summaryrefslogtreecommitdiff
path: root/internal.h
diff options
context:
space:
mode:
authorKazuhiro NISHIYAMA <zn@mbf.nifty.com>2019-05-29 13:12:15 +0900
committerKazuhiro NISHIYAMA <zn@mbf.nifty.com>2019-05-29 13:16:05 +0900
commitaee36bf149bedf97007584ac5d6cd5d438be28b5 (patch)
treef2f2525ed7cc8e73534acc4332a372ae957932fa /internal.h
parente04d10b28f47ea4d32f9562aedc4be9749415219 (diff)
Fix Possible Control flow issues (DEADCODE)
Coverity Scan says `Execution cannot reach this statement: "poison_object(v);"`, so do nothing when `ptr` is always 0 without address_sanitizer.
Diffstat (limited to 'internal.h')
-rw-r--r--internal.h8
1 files changed, 8 insertions, 0 deletions
diff --git a/internal.h b/internal.h
index e986098a56..fcaffa26be 100644
--- a/internal.h
+++ b/internal.h
@@ -155,6 +155,14 @@ asan_poison_object(VALUE obj)
asan_poison_memory_region(ptr, SIZEOF_VALUE);
}
+#if !__has_feature(address_sanitizer)
+#define asan_poison_object_if(ptr, obj) ((void)(ptr), (void)(obj))
+#else
+#define asan_poison_object_if(ptr, obj) do { \
+ if (ptr) asan_poison_object(obj); \
+ } while (0)
+#endif
+
/*!
* This function predicates if the given object is fully addressable or not.
*