mirror of
https://github.com/RPCS3/llvm-mirror.git
synced 2025-02-22 13:32:09 +00:00
[msan] Only check shadow memory for operands that are sized.
Fixes PR33347: https://bugs.llvm.org/show_bug.cgi?id=33347. Differential Revision: https://reviews.llvm.org/D35160 Patch by Matt Morehouse. llvm-svn: 307684
This commit is contained in:
parent
5df3c2db91
commit
56db4777f8
@ -2918,8 +2918,11 @@ struct MemorySanitizerVisitor : public InstVisitor<MemorySanitizerVisitor> {
|
||||
if (ClDumpStrictInstructions)
|
||||
dumpInst(I);
|
||||
DEBUG(dbgs() << "DEFAULT: " << I << "\n");
|
||||
for (size_t i = 0, n = I.getNumOperands(); i < n; i++)
|
||||
insertShadowCheck(I.getOperand(i), &I);
|
||||
for (size_t i = 0, n = I.getNumOperands(); i < n; i++) {
|
||||
Value *Operand = I.getOperand(i);
|
||||
if (Operand->getType()->isSized())
|
||||
insertShadowCheck(Operand, &I);
|
||||
}
|
||||
setShadow(&I, getCleanShadow(&I));
|
||||
setOrigin(&I, getCleanOrigin());
|
||||
}
|
||||
|
22
test/Instrumentation/MemorySanitizer/unsized_type.ll
Normal file
22
test/Instrumentation/MemorySanitizer/unsized_type.ll
Normal file
@ -0,0 +1,22 @@
|
||||
; Check that unsized token types used by coroutine intrinsics do not cause
|
||||
; assertion failures.
|
||||
; RUN: opt < %s -msan -S 2>&1 | FileCheck %s
|
||||
|
||||
target datalayout = "e-m:e-i64:64-f80:128-n8:16:32:64-S128"
|
||||
target triple = "x86_64-unknown-linux-gnu"
|
||||
|
||||
declare token @llvm.coro.id(i32, i8* readnone, i8* nocapture readonly, i8*)
|
||||
declare i1 @llvm.coro.alloc(token)
|
||||
|
||||
define void @foo() sanitize_memory {
|
||||
entry:
|
||||
%id = call token @llvm.coro.id(i32 0, i8* null, i8* null, i8* null)
|
||||
%dyn.alloc.reqd = call i1 @llvm.coro.alloc(token %id)
|
||||
ret void
|
||||
}
|
||||
|
||||
; CHECK: define void @foo
|
||||
; CHECK-NEXT: entry:
|
||||
; CHECK-NEXT: %id = call token @llvm.coro.id
|
||||
; CHECK-NEXT: call i1 @llvm.coro.alloc(token %id)
|
||||
; CHECK-NEXT: ret void
|
Loading…
x
Reference in New Issue
Block a user