//===--- rtsan_context.cpp - Realtime Sanitizer -----------------*- C++ -*-===//
//
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
// See https://llvm.org/LICENSE.txt for license information.
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
//
//===----------------------------------------------------------------------===//
//
//===----------------------------------------------------------------------===//

#include <rtsan/rtsan_context.h>

#include <rtsan/rtsan_stack.h>

#include <sanitizer_common/sanitizer_allocator_internal.h>
#include <sanitizer_common/sanitizer_stacktrace.h>

#include <new>
#include <pthread.h>
#include <stdio.h>
#include <stdlib.h>

static pthread_key_t context_key;
static pthread_once_t key_once = PTHREAD_ONCE_INIT;

// InternalFree cannot be passed directly to pthread_key_create
// because it expects a signature with only one arg
static void InternalFreeWrapper(void *ptr) { __sanitizer::InternalFree(ptr); }

static __rtsan::Context &GetContextForThisThreadImpl() {
  auto make_thread_local_context_key = []() {
    CHECK_EQ(pthread_key_create(&context_key, InternalFreeWrapper), 0);
  };

  pthread_once(&key_once, make_thread_local_context_key);
  __rtsan::Context *current_thread_context =
      static_cast<__rtsan::Context *>(pthread_getspecific(context_key));
  if (current_thread_context == nullptr) {
    current_thread_context = static_cast<__rtsan::Context *>(
        __sanitizer::InternalAlloc(sizeof(__rtsan::Context)));
    new (current_thread_context) __rtsan::Context();
    pthread_setspecific(context_key, current_thread_context);
  }

  return *current_thread_context;
}

/*
    This is a placeholder stub for a future feature that will allow
    a user to configure RTSan's behaviour when a real-time safety
    violation is detected. The RTSan developers intend for the
    following choices to be made available, via a RTSAN_OPTIONS
    environment variable, in a future PR:

        i) exit,
       ii) continue, or
      iii) wait for user input from stdin.

    Until then, and to keep the first PRs small, only the exit mode
    is available.
*/
static void InvokeViolationDetectedAction() { exit(EXIT_FAILURE); }

__rtsan::Context::Context() = default;

void __rtsan::Context::RealtimePush() { realtime_depth++; }

void __rtsan::Context::RealtimePop() { realtime_depth--; }

void __rtsan::Context::BypassPush() { bypass_depth++; }

void __rtsan::Context::BypassPop() { bypass_depth--; }

void __rtsan::Context::ExpectNotRealtime(
    const char *intercepted_function_name) {
  if (InRealtimeContext() && !IsBypassed()) {
    BypassPush();
    PrintDiagnostics(intercepted_function_name);
    InvokeViolationDetectedAction();
    BypassPop();
  }
}

bool __rtsan::Context::InRealtimeContext() const { return realtime_depth > 0; }

bool __rtsan::Context::IsBypassed() const { return bypass_depth > 0; }

void __rtsan::Context::PrintDiagnostics(const char *intercepted_function_name) {
  fprintf(stderr,
          "Real-time violation: intercepted call to real-time unsafe function "
          "`%s` in real-time context! Stack trace:\n",
          intercepted_function_name);
  __rtsan::PrintStackTrace();
}

__rtsan::Context &__rtsan::GetContextForThisThread() {
  return GetContextForThisThreadImpl();
}