[NFC][msan] Rename ModuleMemorySanitizerPass
authorVitaly Buka <vitalybuka@google.com>
Tue, 6 Sep 2022 05:30:23 +0000 (22:30 -0700)
committerVitaly Buka <vitalybuka@google.com>
Wed, 7 Sep 2022 03:30:35 +0000 (20:30 -0700)
clang/lib/CodeGen/BackendUtil.cpp
llvm/include/llvm/Transforms/Instrumentation/MemorySanitizer.h
llvm/lib/Passes/PassRegistry.def
llvm/lib/Transforms/Instrumentation/MemorySanitizer.cpp

index 5b379dc..2de7e6d 100644 (file)
@@ -639,7 +639,7 @@ static void addSanitizers(const Triple &TargetTriple,
 
         MemorySanitizerOptions options(TrackOrigins, Recover, CompileKernel,
                                        CodeGenOpts.SanitizeMemoryParamRetval);
-        MPM.addPass(ModuleMemorySanitizerPass(options));
+        MPM.addPass(MemorySanitizerPass(options));
         if (Level != OptimizationLevel::O0) {
           // MemorySanitizer inserts complex instrumentation that mostly
           // follows the logic of the original code, but operates on
index 5883f81..dc162d5 100644 (file)
@@ -40,8 +40,8 @@ struct MemorySanitizerOptions {
 /// inserts calls to runtime library functions. If the functions aren't declared
 /// yet, the pass inserts the declarations. Otherwise the existing globals are
 /// used.
-struct ModuleMemorySanitizerPass : public PassInfoMixin<ModuleMemorySanitizerPass> {
-  ModuleMemorySanitizerPass(MemorySanitizerOptions Options) : Options(Options) {}
+struct MemorySanitizerPass : public PassInfoMixin<MemorySanitizerPass> {
+  MemorySanitizerPass(MemorySanitizerOptions Options) : Options(Options) {}
 
   PreservedAnalyses run(Module &M, ModuleAnalysisManager &AM);
   void printPipeline(raw_ostream &OS,
index c8c09f6..4a14fc7 100644 (file)
@@ -154,9 +154,9 @@ MODULE_PASS_WITH_PARAMS("asan",
                         parseASanPassOptions,
                         "kernel")
 MODULE_PASS_WITH_PARAMS("msan",
-                        "ModuleMemorySanitizerPass",
+                        "MemorySanitizerPass",
                         [](MemorySanitizerOptions Opts) {
-                          return ModuleMemorySanitizerPass(Opts);
+                          return MemorySanitizerPass(Opts);
                         },
                         parseMSanPassOptions,
                         "recover;kernel;eager-checks;track-origins=N")
index f12524b..3dc7317 100644 (file)
@@ -669,8 +669,8 @@ MemorySanitizerOptions::MemorySanitizerOptions(int TO, bool R, bool K,
       Recover(getOptOrDefault(ClKeepGoing, Kernel || R)),
       EagerChecks(getOptOrDefault(ClEagerChecks, EagerChecks)) {}
 
-PreservedAnalyses ModuleMemorySanitizerPass::run(Module &M,
-                                                 ModuleAnalysisManager &AM) {
+PreservedAnalyses MemorySanitizerPass::run(Module &M,
+                                           ModuleAnalysisManager &AM) {
   bool Modified = false;
   if (!Options.Kernel) {
     insertModuleCtor(M);
@@ -688,9 +688,9 @@ PreservedAnalyses ModuleMemorySanitizerPass::run(Module &M,
   return Modified ? PreservedAnalyses::none() : PreservedAnalyses::all();
 }
 
-void ModuleMemorySanitizerPass::printPipeline(
+void MemorySanitizerPass::printPipeline(
     raw_ostream &OS, function_ref<StringRef(StringRef)> MapClassName2PassName) {
-  static_cast<PassInfoMixin<ModuleMemorySanitizerPass> *>(this)->printPipeline(
+  static_cast<PassInfoMixin<MemorySanitizerPass> *>(this)->printPipeline(
       OS, MapClassName2PassName);
   OS << "<";
   if (Options.Recover)