momchil-velikov wrote:

> I haven't been able to produce a minimal, sharable example as of yet, but I'm 
> encountering a runtime error associated with an inlined function where stack 
> probing is active. The error manifests as a null pointer dereference, 
> originating from a stack value that is probed (and set to 0) before being 
> subsequently dereferenced.

All the stack probing should have already finished before the call to `malloc`.

> I'm working to isolate this issue and will share a repro ASAP. In the 
> meantime, any insights or suggestions based on this description would be 
> greatly appreciated.

Just to make things simpler, can you try disabling the shrink-wrapping and see 
what happens?

> Also is it required to write to the value? Would reading the value be 
> sufficient?
I can't really see a compelling reason to prefer one over another. Maybe for 
the odd chance some
kernel/runtime allocates read-only (as opposed to no access at all) guard 
regions.

Anyway, changing that won't solve the problem here, at most it could hide it.


https://github.com/llvm/llvm-project/pull/66524
_______________________________________________
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits

Reply via email to