summaryrefslogtreecommitdiff
path: root/internal.h
diff options
context:
space:
mode:
authorshyouhei <shyouhei@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>2018-11-06 05:06:20 +0000
committershyouhei <shyouhei@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>2018-11-06 05:06:20 +0000
commitcbb6a3a6aa40481c976afc4e26f90d1c0b0e2a05 (patch)
treee5f0f2374e9993c0980f09c613acb9ed03496483 /internal.h
parenta39080f59c8bb2ad05beb3381f90354f8117aedb (diff)
annotate functions to blacklist MSAN
In these functions we are intentionally reading memory address not owned by us. These reads should not be diagnosed. See also [Bug #8680] See also https://travis-ci.org/ruby/ruby/jobs/451202718 git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@65564 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
Diffstat (limited to 'internal.h')
-rw-r--r--internal.h4
1 files changed, 4 insertions, 0 deletions
diff --git a/internal.h b/internal.h
index 4dc37f3aea..0de37005ae 100644
--- a/internal.h
+++ b/internal.h
@@ -68,6 +68,10 @@ extern "C" {
# define ATTRIBUTE_NO_ADDRESS_SAFETY_ANALYSIS(x) x
#endif
+#ifndef NO_SANITIZE
+#define NO_SANITIZE(x, y)
+#endif
+
#ifdef HAVE_VALGRIND_MEMCHECK_H
# include <valgrind/memcheck.h>
# ifndef VALGRIND_MAKE_MEM_DEFINED