9ac8606Spatrick   if (!ChecksEnabled[CheckKind])
597ec727ea7Spatrick     return;
598e5dd7070Spatrick 
599a9ac8606Spatrick   const MemRegion *LockR = MtxVal.getAsRegion();
600e5dd7070Spatrick   if (!LockR)
601e5dd7070Spatrick     return;
602e5dd7070Spatrick 
603e5dd7070Spatrick   ProgramStateRef State = C.getState();
604e5dd7070Spatrick 
605e5dd7070Spatrick   const SymbolRef *sym = State->get<DestroyRetVal>(LockR);
606e5dd7070Spatrick   if (sym)
607e5dd7070Spatrick     State = resolvePossiblyDestroyedMutex(State, LockR, sym);
608e5dd7070Spatrick 
609e5dd7070Spatrick   const struct LockState *LState = State->get<LockMap>(LockR);
610e5dd7070Spatrick   if (!LState || LState->isDestroyed()) {
611e5dd7070Spatrick     State = State->set<LockMap>(LockR, LockState::getUnlocked());
612e5dd7070Spatrick     C.addTransition(State);
613e5dd7070Spatrick     return;
614e5dd7070Spatrick   }
615e5dd7070Spatrick 
616a9ac8606Spatrick   StringRef Message = LState->isLocked()
617a9ac8606Spatrick                           ? "This lock is still being held"
618a9ac8606Spatrick                           : "This lock has already been initialized";
619e5dd7070Spatrick 
620a9ac8606Spatrick   reportBug(C, BT_initlock, MtxExpr, CheckKind, Message);
621e5dd7070Spatrick }
622e5dd7070Spatrick 
reportBug(CheckerContext & C,std::unique_ptr<BugType> BT[],const Expr * MtxExpr,CheckerKind CheckKind,StringRef Desc) const623a9ac8606Spatrick void PthreadLockChecker::reportBug(CheckerContext &C,
624a9ac8606Spatrick                                    std::unique_ptr<BugType> BT[],
625a9ac8606Spatrick                                    const Expr *MtxExpr, CheckerKind CheckKind,
626a9ac8606Spatrick                                    StringRef Desc) const {
627e5dd7070Spatrick   ExplodedNode *N = C.generateErrorNode();
628e5dd7070Spatrick   if (!N)
629e5dd7070Spatrick     return;
630a9ac8606Spatrick   initBugType(CheckKind);
631a9ac8606Spatrick   auto Report =
632a9ac8606Spatrick       std::make_unique<PathSensitiveBugReport>(*BT[CheckKind], Desc, N);
633a9ac8606Spatrick   Report->addRange(MtxExpr->getSourceRange());
634e5dd7070Spatrick   C.emitReport(std::move(Report));
635e5dd7070Spatrick }
636e5dd7070Spatrick 
checkDeadSymbols(SymbolReaper & SymReaper,CheckerContext & C) const637e5dd7070Spatrick void PthreadLockChecker::checkDeadSymbols(SymbolReaper &SymReaper,
638e5dd7070Spatrick                                           CheckerContext &C) const {
639e5dd7070Spatrick   ProgramStateRef State = C.getState();
640e5dd7070Spatrick 
641ec727ea7Spatrick   for (auto I : State->get<DestroyRetVal>()) {
642ec727ea7Spatrick     // Once the return value symbol dies, no more checks can be performed
643ec727ea7Spatrick     // against it. See if the return value was checked before this point.
644ec727ea7Spatrick     // This would remove the symbol from the map as well.
645ec727ea7Spatrick     if (SymReaper.isDead(I.second))
646ec727ea7Spatrick       State = resolvePossiblyDestroyedMutex(State, I.first, &I.second);
647e5dd7070Spatrick   }
648ec727ea7Spatrick 
649ec727ea7Spatrick   for (auto I : State->get<LockMap>()) {
650ec727ea7Spatrick     // Stop tracking dead mutex regions as well.
651a9ac8606Spatrick     if (!SymReaper.isLiveRegion(I.first)) {
652ec727ea7Spatrick       State = State->remove<LockMap>(I.first);
653a9ac8606Spatrick       State = State->remove<DestroyRetVal>(I.first);
654a9ac8606Spatrick     }
655ec727ea7Spatrick   }
656ec727ea7Spatrick 
657ec727ea7Spatrick   // TODO: We probably need to clean up the lock stack as well.
658ec727ea7Spatrick   // It is tricky though: even if the mutex cannot be unlocked anymore,
659ec727ea7Spatrick   // it can still participate in lock order reversal resolution.
