mirror of
https://github.com/golang/go
synced 2024-11-22 21:10:03 -07:00
5f7a408563
Variables in functions implemented in assembly should have the same names as when they were defined. The names of some variables in asan-related assembly functions do not follow the above rule, which will cause the runtime test to fail. This CL fixes this issue. Updates #64257 Change-Id: I261f4db807d25e460513ef1c92cd1b707cdd1a16 Reviewed-on: https://go-review.googlesource.com/c/go/+/543837 Run-TryBot: Fannie Zhang <Fannie.Zhang@arm.com> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Cherry Mui <cherryyz@google.com> Reviewed-by: Bryan Mills <bcmills@google.com>
92 lines
2.4 KiB
ArmAsm
92 lines
2.4 KiB
ArmAsm
// Copyright 2021 The Go Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
//go:build asan
|
|
|
|
#include "go_asm.h"
|
|
#include "go_tls.h"
|
|
#include "funcdata.h"
|
|
#include "textflag.h"
|
|
|
|
// This is like race_amd64.s, but for the asan calls.
|
|
// See race_amd64.s for detailed comments.
|
|
|
|
#ifdef GOOS_windows
|
|
#define RARG0 CX
|
|
#define RARG1 DX
|
|
#define RARG2 R8
|
|
#define RARG3 R9
|
|
#else
|
|
#define RARG0 DI
|
|
#define RARG1 SI
|
|
#define RARG2 DX
|
|
#define RARG3 CX
|
|
#endif
|
|
|
|
// Called from instrumented code.
|
|
// func runtime·doasanread(addr unsafe.Pointer, sz, sp, pc uintptr)
|
|
TEXT runtime·doasanread(SB), NOSPLIT, $0-32
|
|
MOVQ addr+0(FP), RARG0
|
|
MOVQ sz+8(FP), RARG1
|
|
MOVQ sp+16(FP), RARG2
|
|
MOVQ pc+24(FP), RARG3
|
|
// void __asan_read_go(void *addr, uintptr_t sz, void *sp, void *pc);
|
|
MOVQ $__asan_read_go(SB), AX
|
|
JMP asancall<>(SB)
|
|
|
|
// func runtime·doasanwrite(addr unsafe.Pointer, sz, sp, pc uintptr)
|
|
TEXT runtime·doasanwrite(SB), NOSPLIT, $0-32
|
|
MOVQ addr+0(FP), RARG0
|
|
MOVQ sz+8(FP), RARG1
|
|
MOVQ sp+16(FP), RARG2
|
|
MOVQ pc+24(FP), RARG3
|
|
// void __asan_write_go(void *addr, uintptr_t sz, void *sp, void *pc);
|
|
MOVQ $__asan_write_go(SB), AX
|
|
JMP asancall<>(SB)
|
|
|
|
// func runtime·asanunpoison(addr unsafe.Pointer, sz uintptr)
|
|
TEXT runtime·asanunpoison(SB), NOSPLIT, $0-16
|
|
MOVQ addr+0(FP), RARG0
|
|
MOVQ sz+8(FP), RARG1
|
|
// void __asan_unpoison_go(void *addr, uintptr_t sz);
|
|
MOVQ $__asan_unpoison_go(SB), AX
|
|
JMP asancall<>(SB)
|
|
|
|
// func runtime·asanpoison(addr unsafe.Pointer, sz uintptr)
|
|
TEXT runtime·asanpoison(SB), NOSPLIT, $0-16
|
|
MOVQ addr+0(FP), RARG0
|
|
MOVQ sz+8(FP), RARG1
|
|
// void __asan_poison_go(void *addr, uintptr_t sz);
|
|
MOVQ $__asan_poison_go(SB), AX
|
|
JMP asancall<>(SB)
|
|
|
|
// func runtime·asanregisterglobals(addr unsafe.Pointer, n uintptr)
|
|
TEXT runtime·asanregisterglobals(SB), NOSPLIT, $0-16
|
|
MOVQ addr+0(FP), RARG0
|
|
MOVQ n+8(FP), RARG1
|
|
// void __asan_register_globals_go(void *addr, uintptr_t n);
|
|
MOVQ $__asan_register_globals_go(SB), AX
|
|
JMP asancall<>(SB)
|
|
|
|
// Switches SP to g0 stack and calls (AX). Arguments already set.
|
|
TEXT asancall<>(SB), NOSPLIT, $0-0
|
|
get_tls(R12)
|
|
MOVQ g(R12), R14
|
|
MOVQ SP, R12 // callee-saved, preserved across the CALL
|
|
CMPQ R14, $0
|
|
JE call // no g; still on a system stack
|
|
|
|
MOVQ g_m(R14), R13
|
|
// Switch to g0 stack.
|
|
MOVQ m_g0(R13), R10
|
|
CMPQ R10, R14
|
|
JE call // already on g0
|
|
|
|
MOVQ (g_sched+gobuf_sp)(R10), SP
|
|
call:
|
|
ANDQ $~15, SP // alignment for gcc ABI
|
|
CALL AX
|
|
MOVQ R12, SP
|
|
RET
|