mirror of
https://github.com/llvm/llvm-project.git
synced 2025-04-17 04:26:37 +00:00

This reapplies 8fa66c6ca7272268747835a0e86805307b62399c ([asan][windows] Eliminate the static asan runtime on windows) for a second time. That PR bounced off the tests because it caused failures in the other sanitizer runtimes, these have been fixed by only building interception, sanitizer_common, and asan with /MD, and continuing to build the rest of the runtimes with /MT. This does mean that any usage of the static ubsan/fuzzer/etc runtimes will mean you're mixing different runtime library linkages in the same app, the interception, sanitizer_common, and asan runtimes are designed for this, however it does result in some linker warnings. Additionally, it turns out when building in release-mode with LLVM_ENABLE_PDBs the build system forced /OPT:ICF. This totally breaks asan's "new" method of doing "weak" functions on windows, and so /OPT:NOICF was explicitly added to asan's link flags. --------- Co-authored-by: Amy Wishnousky <amyw@microsoft.com>
64 lines
2.1 KiB
C++
64 lines
2.1 KiB
C++
//===-- asan_globals_win.cpp ----------------------------------------------===//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// Global registration code that is linked into every Windows DLL and EXE.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "asan_interface_internal.h"
|
|
#if SANITIZER_WINDOWS
|
|
|
|
namespace __asan {
|
|
|
|
#pragma section(".ASAN$GA", read, write)
|
|
#pragma section(".ASAN$GZ", read, write)
|
|
extern "C" alignas(sizeof(__asan_global))
|
|
__declspec(allocate(".ASAN$GA")) __asan_global __asan_globals_start = {};
|
|
extern "C" alignas(sizeof(__asan_global))
|
|
__declspec(allocate(".ASAN$GZ")) __asan_global __asan_globals_end = {};
|
|
#pragma comment(linker, "/merge:.ASAN=.data")
|
|
|
|
static void call_on_globals(void (*hook)(__asan_global *, uptr)) {
|
|
__asan_global *start = &__asan_globals_start + 1;
|
|
__asan_global *end = &__asan_globals_end;
|
|
uptr bytediff = (uptr)end - (uptr)start;
|
|
if (bytediff % sizeof(__asan_global) != 0) {
|
|
# if defined(SANITIZER_DLL_THUNK) || \
|
|
defined(SANITIZER_DYNAMIC_RUNTIME_THUNK) || \
|
|
defined(SANITIZER_STATIC_RUNTIME_THUNK)
|
|
__debugbreak();
|
|
#else
|
|
CHECK("corrupt asan global array");
|
|
#endif
|
|
}
|
|
// We know end >= start because the linker sorts the portion after the dollar
|
|
// sign alphabetically.
|
|
uptr n = end - start;
|
|
hook(start, n);
|
|
}
|
|
|
|
static void register_dso_globals() {
|
|
call_on_globals(&__asan_register_globals);
|
|
}
|
|
|
|
static void unregister_dso_globals() {
|
|
call_on_globals(&__asan_unregister_globals);
|
|
}
|
|
|
|
// Register globals
|
|
#pragma section(".CRT$XCU", long, read)
|
|
#pragma section(".CRT$XTX", long, read)
|
|
extern "C" __declspec(allocate(".CRT$XCU"))
|
|
void (*const __asan_dso_reg_hook)() = ®ister_dso_globals;
|
|
extern "C" __declspec(allocate(".CRT$XTX"))
|
|
void (*const __asan_dso_unreg_hook)() = &unregister_dso_globals;
|
|
|
|
} // namespace __asan
|
|
|
|
#endif // SANITIZER_WINDOWS
|