2018-03-29 06:09:09 +08:00
|
|
|
//===- VirtualFileSystem.cpp - Virtual File System Layer ------------------===//
|
2014-02-21 05:59:23 +08:00
|
|
|
//
|
|
|
|
// The LLVM Compiler Infrastructure
|
|
|
|
//
|
|
|
|
// This file is distributed under the University of Illinois Open Source
|
|
|
|
// License. See LICENSE.TXT for details.
|
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
2018-03-29 06:09:09 +08:00
|
|
|
//
|
2014-02-21 05:59:23 +08:00
|
|
|
// This file implements the VirtualFileSystem interface.
|
2018-03-29 06:09:09 +08:00
|
|
|
//
|
2014-02-21 05:59:23 +08:00
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
|
|
|
|
#include "clang/Basic/VirtualFileSystem.h"
|
2018-03-29 06:09:09 +08:00
|
|
|
#include "clang/Basic/LLVM.h"
|
|
|
|
#include "llvm/ADT/ArrayRef.h"
|
2014-02-22 07:39:37 +08:00
|
|
|
#include "llvm/ADT/DenseMap.h"
|
2018-03-29 06:09:09 +08:00
|
|
|
#include "llvm/ADT/IntrusiveRefCntPtr.h"
|
2018-09-04 22:15:53 +08:00
|
|
|
#include "llvm/ADT/None.h"
|
2018-03-29 06:09:09 +08:00
|
|
|
#include "llvm/ADT/Optional.h"
|
2014-02-22 07:39:37 +08:00
|
|
|
#include "llvm/ADT/STLExtras.h"
|
2018-03-29 06:09:09 +08:00
|
|
|
#include "llvm/ADT/SmallString.h"
|
|
|
|
#include "llvm/ADT/SmallVector.h"
|
|
|
|
#include "llvm/ADT/StringRef.h"
|
2014-06-25 03:37:16 +08:00
|
|
|
#include "llvm/ADT/StringSet.h"
|
2018-03-29 06:09:09 +08:00
|
|
|
#include "llvm/ADT/Twine.h"
|
2015-01-14 19:29:14 +08:00
|
|
|
#include "llvm/ADT/iterator_range.h"
|
2016-05-27 22:27:13 +08:00
|
|
|
#include "llvm/Config/llvm-config.h"
|
2018-03-29 06:09:09 +08:00
|
|
|
#include "llvm/Support/Casting.h"
|
|
|
|
#include "llvm/Support/Chrono.h"
|
2018-09-04 22:15:53 +08:00
|
|
|
#include "llvm/Support/Compiler.h"
|
2016-05-07 07:21:57 +08:00
|
|
|
#include "llvm/Support/Debug.h"
|
2014-06-14 01:20:50 +08:00
|
|
|
#include "llvm/Support/Errc.h"
|
2018-03-29 06:09:09 +08:00
|
|
|
#include "llvm/Support/ErrorHandling.h"
|
|
|
|
#include "llvm/Support/ErrorOr.h"
|
|
|
|
#include "llvm/Support/FileSystem.h"
|
2014-02-21 05:59:23 +08:00
|
|
|
#include "llvm/Support/MemoryBuffer.h"
|
|
|
|
#include "llvm/Support/Path.h"
|
2016-03-04 13:26:14 +08:00
|
|
|
#include "llvm/Support/Process.h"
|
2018-03-29 06:09:09 +08:00
|
|
|
#include "llvm/Support/SMLoc.h"
|
|
|
|
#include "llvm/Support/SourceMgr.h"
|
2014-02-22 07:39:37 +08:00
|
|
|
#include "llvm/Support/YAMLParser.h"
|
2018-03-29 06:09:09 +08:00
|
|
|
#include "llvm/Support/raw_ostream.h"
|
|
|
|
#include <algorithm>
|
2014-03-03 01:08:31 +08:00
|
|
|
#include <atomic>
|
2018-03-29 06:09:09 +08:00
|
|
|
#include <cassert>
|
|
|
|
#include <cstdint>
|
|
|
|
#include <iterator>
|
|
|
|
#include <limits>
|
|
|
|
#include <map>
|
2014-03-09 19:36:40 +08:00
|
|
|
#include <memory>
|
2018-09-05 17:45:27 +08:00
|
|
|
#include <mutex>
|
2018-03-29 06:09:09 +08:00
|
|
|
#include <string>
|
|
|
|
#include <system_error>
|
2016-05-27 22:27:13 +08:00
|
|
|
#include <utility>
|
2018-03-29 06:09:09 +08:00
|
|
|
#include <vector>
|
2014-02-21 05:59:23 +08:00
|
|
|
|
|
|
|
using namespace clang;
|
2018-03-29 06:09:09 +08:00
|
|
|
using namespace vfs;
|
2014-02-21 05:59:23 +08:00
|
|
|
using namespace llvm;
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-02-21 05:59:23 +08:00
|
|
|
using llvm::sys::fs::file_status;
|
|
|
|
using llvm::sys::fs::file_type;
|
|
|
|
using llvm::sys::fs::perms;
|
|
|
|
using llvm::sys::fs::UniqueID;
|
|
|
|
|
|
|
|
Status::Status(const file_status &Status)
|
|
|
|
: UID(Status.getUniqueID()), MTime(Status.getLastModificationTime()),
|
|
|
|
User(Status.getUser()), Group(Status.getGroup()), Size(Status.getSize()),
|
2018-03-29 06:09:09 +08:00
|
|
|
Type(Status.type()), Perms(Status.permissions()) {}
|
2014-02-21 05:59:23 +08:00
|
|
|
|
2016-11-09 18:52:22 +08:00
|
|
|
Status::Status(StringRef Name, UniqueID UID, sys::TimePoint<> MTime,
|
2015-10-05 21:15:33 +08:00
|
|
|
uint32_t User, uint32_t Group, uint64_t Size, file_type Type,
|
|
|
|
perms Perms)
|
2014-02-27 08:25:12 +08:00
|
|
|
: Name(Name), UID(UID), MTime(MTime), User(User), Group(Group), Size(Size),
|
2018-03-29 06:09:09 +08:00
|
|
|
Type(Type), Perms(Perms) {}
|
2014-02-21 05:59:23 +08:00
|
|
|
|
2018-07-25 04:28:07 +08:00
|
|
|
Status Status::copyWithNewName(const Status &In, StringRef NewName) {
|
|
|
|
return Status(NewName, In.getUniqueID(), In.getLastModificationTime(),
|
|
|
|
In.getUser(), In.getGroup(), In.getSize(), In.getType(),
|
|
|
|
In.getPermissions());
|
|
|
|
}
|
|
|
|
|
|
|
|
Status Status::copyWithNewName(const file_status &In, StringRef NewName) {
|
|
|
|
return Status(NewName, In.getUniqueID(), In.getLastModificationTime(),
|
|
|
|
In.getUser(), In.getGroup(), In.getSize(), In.type(),
|
|
|
|
In.permissions());
|
2015-10-05 21:15:33 +08:00
|
|
|
}
|
|
|
|
|
2014-02-21 05:59:23 +08:00
|
|
|
bool Status::equivalent(const Status &Other) const {
|
2017-07-20 19:57:02 +08:00
|
|
|
assert(isStatusKnown() && Other.isStatusKnown());
|
2014-02-21 05:59:23 +08:00
|
|
|
return getUniqueID() == Other.getUniqueID();
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-02-21 05:59:23 +08:00
|
|
|
bool Status::isDirectory() const {
|
|
|
|
return Type == file_type::directory_file;
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-02-21 05:59:23 +08:00
|
|
|
bool Status::isRegularFile() const {
|
|
|
|
return Type == file_type::regular_file;
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-02-21 05:59:23 +08:00
|
|
|
bool Status::isOther() const {
|
|
|
|
return exists() && !isRegularFile() && !isDirectory() && !isSymlink();
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-02-21 05:59:23 +08:00
|
|
|
bool Status::isSymlink() const {
|
|
|
|
return Type == file_type::symlink_file;
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-02-21 05:59:23 +08:00
|
|
|
bool Status::isStatusKnown() const {
|
|
|
|
return Type != file_type::status_error;
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-02-21 05:59:23 +08:00
|
|
|
bool Status::exists() const {
|
|
|
|
return isStatusKnown() && Type != file_type::file_not_found;
|
|
|
|
}
|
|
|
|
|
2018-03-29 06:09:09 +08:00
|
|
|
File::~File() = default;
|
2014-02-21 05:59:23 +08:00
|
|
|
|
2018-03-29 06:09:09 +08:00
|
|
|
FileSystem::~FileSystem() = default;
|
2014-02-21 05:59:23 +08:00
|
|
|
|
2014-10-27 06:44:13 +08:00
|
|
|
ErrorOr<std::unique_ptr<MemoryBuffer>>
|
|
|
|
FileSystem::getBufferForFile(const llvm::Twine &Name, int64_t FileSize,
|
|
|
|
bool RequiresNullTerminator, bool IsVolatile) {
|
|
|
|
auto F = openFileForRead(Name);
|
|
|
|
if (!F)
|
|
|
|
return F.getError();
|
|
|
|
|
|
|
|
return (*F)->getBuffer(Name, FileSize, RequiresNullTerminator, IsVolatile);
|
2014-02-21 05:59:23 +08:00
|
|
|
}
|
|
|
|
|
2015-10-05 21:55:20 +08:00
|
|
|
std::error_code FileSystem::makeAbsolute(SmallVectorImpl<char> &Path) const {
|
2016-03-27 02:55:13 +08:00
|
|
|
if (llvm::sys::path::is_absolute(Path))
|
2018-03-29 06:09:09 +08:00
|
|
|
return {};
|
2016-03-27 02:55:13 +08:00
|
|
|
|
2015-10-05 21:55:20 +08:00
|
|
|
auto WorkingDir = getCurrentWorkingDirectory();
|
|
|
|
if (!WorkingDir)
|
|
|
|
return WorkingDir.getError();
|
|
|
|
|
|
|
|
return llvm::sys::fs::make_absolute(WorkingDir.get(), Path);
|
|
|
|
}
|
|
|
|
|
2018-05-17 18:26:23 +08:00
|
|
|
std::error_code FileSystem::getRealPath(const Twine &Path,
|
|
|
|
SmallVectorImpl<char> &Output) const {
|
|
|
|
return errc::operation_not_permitted;
|
|
|
|
}
|
|
|
|
|
2015-10-07 23:48:01 +08:00
|
|
|
bool FileSystem::exists(const Twine &Path) {
|
|
|
|
auto Status = status(Path);
|
|
|
|
return Status && Status->exists();
|
|
|
|
}
|
|
|
|
|
2016-03-17 10:20:43 +08:00
|
|
|
#ifndef NDEBUG
|
|
|
|
static bool isTraversalComponent(StringRef Component) {
|
|
|
|
return Component.equals("..") || Component.equals(".");
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool pathHasTraversal(StringRef Path) {
|
|
|
|
using namespace llvm::sys;
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2016-03-17 10:20:43 +08:00
|
|
|
for (StringRef Comp : llvm::make_range(path::begin(Path), path::end(Path)))
|
|
|
|
if (isTraversalComponent(Comp))
|
|
|
|
return true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2014-02-21 05:59:23 +08:00
|
|
|
//===-----------------------------------------------------------------------===/
|
|
|
|
// RealFileSystem implementation
|
|
|
|
//===-----------------------------------------------------------------------===/
|
|
|
|
|
2014-03-02 01:21:22 +08:00
|
|
|
namespace {
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2018-05-09 09:00:01 +08:00
|
|
|
/// Wrapper around a raw file descriptor.
|
2014-02-21 05:59:23 +08:00
|
|
|
class RealFile : public File {
|
2018-03-29 06:09:09 +08:00
|
|
|
friend class RealFileSystem;
|
|
|
|
|
2014-02-21 05:59:23 +08:00
|
|
|
int FD;
|
2014-03-01 05:16:07 +08:00
|
|
|
Status S;
|
2016-06-14 04:40:21 +08:00
|
|
|
std::string RealName;
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2016-06-14 04:40:21 +08:00
|
|
|
RealFile(int FD, StringRef NewName, StringRef NewRealPathName)
|
2015-10-05 21:15:33 +08:00
|
|
|
: FD(FD), S(NewName, {}, {}, {}, {}, {},
|
2016-06-14 04:40:21 +08:00
|
|
|
llvm::sys::fs::file_type::status_error, {}),
|
|
|
|
RealName(NewRealPathName.str()) {
|
2014-02-21 05:59:23 +08:00
|
|
|
assert(FD >= 0 && "Invalid or inactive file descriptor");
|
|
|
|
}
|
2014-02-22 07:39:37 +08:00
|
|
|
|
2014-02-21 05:59:23 +08:00
|
|
|
public:
|
2015-04-11 10:00:23 +08:00
|
|
|
~RealFile() override;
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-03-02 17:32:10 +08:00
|
|
|
ErrorOr<Status> status() override;
|
2018-07-25 04:28:07 +08:00
|
|
|
ErrorOr<std::string> getName() override;
|
2015-10-06 05:20:19 +08:00
|
|
|
ErrorOr<std::unique_ptr<MemoryBuffer>> getBuffer(const Twine &Name,
|
|
|
|
int64_t FileSize,
|
|
|
|
bool RequiresNullTerminator,
|
|
|
|
bool IsVolatile) override;
|
2014-06-13 04:37:59 +08:00
|
|
|
std::error_code close() override;
|
2014-02-21 05:59:23 +08:00
|
|
|
};
|
2018-03-29 06:09:09 +08:00
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
RealFile::~RealFile() { close(); }
|
2014-02-21 05:59:23 +08:00
|
|
|
|
|
|
|
ErrorOr<Status> RealFile::status() {
|
|
|
|
assert(FD != -1 && "cannot stat closed file");
|
2014-03-01 05:16:07 +08:00
|
|
|
if (!S.isStatusKnown()) {
|
|
|
|
file_status RealStatus;
|
2014-06-13 04:37:59 +08:00
|
|
|
if (std::error_code EC = sys::fs::status(FD, RealStatus))
|
2014-03-01 05:16:07 +08:00
|
|
|
return EC;
|
2018-07-25 04:28:07 +08:00
|
|
|
S = Status::copyWithNewName(RealStatus, S.getName());
|
2014-03-01 05:16:07 +08:00
|
|
|
}
|
|
|
|
return S;
|
2014-02-21 05:59:23 +08:00
|
|
|
}
|
|
|
|
|
2018-07-25 04:28:07 +08:00
|
|
|
ErrorOr<std::string> RealFile::getName() {
|
|
|
|
return RealName.empty() ? S.getName().str() : RealName;
|
2016-06-14 04:40:21 +08:00
|
|
|
}
|
|
|
|
|
2014-10-27 06:44:13 +08:00
|
|
|
ErrorOr<std::unique_ptr<MemoryBuffer>>
|
|
|
|
RealFile::getBuffer(const Twine &Name, int64_t FileSize,
|
|
|
|
bool RequiresNullTerminator, bool IsVolatile) {
|
2014-02-21 05:59:23 +08:00
|
|
|
assert(FD != -1 && "cannot get buffer for closed file");
|
2014-10-27 06:44:13 +08:00
|
|
|
return MemoryBuffer::getOpenFile(FD, Name, FileSize, RequiresNullTerminator,
|
|
|
|
IsVolatile);
|
2014-02-21 05:59:23 +08:00
|
|
|
}
|
|
|
|
|
2014-06-13 04:37:59 +08:00
|
|
|
std::error_code RealFile::close() {
|
2016-03-04 13:26:14 +08:00
|
|
|
std::error_code EC = sys::Process::SafelyCloseFileDescriptor(FD);
|
2014-02-21 05:59:23 +08:00
|
|
|
FD = -1;
|
2016-03-04 13:26:14 +08:00
|
|
|
return EC;
|
2014-02-21 05:59:23 +08:00
|
|
|
}
|
|
|
|
|
2014-03-02 01:21:22 +08:00
|
|
|
namespace {
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2018-05-09 09:00:01 +08:00
|
|
|
/// The file system according to your operating system.
|
2014-02-21 05:59:23 +08:00
|
|
|
class RealFileSystem : public FileSystem {
|
|
|
|
public:
|
2014-03-02 17:32:10 +08:00
|
|
|
ErrorOr<Status> status(const Twine &Path) override;
|
2014-10-27 06:44:13 +08:00
|
|
|
ErrorOr<std::unique_ptr<File>> openFileForRead(const Twine &Path) override;
|
2014-06-25 03:37:16 +08:00
|
|
|
directory_iterator dir_begin(const Twine &Dir, std::error_code &EC) override;
|
2015-10-05 21:55:20 +08:00
|
|
|
|
|
|
|
llvm::ErrorOr<std::string> getCurrentWorkingDirectory() const override;
|
|
|
|
std::error_code setCurrentWorkingDirectory(const Twine &Path) override;
|
2018-05-17 18:26:23 +08:00
|
|
|
std::error_code getRealPath(const Twine &Path,
|
|
|
|
SmallVectorImpl<char> &Output) const override;
|
2018-09-05 17:45:27 +08:00
|
|
|
private:
|
|
|
|
mutable std::mutex CWDMutex;
|
|
|
|
mutable std::string CWDCache;
|
2014-02-21 05:59:23 +08:00
|
|
|
};
|
2018-03-29 06:09:09 +08:00
|
|
|
|
|
|
|
} // namespace
|
2014-02-21 05:59:23 +08:00
|
|
|
|
|
|
|
ErrorOr<Status> RealFileSystem::status(const Twine &Path) {
|
|
|
|
sys::fs::file_status RealStatus;
|
2014-06-13 04:37:59 +08:00
|
|
|
if (std::error_code EC = sys::fs::status(Path, RealStatus))
|
2014-02-21 05:59:23 +08:00
|
|
|
return EC;
|
2018-07-25 04:28:07 +08:00
|
|
|
return Status::copyWithNewName(RealStatus, Path.str());
|
2014-02-21 05:59:23 +08:00
|
|
|
}
|
|
|
|
|
2014-10-27 06:44:13 +08:00
|
|
|
ErrorOr<std::unique_ptr<File>>
|
|
|
|
RealFileSystem::openFileForRead(const Twine &Name) {
|
2014-02-21 05:59:23 +08:00
|
|
|
int FD;
|
2016-06-14 04:40:21 +08:00
|
|
|
SmallString<256> RealName;
|
2018-06-08 03:58:58 +08:00
|
|
|
if (std::error_code EC =
|
|
|
|
sys::fs::openFileForRead(Name, FD, sys::fs::OF_None, &RealName))
|
2014-02-21 05:59:23 +08:00
|
|
|
return EC;
|
2016-06-14 04:40:21 +08:00
|
|
|
return std::unique_ptr<File>(new RealFile(FD, Name.str(), RealName.str()));
|
2014-02-21 05:59:23 +08:00
|
|
|
}
|
|
|
|
|
2015-10-05 21:55:20 +08:00
|
|
|
llvm::ErrorOr<std::string> RealFileSystem::getCurrentWorkingDirectory() const {
|
2018-09-05 17:45:27 +08:00
|
|
|
std::lock_guard<std::mutex> Lock(CWDMutex);
|
|
|
|
if (!CWDCache.empty())
|
|
|
|
return CWDCache;
|
2015-10-05 21:55:20 +08:00
|
|
|
SmallString<256> Dir;
|
|
|
|
if (std::error_code EC = llvm::sys::fs::current_path(Dir))
|
|
|
|
return EC;
|
2018-09-05 17:45:27 +08:00
|
|
|
CWDCache = Dir.str();
|
|
|
|
return CWDCache;
|
2015-10-05 21:55:20 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
std::error_code RealFileSystem::setCurrentWorkingDirectory(const Twine &Path) {
|
|
|
|
// FIXME: chdir is thread hostile; on the other hand, creating the same
|
|
|
|
// behavior as chdir is complex: chdir resolves the path once, thus
|
|
|
|
// guaranteeing that all subsequent relative path operations work
|
|
|
|
// on the same path the original chdir resulted in. This makes a
|
|
|
|
// difference for example on network filesystems, where symlinks might be
|
|
|
|
// switched during runtime of the tool. Fixing this depends on having a
|
|
|
|
// file system abstraction that allows openat() style interactions.
|
2018-09-05 17:45:27 +08:00
|
|
|
if (auto EC = llvm::sys::fs::set_current_path(Path))
|
|
|
|
return EC;
|
|
|
|
|
|
|
|
// Invalidate cache.
