diff options
author | fanzha02 <fannie.zhang@arm.com> | 2021-04-29 17:02:53 +0800 |
---|---|---|
committer | Ian Lance Taylor <iant@google.com> | 2022-04-22 04:42:23 +0000 |
commit | 1e5987635cc8bf99e8a20d240da80bd6f0f793f7 (patch) | |
tree | 71b3c644dab4a84570827c63ecd01185129631ce /src/runtime/asan.go | |
parent | be1d7388b349e86bc2fc1b8769902875e732918f (diff) | |
download | go-git-1e5987635cc8bf99e8a20d240da80bd6f0f793f7.tar.gz |
cmd/compile: enable Asan check for global variables
With this patch, -asan option can detect the error memory
access to global variables.
So this patch makes a few changes:
1. Add the asanregisterglobals runtime support function,
which calls asan runtime function _asan_register_globals
to register global variables.
2. Create a new initialization function for the package
being compiled. This function initializes an array of
instrumented global variables and pass it to function
runtime.asanregisterglobals. An instrumented global
variable has trailing redzone.
3. Writes the new size of instrumented global variables
that have trailing redzones into object file.
4. Notice that the current implementation is only compatible with
the ASan library from version v7 to v9. Therefore, using the
-asan option requires that the gcc version is not less than 7
and the clang version is less than 4, otherwise a segmentation
fault will occur. So this patch adds a check on whether the compiler
being used is a supported version in cmd/go.
Change-Id: I664e74dcabf5dc7ed46802859174606454e8f1d3
Reviewed-on: https://go-review.googlesource.com/c/go/+/321715
Reviewed-by: Keith Randall <khr@google.com>
Reviewed-by: Keith Randall <khr@golang.org>
Run-TryBot: Fannie Zhang <Fannie.Zhang@arm.com>
Reviewed-by: Ian Lance Taylor <iant@google.com>
Diffstat (limited to 'src/runtime/asan.go')
-rw-r--r-- | src/runtime/asan.go | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/src/runtime/asan.go b/src/runtime/asan.go index 8c41e418f7..25b83277e6 100644 --- a/src/runtime/asan.go +++ b/src/runtime/asan.go @@ -55,9 +55,13 @@ func asanunpoison(addr unsafe.Pointer, sz uintptr) //go:noescape func asanpoison(addr unsafe.Pointer, sz uintptr) +//go:noescape +func asanregisterglobals(addr unsafe.Pointer, n uintptr) + // These are called from asan_GOARCH.s // //go:cgo_import_static __asan_read_go //go:cgo_import_static __asan_write_go //go:cgo_import_static __asan_unpoison_go //go:cgo_import_static __asan_poison_go +//go:cgo_import_static __asan_register_globals_go |