@@ -1691,9 +1691,9 @@ struct MemorySanitizerVisitor : public InstVisitor<MemorySanitizerVisitor> {
1691
1691
}
1692
1692
if (Argument *A = dyn_cast<Argument>(V)) {
1693
1693
// For arguments we compute the shadow on demand and store it in the map.
1694
- Value ** ShadowPtr = & ShadowMap[V];
1695
- if (* ShadowPtr)
1696
- return * ShadowPtr;
1694
+ Value *& ShadowPtr = ShadowMap[V];
1695
+ if (ShadowPtr)
1696
+ return ShadowPtr;
1697
1697
Function *F = A->getParent ();
1698
1698
IRBuilder<> EntryIRB (FnPrologueEnd);
1699
1699
unsigned ArgOffset = 0 ;
@@ -1750,12 +1750,12 @@ struct MemorySanitizerVisitor : public InstVisitor<MemorySanitizerVisitor> {
1750
1750
1751
1751
if (!PropagateShadow || Overflow || FArg.hasByValAttr () ||
1752
1752
(MS.EagerChecks && FArg.hasAttribute (Attribute::NoUndef))) {
1753
- * ShadowPtr = getCleanShadow (V);
1753
+ ShadowPtr = getCleanShadow (V);
1754
1754
setOrigin (A, getCleanOrigin ());
1755
1755
} else {
1756
1756
// Shadow over TLS
1757
1757
Value *Base = getShadowPtrForArgument (&FArg, EntryIRB, ArgOffset);
1758
- * ShadowPtr = EntryIRB.CreateAlignedLoad (getShadowTy (&FArg), Base,
1758
+ ShadowPtr = EntryIRB.CreateAlignedLoad (getShadowTy (&FArg), Base,
1759
1759
kShadowTLSAlignment );
1760
1760
if (MS.TrackOrigins ) {
1761
1761
Value *OriginPtr =
@@ -1764,14 +1764,14 @@ struct MemorySanitizerVisitor : public InstVisitor<MemorySanitizerVisitor> {
1764
1764
}
1765
1765
}
1766
1766
LLVM_DEBUG (dbgs ()
1767
- << " ARG: " << FArg << " ==> " << ** ShadowPtr << " \n " );
1767
+ << " ARG: " << FArg << " ==> " << *ShadowPtr << " \n " );
1768
1768
break ;
1769
1769
}
1770
1770
1771
1771
ArgOffset += alignTo (Size, kShadowTLSAlignment );
1772
1772
}
1773
- assert (* ShadowPtr && " Could not find shadow for an argument" );
1774
- return * ShadowPtr;
1773
+ assert (ShadowPtr && " Could not find shadow for an argument" );
1774
+ return ShadowPtr;
1775
1775
}
1776
1776
// For everything else the shadow is zero.
1777
1777
return getCleanShadow (V);
0 commit comments