|
|
|
|
std::lock_guard<std::mutex> Lock(CWDMutex);
|
|
|
|
CWDCache.clear();
|
|
|
|
return std::error_code();
|
2015-10-05 21:55:20 +08:00
|
|
|
}
|
|
|
|
|
2018-05-17 18:26:23 +08:00
|
|
|
std::error_code
|
|
|
|
RealFileSystem::getRealPath(const Twine &Path,
|
|
|
|
SmallVectorImpl<char> &Output) const {
|
|
|
|
return llvm::sys::fs::real_path(Path, Output);
|
|
|
|
}
|
|
|
|
|
2014-02-21 05:59:23 +08:00
|
|
|
IntrusiveRefCntPtr<FileSystem> vfs::getRealFileSystem() {
|
|
|
|
static IntrusiveRefCntPtr<FileSystem> FS = new RealFileSystem();
|
|
|
|
return FS;
|
|
|
|
}
|
|
|
|
|
2014-06-25 03:37:16 +08:00
|
|
|
namespace {
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-06-25 03:37:16 +08:00
|
|
|
class RealFSDirIter : public clang::vfs::detail::DirIterImpl {
|
|
|
|
llvm::sys::fs::directory_iterator Iter;
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-06-25 03:37:16 +08:00
|
|
|
public:
|
2017-03-11 05:23:29 +08:00
|
|
|
RealFSDirIter(const Twine &Path, std::error_code &EC) : Iter(Path, EC) {
|
2018-09-14 20:47:38 +08:00
|
|
|
if (Iter != llvm::sys::fs::directory_iterator())
|
|
|
|
CurrentEntry = directory_entry(Iter->path(), Iter->type());
|
2014-06-25 03:37:16 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
std::error_code increment() override {
|
|
|
|
std::error_code EC;
|
|
|
|
Iter.increment(EC);
|
2018-09-14 20:47:38 +08:00
|
|
|
CurrentEntry = (Iter == llvm::sys::fs::directory_iterator())
|
|
|
|
? directory_entry()
|
|
|
|
: directory_entry(Iter->path(), Iter->type());
|
2014-06-25 03:37:16 +08:00
|
|
|
return EC;
|
|
|
|
}
|
|
|
|
};
|
2018-03-29 06:09:09 +08:00
|
|
|
|
|
|
|
} // namespace
|
2014-06-25 03:37:16 +08:00
|
|
|
|
|
|
|
directory_iterator RealFileSystem::dir_begin(const Twine &Dir,
|
|
|
|
std::error_code &EC) {
|
|
|
|
return directory_iterator(std::make_shared<RealFSDirIter>(Dir, EC));
|
|
|
|
}
|
|
|
|
|
2014-02-21 05:59:23 +08:00
|
|
|
//===-----------------------------------------------------------------------===/
|
|
|
|
// OverlayFileSystem implementation
|
|
|
|
//===-----------------------------------------------------------------------===/
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-02-21 05:59:23 +08:00
|
|
|
OverlayFileSystem::OverlayFileSystem(IntrusiveRefCntPtr<FileSystem> BaseFS) {
|
2016-06-13 04:05:23 +08:00
|
|
|
FSList.push_back(std::move(BaseFS));
|
2014-02-21 05:59:23 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void OverlayFileSystem::pushOverlay(IntrusiveRefCntPtr<FileSystem> FS) {
|
|
|
|
FSList.push_back(FS);
|
2015-10-05 21:55:20 +08:00
|
|
|
// Synchronize added file systems by duplicating the working directory from
|
|
|
|
// the first one in the list.
|
|
|
|
FS->setCurrentWorkingDirectory(getCurrentWorkingDirectory().get());
|
2014-02-21 05:59:23 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
ErrorOr<Status> OverlayFileSystem::status(const Twine &Path) {
|
|
|
|
// FIXME: handle symlinks that cross file systems
|
|
|
|
for (iterator I = overlays_begin(), E = overlays_end(); I != E; ++I) {
|
|
|
|
ErrorOr<Status> Status = (*I)->status(Path);
|
2014-06-14 01:20:50 +08:00
|
|
|
if (Status || Status.getError() != llvm::errc::no_such_file_or_directory)
|
2014-02-21 05:59:23 +08:00
|
|
|
return Status;
|
|
|
|
}
|
2014-06-14 01:20:50 +08:00
|
|
|
return make_error_code(llvm::errc::no_such_file_or_directory);
|
2014-02-21 05:59:23 +08:00
|
|
|
}
|
|
|
|
|
2014-10-27 06:44:13 +08:00
|
|
|
ErrorOr<std::unique_ptr<File>>
|
|
|
|
OverlayFileSystem::openFileForRead(const llvm::Twine &Path) {
|
2014-02-21 05:59:23 +08:00
|
|
|
// FIXME: handle symlinks that cross file systems
|
|
|
|
for (iterator I = overlays_begin(), E = overlays_end(); I != E; ++I) {
|
2014-10-27 06:44:13 +08:00
|
|
|
auto Result = (*I)->openFileForRead(Path);
|
|
|
|
if (Result || Result.getError() != llvm::errc::no_such_file_or_directory)
|
|
|
|
return Result;
|
2014-02-21 05:59:23 +08:00
|
|
|
}
|
2014-06-14 01:20:50 +08:00
|
|
|
return make_error_code(llvm::errc::no_such_file_or_directory);
|
2014-02-21 05:59:23 +08:00
|
|
|
}
|
2014-02-22 07:39:37 +08:00
|
|
|
|
2015-10-05 21:55:20 +08:00
|
|
|
llvm::ErrorOr<std::string>
|
|
|
|
OverlayFileSystem::getCurrentWorkingDirectory() const {
|
|
|
|
// All file systems are synchronized, just take the first working directory.
|
|
|
|
return FSList.front()->getCurrentWorkingDirectory();
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2015-10-05 21:55:20 +08:00
|
|
|
std::error_code
|
|
|
|
OverlayFileSystem::setCurrentWorkingDirectory(const Twine &Path) {
|
|
|
|
for (auto &FS : FSList)
|
|
|
|
if (std::error_code EC = FS->setCurrentWorkingDirectory(Path))
|
|
|
|
return EC;
|
2018-03-29 06:09:09 +08:00
|
|
|
return {};
|
2015-10-05 21:55:20 +08:00
|
|
|
}
|
|
|
|
|
2018-05-18 21:22:49 +08:00
|
|
|
std::error_code
|
|
|
|
OverlayFileSystem::getRealPath(const Twine &Path,
|
|
|
|
SmallVectorImpl<char> &Output) const {
|
|
|
|
for (auto &FS : FSList)
|
|
|
|
if (FS->exists(Path))
|
|
|
|
return FS->getRealPath(Path, Output);
|
|
|
|
return errc::no_such_file_or_directory;
|
|
|
|
}
|
|
|
|
|
2018-03-29 06:09:09 +08:00
|
|
|
clang::vfs::detail::DirIterImpl::~DirIterImpl() = default;
|
2014-06-25 03:37:16 +08:00
|
|
|
|
|
|
|
namespace {
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-06-25 03:37:16 +08:00
|
|
|
class OverlayFSDirIterImpl : public clang::vfs::detail::DirIterImpl {
|
|
|
|
OverlayFileSystem &Overlays;
|
|
|
|
std::string Path;
|
|
|
|
OverlayFileSystem::iterator CurrentFS;
|
|
|
|
directory_iterator CurrentDirIter;
|
|
|
|
llvm::StringSet<> SeenNames;
|
|
|
|
|
|
|
|
std::error_code incrementFS() {
|
|
|
|
assert(CurrentFS != Overlays.overlays_end() && "incrementing past end");
|
|
|
|
++CurrentFS;
|
|
|
|
for (auto E = Overlays.overlays_end(); CurrentFS != E; ++CurrentFS) {
|
|
|
|
std::error_code EC;
|
|
|
|
CurrentDirIter = (*CurrentFS)->dir_begin(Path, EC);
|
|
|
|
if (EC && EC != errc::no_such_file_or_directory)
|
|
|
|
return EC;
|
|
|
|
if (CurrentDirIter != directory_iterator())
|
|
|
|
break; // found
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
return {};
|
2014-06-25 03:37:16 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
std::error_code incrementDirIter(bool IsFirstTime) {
|
|
|
|
assert((IsFirstTime || CurrentDirIter != directory_iterator()) &&
|
|
|
|
"incrementing past end");
|
|
|
|
std::error_code EC;
|
|
|
|
if (!IsFirstTime)
|
|
|
|
CurrentDirIter.increment(EC);
|
|
|
|
if (!EC && CurrentDirIter == directory_iterator())
|
|
|
|
EC = incrementFS();
|
|
|
|
return EC;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::error_code incrementImpl(bool IsFirstTime) {
|
|
|
|
while (true) {
|
|
|
|
std::error_code EC = incrementDirIter(IsFirstTime);
|
|
|
|
if (EC || CurrentDirIter == directory_iterator()) {
|
2018-09-14 20:47:38 +08:00
|
|
|
CurrentEntry = directory_entry();
|
2014-06-25 03:37:16 +08:00
|
|
|
return EC;
|
|
|
|
}
|
|
|
|
CurrentEntry = *CurrentDirIter;
|
2018-09-14 20:47:38 +08:00
|
|
|
StringRef Name = llvm::sys::path::filename(CurrentEntry.path());
|
2014-11-19 10:56:13 +08:00
|
|
|
if (SeenNames.insert(Name).second)
|
2014-06-25 03:37:16 +08:00
|
|
|
return EC; // name not seen before
|
|
|
|
}
|
|
|
|
llvm_unreachable("returned above");
|
|
|
|
}
|
|
|
|
|
|
|
|
public:
|
|
|
|
OverlayFSDirIterImpl(const Twine &Path, OverlayFileSystem &FS,
|
|
|
|
std::error_code &EC)
|
|
|
|
: Overlays(FS), Path(Path.str()), CurrentFS(Overlays.overlays_begin()) {
|
|
|
|
CurrentDirIter = (*CurrentFS)->dir_begin(Path, EC);
|
|
|
|
EC = incrementImpl(true);
|
|
|
|
}
|
|
|
|
|
|
|
|
std::error_code increment() override { return incrementImpl(false); }
|
|
|
|
};
|
2018-03-29 06:09:09 +08:00
|
|
|
|
|
|
|
} // namespace
|
2014-06-25 03:37:16 +08:00
|
|
|
|
|
|
|
directory_iterator OverlayFileSystem::dir_begin(const Twine &Dir,
|
|
|
|
std::error_code &EC) {
|
|
|
|
return directory_iterator(
|
|
|
|
std::make_shared<OverlayFSDirIterImpl>(Dir, *this, EC));
|
|
|
|
}
|
|
|
|
|
2015-10-05 21:55:14 +08:00
|
|
|
namespace clang {
|
|
|
|
namespace vfs {
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2015-10-05 21:55:14 +08:00
|
|
|
namespace detail {
|
|
|
|
|
2018-09-04 22:15:53 +08:00
|
|
|
enum InMemoryNodeKind { IME_File, IME_Directory, IME_HardLink };
|
2015-10-05 21:55:14 +08:00
|
|
|
|
|
|
|
/// The in memory file system is a tree of Nodes. Every node can either be a
|
2018-09-04 22:15:53 +08:00
|
|
|
/// file , hardlink or a directory.
|
2015-10-05 21:55:14 +08:00
|
|
|
class InMemoryNode {
|
2018-07-12 02:43:07 +08:00
|
|
|
InMemoryNodeKind Kind;
|
2018-09-04 22:15:53 +08:00
|
|
|
std::string FileName;
|
[VirtualFileSystem] InMemoryFileSystem::status: Return a Status with the requested name
Summary:
InMemoryFileSystem::status behaves differently than
RealFileSystem::status. The Name contained in the Status returned by
RealFileSystem::status will be the path as requested by the caller,
whereas InMemoryFileSystem::status returns the normalized path.
For example, when requested the status for "../src/first.h",
RealFileSystem returns a Status with "../src/first.h" as the Name.
InMemoryFileSystem returns "/absolute/path/to/src/first.h".
The reason for this change is that I want to make a unit test in the
clangd testsuite (where we use an InMemoryFileSystem) to reproduce a
bug I get with the clangd program (where a RealFileSystem is used).
This difference in behavior "hides" the bug in the unit test version.
An indirect impact of this change is that a -Wnonportable-include-path
warning is now emitted in test PCH/case-insensitive-include.c. This is
because the real path of the included file (with the wrong case) was not
available previously, whereas it is now.
Reviewers: malaperle, ilya-biryukov, bkramer
Reviewed By: ilya-biryukov
Subscribers: eric_niebler, malaperle, omtcyfz, hokein, bkramer, ilya-biryukov, ioeric, cfe-commits
Differential Revision: https://reviews.llvm.org/D48903
llvm-svn: 339063
2018-08-07 05:48:20 +08:00
|
|
|
|
2015-10-05 21:55:14 +08:00
|
|
|
public:
|
2018-09-04 22:15:53 +08:00
|
|
|
InMemoryNode(llvm::StringRef FileName, InMemoryNodeKind Kind)
|
|
|
|
: Kind(Kind), FileName(llvm::sys::path::filename(FileName)) {}
|
2018-03-29 06:09:09 +08:00
|
|
|
virtual ~InMemoryNode() = default;
|
|
|
|
|
2018-09-04 22:15:53 +08:00
|
|
|
/// Get the filename of this node (the name without the directory part).
|
|
|
|
StringRef getFileName() const { return FileName; }
|
|
|
|
InMemoryNodeKind getKind() const { return Kind; }
|
|
|
|
virtual std::string toString(unsigned Indent) const = 0;
|
|
|
|
};
|
|
|
|
|
|
|
|
class InMemoryFile : public InMemoryNode {
|
|
|
|
Status Stat;
|
|
|
|
std::unique_ptr<llvm::MemoryBuffer> Buffer;
|
|
|
|
|
|
|
|
public:
|
|
|
|
InMemoryFile(Status Stat, std::unique_ptr<llvm::MemoryBuffer> Buffer)
|
|
|
|
: InMemoryNode(Stat.getName(), IME_File), Stat(std::move(Stat)),
|
|
|
|
Buffer(std::move(Buffer)) {}
|
|
|
|
|
[VirtualFileSystem] InMemoryFileSystem::status: Return a Status with the requested name
Summary:
InMemoryFileSystem::status behaves differently than
RealFileSystem::status. The Name contained in the Status returned by
RealFileSystem::status will be the path as requested by the caller,
whereas InMemoryFileSystem::status returns the normalized path.
For example, when requested the status for "../src/first.h",
RealFileSystem returns a Status with "../src/first.h" as the Name.
InMemoryFileSystem returns "/absolute/path/to/src/first.h".
The reason for this change is that I want to make a unit test in the
clangd testsuite (where we use an InMemoryFileSystem) to reproduce a
bug I get with the clangd program (where a RealFileSystem is used).
This difference in behavior "hides" the bug in the unit test version.
An indirect impact of this change is that a -Wnonportable-include-path
warning is now emitted in test PCH/case-insensitive-include.c. This is
because the real path of the included file (with the wrong case) was not
available previously, whereas it is now.
Reviewers: malaperle, ilya-biryukov, bkramer
Reviewed By: ilya-biryukov
Subscribers: eric_niebler, malaperle, omtcyfz, hokein, bkramer, ilya-biryukov, ioeric, cfe-commits
Differential Revision: https://reviews.llvm.org/D48903
llvm-svn: 339063
2018-08-07 05:48:20 +08:00
|
|
|
/// Return the \p Status for this node. \p RequestedName should be the name
|
|
|
|
/// through which the caller referred to this node. It will override
|
|
|
|
/// \p Status::Name in the return value, to mimic the behavior of \p RealFile.
|
|
|
|
Status getStatus(StringRef RequestedName) const {
|
|
|
|
return Status::copyWithNewName(Stat, RequestedName);
|
|
|
|
}
|
2018-09-04 22:15:53 +08:00
|
|
|
llvm::MemoryBuffer *getBuffer() const { return Buffer.get(); }
|
[VirtualFileSystem] InMemoryFileSystem::status: Return a Status with the requested name
Summary:
InMemoryFileSystem::status behaves differently than
RealFileSystem::status. The Name contained in the Status returned by
RealFileSystem::status will be the path as requested by the caller,
whereas InMemoryFileSystem::status returns the normalized path.
For example, when requested the status for "../src/first.h",
RealFileSystem returns a Status with "../src/first.h" as the Name.
InMemoryFileSystem returns "/absolute/path/to/src/first.h".
The reason for this change is that I want to make a unit test in the
clangd testsuite (where we use an InMemoryFileSystem) to reproduce a
bug I get with the clangd program (where a RealFileSystem is used).
This difference in behavior "hides" the bug in the unit test version.
An indirect impact of this change is that a -Wnonportable-include-path
warning is now emitted in test PCH/case-insensitive-include.c. This is
because the real path of the included file (with the wrong case) was not
available previously, whereas it is now.
Reviewers: malaperle, ilya-biryukov, bkramer
Reviewed By: ilya-biryukov
Subscribers: eric_niebler, malaperle, omtcyfz, hokein, bkramer, ilya-biryukov, ioeric, cfe-commits
Differential Revision: https://reviews.llvm.org/D48903
llvm-svn: 339063
2018-08-07 05:48:20 +08:00
|
|
|
|
2018-09-04 22:15:53 +08:00
|
|
|
std::string toString(unsigned Indent) const override {
|
|
|
|
return (std::string(Indent, ' ') + Stat.getName() + "\n").str();
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool classof(const InMemoryNode *N) {
|
|
|
|
return N->getKind() == IME_File;
|
[VirtualFileSystem] InMemoryFileSystem::status: Return a Status with the requested name
Summary:
InMemoryFileSystem::status behaves differently than
RealFileSystem::status. The Name contained in the Status returned by
RealFileSystem::status will be the path as requested by the caller,
whereas InMemoryFileSystem::status returns the normalized path.
For example, when requested the status for "../src/first.h",
RealFileSystem returns a Status with "../src/first.h" as the Name.
InMemoryFileSystem returns "/absolute/path/to/src/first.h".
The reason for this change is that I want to make a unit test in the
clangd testsuite (where we use an InMemoryFileSystem) to reproduce a
bug I get with the clangd program (where a RealFileSystem is used).
This difference in behavior "hides" the bug in the unit test version.
An indirect impact of this change is that a -Wnonportable-include-path
warning is now emitted in test PCH/case-insensitive-include.c. This is
because the real path of the included file (with the wrong case) was not
available previously, whereas it is now.
Reviewers: malaperle, ilya-biryukov, bkramer
Reviewed By: ilya-biryukov
Subscribers: eric_niebler, malaperle, omtcyfz, hokein, bkramer, ilya-biryukov, ioeric, cfe-commits
Differential Revision: https://reviews.llvm.org/D48903
llvm-svn: 339063
2018-08-07 05:48:20 +08:00
|
|
|
}
|
2015-10-05 21:55:14 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
namespace {
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2018-09-04 22:15:53 +08:00
|
|
|
class InMemoryHardLink : public InMemoryNode {
|
|
|
|
const InMemoryFile &ResolvedFile;
|
2015-10-05 21:55:14 +08:00
|
|
|
|
|
|
|
public:
|
2018-09-04 22:15:53 +08:00
|
|
|
InMemoryHardLink(StringRef Path, const InMemoryFile &ResolvedFile)
|
|
|
|
: InMemoryNode(Path, IME_HardLink), ResolvedFile(ResolvedFile) {}
|
|
|
|
const InMemoryFile &getResolvedFile() const { return ResolvedFile; }
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2015-10-05 21:55:14 +08:00
|
|
|
std::string toString(unsigned Indent) const override {
|
2018-09-04 22:15:53 +08:00
|
|
|
return std::string(Indent, ' ') + "HardLink to -> " +
|
|
|
|
ResolvedFile.toString(0);
|
2015-10-05 21:55:14 +08:00
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2015-10-05 21:55:14 +08:00
|
|
|
static bool classof(const InMemoryNode *N) {
|
2018-09-04 22:15:53 +08:00
|
|
|
return N->getKind() == IME_HardLink;
|
2015-10-05 21:55:14 +08:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
[VirtualFileSystem] InMemoryFileSystem::status: Return a Status with the requested name
Summary:
InMemoryFileSystem::status behaves differently than
RealFileSystem::status. The Name contained in the Status returned by
RealFileSystem::status will be the path as requested by the caller,
whereas InMemoryFileSystem::status returns the normalized path.
For example, when requested the status for "../src/first.h",
RealFileSystem returns a Status with "../src/first.h" as the Name.
