summaryrefslogtreecommitdiff
path: root/src/runtime/asan.go
diff options
context:
space:
mode:
authorfanzha02 <fannie.zhang@arm.com>2021-04-29 17:02:53 +0800
committerIan Lance Taylor <iant@google.com>2022-04-22 04:42:23 +0000
commit1e5987635cc8bf99e8a20d240da80bd6f0f793f7 (patch)
tree71b3c644dab4a84570827c63ecd01185129631ce /src/runtime/asan.go
parentbe1d7388b349e86bc2fc1b8769902875e732918f (diff)
downloadgo-git-1e5987635cc8bf99e8a20d240da80bd6f0f793f7.tar.gz
cmd/compile: enable Asan check for global variables
With this patch, -asan option can detect the error memory access to global variables. So this patch makes a few changes: 1. Add the asanregisterglobals runtime support function, which calls asan runtime function _asan_register_globals to register global variables. 2. Create a new initialization function for the package being compiled. This function initializes an array of instrumented global variables and pass it to function runtime.asanregisterglobals. An instrumented global variable has trailing redzone. 3. Writes the new size of instrumented global variables that have trailing redzones into object file. 4. Notice that the current implementation is only compatible with the ASan library from version v7 to v9. Therefore, using the -asan option requires that the gcc version is not less than 7 and the clang version is less than 4, otherwise a segmentation fault will occur. So this patch adds a check on whether the compiler being used is a supported version in cmd/go. Change-Id: I664e74dcabf5dc7ed46802859174606454e8f1d3 Reviewed-on: https://go-review.googlesource.com/c/go/+/321715 Reviewed-by: Keith Randall <khr@google.com> Reviewed-by: Keith Randall <khr@golang.org> Run-TryBot: Fannie Zhang <Fannie.Zhang@arm.com> Reviewed-by: Ian Lance Taylor <iant@google.com>
Diffstat (limited to 'src/runtime/asan.go')
-rw-r--r--src/runtime/asan.go4
1 files changed, 4 insertions, 0 deletions
diff --git a/src/runtime/asan.go b/src/runtime/asan.go
index 8c41e418f7..25b83277e6 100644
--- a/src/runtime/asan.go
+++ b/src/runtime/asan.go
@@ -55,9 +55,13 @@ func asanunpoison(addr unsafe.Pointer, sz uintptr)
//go:noescape
func asanpoison(addr unsafe.Pointer, sz uintptr)
+//go:noescape
+func asanregisterglobals(addr unsafe.Pointer, n uintptr)
+
// These are called from asan_GOARCH.s
//
//go:cgo_import_static __asan_read_go
//go:cgo_import_static __asan_write_go
//go:cgo_import_static __asan_unpoison_go
//go:cgo_import_static __asan_poison_go
+//go:cgo_import_static __asan_register_globals_go