660ec727ea7Spatrick 
661e5dd7070Spatrick   C.addTransition(State);
662e5dd7070Spatrick }
663e5dd7070Spatrick 
checkRegionChanges(ProgramStateRef State,const InvalidatedSymbols * Symbols,ArrayRef<const MemRegion * > ExplicitRegions,ArrayRef<const MemRegion * > Regions,const LocationContext * LCtx,const CallEvent * Call) const664ec727ea7Spatrick ProgramStateRef PthreadLockChecker::checkRegionChanges(
665ec727ea7Spatrick     ProgramStateRef State, const InvalidatedSymbols *Symbols,
666ec727ea7Spatrick     ArrayRef<const MemRegion *> ExplicitRegions,
667ec727ea7Spatrick     ArrayRef<const MemRegion *> Regions, const LocationContext *LCtx,
668ec727ea7Spatrick     const CallEvent *Call) const {
669ec727ea7Spatrick 
670ec727ea7Spatrick   bool IsLibraryFunction = false;
671ec727ea7Spatrick   if (Call && Call->isGlobalCFunction()) {
672ec727ea7Spatrick     // Avoid invalidating mutex state when a known supported function is called.
673ec727ea7Spatrick     if (PThreadCallbacks.lookup(*Call) || FuchsiaCallbacks.lookup(*Call) ||
674ec727ea7Spatrick         C11Callbacks.lookup(*Call))
675ec727ea7Spatrick       return State;
676ec727ea7Spatrick 
677ec727ea7Spatrick     if (Call->isInSystemHeader())
678ec727ea7Spatrick       IsLibraryFunction = true;
679ec727ea7Spatrick   }
680ec727ea7Spatrick 
681ec727ea7Spatrick   for (auto R : Regions) {
682ec727ea7Spatrick     // We assume that system library function wouldn't touch the mutex unless
683ec727ea7Spatrick     // it takes the mutex explicitly as an argument.
684ec727ea7Spatrick     // FIXME: This is a bit quadratic.
685*12c85518Srobert     if (IsLibraryFunction && !llvm::is_contained(ExplicitRegions, R))
686ec727ea7Spatrick       continue;
687ec727ea7Spatrick 
688ec727ea7Spatrick     State = State->remove<LockMap>(R);
689ec727ea7Spatrick     State = State->remove<DestroyRetVal>(R);
690ec727ea7Spatrick 
691ec727ea7Spatrick     // TODO: We need to invalidate the lock stack as well. This is tricky
692ec727ea7Spatrick     // to implement correctly and efficiently though, because the effects
693ec727ea7Spatrick     // of mutex escapes on lock order may be fairly varied.
694ec727ea7Spatrick   }
695ec727ea7Spatrick 
696ec727ea7Spatrick   return State;
697ec727ea7Spatrick }
698ec727ea7Spatrick 
registerPthreadLockBase(CheckerManager & mgr)699ec727ea7Spatrick void ento::registerPthreadLockBase(CheckerManager &mgr) {
700e5dd7070Spatrick   mgr.registerChecker<PthreadLockChecker>();
701e5dd7070Spatrick }
702e5dd7070Spatrick 
shouldRegisterPthreadLockBase(const CheckerManager & mgr)703ec727ea7Spatrick bool ento::shouldRegisterPthreadLockBase(const CheckerManager &mgr) { return true; }
704ec727ea7Spatrick 
705ec727ea7Spatrick #define REGISTER_CHECKER(name)                                                 \
706ec727ea7Spatrick   void ento::register##name(CheckerManager &mgr) {                             \
707ec727ea7Spatrick     PthreadLockChecker *checker = mgr.getChecker<PthreadLockChecker>();        \
708ec727ea7Spatrick     checker->ChecksEnabled[PthreadLockChecker::CK_##name] = true;              \
709ec727ea7Spatrick     checker->CheckNames[PthreadLockChecker::CK_##name] =                       \
710ec727ea7Spatrick         mgr.getCurrentCheckerName();                                           \
711ec727ea7Spatrick   }                                                                            \
712ec727ea7Spatrick                                                                                \
713ec727ea7Spatrick   bool ento::shouldRegister##name(const CheckerManager &mgr) { return true; }
714ec727ea7Spatrick 
715ec727ea7Spatrick REGISTER_CHECKER(PthreadLockChecker)
716ec727ea7Spatrick REGISTER_CHECKER(FuchsiaLockChecker)
717ec727ea7Spatrick REGISTER_CHECKER(C11LockChecker)
718