InMemoryFileSystem returns "/absolute/path/to/src/first.h".
The reason for this change is that I want to make a unit test in the
clangd testsuite (where we use an InMemoryFileSystem) to reproduce a
bug I get with the clangd program (where a RealFileSystem is used).
This difference in behavior "hides" the bug in the unit test version.
An indirect impact of this change is that a -Wnonportable-include-path
warning is now emitted in test PCH/case-insensitive-include.c. This is
because the real path of the included file (with the wrong case) was not
available previously, whereas it is now.
Reviewers: malaperle, ilya-biryukov, bkramer
Reviewed By: ilya-biryukov
Subscribers: eric_niebler, malaperle, omtcyfz, hokein, bkramer, ilya-biryukov, ioeric, cfe-commits
Differential Revision: https://reviews.llvm.org/D48903
llvm-svn: 339063
2018-08-07 05:48:20 +08:00
|
|
|
/// Adapt a InMemoryFile for VFS' File interface. The goal is to make
|
|
|
|
/// \p InMemoryFileAdaptor mimic as much as possible the behavior of
|
|
|
|
/// \p RealFile.
|
2015-10-05 21:55:14 +08:00
|
|
|
class InMemoryFileAdaptor : public File {
|
2018-09-04 22:15:53 +08:00
|
|
|
const InMemoryFile &Node;
|
[VirtualFileSystem] InMemoryFileSystem::status: Return a Status with the requested name
Summary:
InMemoryFileSystem::status behaves differently than
RealFileSystem::status. The Name contained in the Status returned by
RealFileSystem::status will be the path as requested by the caller,
whereas InMemoryFileSystem::status returns the normalized path.
For example, when requested the status for "../src/first.h",
RealFileSystem returns a Status with "../src/first.h" as the Name.
InMemoryFileSystem returns "/absolute/path/to/src/first.h".
The reason for this change is that I want to make a unit test in the
clangd testsuite (where we use an InMemoryFileSystem) to reproduce a
bug I get with the clangd program (where a RealFileSystem is used).
This difference in behavior "hides" the bug in the unit test version.
An indirect impact of this change is that a -Wnonportable-include-path
warning is now emitted in test PCH/case-insensitive-include.c. This is
because the real path of the included file (with the wrong case) was not
available previously, whereas it is now.
Reviewers: malaperle, ilya-biryukov, bkramer
Reviewed By: ilya-biryukov
Subscribers: eric_niebler, malaperle, omtcyfz, hokein, bkramer, ilya-biryukov, ioeric, cfe-commits
Differential Revision: https://reviews.llvm.org/D48903
llvm-svn: 339063
2018-08-07 05:48:20 +08:00
|
|
|
/// The name to use when returning a Status for this file.
|
|
|
|
std::string RequestedName;
|
2015-10-05 21:55:14 +08:00
|
|
|
|
|
|
|
public:
|
2018-09-04 22:15:53 +08:00
|
|
|
explicit InMemoryFileAdaptor(const InMemoryFile &Node,
|
|
|
|
std::string RequestedName)
|
[VirtualFileSystem] InMemoryFileSystem::status: Return a Status with the requested name
Summary:
InMemoryFileSystem::status behaves differently than
RealFileSystem::status. The Name contained in the Status returned by
RealFileSystem::status will be the path as requested by the caller,
whereas InMemoryFileSystem::status returns the normalized path.
For example, when requested the status for "../src/first.h",
RealFileSystem returns a Status with "../src/first.h" as the Name.
InMemoryFileSystem returns "/absolute/path/to/src/first.h".
The reason for this change is that I want to make a unit test in the
clangd testsuite (where we use an InMemoryFileSystem) to reproduce a
bug I get with the clangd program (where a RealFileSystem is used).
This difference in behavior "hides" the bug in the unit test version.
An indirect impact of this change is that a -Wnonportable-include-path
warning is now emitted in test PCH/case-insensitive-include.c. This is
because the real path of the included file (with the wrong case) was not
available previously, whereas it is now.
Reviewers: malaperle, ilya-biryukov, bkramer
Reviewed By: ilya-biryukov
Subscribers: eric_niebler, malaperle, omtcyfz, hokein, bkramer, ilya-biryukov, ioeric, cfe-commits
Differential Revision: https://reviews.llvm.org/D48903
llvm-svn: 339063
2018-08-07 05:48:20 +08:00
|
|
|
: Node(Node), RequestedName(std::move(RequestedName)) {}
|
2015-10-05 21:55:14 +08:00
|
|
|
|
[VirtualFileSystem] InMemoryFileSystem::status: Return a Status with the requested name
Summary:
InMemoryFileSystem::status behaves differently than
RealFileSystem::status. The Name contained in the Status returned by
RealFileSystem::status will be the path as requested by the caller,
whereas InMemoryFileSystem::status returns the normalized path.
For example, when requested the status for "../src/first.h",
RealFileSystem returns a Status with "../src/first.h" as the Name.
InMemoryFileSystem returns "/absolute/path/to/src/first.h".
The reason for this change is that I want to make a unit test in the
clangd testsuite (where we use an InMemoryFileSystem) to reproduce a
bug I get with the clangd program (where a RealFileSystem is used).
This difference in behavior "hides" the bug in the unit test version.
An indirect impact of this change is that a -Wnonportable-include-path
warning is now emitted in test PCH/case-insensitive-include.c. This is
because the real path of the included file (with the wrong case) was not
available previously, whereas it is now.
Reviewers: malaperle, ilya-biryukov, bkramer
Reviewed By: ilya-biryukov
Subscribers: eric_niebler, malaperle, omtcyfz, hokein, bkramer, ilya-biryukov, ioeric, cfe-commits
Differential Revision: https://reviews.llvm.org/D48903
llvm-svn: 339063
2018-08-07 05:48:20 +08:00
|
|
|
llvm::ErrorOr<Status> status() override {
|
|
|
|
return Node.getStatus(RequestedName);
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2015-10-05 21:55:14 +08:00
|
|
|
llvm::ErrorOr<std::unique_ptr<llvm::MemoryBuffer>>
|
2015-10-06 05:20:19 +08:00
|
|
|
getBuffer(const Twine &Name, int64_t FileSize, bool RequiresNullTerminator,
|
|
|
|
bool IsVolatile) override {
|
2015-10-05 21:55:14 +08:00
|
|
|
llvm::MemoryBuffer *Buf = Node.getBuffer();
|
|
|
|
return llvm::MemoryBuffer::getMemBuffer(
|
|
|
|
Buf->getBuffer(), Buf->getBufferIdentifier(), RequiresNullTerminator);
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
|
|
|
std::error_code close() override { return {}; }
|
2015-10-05 21:55:14 +08:00
|
|
|
};
|
2018-03-29 06:09:09 +08:00
|
|
|
} // namespace
|
2015-10-05 21:55:14 +08:00
|
|
|
|
|
|
|
class InMemoryDirectory : public InMemoryNode {
|
2018-09-04 22:15:53 +08:00
|
|
|
Status Stat;
|
2018-09-24 22:52:11 +08:00
|
|
|
llvm::StringMap<std::unique_ptr<InMemoryNode>> Entries;
|
2015-10-05 21:55:14 +08:00
|
|
|
|
|
|
|
public:
|
|
|
|
InMemoryDirectory(Status Stat)
|
2018-09-04 22:15:53 +08:00
|
|
|
: InMemoryNode(Stat.getName(), IME_Directory), Stat(std::move(Stat)) {}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2018-09-04 22:15:53 +08:00
|
|
|
/// Return the \p Status for this node. \p RequestedName should be the name
|
|
|
|
/// through which the caller referred to this node. It will override
|
|
|
|
/// \p Status::Name in the return value, to mimic the behavior of \p RealFile.
|
|
|
|
Status getStatus(StringRef RequestedName) const {
|
|
|
|
return Status::copyWithNewName(Stat, RequestedName);
|
|
|
|
}
|
2015-10-05 21:55:14 +08:00
|
|
|
InMemoryNode *getChild(StringRef Name) {
|
|
|
|
auto I = Entries.find(Name);
|
|
|
|
if (I != Entries.end())
|
|
|
|
return I->second.get();
|
|
|
|
return nullptr;
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2015-10-05 21:55:14 +08:00
|
|
|
InMemoryNode *addChild(StringRef Name, std::unique_ptr<InMemoryNode> Child) {
|
|
|
|
return Entries.insert(make_pair(Name, std::move(Child)))
|
|
|
|
.first->second.get();
|
|
|
|
}
|
|
|
|
|
2018-03-29 06:09:09 +08:00
|
|
|
using const_iterator = decltype(Entries)::const_iterator;
|
|
|
|
|
2015-10-05 21:55:14 +08:00
|
|
|
const_iterator begin() const { return Entries.begin(); }
|
|
|
|
const_iterator end() const { return Entries.end(); }
|
|
|
|
|
|
|
|
std::string toString(unsigned Indent) const override {
|
|
|
|
std::string Result =
|
2018-09-04 22:15:53 +08:00
|
|
|
(std::string(Indent, ' ') + Stat.getName() + "\n").str();
|
2018-03-29 06:09:09 +08:00
|
|
|
for (const auto &Entry : Entries)
|
2015-10-05 21:55:14 +08:00
|
|
|
Result += Entry.second->toString(Indent + 2);
|
|
|
|
return Result;
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2015-10-05 21:55:14 +08:00
|
|
|
static bool classof(const InMemoryNode *N) {
|
|
|
|
return N->getKind() == IME_Directory;
|
|
|
|
}
|
|
|
|
};
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2018-09-04 22:15:53 +08:00
|
|
|
namespace {
|
|
|
|
Status getNodeStatus(const InMemoryNode *Node, StringRef RequestedName) {
|
|
|
|
if (auto Dir = dyn_cast<detail::InMemoryDirectory>(Node))
|
|
|
|
return Dir->getStatus(RequestedName);
|
|
|
|
if (auto File = dyn_cast<detail::InMemoryFile>(Node))
|
|
|
|
return File->getStatus(RequestedName);
|
|
|
|
if (auto Link = dyn_cast<detail::InMemoryHardLink>(Node))
|
|
|
|
return Link->getResolvedFile().getStatus(RequestedName);
|
|
|
|
llvm_unreachable("Unknown node type");
|
|
|
|
}
|
|
|
|
} // namespace
|
2018-03-29 06:09:09 +08:00
|
|
|
} // namespace detail
|
2015-10-05 21:55:14 +08:00
|
|
|
|
2015-10-13 00:16:39 +08:00
|
|
|
InMemoryFileSystem::InMemoryFileSystem(bool UseNormalizedPaths)
|
2015-10-05 21:55:14 +08:00
|
|
|
: Root(new detail::InMemoryDirectory(
|
2016-11-09 18:52:22 +08:00
|
|
|
Status("", getNextVirtualUniqueID(), llvm::sys::TimePoint<>(), 0, 0,
|
|
|
|
0, llvm::sys::fs::file_type::directory_file,
|
2015-10-13 00:16:39 +08:00
|
|
|
llvm::sys::fs::perms::all_all))),
|
|
|
|
UseNormalizedPaths(UseNormalizedPaths) {}
|
2015-10-05 21:55:14 +08:00
|
|
|
|
2018-03-29 06:09:09 +08:00
|
|
|
InMemoryFileSystem::~InMemoryFileSystem() = default;
|
2015-10-05 21:55:14 +08:00
|
|
|
|
2015-10-09 21:03:22 +08:00
|
|
|
std::string InMemoryFileSystem::toString() const {
|
2015-10-05 21:55:14 +08:00
|
|
|
return Root->toString(/*Indent=*/0);
|
|
|
|
}
|
|
|
|
|
2015-10-13 00:16:39 +08:00
|
|
|
bool InMemoryFileSystem::addFile(const Twine &P, time_t ModificationTime,
|
2017-11-10 00:01:16 +08:00
|
|
|
std::unique_ptr<llvm::MemoryBuffer> Buffer,
|
|
|
|
Optional<uint32_t> User,
|
|
|
|
Optional<uint32_t> Group,
|
|
|
|
Optional<llvm::sys::fs::file_type> Type,
|
2018-09-04 22:15:53 +08:00
|
|
|
Optional<llvm::sys::fs::perms> Perms,
|
|
|
|
const detail::InMemoryFile *HardLinkTarget) {
|
2015-10-05 21:55:14 +08:00
|
|
|
SmallString<128> Path;
|
|
|
|
P.toVector(Path);
|
|
|
|
|
|
|
|
// Fix up relative paths. This just prepends the current working directory.
|
2015-10-05 21:55:20 +08:00
|
|
|
std::error_code EC = makeAbsolute(Path);
|
2015-10-05 21:55:14 +08:00
|
|
|
assert(!EC);
|
|
|
|
(void)EC;
|
|
|
|
|
2015-10-13 00:16:39 +08:00
|
|
|
if (useNormalizedPaths())
|
2015-11-10 03:12:18 +08:00
|
|
|
llvm::sys::path::remove_dots(Path, /*remove_dot_dot=*/true);
|
2015-10-12 21:30:38 +08:00
|
|
|
|
2015-10-13 00:16:39 +08:00
|
|
|
if (Path.empty())
|
|
|
|
return false;
|
2015-10-12 21:30:38 +08:00
|
|
|
|
2015-10-13 00:16:39 +08:00
|
|
|
detail::InMemoryDirectory *Dir = Root.get();
|
2017-11-10 00:01:16 +08:00
|
|
|
auto I = llvm::sys::path::begin(Path), E = sys::path::end(Path);
|
|
|
|
const auto ResolvedUser = User.getValueOr(0);
|
|
|
|
const auto ResolvedGroup = Group.getValueOr(0);
|
|
|
|
const auto ResolvedType = Type.getValueOr(sys::fs::file_type::regular_file);
|
|
|
|
const auto ResolvedPerms = Perms.getValueOr(sys::fs::all_all);
|
2018-09-04 22:15:53 +08:00
|
|
|
assert(!(HardLinkTarget && Buffer) && "HardLink cannot have a buffer");
|
2017-11-10 00:01:16 +08:00
|
|
|
// Any intermediate directories we create should be accessible by
|
|
|
|
// the owner, even if Perms says otherwise for the final path.
|
|
|
|
const auto NewDirectoryPerms = ResolvedPerms | sys::fs::owner_all;
|
2015-10-05 21:55:14 +08:00
|
|
|
while (true) {
|
|
|
|
StringRef Name = *I;
|
|
|
|
detail::InMemoryNode *Node = Dir->getChild(Name);
|
|
|
|
++I;
|
|
|
|
if (!Node) {
|
|
|
|
if (I == E) {
|
2018-09-04 22:15:53 +08:00
|
|
|
// End of the path.
|
2017-11-17 03:34:08 +08:00
|
|
|
std::unique_ptr<detail::InMemoryNode> Child;
|
2018-09-04 22:15:53 +08:00
|
|
|
if (HardLinkTarget)
|
|
|
|
Child.reset(new detail::InMemoryHardLink(P.str(), *HardLinkTarget));
|
|
|
|
else {
|
|
|
|
// Create a new file or directory.
|
|
|
|
Status Stat(P.str(), getNextVirtualUniqueID(),
|
|
|
|
llvm::sys::toTimePoint(ModificationTime), ResolvedUser,
|
|
|
|
ResolvedGroup, Buffer->getBufferSize(), ResolvedType,
|
|
|
|
ResolvedPerms);
|
|
|
|
if (ResolvedType == sys::fs::file_type::directory_file) {
|
|
|
|
Child.reset(new detail::InMemoryDirectory(std::move(Stat)));
|
|
|
|
} else {
|
|
|
|
Child.reset(
|
|
|
|
new detail::InMemoryFile(std::move(Stat), std::move(Buffer)));
|
|
|
|
}
|
2017-11-17 03:34:08 +08:00
|
|
|
}
|
|
|
|
Dir->addChild(Name, std::move(Child));
|
2015-10-13 00:16:39 +08:00
|
|
|
return true;
|
2015-10-05 21:55:14 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create a new directory. Use the path up to here.
|
|
|
|
Status Stat(
|
|
|
|
StringRef(Path.str().begin(), Name.end() - Path.str().begin()),
|
2017-11-10 00:01:16 +08:00
|
|
|
getNextVirtualUniqueID(), llvm::sys::toTimePoint(ModificationTime),
|
2018-09-04 22:15:53 +08:00
|
|
|
ResolvedUser, ResolvedGroup, 0, sys::fs::file_type::directory_file,
|
|
|
|
NewDirectoryPerms);
|
2015-10-05 21:55:14 +08:00
|
|
|
Dir = cast<detail::InMemoryDirectory>(Dir->addChild(
|
|
|
|
Name, llvm::make_unique<detail::InMemoryDirectory>(std::move(Stat))));
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2015-10-13 00:16:39 +08:00
|
|
|
if (auto *NewDir = dyn_cast<detail::InMemoryDirectory>(Node)) {
|
2015-10-05 21:55:14 +08:00
|
|
|
Dir = NewDir;
|
2015-10-13 00:16:39 +08:00
|
|
|
} else {
|
2018-09-04 22:15:53 +08:00
|
|
|
assert((isa<detail::InMemoryFile>(Node) ||
|
|
|
|
isa<detail::InMemoryHardLink>(Node)) &&
|
|
|
|
"Must be either file, hardlink or directory!");
|
2015-10-13 00:16:39 +08:00
|
|
|
|
|
|
|
// Trying to insert a directory in place of a file.
|
|
|
|
if (I != E)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
// Return false only if the new file is different from the existing one.
|
2018-09-04 22:15:53 +08:00
|
|
|
if (auto Link = dyn_cast<detail::InMemoryHardLink>(Node)) {
|
|
|
|
return Link->getResolvedFile().getBuffer()->getBuffer() ==
|
|
|
|
Buffer->getBuffer();
|
|
|
|
}
|
2015-10-13 00:16:39 +08:00
|
|
|
return cast<detail::InMemoryFile>(Node)->getBuffer()->getBuffer() ==
|
|
|
|
Buffer->getBuffer();
|
|
|
|
}
|
2015-10-05 21:55:14 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-09-04 22:15:53 +08:00
|
|
|
bool InMemoryFileSystem::addFile(const Twine &P, time_t ModificationTime,
|
|
|
|
std::unique_ptr<llvm::MemoryBuffer> Buffer,
|
|
|
|
Optional<uint32_t> User,
|
|
|
|
Optional<uint32_t> Group,
|
|
|
|
Optional<llvm::sys::fs::file_type> Type,
|
|
|
|
Optional<llvm::sys::fs::perms> Perms) {
|
|
|
|
return addFile(P, ModificationTime, std::move(Buffer), User, Group, Type,
|
|
|
|
Perms, /*HardLinkTarget=*/nullptr);
|
|
|
|
}
|
|
|
|
|
2015-10-13 00:16:39 +08:00
|
|
|
bool InMemoryFileSystem::addFileNoOwn(const Twine &P, time_t ModificationTime,
|
2017-11-10 00:01:16 +08:00
|
|
|
llvm::MemoryBuffer *Buffer,
|
|
|
|
Optional<uint32_t> User,
|
|
|
|
Optional<uint32_t> Group,
|
|
|
|
Optional<llvm::sys::fs::file_type> Type,
|
|
|
|
Optional<llvm::sys::fs::perms> Perms) {
|
2015-10-06 18:04:08 +08:00
|
|
|
return addFile(P, ModificationTime,
|
|
|
|
llvm::MemoryBuffer::getMemBuffer(
|
2017-11-10 00:01:16 +08:00
|
|
|
Buffer->getBuffer(), Buffer->getBufferIdentifier()),
|
|
|
|
std::move(User), std::move(Group), std::move(Type),
|
|
|
|
std::move(Perms));
|
2015-10-06 18:04:08 +08:00
|
|
|
}
|
|
|
|
|
2018-09-04 22:15:53 +08:00
|
|
|
static ErrorOr<const detail::InMemoryNode *>
|
2015-10-05 21:55:20 +08:00
|
|
|
lookupInMemoryNode(const InMemoryFileSystem &FS, detail::InMemoryDirectory *Dir,
|
|
|
|
const Twine &P) {
|
2015-10-05 21:55:14 +08:00
|
|
|
SmallString<128> Path;
|
|
|
|
P.toVector(Path);
|
|
|
|
|
|
|
|
// Fix up relative paths. This just prepends the current working directory.
