diff options
author | Adin Scannell <ascannell@google.com> | 2020-04-20 20:57:02 -0700 |
---|---|---|
committer | gVisor bot <gvisor-bot@google.com> | 2020-04-20 20:58:20 -0700 |
commit | c615aafa219e8d9783b9c9a25252e4973de57d4a (patch) | |
tree | 29e9ce4c7a2340316dfd0444ec57eaa1e7d6d531 /tools/nogo/check/BUILD | |
parent | 782041509f4130e8e795b22379368239d5091c8f (diff) |
Add internal nogo analysis & checkescape tool.
See tools/nogo/README.md.
The checkescape tool is able to perform recursive escape analysis, using the
actual generated binary to confirm the results produced by the compiler itself.
As an initial use case, this replaces the manual escape analysis tests used for
go_marshal, and validates that the CopyIn and CopyOut paths will not require
any allocation or stack splits.
Updates #2243
PiperOrigin-RevId: 307532986
Diffstat (limited to 'tools/nogo/check/BUILD')
-rw-r--r-- | tools/nogo/check/BUILD | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/tools/nogo/check/BUILD b/tools/nogo/check/BUILD new file mode 100644 index 000000000..e2d76cd5c --- /dev/null +++ b/tools/nogo/check/BUILD @@ -0,0 +1,12 @@ +load("//tools:defs.bzl", "go_binary") + +package(licenses = ["notice"]) + +# Note that the check binary must be public, since an aspect may be applied +# across lots of different rules in different repositories. +go_binary( + name = "check", + srcs = ["main.go"], + visibility = ["//visibility:public"], + deps = ["//tools/nogo"], +) |