[llvm] r307684 - [msan] Only check shadow memory for operands that are sized.
Evgeniy Stepanov via llvm-commits
llvm-commits at lists.llvm.org
Tue Jul 11 11:13:52 PDT 2017
Author: eugenis
Date: Tue Jul 11 11:13:52 2017
New Revision: 307684
URL: http://llvm.org/viewvc/llvm-project?rev=307684&view=rev
Log:
[msan] Only check shadow memory for operands that are sized.
Fixes PR33347: https://bugs.llvm.org/show_bug.cgi?id=33347.
Differential Revision: https://reviews.llvm.org/D35160
Patch by Matt Morehouse.
Added:
llvm/trunk/test/Instrumentation/MemorySanitizer/unsized_type.ll
Modified:
llvm/trunk/lib/Transforms/Instrumentation/MemorySanitizer.cpp
Modified: llvm/trunk/lib/Transforms/Instrumentation/MemorySanitizer.cpp
URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/lib/Transforms/Instrumentation/MemorySanitizer.cpp?rev=307684&r1=307683&r2=307684&view=diff
==============================================================================
--- llvm/trunk/lib/Transforms/Instrumentation/MemorySanitizer.cpp (original)
+++ llvm/trunk/lib/Transforms/Instrumentation/MemorySanitizer.cpp Tue Jul 11 11:13:52 2017
@@ -2918,8 +2918,11 @@ struct MemorySanitizerVisitor : public I
if (ClDumpStrictInstructions)
dumpInst(I);
DEBUG(dbgs() << "DEFAULT: " << I << "\n");
- for (size_t i = 0, n = I.getNumOperands(); i < n; i++)
- insertShadowCheck(I.getOperand(i), &I);
+ for (size_t i = 0, n = I.getNumOperands(); i < n; i++) {
+ Value *Operand = I.getOperand(i);
+ if (Operand->getType()->isSized())
+ insertShadowCheck(Operand, &I);
+ }
setShadow(&I, getCleanShadow(&I));
setOrigin(&I, getCleanOrigin());
}
Added: llvm/trunk/test/Instrumentation/MemorySanitizer/unsized_type.ll
URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/test/Instrumentation/MemorySanitizer/unsized_type.ll?rev=307684&view=auto
==============================================================================
--- llvm/trunk/test/Instrumentation/MemorySanitizer/unsized_type.ll (added)
+++ llvm/trunk/test/Instrumentation/MemorySanitizer/unsized_type.ll Tue Jul 11 11:13:52 2017
@@ -0,0 +1,22 @@
+; Check that unsized token types used by coroutine intrinsics do not cause
+; assertion failures.
+; RUN: opt < %s -msan -S 2>&1 | FileCheck %s
+
+target datalayout = "e-m:e-i64:64-f80:128-n8:16:32:64-S128"
+target triple = "x86_64-unknown-linux-gnu"
+
+declare token @llvm.coro.id(i32, i8* readnone, i8* nocapture readonly, i8*)
+declare i1 @llvm.coro.alloc(token)
+
+define void @foo() sanitize_memory {
+entry:
+ %id = call token @llvm.coro.id(i32 0, i8* null, i8* null, i8* null)
+ %dyn.alloc.reqd = call i1 @llvm.coro.alloc(token %id)
+ ret void
+}
+
+; CHECK: define void @foo
+; CHECK-NEXT: entry:
+; CHECK-NEXT: %id = call token @llvm.coro.id
+; CHECK-NEXT: call i1 @llvm.coro.alloc(token %id)
+; CHECK-NEXT: ret void
More information about the llvm-commits
mailing list