|
2015-10-05 21:55:20 +08:00
|
|
|
std::error_code EC = FS.makeAbsolute(Path);
|
2015-10-05 21:55:14 +08:00
|
|
|
assert(!EC);
|
|
|
|
(void)EC;
|
|
|
|
|
2015-10-13 00:16:39 +08:00
|
|
|
if (FS.useNormalizedPaths())
|
2015-11-10 03:12:18 +08:00
|
|
|
llvm::sys::path::remove_dots(Path, /*remove_dot_dot=*/true);
|
2015-10-12 21:30:38 +08:00
|
|
|
|
2015-10-13 00:16:39 +08:00
|
|
|
if (Path.empty())
|
2015-10-09 21:03:22 +08:00
|
|
|
return Dir;
|
|
|
|
|
2015-10-13 00:16:39 +08:00
|
|
|
auto I = llvm::sys::path::begin(Path), E = llvm::sys::path::end(Path);
|
2015-10-05 21:55:14 +08:00
|
|
|
while (true) {
|
|
|
|
detail::InMemoryNode *Node = Dir->getChild(*I);
|
|
|
|
++I;
|
|
|
|
if (!Node)
|
|
|
|
return errc::no_such_file_or_directory;
|
|
|
|
|
|
|
|
// Return the file if it's at the end of the path.
|
|
|
|
if (auto File = dyn_cast<detail::InMemoryFile>(Node)) {
|
|
|
|
if (I == E)
|
|
|
|
return File;
|
|
|
|
return errc::no_such_file_or_directory;
|
|
|
|
}
|
|
|
|
|
2018-09-04 22:15:53 +08:00
|
|
|
// If Node is HardLink then return the resolved file.
|
|
|
|
if (auto File = dyn_cast<detail::InMemoryHardLink>(Node)) {
|
|
|
|
if (I == E)
|
|
|
|
return &File->getResolvedFile();
|
|
|
|
return errc::no_such_file_or_directory;
|
|
|
|
}
|
2015-10-05 21:55:14 +08:00
|
|
|
// Traverse directories.
|
|
|
|
Dir = cast<detail::InMemoryDirectory>(Node);
|
|
|
|
if (I == E)
|
|
|
|
return Dir;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-09-04 22:15:53 +08:00
|
|
|
bool InMemoryFileSystem::addHardLink(const Twine &FromPath,
|
|
|
|
const Twine &ToPath) {
|
|
|
|
auto FromNode = lookupInMemoryNode(*this, Root.get(), FromPath);
|
|
|
|
auto ToNode = lookupInMemoryNode(*this, Root.get(), ToPath);
|
|
|
|
// FromPath must not have been added before. ToPath must have been added
|
|
|
|
// before. Resolved ToPath must be a File.
|
|
|
|
if (!ToNode || FromNode || !isa<detail::InMemoryFile>(*ToNode))
|
|
|
|
return false;
|
|
|
|
return this->addFile(FromPath, 0, nullptr, None, None, None, None,
|
|
|
|
cast<detail::InMemoryFile>(*ToNode));
|
|
|
|
}
|
|
|
|
|
2015-10-05 21:55:14 +08:00
|
|
|
llvm::ErrorOr<Status> InMemoryFileSystem::status(const Twine &Path) {
|
2015-10-05 21:55:20 +08:00
|
|
|
auto Node = lookupInMemoryNode(*this, Root.get(), Path);
|
2015-10-05 21:55:14 +08:00
|
|
|
if (Node)
|
2018-09-04 22:15:53 +08:00
|
|
|
return detail::getNodeStatus(*Node, Path.str());
|
2015-10-05 21:55:14 +08:00
|
|
|
return Node.getError();
|
|
|
|
}
|
|
|
|
|
|
|
|
llvm::ErrorOr<std::unique_ptr<File>>
|
|
|
|
InMemoryFileSystem::openFileForRead(const Twine &Path) {
|
2015-10-05 21:55:20 +08:00
|
|
|
auto Node = lookupInMemoryNode(*this, Root.get(), Path);
|
2015-10-05 21:55:14 +08:00
|
|
|
if (!Node)
|
|
|
|
return Node.getError();
|
|
|
|
|
|
|
|
// When we have a file provide a heap-allocated wrapper for the memory buffer
|
|
|
|
// to match the ownership semantics for File.
|
|
|
|
if (auto *F = dyn_cast<detail::InMemoryFile>(*Node))
|
[VirtualFileSystem] InMemoryFileSystem::status: Return a Status with the requested name
Summary:
InMemoryFileSystem::status behaves differently than
RealFileSystem::status. The Name contained in the Status returned by
RealFileSystem::status will be the path as requested by the caller,
whereas InMemoryFileSystem::status returns the normalized path.
For example, when requested the status for "../src/first.h",
RealFileSystem returns a Status with "../src/first.h" as the Name.
InMemoryFileSystem returns "/absolute/path/to/src/first.h".
The reason for this change is that I want to make a unit test in the
clangd testsuite (where we use an InMemoryFileSystem) to reproduce a
bug I get with the clangd program (where a RealFileSystem is used).
This difference in behavior "hides" the bug in the unit test version.
An indirect impact of this change is that a -Wnonportable-include-path
warning is now emitted in test PCH/case-insensitive-include.c. This is
because the real path of the included file (with the wrong case) was not
available previously, whereas it is now.
Reviewers: malaperle, ilya-biryukov, bkramer
Reviewed By: ilya-biryukov
Subscribers: eric_niebler, malaperle, omtcyfz, hokein, bkramer, ilya-biryukov, ioeric, cfe-commits
Differential Revision: https://reviews.llvm.org/D48903
llvm-svn: 339063
2018-08-07 05:48:20 +08:00
|
|
|
return std::unique_ptr<File>(
|
|
|
|
new detail::InMemoryFileAdaptor(*F, Path.str()));
|
2015-10-05 21:55:14 +08:00
|
|
|
|
|
|
|
// FIXME: errc::not_a_file?
|
|
|
|
return make_error_code(llvm::errc::invalid_argument);
|
|
|
|
}
|
|
|
|
|
|
|
|
namespace {
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2015-10-05 21:55:14 +08:00
|
|
|
/// Adaptor from InMemoryDir::iterator to directory_iterator.
|
|
|
|
class InMemoryDirIterator : public clang::vfs::detail::DirIterImpl {
|
|
|
|
detail::InMemoryDirectory::const_iterator I;
|
|
|
|
detail::InMemoryDirectory::const_iterator E;
|
[VirtualFileSystem] InMemoryFileSystem::status: Return a Status with the requested name
Summary:
InMemoryFileSystem::status behaves differently than
RealFileSystem::status. The Name contained in the Status returned by
RealFileSystem::status will be the path as requested by the caller,
whereas InMemoryFileSystem::status returns the normalized path.
For example, when requested the status for "../src/first.h",
RealFileSystem returns a Status with "../src/first.h" as the Name.
InMemoryFileSystem returns "/absolute/path/to/src/first.h".
The reason for this change is that I want to make a unit test in the
clangd testsuite (where we use an InMemoryFileSystem) to reproduce a
bug I get with the clangd program (where a RealFileSystem is used).
This difference in behavior "hides" the bug in the unit test version.
An indirect impact of this change is that a -Wnonportable-include-path
warning is now emitted in test PCH/case-insensitive-include.c. This is
because the real path of the included file (with the wrong case) was not
available previously, whereas it is now.
Reviewers: malaperle, ilya-biryukov, bkramer
Reviewed By: ilya-biryukov
Subscribers: eric_niebler, malaperle, omtcyfz, hokein, bkramer, ilya-biryukov, ioeric, cfe-commits
Differential Revision: https://reviews.llvm.org/D48903
llvm-svn: 339063
2018-08-07 05:48:20 +08:00
|
|
|
std::string RequestedDirName;
|
|
|
|
|
|
|
|
void setCurrentEntry() {
|
|
|
|
if (I != E) {
|
|
|
|
SmallString<256> Path(RequestedDirName);
|
|
|
|
llvm::sys::path::append(Path, I->second->getFileName());
|
2018-09-14 20:47:38 +08:00
|
|
|
sys::fs::file_type Type;
|
|
|
|
switch (I->second->getKind()) {
|
|
|
|
case detail::IME_File:
|
|
|
|
case detail::IME_HardLink:
|
|
|
|
Type = sys::fs::file_type::regular_file;
|
|
|
|
break;
|
|
|
|
case detail::IME_Directory:
|
|
|
|
Type = sys::fs::file_type::directory_file;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
CurrentEntry = directory_entry(Path.str(), Type);
|
[VirtualFileSystem] InMemoryFileSystem::status: Return a Status with the requested name
Summary:
InMemoryFileSystem::status behaves differently than
RealFileSystem::status. The Name contained in the Status returned by
RealFileSystem::status will be the path as requested by the caller,
whereas InMemoryFileSystem::status returns the normalized path.
For example, when requested the status for "../src/first.h",
RealFileSystem returns a Status with "../src/first.h" as the Name.
InMemoryFileSystem returns "/absolute/path/to/src/first.h".
The reason for this change is that I want to make a unit test in the
clangd testsuite (where we use an InMemoryFileSystem) to reproduce a
bug I get with the clangd program (where a RealFileSystem is used).
This difference in behavior "hides" the bug in the unit test version.
An indirect impact of this change is that a -Wnonportable-include-path
warning is now emitted in test PCH/case-insensitive-include.c. This is
because the real path of the included file (with the wrong case) was not
available previously, whereas it is now.
Reviewers: malaperle, ilya-biryukov, bkramer
Reviewed By: ilya-biryukov
Subscribers: eric_niebler, malaperle, omtcyfz, hokein, bkramer, ilya-biryukov, ioeric, cfe-commits
Differential Revision: https://reviews.llvm.org/D48903
llvm-svn: 339063
2018-08-07 05:48:20 +08:00
|
|
|
} else {
|
|
|
|
// When we're at the end, make CurrentEntry invalid and DirIterImpl will
|
|
|
|
// do the rest.
|
2018-09-14 20:47:38 +08:00
|
|
|
CurrentEntry = directory_entry();
|
[VirtualFileSystem] InMemoryFileSystem::status: Return a Status with the requested name
Summary:
InMemoryFileSystem::status behaves differently than
RealFileSystem::status. The Name contained in the Status returned by
RealFileSystem::status will be the path as requested by the caller,
whereas InMemoryFileSystem::status returns the normalized path.
For example, when requested the status for "../src/first.h",
RealFileSystem returns a Status with "../src/first.h" as the Name.
InMemoryFileSystem returns "/absolute/path/to/src/first.h".
The reason for this change is that I want to make a unit test in the
clangd testsuite (where we use an InMemoryFileSystem) to reproduce a
bug I get with the clangd program (where a RealFileSystem is used).
This difference in behavior "hides" the bug in the unit test version.
An indirect impact of this change is that a -Wnonportable-include-path
warning is now emitted in test PCH/case-insensitive-include.c. This is
because the real path of the included file (with the wrong case) was not
available previously, whereas it is now.
Reviewers: malaperle, ilya-biryukov, bkramer
Reviewed By: ilya-biryukov
Subscribers: eric_niebler, malaperle, omtcyfz, hokein, bkramer, ilya-biryukov, ioeric, cfe-commits
Differential Revision: https://reviews.llvm.org/D48903
llvm-svn: 339063
2018-08-07 05:48:20 +08:00
|
|
|
}
|
|
|
|
}
|
2015-10-05 21:55:14 +08:00
|
|
|
|
|
|
|
public:
|
2018-03-29 06:09:09 +08:00
|
|
|
InMemoryDirIterator() = default;
|
|
|
|
|
2018-09-04 22:15:53 +08:00
|
|
|
explicit InMemoryDirIterator(const detail::InMemoryDirectory &Dir,
|
[VirtualFileSystem] InMemoryFileSystem::status: Return a Status with the requested name
Summary:
InMemoryFileSystem::status behaves differently than
RealFileSystem::status. The Name contained in the Status returned by
RealFileSystem::status will be the path as requested by the caller,
whereas InMemoryFileSystem::status returns the normalized path.
For example, when requested the status for "../src/first.h",
RealFileSystem returns a Status with "../src/first.h" as the Name.
InMemoryFileSystem returns "/absolute/path/to/src/first.h".
The reason for this change is that I want to make a unit test in the
clangd testsuite (where we use an InMemoryFileSystem) to reproduce a
bug I get with the clangd program (where a RealFileSystem is used).
This difference in behavior "hides" the bug in the unit test version.
An indirect impact of this change is that a -Wnonportable-include-path
warning is now emitted in test PCH/case-insensitive-include.c. This is
because the real path of the included file (with the wrong case) was not
available previously, whereas it is now.
Reviewers: malaperle, ilya-biryukov, bkramer
Reviewed By: ilya-biryukov
Subscribers: eric_niebler, malaperle, omtcyfz, hokein, bkramer, ilya-biryukov, ioeric, cfe-commits
Differential Revision: https://reviews.llvm.org/D48903
llvm-svn: 339063
2018-08-07 05:48:20 +08:00
|
|
|
std::string RequestedDirName)
|
|
|
|
: I(Dir.begin()), E(Dir.end()),
|
|
|
|
RequestedDirName(std::move(RequestedDirName)) {
|
|
|
|
setCurrentEntry();
|
2015-10-05 21:55:14 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
std::error_code increment() override {
|
|
|
|
++I;
|
[VirtualFileSystem] InMemoryFileSystem::status: Return a Status with the requested name
Summary:
InMemoryFileSystem::status behaves differently than
RealFileSystem::status. The Name contained in the Status returned by
RealFileSystem::status will be the path as requested by the caller,
whereas InMemoryFileSystem::status returns the normalized path.
For example, when requested the status for "../src/first.h",
RealFileSystem returns a Status with "../src/first.h" as the Name.
InMemoryFileSystem returns "/absolute/path/to/src/first.h".
The reason for this change is that I want to make a unit test in the
clangd testsuite (where we use an InMemoryFileSystem) to reproduce a
bug I get with the clangd program (where a RealFileSystem is used).
This difference in behavior "hides" the bug in the unit test version.
An indirect impact of this change is that a -Wnonportable-include-path
warning is now emitted in test PCH/case-insensitive-include.c. This is
because the real path of the included file (with the wrong case) was not
available previously, whereas it is now.
Reviewers: malaperle, ilya-biryukov, bkramer
Reviewed By: ilya-biryukov
Subscribers: eric_niebler, malaperle, omtcyfz, hokein, bkramer, ilya-biryukov, ioeric, cfe-commits
Differential Revision: https://reviews.llvm.org/D48903
llvm-svn: 339063
2018-08-07 05:48:20 +08:00
|
|
|
setCurrentEntry();
|
2018-03-29 06:09:09 +08:00
|
|
|
return {};
|
2015-10-05 21:55:14 +08:00
|
|
|
}
|
|
|
|
};
|
2018-03-29 06:09:09 +08:00
|
|
|
|
|
|
|
} // namespace
|
2015-10-05 21:55:14 +08:00
|
|
|
|
|
|
|
directory_iterator InMemoryFileSystem::dir_begin(const Twine &Dir,
|
|
|
|
std::error_code &EC) {
|
2015-10-05 21:55:20 +08:00
|
|
|
auto Node = lookupInMemoryNode(*this, Root.get(), Dir);
|
2015-10-05 21:55:14 +08:00
|
|
|
if (!Node) {
|
|
|
|
EC = Node.getError();
|
|
|
|
return directory_iterator(std::make_shared<InMemoryDirIterator>());
|
|
|
|
}
|
|
|
|
|
|
|
|
if (auto *DirNode = dyn_cast<detail::InMemoryDirectory>(*Node))
|
[VirtualFileSystem] InMemoryFileSystem::status: Return a Status with the requested name
Summary:
InMemoryFileSystem::status behaves differently than
RealFileSystem::status. The Name contained in the Status returned by
RealFileSystem::status will be the path as requested by the caller,
whereas InMemoryFileSystem::status returns the normalized path.
For example, when requested the status for "../src/first.h",
RealFileSystem returns a Status with "../src/first.h" as the Name.
InMemoryFileSystem returns "/absolute/path/to/src/first.h".
The reason for this change is that I want to make a unit test in the
clangd testsuite (where we use an InMemoryFileSystem) to reproduce a
bug I get with the clangd program (where a RealFileSystem is used).
This difference in behavior "hides" the bug in the unit test version.
An indirect impact of this change is that a -Wnonportable-include-path
warning is now emitted in test PCH/case-insensitive-include.c. This is
because the real path of the included file (with the wrong case) was not
available previously, whereas it is now.
Reviewers: malaperle, ilya-biryukov, bkramer
Reviewed By: ilya-biryukov
Subscribers: eric_niebler, malaperle, omtcyfz, hokein, bkramer, ilya-biryukov, ioeric, cfe-commits
Differential Revision: https://reviews.llvm.org/D48903
llvm-svn: 339063
2018-08-07 05:48:20 +08:00
|
|
|
return directory_iterator(
|
|
|
|
std::make_shared<InMemoryDirIterator>(*DirNode, Dir.str()));
|
2015-10-05 21:55:14 +08:00
|
|
|
|
|
|
|
EC = make_error_code(llvm::errc::not_a_directory);
|
|
|
|
return directory_iterator(std::make_shared<InMemoryDirIterator>());
|
|
|
|
}
|
2016-01-10 00:33:16 +08:00
|
|
|
|
|
|
|
std::error_code InMemoryFileSystem::setCurrentWorkingDirectory(const Twine &P) {
|
|
|
|
SmallString<128> Path;
|
|
|
|
P.toVector(Path);
|
|
|
|
|
|
|
|
// Fix up relative paths. This just prepends the current working directory.
|
|
|
|
std::error_code EC = makeAbsolute(Path);
|
|
|
|
assert(!EC);
|
|
|
|
(void)EC;
|
|
|
|
|
|
|
|
if (useNormalizedPaths())
|
|
|
|
llvm::sys::path::remove_dots(Path, /*remove_dot_dot=*/true);
|
|
|
|
|
|
|
|
if (!Path.empty())
|
|
|
|
WorkingDirectory = Path.str();
|
2018-03-29 06:09:09 +08:00
|
|
|
return {};
|
2015-10-05 21:55:14 +08:00
|
|
|
}
|
|
|
|
|
2018-05-24 19:17:00 +08:00
|
|
|
std::error_code
|
|
|
|
InMemoryFileSystem::getRealPath(const Twine &Path,
|
|
|
|
SmallVectorImpl<char> &Output) const {
|
|
|
|
auto CWD = getCurrentWorkingDirectory();
|
|
|
|
if (!CWD || CWD->empty())
|
|
|
|
return errc::operation_not_permitted;
|
|
|
|
Path.toVector(Output);
|
|
|
|
if (auto EC = makeAbsolute(Output))
|
|
|
|
return EC;
|
|
|
|
llvm::sys::path::remove_dots(Output, /*remove_dot_dot=*/true);
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
2018-03-29 06:09:09 +08:00
|
|
|
} // namespace vfs
|
|
|
|
} // namespace clang
|
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
//===-----------------------------------------------------------------------===/
|
2015-10-07 18:05:44 +08:00
|
|
|
// RedirectingFileSystem implementation
|
2014-02-22 07:39:37 +08:00
|
|
|
//===-----------------------------------------------------------------------===/
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
enum EntryKind {
|
|
|
|
EK_Directory,
|
|
|
|
EK_File
|
|
|
|
};
|
|
|
|
|
2018-05-09 09:00:01 +08:00
|
|
|
/// A single file or directory in the VFS.
|
2014-02-22 07:39:37 +08:00
|
|
|
class Entry {
|
|
|
|
EntryKind Kind;
|
|
|
|
std::string Name;
|
|
|
|
|
|
|
|
public:
|
|
|
|
Entry(EntryKind K, StringRef Name) : Kind(K), Name(Name) {}
|
2018-03-29 06:09:09 +08:00
|
|
|
virtual ~Entry() = default;
|
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
StringRef getName() const { return Name; }
|
|
|
|
EntryKind getKind() const { return Kind; }
|
|
|
|
};
|
|
|
|
|
2015-10-09 21:28:13 +08:00
|
|
|
class RedirectingDirectoryEntry : public Entry {
|
2015-10-07 18:05:44 +08:00
|
|
|
std::vector<std::unique_ptr<Entry>> Contents;
|
2014-02-22 07:39:37 +08:00
|
|
|
Status S;
|
|
|
|
|
|
|
|
public:
|
2015-10-09 21:28:13 +08:00
|
|
|
RedirectingDirectoryEntry(StringRef Name,
|
|
|
|
std::vector<std::unique_ptr<Entry>> Contents,
|
|
|
|
Status S)
|
2014-02-25 12:34:14 +08:00
|
|
|
: Entry(EK_Directory, Name), Contents(std::move(Contents)),
|
2014-02-22 07:39:37 +08:00
|
|
|
S(std::move(S)) {}
|
[VFS] Reapply #2: Reconstruct the VFS overlay tree for more accurate lookup
Reapply r269100 and r269270, reverted due to
https://llvm.org/bugs/show_bug.cgi?id=27725. Isolate the testcase that
corresponds to the new feature side of this commit and skip it on
windows hosts until we find why it does not work on these platforms.
