r288512 - [CUDA] Forward sanitizer support to host toolchain

Jason Henline via cfe-commits cfe-commits at lists.llvm.org
Fri Dec 2 09:32:18 PST 2016


Author: jhen
Date: Fri Dec  2 11:32:18 2016
New Revision: 288512

URL: http://llvm.org/viewvc/llvm-project?rev=288512&view=rev
Log:
[CUDA] Forward sanitizer support to host toolchain

Summary:
This is an improvement on rL288448 where address sanitization was listed
as supported for the CudaToolChain. Since the intent is for the
CudaToolChain not to reject any flags supported by the host compiler,
this patch switches to forwarding the CudaToolChain sanitizer support to
the host toolchain rather than explicitly whitelisting address
sanitization.

Thanks to hfinkel for this suggestion.

Reviewers: jlebar

Subscribers: hfinkel, cfe-commits

Differential Revision: https://reviews.llvm.org/D27351

Modified:
    cfe/trunk/lib/Driver/ToolChains.cpp

Modified: cfe/trunk/lib/Driver/ToolChains.cpp
URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Driver/ToolChains.cpp?rev=288512&r1=288511&r2=288512&view=diff
==============================================================================
--- cfe/trunk/lib/Driver/ToolChains.cpp (original)
+++ cfe/trunk/lib/Driver/ToolChains.cpp Fri Dec  2 11:32:18 2016
@@ -4974,12 +4974,16 @@ void CudaToolChain::AddIAMCUIncludeArgs(
 }
 
 SanitizerMask CudaToolChain::getSupportedSanitizers() const {
-  // The CudaToolChain only supports address sanitization in the sense that it
-  // allows ASAN arguments on the command line. It must not error out on these
-  // command line arguments because the host code compilation supports them.
-  // However, it doesn't actually do any address sanitization for device code;
-  // instead, it just ignores any ASAN command line arguments it sees.
-  return SanitizerKind::Address;
+  // The CudaToolChain only supports sanitizers in the sense that it allows
+  // sanitizer arguments on the command line if they are supported by the host
+  // toolchain. The CudaToolChain will actually ignore any command line
+  // arguments for any of these "supported" sanitizers. That means that no
+  // sanitization of device code is actually supported at this time.
+  //
+  // This behavior is necessary because the host and device toolchains
+  // invocations often share the command line, so the device toolchain must
+  // tolerate flags meant only for the host toolchain.
+  return HostTC.getSupportedSanitizers();
 }
 
 /// XCore tool chain




More information about the cfe-commits mailing list