//===--- rtsan_context.cpp - Realtime Sanitizer -----------------*- C++ -*-===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// // //===----------------------------------------------------------------------===// #include #include #include #include #include #include #include #include static pthread_key_t context_key; static pthread_once_t key_once = PTHREAD_ONCE_INIT; // InternalFree cannot be passed directly to pthread_key_create // because it expects a signature with only one arg static void InternalFreeWrapper(void *ptr) { __sanitizer::InternalFree(ptr); } static __rtsan::Context &GetContextForThisThreadImpl() { auto make_thread_local_context_key = []() { CHECK_EQ(pthread_key_create(&context_key, InternalFreeWrapper), 0); }; pthread_once(&key_once, make_thread_local_context_key); __rtsan::Context *current_thread_context = static_cast<__rtsan::Context *>(pthread_getspecific(context_key)); if (current_thread_context == nullptr) { current_thread_context = static_cast<__rtsan::Context *>( __sanitizer::InternalAlloc(sizeof(__rtsan::Context))); new (current_thread_context) __rtsan::Context(); pthread_setspecific(context_key, current_thread_context); } return *current_thread_context; } /* This is a placeholder stub for a future feature that will allow a user to configure RTSan's behaviour when a real-time safety violation is detected. The RTSan developers intend for the following choices to be made available, via a RTSAN_OPTIONS environment variable, in a future PR: i) exit, ii) continue, or iii) wait for user input from stdin. Until then, and to keep the first PRs small, only the exit mode is available. */ static void InvokeViolationDetectedAction() { exit(EXIT_FAILURE); } __rtsan::Context::Context() = default; void __rtsan::Context::RealtimePush() { realtime_depth++; } void __rtsan::Context::RealtimePop() { realtime_depth--; } void __rtsan::Context::BypassPush() { bypass_depth++; } void __rtsan::Context::BypassPop() { bypass_depth--; } void __rtsan::Context::ExpectNotRealtime( const char *intercepted_function_name) { if (InRealtimeContext() && !IsBypassed()) { BypassPush(); PrintDiagnostics(intercepted_function_name); InvokeViolationDetectedAction(); BypassPop(); } } bool __rtsan::Context::InRealtimeContext() const { return realtime_depth > 0; } bool __rtsan::Context::IsBypassed() const { return bypass_depth > 0; } void __rtsan::Context::PrintDiagnostics(const char *intercepted_function_name) { fprintf(stderr, "Real-time violation: intercepted call to real-time unsafe function " "`%s` in real-time context! Stack trace:\n", intercepted_function_name); __rtsan::PrintStackTrace(); } __rtsan::Context &__rtsan::GetContextForThisThread() { return GetContextForThisThreadImpl(); }