Original commit message:
The way we currently build the internal VFS overlay representation leads
to inefficient path search and might yield wrong answers when asked for
recursive or regular directory iteration.
Currently, when reading an YAML file, each YAML root entry is placed
inside a new root in the filesystem overlay. In the crash reproducer, a
simple "@import Foundation" currently maps to 43 roots, and when looking
up paths, we traverse a directory tree for each of these different
roots, until we find a match (or don't). This has two consequences:
- It's slow.
- Directory iteration gives incomplete results since it only return
results within one root - since contents of the same directory can be
declared inside different roots, the result isn't accurate.
This is in part fault of the way we currently write out the YAML file
when emitting the crash reproducer - we could generate only one root and
that would make it fast and correct again. However, we should not rely
on how the client writes the YAML, but provide a good internal
representation regardless.
Build a proper virtual directory tree out of the YAML representation,
allowing faster search and proper iteration. Besides the crash
reproducer, this potentially benefits other VFS clients.
llvm-svn: 269327
2016-05-13 03:13:07 +08:00
|
|
|
RedirectingDirectoryEntry(StringRef Name, Status S)
|
|
|
|
: Entry(EK_Directory, Name), S(std::move(S)) {}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
Status getStatus() { return S; }
|
2018-03-29 06:09:09 +08:00
|
|
|
|
[VFS] Reapply #2: Reconstruct the VFS overlay tree for more accurate lookup
Reapply r269100 and r269270, reverted due to
https://llvm.org/bugs/show_bug.cgi?id=27725. Isolate the testcase that
corresponds to the new feature side of this commit and skip it on
windows hosts until we find why it does not work on these platforms.
Original commit message:
The way we currently build the internal VFS overlay representation leads
to inefficient path search and might yield wrong answers when asked for
recursive or regular directory iteration.
Currently, when reading an YAML file, each YAML root entry is placed
inside a new root in the filesystem overlay. In the crash reproducer, a
simple "@import Foundation" currently maps to 43 roots, and when looking
up paths, we traverse a directory tree for each of these different
roots, until we find a match (or don't). This has two consequences:
- It's slow.
- Directory iteration gives incomplete results since it only return
results within one root - since contents of the same directory can be
declared inside different roots, the result isn't accurate.
This is in part fault of the way we currently write out the YAML file
when emitting the crash reproducer - we could generate only one root and
that would make it fast and correct again. However, we should not rely
on how the client writes the YAML, but provide a good internal
representation regardless.
Build a proper virtual directory tree out of the YAML representation,
allowing faster search and proper iteration. Besides the crash
reproducer, this potentially benefits other VFS clients.
llvm-svn: 269327
2016-05-13 03:13:07 +08:00
|
|
|
void addContent(std::unique_ptr<Entry> Content) {
|
|
|
|
Contents.push_back(std::move(Content));
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
[VFS] Reapply #2: Reconstruct the VFS overlay tree for more accurate lookup
Reapply r269100 and r269270, reverted due to
https://llvm.org/bugs/show_bug.cgi?id=27725. Isolate the testcase that
corresponds to the new feature side of this commit and skip it on
windows hosts until we find why it does not work on these platforms.
Original commit message:
The way we currently build the internal VFS overlay representation leads
to inefficient path search and might yield wrong answers when asked for
recursive or regular directory iteration.
Currently, when reading an YAML file, each YAML root entry is placed
inside a new root in the filesystem overlay. In the crash reproducer, a
simple "@import Foundation" currently maps to 43 roots, and when looking
up paths, we traverse a directory tree for each of these different
roots, until we find a match (or don't). This has two consequences:
- It's slow.
- Directory iteration gives incomplete results since it only return
results within one root - since contents of the same directory can be
declared inside different roots, the result isn't accurate.
This is in part fault of the way we currently write out the YAML file
when emitting the crash reproducer - we could generate only one root and
that would make it fast and correct again. However, we should not rely
on how the client writes the YAML, but provide a good internal
representation regardless.
Build a proper virtual directory tree out of the YAML representation,
allowing faster search and proper iteration. Besides the crash
reproducer, this potentially benefits other VFS clients.
llvm-svn: 269327
2016-05-13 03:13:07 +08:00
|
|
|
Entry *getLastContent() const { return Contents.back().get(); }
|
2018-03-29 06:09:09 +08:00
|
|
|
|
|
|
|
using iterator = decltype(Contents)::iterator;
|
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
iterator contents_begin() { return Contents.begin(); }
|
|
|
|
iterator contents_end() { return Contents.end(); }
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
static bool classof(const Entry *E) { return E->getKind() == EK_Directory; }
|
|
|
|
};
|
|
|
|
|
2015-10-09 21:28:13 +08:00
|
|
|
class RedirectingFileEntry : public Entry {
|
2014-02-27 08:25:12 +08:00
|
|
|
public:
|
|
|
|
enum NameKind {
|
|
|
|
NK_NotSet,
|
|
|
|
NK_External,
|
|
|
|
NK_Virtual
|
|
|
|
};
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-02-27 08:25:12 +08:00
|
|
|
private:
|
2014-02-22 07:39:37 +08:00
|
|
|
std::string ExternalContentsPath;
|
2014-02-27 08:25:12 +08:00
|
|
|
NameKind UseName;
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
public:
|
2015-10-09 21:28:13 +08:00
|
|
|
RedirectingFileEntry(StringRef Name, StringRef ExternalContentsPath,
|
|
|
|
NameKind UseName)
|
2014-02-27 08:25:12 +08:00
|
|
|
: Entry(EK_File, Name), ExternalContentsPath(ExternalContentsPath),
|
|
|
|
UseName(UseName) {}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
StringRef getExternalContentsPath() const { return ExternalContentsPath; }
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2018-05-09 09:00:01 +08:00
|
|
|
/// whether to use the external path as the name for this file.
|
2014-03-01 05:16:07 +08:00
|
|
|
bool useExternalName(bool GlobalUseExternalName) const {
|
|
|
|
return UseName == NK_NotSet ? GlobalUseExternalName
|
|
|
|
: (UseName == NK_External);
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
[VFS] Reapply #2: Reconstruct the VFS overlay tree for more accurate lookup
Reapply r269100 and r269270, reverted due to
https://llvm.org/bugs/show_bug.cgi?id=27725. Isolate the testcase that
corresponds to the new feature side of this commit and skip it on
windows hosts until we find why it does not work on these platforms.
Original commit message:
The way we currently build the internal VFS overlay representation leads
to inefficient path search and might yield wrong answers when asked for
recursive or regular directory iteration.
Currently, when reading an YAML file, each YAML root entry is placed
inside a new root in the filesystem overlay. In the crash reproducer, a
simple "@import Foundation" currently maps to 43 roots, and when looking
up paths, we traverse a directory tree for each of these different
roots, until we find a match (or don't). This has two consequences:
- It's slow.
- Directory iteration gives incomplete results since it only return
results within one root - since contents of the same directory can be
declared inside different roots, the result isn't accurate.
This is in part fault of the way we currently write out the YAML file
when emitting the crash reproducer - we could generate only one root and
that would make it fast and correct again. However, we should not rely
on how the client writes the YAML, but provide a good internal
representation regardless.
Build a proper virtual directory tree out of the YAML representation,
allowing faster search and proper iteration. Besides the crash
reproducer, this potentially benefits other VFS clients.
llvm-svn: 269327
2016-05-13 03:13:07 +08:00
|
|
|
NameKind getUseName() const { return UseName; }
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
static bool classof(const Entry *E) { return E->getKind() == EK_File; }
|
|
|
|
};
|
|
|
|
|
2014-06-25 03:37:16 +08:00
|
|
|
class VFSFromYamlDirIterImpl : public clang::vfs::detail::DirIterImpl {
|
|
|
|
std::string Dir;
|
2015-10-09 21:28:13 +08:00
|
|
|
RedirectingDirectoryEntry::iterator Current, End;
|
|
|
|
|
2018-08-08 07:00:40 +08:00
|
|
|
std::error_code incrementImpl();
|
|
|
|
|
2014-06-25 03:37:16 +08:00
|
|
|
public:
|
2018-09-14 20:47:38 +08:00
|
|
|
VFSFromYamlDirIterImpl(const Twine &Path,
|
2015-10-09 21:28:13 +08:00
|
|
|
RedirectingDirectoryEntry::iterator Begin,
|
|
|
|
RedirectingDirectoryEntry::iterator End,
|
|
|
|
std::error_code &EC);
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-06-25 03:37:16 +08:00
|
|
|
std::error_code increment() override;
|
|
|
|
};
|
|
|
|
|
2018-05-09 09:00:01 +08:00
|
|
|
/// A virtual file system parsed from a YAML file.
|
2014-02-22 07:39:37 +08:00
|
|
|
///
|
|
|
|
/// Currently, this class allows creating virtual directories and mapping
|
|
|
|
/// virtual file paths to existing external files, available in \c ExternalFS.
|
|
|
|
///
|
|
|
|
/// The basic structure of the parsed file is:
|
|
|
|
/// \verbatim
|
|
|
|
/// {
|
|
|
|
/// 'version': <version number>,
|
|
|
|
/// <optional configuration>
|
|
|
|
/// 'roots': [
|
|
|
|
/// <directory entries>
|
|
|
|
/// ]
|
|
|
|
/// }
|
|
|
|
/// \endverbatim
|
|
|
|
///
|
|
|
|
/// All configuration options are optional.
|
|
|
|
/// 'case-sensitive': <boolean, default=true>
|
2014-02-27 08:25:12 +08:00
|
|
|
/// 'use-external-names': <boolean, default=true>
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
/// 'overlay-relative': <boolean, default=false>
|
2016-08-12 09:50:53 +08:00
|
|
|
/// 'ignore-non-existent-contents': <boolean, default=true>
|
2014-02-22 07:39:37 +08:00
|
|
|
///
|
|
|
|
/// Virtual directories are represented as
|
|
|
|
/// \verbatim
|
|
|
|
/// {
|
|
|
|
/// 'type': 'directory',
|
|
|
|
/// 'name': <string>,
|
|
|
|
/// 'contents': [ <file or directory entries> ]
|
|
|
|
/// }
|
|
|
|
/// \endverbatim
|
|
|
|
///
|
|
|
|
/// The default attributes for virtual directories are:
|
|
|
|
/// \verbatim
|
|
|
|
/// MTime = now() when created
|
|
|
|
/// Perms = 0777
|
|
|
|
/// User = Group = 0
|
|
|
|
/// Size = 0
|
|
|
|
/// UniqueID = unspecified unique value
|
|
|
|
/// \endverbatim
|
|
|
|
///
|
|
|
|
/// Re-mapped files are represented as
|
|
|
|
/// \verbatim
|
|
|
|
/// {
|
|
|
|
/// 'type': 'file',
|
|
|
|
/// 'name': <string>,
|
2014-02-27 08:25:12 +08:00
|
|
|
/// 'use-external-name': <boolean> # Optional
|
2018-08-08 09:28:37 +08:00
|
|
|
/// 'external-contents': <path to external file>
|
2014-02-22 07:39:37 +08:00
|
|
|
/// }
|
|
|
|
/// \endverbatim
|
|
|
|
///
|
|
|
|
/// and inherit their attributes from the external contents.
|
|
|
|
///
|
2014-02-25 12:34:14 +08:00
|
|
|
/// In both cases, the 'name' field may contain multiple path components (e.g.
|
|
|
|
/// /path/to/file). However, any directory that contains more than one child
|
|
|
|
/// must be uniquely represented by a directory entry.
|
2015-10-07 18:05:44 +08:00
|
|
|
class RedirectingFileSystem : public vfs::FileSystem {
|
2018-03-29 06:09:09 +08:00
|
|
|
friend class RedirectingFileSystemParser;
|
|
|
|
|
2015-10-07 18:05:44 +08:00
|
|
|
/// The root(s) of the virtual file system.
|
|
|
|
std::vector<std::unique_ptr<Entry>> Roots;
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2018-05-09 09:00:01 +08:00
|
|
|
/// The file system to use for external references.
|
2014-02-22 07:39:37 +08:00
|
|
|
IntrusiveRefCntPtr<FileSystem> ExternalFS;
|
2018-03-29 06:09:09 +08:00
|
|
|
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
/// If IsRelativeOverlay is set, this represents the directory
|
|
|
|
/// path that should be prefixed to each 'external-contents' entry
|
|
|
|
/// when reading from YAML files.
|
|
|
|
std::string ExternalContentsPrefixDir;
|
2014-02-22 07:39:37 +08:00
|
|
|
|
|
|
|
/// @name Configuration
|
|
|
|
/// @{
|
|
|
|
|
2018-05-09 09:00:01 +08:00
|
|
|
/// Whether to perform case-sensitive comparisons.
|
2014-02-22 07:39:37 +08:00
|
|
|
///
|
|
|
|
/// Currently, case-insensitive matching only works correctly with ASCII.
|
2016-04-14 03:28:16 +08:00
|
|
|
bool CaseSensitive = true;
|
2014-02-27 08:25:12 +08:00
|
|
|
|
2018-08-08 09:28:37 +08:00
|
|
|
/// IsRelativeOverlay marks whether a ExternalContentsPrefixDir path must
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
/// be prefixed in every 'external-contents' when reading from YAML files.
|
|
|
|
bool IsRelativeOverlay = false;
|
|
|
|
|
2018-05-09 09:00:01 +08:00
|
|
|
/// Whether to use to use the value of 'external-contents' for the
|
2014-02-27 08:25:12 +08:00
|
|
|
/// names of files. This global value is overridable on a per-file basis.
|
2016-04-14 03:28:16 +08:00
|
|
|
bool UseExternalNames = true;
|
2016-08-12 09:50:53 +08:00
|
|
|
|
2018-05-09 09:00:01 +08:00
|
|
|
/// Whether an invalid path obtained via 'external-contents' should
|
2016-08-12 09:50:53 +08:00
|
|
|
/// cause iteration on the VFS to stop. If 'true', the VFS should ignore
|
|
|
|
/// the entry and continue with the next. Allows YAML files to be shared
|
|
|
|
/// across multiple compiler invocations regardless of prior existent
|
|
|
|
/// paths in 'external-contents'. This global value is overridable on a
|
|
|
|
/// per-file basis.
|
|
|
|
bool IgnoreNonExistentContents = true;
|
2014-02-22 07:39:37 +08:00
|
|
|
/// @}
|
|
|
|
|
2016-03-17 10:20:43 +08:00
|
|
|
/// Virtual file paths and external files could be canonicalized without "..",
|
|
|
|
/// "." and "./" in their paths. FIXME: some unittests currently fail on
|
|
|
|
/// win32 when using remove_dots and remove_leading_dotslash on paths.
|
|
|
|
bool UseCanonicalizedPaths =
|
2018-04-28 03:11:14 +08:00
|
|
|
#ifdef _WIN32
|
2016-03-17 10:20:43 +08:00
|
|
|
false;
|
|
|
|
#else
|
|
|
|
true;
|
|
|
|
#endif
|
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
private:
|
2015-10-07 18:05:44 +08:00
|
|
|
RedirectingFileSystem(IntrusiveRefCntPtr<FileSystem> ExternalFS)
|
2016-05-27 22:27:13 +08:00
|
|
|
: ExternalFS(std::move(ExternalFS)) {}
|
2014-02-22 07:39:37 +08:00
|
|
|
|
2018-05-09 09:00:01 +08:00
|
|
|
/// Looks up the path <tt>[Start, End)</tt> in \p From, possibly
|
2014-02-22 07:39:37 +08:00
|
|
|
/// recursing into the contents of \p From if it is a directory.
|
|
|
|
ErrorOr<Entry *> lookupPath(sys::path::const_iterator Start,
|
|
|
|
sys::path::const_iterator End, Entry *From);
|
|
|
|
|
2018-05-09 09:00:01 +08:00
|
|
|
/// Get the status of a given an \c Entry.
|
2014-06-25 03:37:16 +08:00
|
|
|
ErrorOr<Status> status(const Twine &Path, Entry *E);
|
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
public:
|
2018-05-09 09:00:01 +08:00
|
|
|
/// Looks up \p Path in \c Roots.
|
2016-12-22 15:06:03 +08:00
|
|
|
ErrorOr<Entry *> lookupPath(const Twine &Path);
|
|
|
|
|
2018-05-09 09:00:01 +08:00
|
|
|
/// Parses \p Buffer, which is expected to be in YAML format and
|
2014-02-22 07:39:37 +08:00
|
|
|
/// returns a virtual file system representing its contents.
|
2015-10-07 18:05:44 +08:00
|
|
|
static RedirectingFileSystem *
|
|
|
|
create(std::unique_ptr<MemoryBuffer> Buffer,
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
SourceMgr::DiagHandlerTy DiagHandler, StringRef YAMLFilePath,
|
|
|
|
void *DiagContext, IntrusiveRefCntPtr<FileSystem> ExternalFS);
|
2014-02-22 07:39:37 +08:00
|
|
|
|
2014-03-02 17:32:10 +08:00
|
|
|
ErrorOr<Status> status(const Twine &Path) override;
|
2014-10-27 06:44:13 +08:00
|
|
|
ErrorOr<std::unique_ptr<File>> openFileForRead(const Twine &Path) override;
|
2014-06-25 03:37:16 +08:00
|
|
|
|
2015-10-05 21:55:20 +08:00
|
|
|
llvm::ErrorOr<std::string> getCurrentWorkingDirectory() const override {
|
|
|
|
return ExternalFS->getCurrentWorkingDirectory();
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2015-10-05 21:55:20 +08:00
|
|
|
std::error_code setCurrentWorkingDirectory(const Twine &Path) override {
|
|
|
|
return ExternalFS->setCurrentWorkingDirectory(Path);
|
|
|
|
}
|
|
|
|
|
2014-06-25 03:37:16 +08:00
|
|
|
directory_iterator dir_begin(const Twine &Dir, std::error_code &EC) override{
|
|
|
|
ErrorOr<Entry *> E = lookupPath(Dir);
|
|
|
|
if (!E) {
|
|
|
|
EC = E.getError();
|
2018-03-29 06:09:09 +08:00
|
|
|
return {};
|
2014-06-25 03:37:16 +08:00
|
|
|
}
|
|
|
|
ErrorOr<Status> S = status(Dir, *E);
|
|
|
|
if (!S) {
|
|
|
|
EC = S.getError();
|
2018-03-29 06:09:09 +08:00
|
|
|
return {};
|
2014-06-25 03:37:16 +08:00
|
|
|
}
|
|
|
|
if (!S->isDirectory()) {
|
|
|
|
EC = std::error_code(static_cast<int>(errc::not_a_directory),
|
|
|
|
std::system_category());
|
2018-03-29 06:09:09 +08:00
|
|
|
return {};
|
2014-06-25 03:37:16 +08:00
|
|
|
}
|
|
|
|
|
2015-10-09 21:28:13 +08:00
|
|
|
auto *D = cast<RedirectingDirectoryEntry>(*E);
|
2018-09-14 20:47:38 +08:00
|
|
|
return directory_iterator(std::make_shared<VFSFromYamlDirIterImpl>(
|
|
|
|
Dir, D->contents_begin(), D->contents_end(), EC));
|
2014-06-25 03:37:16 +08:00
|
|
|
}
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
|
|
|
|
void setExternalContentsPrefixDir(StringRef PrefixDir) {
|
|
|
|
ExternalContentsPrefixDir = PrefixDir.str();
|
|
|
|
}
|
|
|
|
|
|
|
|
StringRef getExternalContentsPrefixDir() const {
|
|
|
|
return ExternalContentsPrefixDir;
|
|
|
|
}
|
|
|
|
|
2016-08-12 09:50:53 +08:00
|
|
|
bool ignoreNonExistentContents() const {
|
|
|
|
return IgnoreNonExistentContents;
|
|
|
|
}
|
|
|
|
|
2016-05-07 07:21:57 +08:00
|
|
|
#if !defined(NDEBUG) || defined(LLVM_ENABLE_DUMP)
|
|
|
|
LLVM_DUMP_METHOD void dump() const {
|
2018-03-29 06:09:09 +08:00
|
|
|
for (const auto &Root : Roots)
|
2016-05-07 07:21:57 +08:00
|
|
|
dumpEntry(Root.get());
|
|
|
|
}
|
|
|
|
|
|
|
|
LLVM_DUMP_METHOD void dumpEntry(Entry *E, int NumSpaces = 0) const {
|
|
|
|
StringRef Name = E->getName();
|
|
|
|
for (int i = 0, e = NumSpaces; i < e; ++i)
|
|
|
|
dbgs() << " ";
|
|
|
|
dbgs() << "'" << Name.str().c_str() << "'" << "\n";
|
|
|
|
|
|
|
|
if (E->getKind() == EK_Directory) {
|
|
|
|
auto *DE = dyn_cast<RedirectingDirectoryEntry>(E);
|
|
|
|
assert(DE && "Should be a directory");
|
|
|
|
|
|
|
|
for (std::unique_ptr<Entry> &SubEntry :
|
|
|
|
llvm::make_range(DE->contents_begin(), DE->contents_end()))
|
|
|
|
dumpEntry(SubEntry.get(), NumSpaces+2);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2014-02-22 07:39:37 +08:00
|
|
|
};
|
|
|
|
|
2018-05-09 09:00:01 +08:00
|
|
|
/// A helper class to hold the common YAML parsing state.
