| //===--- rtsan_assertions.h - Realtime Sanitizer ----------------*- C++ -*-===// |
| // |
| // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| // See https://llvm.org/LICENSE.txt for license information. |
| // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
| // |
| //===----------------------------------------------------------------------===// |
| // |
| // Part of the RealtimeSanitizer runtime library |
| // |
| //===----------------------------------------------------------------------===// |
| |
| #pragma once |
| |
| #include "rtsan/rtsan.h" |
| #include "rtsan/rtsan_context.h" |
| #include "rtsan/rtsan_diagnostics.h" |
| #include "rtsan/rtsan_stats.h" |
| #include "rtsan/rtsan_suppressions.h" |
| |
| #include "sanitizer_common/sanitizer_stacktrace.h" |
| |
| namespace __rtsan { |
| |
| template <typename OnViolationAction> |
| void ExpectNotRealtime(Context &context, const DiagnosticsInfo &info, |
| OnViolationAction &&OnViolation) { |
| CHECK(__rtsan_is_initialized()); |
| if (context.InRealtimeContext() && !context.IsBypassed()) { |
| ScopedBypass sb{context}; |
| |
| if (IsFunctionSuppressed(info.func_name)) { |
| IncrementSuppressedCount(); |
| return; |
| } |
| |
| __sanitizer::BufferedStackTrace stack; |
| |
| // We use the unwind_on_fatal flag here because of precedent with other |
| // sanitizers, this action is not necessarily fatal if halt_on_error=false |
| stack.Unwind(info.pc, info.bp, nullptr, |
| __sanitizer::common_flags()->fast_unwind_on_fatal); |
| |
| if (IsStackTraceSuppressed(stack)) { |
| IncrementSuppressedCount(); |
| return; |
| } |
| |
| OnViolation(stack, info); |
| } |
| } |
| |
| } // namespace __rtsan |