diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-16 19:25:22 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-16 19:25:22 +0000 |
commit | f6ad4dcef54c5ce997a4bad5a6d86de229015700 (patch) | |
tree | 7cfa4e31ace5c2bd95c72b154d15af494b2bcbef /test/live_uintptrkeepalive.go | |
parent | Initial commit. (diff) | |
download | golang-1.22-f6ad4dcef54c5ce997a4bad5a6d86de229015700.tar.xz golang-1.22-f6ad4dcef54c5ce997a4bad5a6d86de229015700.zip |
Adding upstream version 1.22.1.upstream/1.22.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'test/live_uintptrkeepalive.go')
-rw-r--r-- | test/live_uintptrkeepalive.go | 63 |
1 files changed, 63 insertions, 0 deletions
diff --git a/test/live_uintptrkeepalive.go b/test/live_uintptrkeepalive.go new file mode 100644 index 0000000..ae41101 --- /dev/null +++ b/test/live_uintptrkeepalive.go @@ -0,0 +1,63 @@ +// errorcheck -0 -m -live -std + +//go:build !windows && !js && !wasip1 + +// Copyright 2015 The Go Authors. All rights reserved. +// Use of this source code is governed by a BSD-style +// license that can be found in the LICENSE file. + +// Test escape analysis and liveness inferred for uintptrkeepalive functions. +// +// This behavior is enabled automatically for function declarations with no +// bodies (assembly, linkname), as well as explicitly on complete functions +// with //go:uintptrkeepalive. +// +// This is most important for syscall.Syscall (and similar functions), so we +// test it explicitly. + +package p + +import ( + "syscall" + "unsafe" +) + +func implicit(uintptr) // ERROR "assuming ~p0 is unsafe uintptr" + +//go:uintptrkeepalive +//go:nosplit +func explicit(uintptr) { +} + +func autotmpImplicit() { // ERROR "can inline autotmpImplicit" + var t int + implicit(uintptr(unsafe.Pointer(&t))) // ERROR "live at call to implicit: .?autotmp" "stack object .autotmp_[0-9]+ unsafe.Pointer$" +} + +func autotmpExplicit() { // ERROR "can inline autotmpExplicit" + var t int + explicit(uintptr(unsafe.Pointer(&t))) // ERROR "live at call to explicit: .?autotmp" "stack object .autotmp_[0-9]+ unsafe.Pointer$" +} + +func autotmpSyscall() { // ERROR "can inline autotmpSyscall" + var v int + syscall.Syscall(0, 1, uintptr(unsafe.Pointer(&v)), 2) // ERROR "live at call to Syscall: .?autotmp" "stack object .autotmp_[0-9]+ unsafe.Pointer$" +} + +func localImplicit() { // ERROR "can inline localImplicit" + var t int + p := unsafe.Pointer(&t) + implicit(uintptr(p)) // ERROR "live at call to implicit: .?autotmp" "stack object .autotmp_[0-9]+ unsafe.Pointer$" +} + +func localExplicit() { // ERROR "can inline localExplicit" + var t int + p := unsafe.Pointer(&t) + explicit(uintptr(p)) // ERROR "live at call to explicit: .?autotmp" "stack object .autotmp_[0-9]+ unsafe.Pointer$" +} + +func localSyscall() { // ERROR "can inline localSyscall" + var v int + p := unsafe.Pointer(&v) + syscall.Syscall(0, 1, uintptr(p), 2) // ERROR "live at call to Syscall: .?autotmp" "stack object .autotmp_[0-9]+ unsafe.Pointer$" +} |