|
2015-10-07 18:05:44 +08:00
|
|
|
class RedirectingFileSystemParser {
|
2014-02-22 07:39:37 +08:00
|
|
|
yaml::Stream &Stream;
|
|
|
|
|
|
|
|
void error(yaml::Node *N, const Twine &Msg) {
|
|
|
|
Stream.printError(N, Msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
// false on error
|
|
|
|
bool parseScalarString(yaml::Node *N, StringRef &Result,
|
|
|
|
SmallVectorImpl<char> &Storage) {
|
2018-03-29 06:09:09 +08:00
|
|
|
const auto *S = dyn_cast<yaml::ScalarNode>(N);
|
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
if (!S) {
|
|
|
|
error(N, "expected string");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
Result = S->getValue(Storage);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// false on error
|
|
|
|
bool parseScalarBool(yaml::Node *N, bool &Result) {
|
|
|
|
SmallString<5> Storage;
|
|
|
|
StringRef Value;
|
|
|
|
if (!parseScalarString(N, Value, Storage))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (Value.equals_lower("true") || Value.equals_lower("on") ||
|
|
|
|
Value.equals_lower("yes") || Value == "1") {
|
|
|
|
Result = true;
|
|
|
|
return true;
|
|
|
|
} else if (Value.equals_lower("false") || Value.equals_lower("off") ||
|
|
|
|
Value.equals_lower("no") || Value == "0") {
|
|
|
|
Result = false;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
error(N, "expected boolean value");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct KeyStatus {
|
|
|
|
bool Required;
|
2018-03-29 06:09:09 +08:00
|
|
|
bool Seen = false;
|
|
|
|
|
|
|
|
KeyStatus(bool Required = false) : Required(Required) {}
|
2014-02-22 07:39:37 +08:00
|
|
|
};
|
2018-03-29 06:09:09 +08:00
|
|
|
|
|
|
|
using KeyStatusPair = std::pair<StringRef, KeyStatus>;
|
2014-02-22 07:39:37 +08:00
|
|
|
|
|
|
|
// false on error
|
|
|
|
bool checkDuplicateOrUnknownKey(yaml::Node *KeyNode, StringRef Key,
|
|
|
|
DenseMap<StringRef, KeyStatus> &Keys) {
|
|
|
|
if (!Keys.count(Key)) {
|
|
|
|
error(KeyNode, "unknown key");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
KeyStatus &S = Keys[Key];
|
|
|
|
if (S.Seen) {
|
|
|
|
error(KeyNode, Twine("duplicate key '") + Key + "'");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
S.Seen = true;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// false on error
|
|
|
|
bool checkMissingKeys(yaml::Node *Obj, DenseMap<StringRef, KeyStatus> &Keys) {
|
2018-03-29 06:09:09 +08:00
|
|
|
for (const auto &I : Keys) {
|
|
|
|
if (I.second.Required && !I.second.Seen) {
|
|
|
|
error(Obj, Twine("missing key '") + I.first + "'");
|
2014-02-22 07:39:37 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
[VFS] Reapply #2: Reconstruct the VFS overlay tree for more accurate lookup
Reapply r269100 and r269270, reverted due to
https://llvm.org/bugs/show_bug.cgi?id=27725. Isolate the testcase that
corresponds to the new feature side of this commit and skip it on
windows hosts until we find why it does not work on these platforms.
Original commit message:
The way we currently build the internal VFS overlay representation leads
to inefficient path search and might yield wrong answers when asked for
recursive or regular directory iteration.
Currently, when reading an YAML file, each YAML root entry is placed
inside a new root in the filesystem overlay. In the crash reproducer, a
simple "@import Foundation" currently maps to 43 roots, and when looking
up paths, we traverse a directory tree for each of these different
roots, until we find a match (or don't). This has two consequences:
- It's slow.
- Directory iteration gives incomplete results since it only return
results within one root - since contents of the same directory can be
declared inside different roots, the result isn't accurate.
This is in part fault of the way we currently write out the YAML file
when emitting the crash reproducer - we could generate only one root and
that would make it fast and correct again. However, we should not rely
on how the client writes the YAML, but provide a good internal
representation regardless.
Build a proper virtual directory tree out of the YAML representation,
allowing faster search and proper iteration. Besides the crash
reproducer, this potentially benefits other VFS clients.
llvm-svn: 269327
2016-05-13 03:13:07 +08:00
|
|
|
Entry *lookupOrCreateEntry(RedirectingFileSystem *FS, StringRef Name,
|
|
|
|
Entry *ParentEntry = nullptr) {
|
|
|
|
if (!ParentEntry) { // Look for a existent root
|
2018-03-29 06:09:09 +08:00
|
|
|
for (const auto &Root : FS->Roots) {
|
[VFS] Reapply #2: Reconstruct the VFS overlay tree for more accurate lookup
Reapply r269100 and r269270, reverted due to
https://llvm.org/bugs/show_bug.cgi?id=27725. Isolate the testcase that
corresponds to the new feature side of this commit and skip it on
windows hosts until we find why it does not work on these platforms.
Original commit message:
The way we currently build the internal VFS overlay representation leads
to inefficient path search and might yield wrong answers when asked for
recursive or regular directory iteration.
Currently, when reading an YAML file, each YAML root entry is placed
inside a new root in the filesystem overlay. In the crash reproducer, a
simple "@import Foundation" currently maps to 43 roots, and when looking
up paths, we traverse a directory tree for each of these different
roots, until we find a match (or don't). This has two consequences:
- It's slow.
- Directory iteration gives incomplete results since it only return
results within one root - since contents of the same directory can be
declared inside different roots, the result isn't accurate.
This is in part fault of the way we currently write out the YAML file
when emitting the crash reproducer - we could generate only one root and
that would make it fast and correct again. However, we should not rely
on how the client writes the YAML, but provide a good internal
representation regardless.
Build a proper virtual directory tree out of the YAML representation,
allowing faster search and proper iteration. Besides the crash
reproducer, this potentially benefits other VFS clients.
llvm-svn: 269327
2016-05-13 03:13:07 +08:00
|
|
|
if (Name.equals(Root->getName())) {
|
|
|
|
ParentEntry = Root.get();
|
|
|
|
return ParentEntry;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else { // Advance to the next component
|
|
|
|
auto *DE = dyn_cast<RedirectingDirectoryEntry>(ParentEntry);
|
|
|
|
for (std::unique_ptr<Entry> &Content :
|
|
|
|
llvm::make_range(DE->contents_begin(), DE->contents_end())) {
|
|
|
|
auto *DirContent = dyn_cast<RedirectingDirectoryEntry>(Content.get());
|
|
|
|
if (DirContent && Name.equals(Content->getName()))
|
|
|
|
return DirContent;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ... or create a new one
|
|
|
|
std::unique_ptr<Entry> E = llvm::make_unique<RedirectingDirectoryEntry>(
|
2016-11-09 18:52:22 +08:00
|
|
|
Name,
|
|
|
|
Status("", getNextVirtualUniqueID(), std::chrono::system_clock::now(),
|
|
|
|
0, 0, 0, file_type::directory_file, sys::fs::all_all));
|
[VFS] Reapply #2: Reconstruct the VFS overlay tree for more accurate lookup
Reapply r269100 and r269270, reverted due to
https://llvm.org/bugs/show_bug.cgi?id=27725. Isolate the testcase that
corresponds to the new feature side of this commit and skip it on
windows hosts until we find why it does not work on these platforms.
Original commit message:
The way we currently build the internal VFS overlay representation leads
to inefficient path search and might yield wrong answers when asked for
recursive or regular directory iteration.
Currently, when reading an YAML file, each YAML root entry is placed
inside a new root in the filesystem overlay. In the crash reproducer, a
simple "@import Foundation" currently maps to 43 roots, and when looking
up paths, we traverse a directory tree for each of these different
roots, until we find a match (or don't). This has two consequences:
- It's slow.
- Directory iteration gives incomplete results since it only return
results within one root - since contents of the same directory can be
declared inside different roots, the result isn't accurate.
This is in part fault of the way we currently write out the YAML file
when emitting the crash reproducer - we could generate only one root and
that would make it fast and correct again. However, we should not rely
on how the client writes the YAML, but provide a good internal
representation regardless.
Build a proper virtual directory tree out of the YAML representation,
allowing faster search and proper iteration. Besides the crash
reproducer, this potentially benefits other VFS clients.
llvm-svn: 269327
2016-05-13 03:13:07 +08:00
|
|
|
|
|
|
|
if (!ParentEntry) { // Add a new root to the overlay
|
|
|
|
FS->Roots.push_back(std::move(E));
|
|
|
|
ParentEntry = FS->Roots.back().get();
|
|
|
|
return ParentEntry;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto *DE = dyn_cast<RedirectingDirectoryEntry>(ParentEntry);
|
|
|
|
DE->addContent(std::move(E));
|
|
|
|
return DE->getLastContent();
|
|
|
|
}
|
|
|
|
|
|
|
|
void uniqueOverlayTree(RedirectingFileSystem *FS, Entry *SrcE,
|
|
|
|
Entry *NewParentE = nullptr) {
|
|
|
|
StringRef Name = SrcE->getName();
|
|
|
|
switch (SrcE->getKind()) {
|
|
|
|
case EK_Directory: {
|
|
|
|
auto *DE = dyn_cast<RedirectingDirectoryEntry>(SrcE);
|
|
|
|
assert(DE && "Must be a directory");
|
|
|
|
// Empty directories could be present in the YAML as a way to
|
|
|
|
// describe a file for a current directory after some of its subdir
|
|
|
|
// is parsed. This only leads to redundant walks, ignore it.
|
|
|
|
if (!Name.empty())
|
|
|
|
NewParentE = lookupOrCreateEntry(FS, Name, NewParentE);
|
|
|
|
for (std::unique_ptr<Entry> &SubEntry :
|
|
|
|
llvm::make_range(DE->contents_begin(), DE->contents_end()))
|
|
|
|
uniqueOverlayTree(FS, SubEntry.get(), NewParentE);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case EK_File: {
|
|
|
|
auto *FE = dyn_cast<RedirectingFileEntry>(SrcE);
|
|
|
|
assert(FE && "Must be a file");
|
|
|
|
assert(NewParentE && "Parent entry must exist");
|
|
|
|
auto *DE = dyn_cast<RedirectingDirectoryEntry>(NewParentE);
|
|
|
|
DE->addContent(llvm::make_unique<RedirectingFileEntry>(
|
|
|
|
Name, FE->getExternalContentsPath(), FE->getUseName()));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-08 03:05:41 +08:00
|
|
|
std::unique_ptr<Entry> parseEntry(yaml::Node *N, RedirectingFileSystem *FS,
|
|
|
|
bool IsRootEntry) {
|
2018-03-29 06:09:09 +08:00
|
|
|
auto *M = dyn_cast<yaml::MappingNode>(N);
|
2014-02-22 07:39:37 +08:00
|
|
|
if (!M) {
|
|
|
|
error(N, "expected mapping node for file or directory entry");
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
KeyStatusPair Fields[] = {
|
|
|
|
KeyStatusPair("name", true),
|
|
|
|
KeyStatusPair("type", true),
|
|
|
|
KeyStatusPair("contents", false),
|
2014-02-27 08:25:12 +08:00
|
|
|
KeyStatusPair("external-contents", false),
|
|
|
|
KeyStatusPair("use-external-name", false),
|
2014-02-22 07:39:37 +08:00
|
|
|
};
|
|
|
|
|
2015-11-30 11:11:10 +08:00
|
|
|
DenseMap<StringRef, KeyStatus> Keys(std::begin(Fields), std::end(Fields));
|
2014-02-22 07:39:37 +08:00
|
|
|
|
|
|
|
bool HasContents = false; // external or otherwise
|
2015-10-07 18:05:44 +08:00
|
|
|
std::vector<std::unique_ptr<Entry>> EntryArrayContents;
|
2014-02-22 07:39:37 +08:00
|
|
|
std::string ExternalContentsPath;
|
|
|
|
std::string Name;
|
2018-08-08 03:05:41 +08:00
|
|
|
yaml::Node *NameValueNode;
|
2015-10-09 21:28:13 +08:00
|
|
|
auto UseExternalName = RedirectingFileEntry::NK_NotSet;
|
2014-02-22 07:39:37 +08:00
|
|
|
EntryKind Kind;
|
|
|
|
|
2018-03-29 06:09:09 +08:00
|
|
|
for (auto &I : *M) {
|
2014-02-22 07:39:37 +08:00
|
|
|
StringRef Key;
|
|
|
|
// Reuse the buffer for key and value, since we don't look at key after
|
|
|
|
// parsing value.
|
|
|
|
SmallString<256> Buffer;
|
2018-03-29 06:09:09 +08:00
|
|
|
if (!parseScalarString(I.getKey(), Key, Buffer))
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2014-02-22 07:39:37 +08:00
|
|
|
|
2018-03-29 06:09:09 +08:00
|
|
|
if (!checkDuplicateOrUnknownKey(I.getKey(), Key, Keys))
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2014-02-22 07:39:37 +08:00
|
|
|
|
|
|
|
StringRef Value;
|
|
|
|
if (Key == "name") {
|
2018-03-29 06:09:09 +08:00
|
|
|
if (!parseScalarString(I.getValue(), Value, Buffer))
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2016-03-17 10:20:43 +08:00
|
|
|
|
2018-08-08 03:05:41 +08:00
|
|
|
NameValueNode = I.getValue();
|
2016-03-17 10:20:43 +08:00
|
|
|
if (FS->UseCanonicalizedPaths) {
|
|
|
|
SmallString<256> Path(Value);
|
|
|
|
// Guarantee that old YAML files containing paths with ".." and "."
|
|
|
|
// are properly canonicalized before read into the VFS.
|
|
|
|
Path = sys::path::remove_leading_dotslash(Path);
|
|
|
|
sys::path::remove_dots(Path, /*remove_dot_dot=*/true);
|
|
|
|
Name = Path.str();
|
|
|
|
} else {
|
|
|
|
Name = Value;
|
|
|
|
}
|
2014-02-22 07:39:37 +08:00
|
|
|
} else if (Key == "type") {
|
2018-03-29 06:09:09 +08:00
|
|
|
if (!parseScalarString(I.getValue(), Value, Buffer))
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2014-02-22 07:39:37 +08:00
|
|
|
if (Value == "file")
|
|
|
|
Kind = EK_File;
|
|
|
|
else if (Value == "directory")
|
|
|
|
Kind = EK_Directory;
|
|
|
|
else {
|
2018-03-29 06:09:09 +08:00
|
|
|
error(I.getValue(), "unknown value for 'type'");
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
} else if (Key == "contents") {
|
|
|
|
if (HasContents) {
|
2018-03-29 06:09:09 +08:00
|
|
|
error(I.getKey(),
|
2014-02-22 07:39:37 +08:00
|
|
|
"entry already has 'contents' or 'external-contents'");
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
HasContents = true;
|
2018-03-29 06:09:09 +08:00
|
|
|
auto *Contents = dyn_cast<yaml::SequenceNode>(I.getValue());
|
2014-02-22 07:39:37 +08:00
|
|
|
if (!Contents) {
|
|
|
|
// FIXME: this is only for directories, what about files?
|
2018-03-29 06:09:09 +08:00
|
|
|
error(I.getValue(), "expected array");
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
|
2018-03-29 06:09:09 +08:00
|
|
|
for (auto &I : *Contents) {
|
2018-08-08 03:05:41 +08:00
|
|
|
if (std::unique_ptr<Entry> E =
|
|
|
|
parseEntry(&I, FS, /*IsRootEntry*/ false))
|
2015-10-07 18:05:44 +08:00
|
|
|
EntryArrayContents.push_back(std::move(E));
|
2014-02-22 07:39:37 +08:00
|
|
|
else
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
} else if (Key == "external-contents") {
|
|
|
|
if (HasContents) {
|
2018-03-29 06:09:09 +08:00
|
|
|
error(I.getKey(),
|
2014-02-22 07:39:37 +08:00
|
|
|
"entry already has 'contents' or 'external-contents'");
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
HasContents = true;
|
2018-03-29 06:09:09 +08:00
|
|
|
if (!parseScalarString(I.getValue(), Value, Buffer))
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
|
|
|
|
SmallString<256> FullPath;
|
|
|
|
if (FS->IsRelativeOverlay) {
|
|
|
|
FullPath = FS->getExternalContentsPrefixDir();
|
|
|
|
assert(!FullPath.empty() &&
|
|
|
|
"External contents prefix directory must exist");
|
|
|
|
llvm::sys::path::append(FullPath, Value);
|
|
|
|
} else {
|
|
|
|
FullPath = Value;
|
|
|
|
}
|
|
|
|
|
2016-03-17 10:20:43 +08:00
|
|
|
if (FS->UseCanonicalizedPaths) {
|
|
|
|
// Guarantee that old YAML files containing paths with ".." and "."
|
|
|
|
// are properly canonicalized before read into the VFS.
