[Sanitizer] Refactor sanitizer options in LangOptions.

Get rid of ugly SanitizerOptions class thrust into LangOptions:
* Make SanitizeAddressFieldPadding a regular language option,
  and rely on default behavior to initialize/reset it.
* Make SanitizerBlacklistFile a regular member LangOptions.
* Introduce the helper class "SanitizerSet" to represent the
  set of enabled sanitizers and make it a member of LangOptions.
  It is exactly the entity we want to cache and modify in CodeGenFunction,
  for instance. We'd also be able to reuse SanitizerSet in
  CodeGenOptions for storing the set of recoverable sanitizers,
  and in the Driver to represent the set of sanitizers
  turned on/off by the commandline flags.

No functionality change.

llvm-svn: 221653
This commit is contained in:
Alexey Samsonov 2014-11-11 01:26:14 +00:00
parent 7f654a8e8f
commit a041610f11
12 changed files with 69 additions and 51 deletions

View File

@ -216,6 +216,10 @@ LANGOPT(ApplePragmaPack, 1, 0, "Apple gcc-compatible #pragma pack handling")
LANGOPT(RetainCommentsFromSystemHeaders, 1, 0, "retain documentation comments from system headers in the AST")
LANGOPT(SanitizeAddressFieldPadding, 2, 0, "controls how aggressive is ASan "
"field padding (0: none, 1:least "
"aggressive, 2: more aggressive)")
#undef LANGOPT
#undef COMPATIBLE_LANGOPT
#undef BENIGN_LANGOPT

View File

@ -24,29 +24,6 @@
namespace clang {
class SanitizerOptions {
/// \brief Bitmask of enabled sanitizers.
unsigned Kind;
public:
SanitizerOptions();
/// \brief Check if a certain sanitizer is enabled.
bool has(SanitizerKind K) const;
/// \brief Enable or disable a certain sanitizer.
void set(SanitizerKind K, bool Value);
/// \brief Controls how agressive is asan field padding (0: none, 1: least
/// aggressive, 2: more aggressive).
unsigned SanitizeAddressFieldPadding : 2;
/// \brief Path to blacklist file specifying which objects
/// (files, functions, variables) should not be instrumented.
std::string BlacklistFile;
/// \brief Disable all sanitizers.
void clear();
};
/// Bitfields of LangOptions, split out from LangOptions in order to ensure that
/// this large collection of bitfields is a trivial class type.
class LangOptionsBase {
@ -56,7 +33,6 @@ public:
#define ENUM_LANGOPT(Name, Type, Bits, Default, Description)
#include "clang/Basic/LangOptions.def"
SanitizerOptions Sanitize;
protected:
// Define language options of enumeration type. These are private, and will
// have accessors (below).
@ -91,6 +67,13 @@ public:
enum AddrSpaceMapMangling { ASMM_Target, ASMM_On, ASMM_Off };
public:
/// \brief Set of enabled sanitizers.
SanitizerSet Sanitize;
/// \brief Path to blacklist file specifying which objects
/// (files, functions, variables) should not be instrumented.
std::string SanitizerBlacklistFile;
clang::ObjCRuntime ObjCRuntime;
std::string ObjCConstantStringClass;

View File

@ -23,6 +23,22 @@ enum class SanitizerKind {
Unknown
};
class SanitizerSet {
/// \brief Bitmask of enabled sanitizers.
unsigned Kinds;
public:
SanitizerSet();
/// \brief Check if a certain sanitizer is enabled.
bool has(SanitizerKind K) const;
/// \brief Enable or disable a certain sanitizer.
void set(SanitizerKind K, bool Value);
/// \brief Disable all sanitizers.
void clear();
};
} // end namespace clang
#endif

View File

@ -738,7 +738,7 @@ ASTContext::ASTContext(LangOptions &LOpts, SourceManager &SM,
BlockDescriptorExtendedType(nullptr), cudaConfigureCallDecl(nullptr),
NullTypeSourceInfo(QualType()), FirstLocalImport(), LastLocalImport(),
SourceMgr(SM), LangOpts(LOpts),
SanitizerBL(new SanitizerBlacklist(LangOpts.Sanitize.BlacklistFile, SM)),
SanitizerBL(new SanitizerBlacklist(LangOpts.SanitizerBlacklistFile, SM)),
AddrSpaceMap(nullptr), Target(nullptr), PrintingPolicy(LOpts),
Idents(idents), Selectors(sels), BuiltinInfo(builtins),
DeclarationNames(*this), ExternalSource(nullptr), Listener(nullptr),

View File

@ -3628,7 +3628,7 @@ void RecordDecl::LoadFieldsFromExternalStorage() const {
bool RecordDecl::mayInsertExtraPadding(bool EmitRemark) const {
ASTContext &Context = getASTContext();
if (!Context.getLangOpts().Sanitize.has(SanitizerKind::Address) ||
!Context.getLangOpts().Sanitize.SanitizeAddressFieldPadding)
!Context.getLangOpts().SanitizeAddressFieldPadding)
return false;
const auto &Blacklist = Context.getSanitizerBlacklist();
const CXXRecordDecl *CXXRD = dyn_cast<CXXRecordDecl>(this);