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
FullPath = sys::path::remove_leading_dotslash(FullPath);
|
|
|
|
sys::path::remove_dots(FullPath, /*remove_dot_dot=*/true);
|
2016-03-17 10:20:43 +08:00
|
|
|
}
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
ExternalContentsPath = FullPath.str();
|
2014-02-27 08:25:12 +08:00
|
|
|
} else if (Key == "use-external-name") {
|
|
|
|
bool Val;
|
2018-03-29 06:09:09 +08:00
|
|
|
if (!parseScalarBool(I.getValue(), Val))
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2015-10-09 21:28:13 +08:00
|
|
|
UseExternalName = Val ? RedirectingFileEntry::NK_External
|
|
|
|
: RedirectingFileEntry::NK_Virtual;
|
2014-02-22 07:39:37 +08:00
|
|
|
} else {
|
|
|
|
llvm_unreachable("key missing from Keys");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (Stream.failed())
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2014-02-22 07:39:37 +08:00
|
|
|
|
|
|
|
// check for missing keys
|
|
|
|
if (!HasContents) {
|
|
|
|
error(N, "missing key 'contents' or 'external-contents'");
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
if (!checkMissingKeys(N, Keys))
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2014-02-22 07:39:37 +08:00
|
|
|
|
2014-02-27 08:25:12 +08:00
|
|
|
// check invalid configuration
|
2015-10-09 21:28:13 +08:00
|
|
|
if (Kind == EK_Directory &&
|
|
|
|
UseExternalName != RedirectingFileEntry::NK_NotSet) {
|
2014-02-27 08:25:12 +08:00
|
|
|
error(N, "'use-external-name' is not supported for directories");
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2014-02-27 08:25:12 +08:00
|
|
|
}
|
|
|
|
|
2018-08-08 03:05:41 +08:00
|
|
|
if (IsRootEntry && !sys::path::is_absolute(Name)) {
|
|
|
|
assert(NameValueNode && "Name presence should be checked earlier");
|
|
|
|
error(NameValueNode,
|
|
|
|
"entry with relative path at the root level is not discoverable");
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2014-03-06 05:32:20 +08:00
|
|
|
// Remove trailing slash(es), being careful not to remove the root path
|
2014-02-25 12:34:14 +08:00
|
|
|
StringRef Trimmed(Name);
|
2014-03-06 05:32:20 +08:00
|
|
|
size_t RootPathLen = sys::path::root_path(Trimmed).size();
|
|
|
|
while (Trimmed.size() > RootPathLen &&
|
|
|
|
sys::path::is_separator(Trimmed.back()))
|
2014-02-25 12:34:14 +08:00
|
|
|
Trimmed = Trimmed.slice(0, Trimmed.size()-1);
|
|
|
|
// Get the last component
|
|
|
|
StringRef LastComponent = sys::path::filename(Trimmed);
|
|
|
|
|
2015-10-07 18:05:44 +08:00
|
|
|
std::unique_ptr<Entry> Result;
|
2014-02-22 07:39:37 +08:00
|
|
|
switch (Kind) {
|
|
|
|
case EK_File:
|
2015-10-09 21:28:13 +08:00
|
|
|
Result = llvm::make_unique<RedirectingFileEntry>(
|
2015-10-07 18:05:44 +08:00
|
|
|
LastComponent, std::move(ExternalContentsPath), UseExternalName);
|
2014-02-25 12:34:14 +08:00
|
|
|
break;
|
2014-02-22 07:39:37 +08:00
|
|
|
case EK_Directory:
|
2015-10-09 21:28:13 +08:00
|
|
|
Result = llvm::make_unique<RedirectingDirectoryEntry>(
|
2015-10-05 21:15:33 +08:00
|
|
|
LastComponent, std::move(EntryArrayContents),
|
2016-11-09 18:52:22 +08:00
|
|
|
Status("", getNextVirtualUniqueID(), std::chrono::system_clock::now(),
|
|
|
|
0, 0, 0, file_type::directory_file, sys::fs::all_all));
|
2014-02-25 12:34:14 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
StringRef Parent = sys::path::parent_path(Trimmed);
|
|
|
|
if (Parent.empty())
|
|
|
|
return Result;
|
|
|
|
|
|
|
|
// if 'name' contains multiple components, create implicit directory entries
|
|
|
|
for (sys::path::reverse_iterator I = sys::path::rbegin(Parent),
|
|
|
|
E = sys::path::rend(Parent);
|
|
|
|
I != E; ++I) {
|
2015-10-07 18:05:44 +08:00
|
|
|
std::vector<std::unique_ptr<Entry>> Entries;
|
|
|
|
Entries.push_back(std::move(Result));
|
2015-10-09 21:28:13 +08:00
|
|
|
Result = llvm::make_unique<RedirectingDirectoryEntry>(
|
2015-10-07 18:05:44 +08:00
|
|
|
*I, std::move(Entries),
|
2016-11-09 18:52:22 +08:00
|
|
|
Status("", getNextVirtualUniqueID(), std::chrono::system_clock::now(),
|
|
|
|
0, 0, 0, file_type::directory_file, sys::fs::all_all));
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
2014-02-25 12:34:14 +08:00
|
|
|
return Result;
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
public:
|
2015-10-07 18:05:44 +08:00
|
|
|
RedirectingFileSystemParser(yaml::Stream &S) : Stream(S) {}
|
2014-02-22 07:39:37 +08:00
|
|
|
|
|
|
|
// false on error
|
2015-10-07 18:05:44 +08:00
|
|
|
bool parse(yaml::Node *Root, RedirectingFileSystem *FS) {
|
2018-03-29 06:09:09 +08:00
|
|
|
auto *Top = dyn_cast<yaml::MappingNode>(Root);
|
2014-02-22 07:39:37 +08:00
|
|
|
if (!Top) {
|
|
|
|
error(Root, "expected mapping node");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
KeyStatusPair Fields[] = {
|
|
|
|
KeyStatusPair("version", true),
|
|
|
|
KeyStatusPair("case-sensitive", false),
|
2014-02-27 08:25:12 +08:00
|
|
|
KeyStatusPair("use-external-names", false),
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
KeyStatusPair("overlay-relative", false),
|
2016-08-12 09:50:53 +08:00
|
|
|
KeyStatusPair("ignore-non-existent-contents", false),
|
2014-02-22 07:39:37 +08:00
|
|
|
KeyStatusPair("roots", true),
|
|
|
|
};
|
|
|
|
|
2015-11-30 11:11:10 +08:00
|
|
|
DenseMap<StringRef, KeyStatus> Keys(std::begin(Fields), std::end(Fields));
|
[VFS] Reapply #2: Reconstruct the VFS overlay tree for more accurate lookup
Reapply r269100 and r269270, reverted due to
https://llvm.org/bugs/show_bug.cgi?id=27725. Isolate the testcase that
corresponds to the new feature side of this commit and skip it on
windows hosts until we find why it does not work on these platforms.
Original commit message:
The way we currently build the internal VFS overlay representation leads
to inefficient path search and might yield wrong answers when asked for
recursive or regular directory iteration.
Currently, when reading an YAML file, each YAML root entry is placed
inside a new root in the filesystem overlay. In the crash reproducer, a
simple "@import Foundation" currently maps to 43 roots, and when looking
up paths, we traverse a directory tree for each of these different
roots, until we find a match (or don't). This has two consequences:
- It's slow.
- Directory iteration gives incomplete results since it only return
results within one root - since contents of the same directory can be
declared inside different roots, the result isn't accurate.
This is in part fault of the way we currently write out the YAML file
when emitting the crash reproducer - we could generate only one root and
that would make it fast and correct again. However, we should not rely
on how the client writes the YAML, but provide a good internal
representation regardless.
Build a proper virtual directory tree out of the YAML representation,
allowing faster search and proper iteration. Besides the crash
reproducer, this potentially benefits other VFS clients.
llvm-svn: 269327
2016-05-13 03:13:07 +08:00
|
|
|
std::vector<std::unique_ptr<Entry>> RootEntries;
|
2014-02-22 07:39:37 +08:00
|
|
|
|
|
|
|
// Parse configuration and 'roots'
|
2018-03-29 06:09:09 +08:00
|
|
|
for (auto &I : *Top) {
|
2014-02-22 07:39:37 +08:00
|
|
|
SmallString<10> KeyBuffer;
|
|
|
|
StringRef Key;
|
2018-03-29 06:09:09 +08:00
|
|
|
if (!parseScalarString(I.getKey(), Key, KeyBuffer))
|
2014-02-22 07:39:37 +08:00
|
|
|
return false;
|
|
|
|
|
2018-03-29 06:09:09 +08:00
|
|
|
if (!checkDuplicateOrUnknownKey(I.getKey(), Key, Keys))
|
2014-02-22 07:39:37 +08:00
|
|
|
return false;
|
|
|
|
|
|
|
|
if (Key == "roots") {
|
2018-03-29 06:09:09 +08:00
|
|
|
auto *Roots = dyn_cast<yaml::SequenceNode>(I.getValue());
|
2014-02-22 07:39:37 +08:00
|
|
|
if (!Roots) {
|
2018-03-29 06:09:09 +08:00
|
|
|
error(I.getValue(), "expected array");
|
2014-02-22 07:39:37 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2018-03-29 06:09:09 +08:00
|
|
|
for (auto &I : *Roots) {
|
2018-08-08 03:05:41 +08:00
|
|
|
if (std::unique_ptr<Entry> E =
|
|
|
|
parseEntry(&I, FS, /*IsRootEntry*/ true))
|
[VFS] Reapply #2: Reconstruct the VFS overlay tree for more accurate lookup
Reapply r269100 and r269270, reverted due to
https://llvm.org/bugs/show_bug.cgi?id=27725. Isolate the testcase that
corresponds to the new feature side of this commit and skip it on
windows hosts until we find why it does not work on these platforms.
Original commit message:
The way we currently build the internal VFS overlay representation leads
to inefficient path search and might yield wrong answers when asked for
recursive or regular directory iteration.
Currently, when reading an YAML file, each YAML root entry is placed
inside a new root in the filesystem overlay. In the crash reproducer, a
simple "@import Foundation" currently maps to 43 roots, and when looking
up paths, we traverse a directory tree for each of these different
roots, until we find a match (or don't). This has two consequences:
- It's slow.
- Directory iteration gives incomplete results since it only return
results within one root - since contents of the same directory can be
declared inside different roots, the result isn't accurate.
This is in part fault of the way we currently write out the YAML file
when emitting the crash reproducer - we could generate only one root and
that would make it fast and correct again. However, we should not rely
on how the client writes the YAML, but provide a good internal
representation regardless.
Build a proper virtual directory tree out of the YAML representation,
allowing faster search and proper iteration. Besides the crash
reproducer, this potentially benefits other VFS clients.
llvm-svn: 269327
2016-05-13 03:13:07 +08:00
|
|
|
RootEntries.push_back(std::move(E));
|
2014-02-22 07:39:37 +08:00
|
|
|
else
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
} else if (Key == "version") {
|
|
|
|
StringRef VersionString;
|
|
|
|
SmallString<4> Storage;
|
2018-03-29 06:09:09 +08:00
|
|
|
if (!parseScalarString(I.getValue(), VersionString, Storage))
|
2014-02-22 07:39:37 +08:00
|
|
|
return false;
|
|
|
|
int Version;
|
|
|
|
if (VersionString.getAsInteger<int>(10, Version)) {
|
2018-03-29 06:09:09 +08:00
|
|
|
error(I.getValue(), "expected integer");
|
2014-02-22 07:39:37 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (Version < 0) {
|
2018-03-29 06:09:09 +08:00
|
|
|
error(I.getValue(), "invalid version number");
|
2014-02-22 07:39:37 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (Version != 0) {
|
2018-03-29 06:09:09 +08:00
|
|
|
error(I.getValue(), "version mismatch, expected 0");
|
2014-02-22 07:39:37 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
} else if (Key == "case-sensitive") {
|
2018-03-29 06:09:09 +08:00
|
|
|
if (!parseScalarBool(I.getValue(), FS->CaseSensitive))
|
2014-02-22 07:39:37 +08:00
|
|
|
return false;
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
} else if (Key == "overlay-relative") {
|
2018-03-29 06:09:09 +08:00
|
|
|
if (!parseScalarBool(I.getValue(), FS->IsRelativeOverlay))
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
return false;
|
2014-02-27 08:25:12 +08:00
|
|
|
} else if (Key == "use-external-names") {
|
2018-03-29 06:09:09 +08:00
|
|
|
if (!parseScalarBool(I.getValue(), FS->UseExternalNames))
|
2014-02-27 08:25:12 +08:00
|
|
|
return false;
|
2016-08-12 09:50:53 +08:00
|
|
|
} else if (Key == "ignore-non-existent-contents") {
|
2018-03-29 06:09:09 +08:00
|
|
|
if (!parseScalarBool(I.getValue(), FS->IgnoreNonExistentContents))
|
2016-08-12 09:50:53 +08:00
|
|
|
return false;
|
2014-02-22 07:39:37 +08:00
|
|
|
} else {
|
|
|
|
llvm_unreachable("key missing from Keys");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (Stream.failed())
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (!checkMissingKeys(Top, Keys))
|
|
|
|
return false;
|
[VFS] Reapply #2: Reconstruct the VFS overlay tree for more accurate lookup
Reapply r269100 and r269270, reverted due to
https://llvm.org/bugs/show_bug.cgi?id=27725. Isolate the testcase that
corresponds to the new feature side of this commit and skip it on
windows hosts until we find why it does not work on these platforms.
Original commit message:
The way we currently build the internal VFS overlay representation leads
to inefficient path search and might yield wrong answers when asked for
recursive or regular directory iteration.
Currently, when reading an YAML file, each YAML root entry is placed
inside a new root in the filesystem overlay. In the crash reproducer, a
simple "@import Foundation" currently maps to 43 roots, and when looking
up paths, we traverse a directory tree for each of these different
roots, until we find a match (or don't). This has two consequences:
- It's slow.
- Directory iteration gives incomplete results since it only return
results within one root - since contents of the same directory can be
declared inside different roots, the result isn't accurate.
This is in part fault of the way we currently write out the YAML file
when emitting the crash reproducer - we could generate only one root and
that would make it fast and correct again. However, we should not rely
on how the client writes the YAML, but provide a good internal
representation regardless.
Build a proper virtual directory tree out of the YAML representation,
allowing faster search and proper iteration. Besides the crash
reproducer, this potentially benefits other VFS clients.
llvm-svn: 269327
2016-05-13 03:13:07 +08:00
|
|
|
|
|
|
|
// Now that we sucessefully parsed the YAML file, canonicalize the internal
|
|
|
|
// representation to a proper directory tree so that we can search faster
|
|
|
|
// inside the VFS.
|
2018-03-29 06:09:09 +08:00
|
|
|
for (auto &E : RootEntries)
|
[VFS] Reapply #2: Reconstruct the VFS overlay tree for more accurate lookup
Reapply r269100 and r269270, reverted due to
https://llvm.org/bugs/show_bug.cgi?id=27725. Isolate the testcase that
corresponds to the new feature side of this commit and skip it on
windows hosts until we find why it does not work on these platforms.
Original commit message:
The way we currently build the internal VFS overlay representation leads
to inefficient path search and might yield wrong answers when asked for
recursive or regular directory iteration.
Currently, when reading an YAML file, each YAML root entry is placed
inside a new root in the filesystem overlay. In the crash reproducer, a
simple "@import Foundation" currently maps to 43 roots, and when looking
up paths, we traverse a directory tree for each of these different
roots, until we find a match (or don't). This has two consequences:
- It's slow.
- Directory iteration gives incomplete results since it only return
results within one root - since contents of the same directory can be
declared inside different roots, the result isn't accurate.
This is in part fault of the way we currently write out the YAML file
when emitting the crash reproducer - we could generate only one root and
that would make it fast and correct again. However, we should not rely
on how the client writes the YAML, but provide a good internal
representation regardless.
Build a proper virtual directory tree out of the YAML representation,
allowing faster search and proper iteration. Besides the crash
reproducer, this potentially benefits other VFS clients.
llvm-svn: 269327
2016-05-13 03:13:07 +08:00
|
|
|
uniqueOverlayTree(FS, E.get());
|
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2018-03-29 06:09:09 +08:00
|
|
|
} // namespace
|
2014-02-22 07:39:37 +08:00
|
|
|
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
RedirectingFileSystem *
|
|
|
|
RedirectingFileSystem::create(std::unique_ptr<MemoryBuffer> Buffer,
|
|
|
|
SourceMgr::DiagHandlerTy DiagHandler,
|
|
|
|
StringRef YAMLFilePath, void *DiagContext,
|
|
|
|
IntrusiveRefCntPtr<FileSystem> ExternalFS) {
|
2014-02-22 07:39:37 +08:00
|
|
|
SourceMgr SM;
|
2014-08-28 03:03:27 +08:00
|
|
|
yaml::Stream Stream(Buffer->getMemBufferRef(), SM);
|
2014-02-22 07:39:37 +08:00
|
|
|
|
2014-02-25 04:56:37 +08:00
|
|
|
SM.setDiagHandler(DiagHandler, DiagContext);
|
2014-02-22 07:39:37 +08:00
|
|
|
yaml::document_iterator DI = Stream.begin();
|
|
|
|
yaml::Node *Root = DI->getRoot();
|
|
|
|
if (DI == Stream.end() || !Root) {
|
|
|
|
SM.PrintMessage(SMLoc(), SourceMgr::DK_Error, "expected root node");
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
|
2015-10-07 18:05:44 +08:00
|
|
|
RedirectingFileSystemParser P(Stream);
|
2014-02-22 07:39:37 +08:00
|
|
|
|
2015-10-07 18:05:44 +08:00
|
|
|
std::unique_ptr<RedirectingFileSystem> FS(
|
2016-06-13 04:05:23 +08:00
|
|
|
new RedirectingFileSystem(std::move(ExternalFS)));
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
|
|
|
|
if (!YAMLFilePath.empty()) {
|
|
|
|
// Use the YAML path from -ivfsoverlay to compute the dir to be prefixed
|
|
|
|
// to each 'external-contents' path.
|
|
|
|
//
|
|
|
|
// Example:
|
|
|
|
// -ivfsoverlay dummy.cache/vfs/vfs.yaml
|
|
|
|
// yields:
|
|
|
|
// FS->ExternalContentsPrefixDir => /<absolute_path_to>/dummy.cache/vfs
|
|
|
|
//
|
|
|
|
SmallString<256> OverlayAbsDir = sys::path::parent_path(YAMLFilePath);
|
|
|
|
std::error_code EC = llvm::sys::fs::make_absolute(OverlayAbsDir);
|
|
|
|
assert(!EC && "Overlay dir final path must be absolute");
|
|
|
|
(void)EC;
|
|
|
|
FS->setExternalContentsPrefixDir(OverlayAbsDir);
|
|
|
|
}
|
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
if (!P.parse(Root, FS.get()))
|
2014-05-08 14:41:40 +08:00
|
|
|
return nullptr;
|
2014-02-22 07:39:37 +08:00
|
|
|
|
2014-03-08 03:33:25 +08:00
|
|
|
return FS.release();
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
|
2015-10-07 18:05:44 +08:00
|
|
|
ErrorOr<Entry *> RedirectingFileSystem::lookupPath(const Twine &Path_) {
|
2014-03-05 06:34:50 +08:00
|
|
|
SmallString<256> Path;
|
|
|
|
Path_.toVector(Path);
|
|
|
|
|
|
|
|
// Handle relative paths
|
2015-10-05 21:55:20 +08:00
|
|
|
if (std::error_code EC = makeAbsolute(Path))
|
2014-03-05 06:34:50 +08:00
|
|
|
return EC;
|
2014-02-22 07:39:37 +08:00
|
|
|
|
2016-03-17 10:20:43 +08:00
|
|
|
// Canonicalize path by removing ".", "..", "./", etc components. This is
|
|
|
|
// a VFS request, do bot bother about symlinks in the path components
|
|
|
|
// but canonicalize in order to perform the correct entry search.
|
|
|
|
if (UseCanonicalizedPaths) {
|
|
|
|
Path = sys::path::remove_leading_dotslash(Path);
|
|
|
|
sys::path::remove_dots(Path, /*remove_dot_dot=*/true);
|
|
|
|
}
|
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
if (Path.empty())
|
2014-06-14 01:20:50 +08:00
|
|
|
return make_error_code(llvm::errc::invalid_argument);
|
2014-02-22 07:39:37 +08:00
|
|
|
|
|
|
|
sys::path::const_iterator Start = sys::path::begin(Path);
|
|
|
|
sys::path::const_iterator End = sys::path::end(Path);
|
2018-03-29 06:09:09 +08:00
|
|
|
for (const auto &Root : Roots) {
|
2015-10-07 18:05:44 +08:00
|
|
|
ErrorOr<Entry *> Result = lookupPath(Start, End, Root.get());
|
2014-06-14 01:20:50 +08:00
|
|
|
if (Result || Result.getError() != llvm::errc::no_such_file_or_directory)
|
2014-02-22 07:39:37 +08:00
|
|
|
return Result;
|
|
|
|
}
|
2014-06-14 01:20:50 +08:00
|
|
|
return make_error_code(llvm::errc::no_such_file_or_directory);
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
|
2015-10-07 18:05:44 +08:00
|
|
|
ErrorOr<Entry *>
|
|
|
|
RedirectingFileSystem::lookupPath(sys::path::const_iterator Start,
|
|
|
|
sys::path::const_iterator End, Entry *From) {
|
2018-04-28 03:11:14 +08:00
|
|
|
#ifndef _WIN32
|
2016-03-17 10:20:43 +08:00
|
|
|
assert(!isTraversalComponent(*Start) &&
|
|
|
|
!isTraversalComponent(From->getName()) &&
|
|
|
|
"Paths should not contain traversal components");
|
|
|
|
#else
|
|
|
|
// FIXME: this is here to support windows, remove it once canonicalized
|
|
|
|
// paths become globally default.
|
2016-02-24 01:06:50 +08:00
|
|
|
if (Start->equals("."))
|
|
|
|
++Start;
|
2016-03-17 10:20:43 +08:00
|
|
|
#endif
|
2014-03-05 06:34:50 +08:00
|
|
|
|
2016-03-31 07:54:00 +08:00
|
|
|
StringRef FromName = From->getName();
|
2014-02-22 07:39:37 +08:00
|
|
|
|
2016-03-31 07:54:00 +08:00
|
|
|
// Forward the search to the next component in case this is an empty one.
|
|
|
|
if (!FromName.empty()) {
|
|
|
|
if (CaseSensitive ? !Start->equals(FromName)
|
|
|
|
: !Start->equals_lower(FromName))
|
|
|
|
// failure to match
|
|
|
|
return make_error_code(llvm::errc::no_such_file_or_directory);
|
2014-02-22 07:39:37 +08:00
|
|
|
|
2016-03-31 07:54:00 +08:00
|
|
|
++Start;
|
|
|
|
|
|
|
|
if (Start == End) {
|
|
|
|
// Match!