View File

@ -19,6 +19,7 @@ add_clang_library(clangBasic
OpenMPKinds.cpp
OperatorPrecedence.cpp
SanitizerBlacklist.cpp
Sanitizers.cpp
SourceLocation.cpp
SourceManager.cpp
TargetInfo.cpp

View File

@ -14,24 +14,6 @@
using namespace clang;
SanitizerOptions::SanitizerOptions()
: Kind(0), SanitizeAddressFieldPadding(0) {}
bool SanitizerOptions::has(SanitizerKind K) const {
unsigned Bit = static_cast<unsigned>(K);
return Kind & (1 << Bit);
}
void SanitizerOptions::set(SanitizerKind K, bool Value) {
unsigned Bit = static_cast<unsigned>(K);
Kind = Value ? (Kind | (1 << Bit)) : (Kind & ~(1 << Bit));
}
void SanitizerOptions::clear() {
SanitizerOptions Default;
*this = std::move(Default);
}
LangOptions::LangOptions() {
#define LANGOPT(Name, Bits, Default, Description) Name = Default;
#define ENUM_LANGOPT(Name, Type, Bits, Default, Description) set##Name(Default);
@ -48,6 +30,7 @@ void LangOptions::resetNonModularOptions() {
// FIXME: This should not be reset; modules can be different with different
// sanitizer options (this affects __has_feature(address_sanitizer) etc).
Sanitize.clear();
SanitizerBlacklistFile.clear();
CurrentModule.clear();
ImplementationOfModule.clear();

View File

@ -0,0 +1,31 @@
//===--- Sanitizers.cpp - C Language Family Language Options ----*- C++ -*-===//
//
// The LLVM Compiler Infrastructure
//
// This file is distributed under the University of Illinois Open Source
// License. See LICENSE.TXT for details.
//
//===----------------------------------------------------------------------===//
//
// This file defines the classes from Sanitizers.h
//
//===----------------------------------------------------------------------===//
#include "clang/Basic/Sanitizers.h"
using namespace clang;
SanitizerSet::SanitizerSet() : Kinds(0) {}
bool SanitizerSet::has(SanitizerKind K) const {
unsigned Bit = static_cast<unsigned>(K);
return Kinds & (1 << Bit);
}
void SanitizerSet::set(SanitizerKind K, bool Value) {
unsigned Bit = static_cast<unsigned>(K);
Kinds = Value ? (Kinds | (1 << Bit)) : (Kinds & ~(1 << Bit));
}
void SanitizerSet::clear() {
Kinds = 0;
}

View File

@ -215,7 +215,7 @@ static void addDataFlowSanitizerPass(const PassManagerBuilder &Builder,
const PassManagerBuilderWrapper &BuilderWrapper =
static_cast<const PassManagerBuilderWrapper&>(Builder);
const LangOptions &LangOpts = BuilderWrapper.getLangOpts();
PM.add(createDataFlowSanitizerPass(LangOpts.Sanitize.BlacklistFile));
PM.add(createDataFlowSanitizerPass(LangOpts.SanitizerBlacklistFile));
}
static TargetLibraryInfo *createTLI(llvm::Triple &TargetTriple,

View File

@ -842,7 +842,7 @@ namespace {
}
private:
CodeGenFunction &CGF;
SanitizerOptions OldSanOpts;
SanitizerSet OldSanOpts;
};
}
@ -858,7 +858,7 @@ namespace {
bool isMemcpyableField(FieldDecl *F) const {
// Never memcpy fields when we are adding poisoned paddings.
if (CGF.getContext().getLangOpts().Sanitize.SanitizeAddressFieldPadding)
if (CGF.getContext().getLangOpts().SanitizeAddressFieldPadding)
return false;
Qualifiers Qual = F->getType().getQualifiers();
if (Qual.hasVolatile() || Qual.hasObjCLifetime())

View File

@ -248,8 +248,8 @@ public:
/// potentially higher performance penalties.
unsigned char BoundsChecking;
/// \brief Sanitizer options to use for this function.
SanitizerOptions SanOpts;
/// \brief Sanitizers enabled for this function.
SanitizerSet SanOpts;
/// \brief True if CodeGen currently emits code implementing sanitizer checks.
bool IsSanitizerScope;

View File

@ -1622,9 +1622,9 @@ static void ParseLangArgs(LangOptions &Opts, ArgList &Args, InputKind IK,
Opts.Sanitize.set(K, true);
}
// -fsanitize-address-field-padding=N has to be a LangOpt, parse it here.
Opts.Sanitize.SanitizeAddressFieldPadding =
Opts.SanitizeAddressFieldPadding =
getLastArgIntValue(Args, OPT_fsanitize_address_field_padding, 0, Diags);
Opts.Sanitize.BlacklistFile = Args.getLastArgValue(OPT_fsanitize_blacklist);
Opts.SanitizerBlacklistFile = Args.getLastArgValue(OPT_fsanitize_blacklist);
}
static void ParsePreprocessorArgs(PreprocessorOptions &Opts, ArgList &Args,