|
|
|
|
return From;
|
|
|
|
}
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
|
2015-10-09 21:28:13 +08:00
|
|
|
auto *DE = dyn_cast<RedirectingDirectoryEntry>(From);
|
2014-02-22 07:39:37 +08:00
|
|
|
if (!DE)
|
2014-06-14 01:20:50 +08:00
|
|
|
return make_error_code(llvm::errc::not_a_directory);
|
2014-02-22 07:39:37 +08:00
|
|
|
|
2015-10-07 18:05:44 +08:00
|
|
|
for (const std::unique_ptr<Entry> &DirEntry :
|
|
|
|
llvm::make_range(DE->contents_begin(), DE->contents_end())) {
|
|
|
|
ErrorOr<Entry *> Result = lookupPath(Start, End, DirEntry.get());
|
2014-06-14 01:20:50 +08:00
|
|
|
if (Result || Result.getError() != llvm::errc::no_such_file_or_directory)
|
2014-02-22 07:39:37 +08:00
|
|
|
return Result;
|
|
|
|
}
|
2014-06-14 01:20:50 +08:00
|
|
|
return make_error_code(llvm::errc::no_such_file_or_directory);
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
|
2015-12-11 07:41:39 +08:00
|
|
|
static Status getRedirectedFileStatus(const Twine &Path, bool UseExternalNames,
|
|
|
|
Status ExternalStatus) {
|
|
|
|
Status S = ExternalStatus;
|
|
|
|
if (!UseExternalNames)
|
2018-07-25 04:28:07 +08:00
|
|
|
S = Status::copyWithNewName(S, Path.str());
|
2015-12-11 07:41:39 +08:00
|
|
|
S.IsVFSMapped = true;
|
|
|
|
return S;
|
|
|
|
}
|
|
|
|
|
2015-10-07 18:05:44 +08:00
|
|
|
ErrorOr<Status> RedirectingFileSystem::status(const Twine &Path, Entry *E) {
|
2014-06-25 03:37:16 +08:00
|
|
|
assert(E != nullptr);
|
2015-10-09 21:28:13 +08:00
|
|
|
if (auto *F = dyn_cast<RedirectingFileEntry>(E)) {
|
2014-02-22 07:39:37 +08:00
|
|
|
ErrorOr<Status> S = ExternalFS->status(F->getExternalContentsPath());
|
2014-02-27 08:25:12 +08:00
|
|
|
assert(!S || S->getName() == F->getExternalContentsPath());
|
2014-05-24 02:15:47 +08:00
|
|
|
if (S)
|
2015-12-11 07:41:39 +08:00
|
|
|
return getRedirectedFileStatus(Path, F->useExternalName(UseExternalNames),
|
|
|
|
*S);
|
2014-02-22 07:39:37 +08:00
|
|
|
return S;
|
|
|
|
} else { // directory
|
2015-10-09 21:28:13 +08:00
|
|
|
auto *DE = cast<RedirectingDirectoryEntry>(E);
|
2018-07-25 04:28:07 +08:00
|
|
|
return Status::copyWithNewName(DE->getStatus(), Path.str());
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-07 18:05:44 +08:00
|
|
|
ErrorOr<Status> RedirectingFileSystem::status(const Twine &Path) {
|
2014-06-25 03:37:16 +08:00
|
|
|
ErrorOr<Entry *> Result = lookupPath(Path);
|
|
|
|
if (!Result)
|
|
|
|
return Result.getError();
|
|
|
|
return status(Path, *Result);
|
|
|
|
}
|
|
|
|
|
2015-10-05 21:55:09 +08:00
|
|
|
namespace {
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2015-12-11 07:41:39 +08:00
|
|
|
/// Provide a file wrapper with an overriden status.
|
|
|
|
class FileWithFixedStatus : public File {
|
2015-10-05 21:55:09 +08:00
|
|
|
std::unique_ptr<File> InnerFile;
|
2015-12-11 07:41:39 +08:00
|
|
|
Status S;
|
2015-10-05 21:55:09 +08:00
|
|
|
|
|
|
|
public:
|
2015-12-11 07:41:39 +08:00
|
|
|
FileWithFixedStatus(std::unique_ptr<File> InnerFile, Status S)
|
2016-05-27 22:27:13 +08:00
|
|
|
: InnerFile(std::move(InnerFile)), S(std::move(S)) {}
|
2015-12-11 07:41:39 +08:00
|
|
|
|
|
|
|
ErrorOr<Status> status() override { return S; }
|
|
|
|
ErrorOr<std::unique_ptr<llvm::MemoryBuffer>>
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2015-10-06 05:20:19 +08:00
|
|
|
getBuffer(const Twine &Name, int64_t FileSize, bool RequiresNullTerminator,
|
|
|
|
bool IsVolatile) override {
|
2015-10-05 21:55:09 +08:00
|
|
|
return InnerFile->getBuffer(Name, FileSize, RequiresNullTerminator,
|
|
|
|
IsVolatile);
|
|
|
|
}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2015-10-05 21:55:09 +08:00
|
|
|
std::error_code close() override { return InnerFile->close(); }
|
|
|
|
};
|
2018-03-29 06:09:09 +08:00
|
|
|
|
|
|
|
} // namespace
|
2015-10-05 21:55:09 +08:00
|
|
|
|
2015-10-07 18:05:44 +08:00
|
|
|
ErrorOr<std::unique_ptr<File>>
|
|
|
|
RedirectingFileSystem::openFileForRead(const Twine &Path) {
|
2014-02-22 07:39:37 +08:00
|
|
|
ErrorOr<Entry *> E = lookupPath(Path);
|
|
|
|
if (!E)
|
|
|
|
return E.getError();
|
|
|
|
|
2015-10-09 21:28:13 +08:00
|
|
|
auto *F = dyn_cast<RedirectingFileEntry>(*E);
|
2014-02-22 07:39:37 +08:00
|
|
|
if (!F) // FIXME: errc::not_a_file?
|
2014-06-14 01:20:50 +08:00
|
|
|
return make_error_code(llvm::errc::invalid_argument);
|
2014-02-22 07:39:37 +08:00
|
|
|
|
2014-10-27 06:44:13 +08:00
|
|
|
auto Result = ExternalFS->openFileForRead(F->getExternalContentsPath());
|
|
|
|
if (!Result)
|
|
|
|
return Result;
|
2014-03-01 05:16:07 +08:00
|
|
|
|
2015-12-11 07:41:39 +08:00
|
|
|
auto ExternalStatus = (*Result)->status();
|
|
|
|
if (!ExternalStatus)
|
|
|
|
return ExternalStatus.getError();
|
2014-03-01 05:16:07 +08:00
|
|
|
|
2015-12-11 07:41:39 +08:00
|
|
|
// FIXME: Update the status with the name and VFSMapped.
|
|
|
|
Status S = getRedirectedFileStatus(Path, F->useExternalName(UseExternalNames),
|
|
|
|
*ExternalStatus);
|
|
|
|
return std::unique_ptr<File>(
|
|
|
|
llvm::make_unique<FileWithFixedStatus>(std::move(*Result), S));
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
IntrusiveRefCntPtr<FileSystem>
|
2014-08-18 06:12:58 +08:00
|
|
|
vfs::getVFSFromYAML(std::unique_ptr<MemoryBuffer> Buffer,
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
SourceMgr::DiagHandlerTy DiagHandler,
|
|
|
|
StringRef YAMLFilePath,
|
|
|
|
void *DiagContext,
|
2014-02-22 07:39:37 +08:00
|
|
|
IntrusiveRefCntPtr<FileSystem> ExternalFS) {
|
2015-10-07 18:05:44 +08:00
|
|
|
return RedirectingFileSystem::create(std::move(Buffer), DiagHandler,
|
2016-06-13 04:05:23 +08:00
|
|
|
YAMLFilePath, DiagContext,
|
|
|
|
std::move(ExternalFS));
|
2014-02-22 07:39:37 +08:00
|
|
|
}
|
|
|
|
|
2016-12-22 15:06:03 +08:00
|
|
|
static void getVFSEntries(Entry *SrcE, SmallVectorImpl<StringRef> &Path,
|
|
|
|
SmallVectorImpl<YAMLVFSEntry> &Entries) {
|
|
|
|
auto Kind = SrcE->getKind();
|
|
|
|
if (Kind == EK_Directory) {
|
|
|
|
auto *DE = dyn_cast<RedirectingDirectoryEntry>(SrcE);
|
|
|
|
assert(DE && "Must be a directory");
|
|
|
|
for (std::unique_ptr<Entry> &SubEntry :
|
|
|
|
llvm::make_range(DE->contents_begin(), DE->contents_end())) {
|
|
|
|
Path.push_back(SubEntry->getName());
|
|
|
|
getVFSEntries(SubEntry.get(), Path, Entries);
|
|
|
|
Path.pop_back();
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
assert(Kind == EK_File && "Must be a EK_File");
|
|
|
|
auto *FE = dyn_cast<RedirectingFileEntry>(SrcE);
|
|
|
|
assert(FE && "Must be a file");
|
|
|
|
SmallString<128> VPath;
|
|
|
|
for (auto &Comp : Path)
|
|
|
|
llvm::sys::path::append(VPath, Comp);
|
|
|
|
Entries.push_back(YAMLVFSEntry(VPath.c_str(), FE->getExternalContentsPath()));
|
|
|
|
}
|
|
|
|
|
|
|
|
void vfs::collectVFSFromYAML(std::unique_ptr<MemoryBuffer> Buffer,
|
|
|
|
SourceMgr::DiagHandlerTy DiagHandler,
|
|
|
|
StringRef YAMLFilePath,
|
|
|
|
SmallVectorImpl<YAMLVFSEntry> &CollectedEntries,
|
|
|
|
void *DiagContext,
|
|
|
|
IntrusiveRefCntPtr<FileSystem> ExternalFS) {
|
|
|
|
RedirectingFileSystem *VFS = RedirectingFileSystem::create(
|
|
|
|
std::move(Buffer), DiagHandler, YAMLFilePath, DiagContext,
|
|
|
|
std::move(ExternalFS));
|
|
|
|
ErrorOr<Entry *> RootE = VFS->lookupPath("/");
|
|
|
|
if (!RootE)
|
|
|
|
return;
|
|
|
|
SmallVector<StringRef, 8> Components;
|
|
|
|
Components.push_back("/");
|
|
|
|
getVFSEntries(*RootE, Components, CollectedEntries);
|
|
|
|
}
|
|
|
|
|
2014-02-22 07:39:37 +08:00
|
|
|
UniqueID vfs::getNextVirtualUniqueID() {
|
2014-03-03 01:08:31 +08:00
|
|
|
static std::atomic<unsigned> UID;
|
|
|
|
unsigned ID = ++UID;
|
2014-02-22 07:39:37 +08:00
|
|
|
// The following assumes that uint64_t max will never collide with a real
|
|
|
|
// dev_t value from the OS.
|
|
|
|
return UniqueID(std::numeric_limits<uint64_t>::max(), ID);
|
|
|
|
}
|
2014-05-21 05:43:27 +08:00
|
|
|
|
|
|
|
void YAMLVFSWriter::addFileMapping(StringRef VirtualPath, StringRef RealPath) {
|
|
|
|
assert(sys::path::is_absolute(VirtualPath) && "virtual path not absolute");
|
|
|
|
assert(sys::path::is_absolute(RealPath) && "real path not absolute");
|
|
|
|
assert(!pathHasTraversal(VirtualPath) && "path traversal is not supported");
|
|
|
|
Mappings.emplace_back(VirtualPath, RealPath);
|
|
|
|
}
|
|
|
|
|
2014-05-22 06:46:51 +08:00
|
|
|
namespace {
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-05-22 06:46:51 +08:00
|
|
|
class JSONWriter {
|
|
|
|
llvm::raw_ostream &OS;
|
|
|
|
SmallVector<StringRef, 16> DirStack;
|
2018-03-29 06:09:09 +08:00
|
|
|
|
|
|
|
unsigned getDirIndent() { return 4 * DirStack.size(); }
|
|
|
|
unsigned getFileIndent() { return 4 * (DirStack.size() + 1); }
|
2014-05-22 06:46:51 +08:00
|
|
|
bool containedIn(StringRef Parent, StringRef Path);
|
|
|
|
StringRef containedPart(StringRef Parent, StringRef Path);
|
|
|
|
void startDirectory(StringRef Path);
|
|
|
|
void endDirectory();
|
|
|
|
void writeEntry(StringRef VPath, StringRef RPath);
|
2014-05-21 05:43:27 +08:00
|
|
|
|
2014-05-22 06:46:51 +08:00
|
|
|
public:
|
|
|
|
JSONWriter(llvm::raw_ostream &OS) : OS(OS) {}
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2016-04-14 03:28:21 +08:00
|
|
|
void write(ArrayRef<YAMLVFSEntry> Entries, Optional<bool> UseExternalNames,
|
|
|
|
Optional<bool> IsCaseSensitive, Optional<bool> IsOverlayRelative,
|
2016-08-12 09:50:53 +08:00
|
|
|
Optional<bool> IgnoreNonExistentContents, StringRef OverlayDir);
|
2014-05-22 06:46:51 +08:00
|
|
|
};
|
2018-03-29 06:09:09 +08:00
|
|
|
|
|
|
|
} // namespace
|
2014-05-21 05:43:27 +08:00
|
|
|
|
2014-05-22 06:46:51 +08:00
|
|
|
bool JSONWriter::containedIn(StringRef Parent, StringRef Path) {
|
2014-05-21 06:12:58 +08:00
|
|
|
using namespace llvm::sys;
|
2018-03-29 06:09:09 +08:00
|
|
|
|
2014-05-21 06:12:58 +08:00
|
|
|
// Compare each path component.
|
|
|
|
auto IParent = path::begin(Parent), EParent = path::end(Parent);
|
|
|
|
for (auto IChild = path::begin(Path), EChild = path::end(Path);
|
|
|
|
IParent != EParent && IChild != EChild; ++IParent, ++IChild) {
|
|
|
|
if (*IParent != *IChild)
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
// Have we exhausted the parent path?
|
|
|
|
return IParent == EParent;
|
2014-05-21 05:43:27 +08:00
|
|
|
}
|
|
|
|
|
2014-05-22 06:46:51 +08:00
|
|
|
StringRef JSONWriter::containedPart(StringRef Parent, StringRef Path) {
|
|
|
|
assert(!Parent.empty());
|
2014-05-21 05:43:27 +08:00
|
|
|
assert(containedIn(Parent, Path));
|
|
|
|
return Path.slice(Parent.size() + 1, StringRef::npos);
|
|
|
|
}
|
|
|
|
|
2014-05-22 06:46:51 +08:00
|
|
|
void JSONWriter::startDirectory(StringRef Path) {
|
|
|
|
StringRef Name =
|
|
|
|
DirStack.empty() ? Path : containedPart(DirStack.back(), Path);
|
|
|
|
DirStack.push_back(Path);
|
|
|
|
unsigned Indent = getDirIndent();
|
|
|
|
OS.indent(Indent) << "{\n";
|
|
|
|
OS.indent(Indent + 2) << "'type': 'directory',\n";
|
|
|
|
OS.indent(Indent + 2) << "'name': \"" << llvm::yaml::escape(Name) << "\",\n";
|
|
|
|
OS.indent(Indent + 2) << "'contents': [\n";
|
|
|
|
}
|
|
|
|
|
|
|
|
void JSONWriter::endDirectory() {
|
|
|
|
unsigned Indent = getDirIndent();
|
|
|
|
OS.indent(Indent + 2) << "]\n";
|
|
|
|
OS.indent(Indent) << "}";
|
|
|
|
|
|
|
|
DirStack.pop_back();
|
|
|
|
}
|
|
|
|
|
|
|
|
void JSONWriter::writeEntry(StringRef VPath, StringRef RPath) {
|
|
|
|
unsigned Indent = getFileIndent();
|
|
|
|
OS.indent(Indent) << "{\n";
|
|
|
|
OS.indent(Indent + 2) << "'type': 'file',\n";
|
|
|
|
OS.indent(Indent + 2) << "'name': \"" << llvm::yaml::escape(VPath) << "\",\n";
|
|
|
|
OS.indent(Indent + 2) << "'external-contents': \""
|
|
|
|
<< llvm::yaml::escape(RPath) << "\"\n";
|
|
|
|
OS.indent(Indent) << "}";
|
|
|
|
}
|
|
|
|
|
|
|
|
void JSONWriter::write(ArrayRef<YAMLVFSEntry> Entries,
|
2016-04-14 03:28:21 +08:00
|
|
|
Optional<bool> UseExternalNames,
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
Optional<bool> IsCaseSensitive,
|
|
|
|
Optional<bool> IsOverlayRelative,
|
2016-08-12 09:50:53 +08:00
|
|
|
Optional<bool> IgnoreNonExistentContents,
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
StringRef OverlayDir) {
|
2014-05-22 06:46:51 +08:00
|
|
|
using namespace llvm::sys;
|
2014-05-21 05:43:27 +08:00
|
|
|
|
|
|
|
OS << "{\n"
|
|
|
|
" 'version': 0,\n";
|
2014-05-22 06:46:51 +08:00
|
|
|
if (IsCaseSensitive.hasValue())
|
|
|
|
OS << " 'case-sensitive': '"
|
|
|
|
<< (IsCaseSensitive.getValue() ? "true" : "false") << "',\n";
|
2016-04-14 03:28:21 +08:00
|
|
|
if (UseExternalNames.hasValue())
|
|
|
|
OS << " 'use-external-names': '"
|
|
|
|
<< (UseExternalNames.getValue() ? "true" : "false") << "',\n";
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
bool UseOverlayRelative = false;
|
|
|
|
if (IsOverlayRelative.hasValue()) {
|
|
|
|
UseOverlayRelative = IsOverlayRelative.getValue();
|
|
|
|
OS << " 'overlay-relative': '"
|
|
|
|
<< (UseOverlayRelative ? "true" : "false") << "',\n";
|
|
|
|
}
|
2016-08-12 09:50:53 +08:00
|
|
|
if (IgnoreNonExistentContents.hasValue())
|
|
|
|
OS << " 'ignore-non-existent-contents': '"
|
|
|
|
<< (IgnoreNonExistentContents.getValue() ? "true" : "false") << "',\n";
|
2014-05-21 05:43:27 +08:00
|
|
|
OS << " 'roots': [\n";
|
2014-05-22 06:46:51 +08:00
|
|
|
|
2014-07-15 09:24:35 +08:00
|
|
|
if (!Entries.empty()) {
|
|
|
|
const YAMLVFSEntry &Entry = Entries.front();
|
|
|
|
startDirectory(path::parent_path(Entry.VPath));
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
|
|
|
|
StringRef RPath = Entry.RPath;
|
|
|
|
if (UseOverlayRelative) {
|
|
|
|
unsigned OverlayDirLen = OverlayDir.size();
|
|
|
|
assert(RPath.substr(0, OverlayDirLen) == OverlayDir &&
|
|
|
|
"Overlay dir must be contained in RPath");
|
|
|
|
RPath = RPath.slice(OverlayDirLen, RPath.size());
|
|
|
|
}
|
|
|
|
|
|
|
|
writeEntry(path::filename(Entry.VPath), RPath);
|
2014-07-15 09:24:35 +08:00
|
|
|
|
|
|
|
for (const auto &Entry : Entries.slice(1)) {
|
|
|
|
StringRef Dir = path::parent_path(Entry.VPath);
|
|
|
|
if (Dir == DirStack.back())
|
|
|
|
OS << ",\n";
|
|
|
|
else {
|
|
|
|
while (!DirStack.empty() && !containedIn(DirStack.back(), Dir)) {
|
|
|
|
OS << "\n";
|
|
|
|
endDirectory();
|
|
|
|
}
|
|
|
|
OS << ",\n";
|
|
|
|
startDirectory(Dir);
|
2014-05-22 06:46:51 +08:00
|
|
|
}
|
Reapply [2] [VFS] Add 'overlay-relative' field to YAML files
This reapplies r261552 and r263748. Fixed testcase to reapply.
The VFS overlay mapping between virtual paths and real paths is done through
the 'external-contents' entries in YAML files, which contains hardcoded paths
to the real files.
When a module compilation crashes, headers are dumped into <name>.cache/vfs
directory and are mapped via the <name>.cache/vfs/vfs.yaml. The script
generated for reproduction uses -ivfsoverlay pointing to file to gather the
mapping between virtual paths and files inside <name>.cache/vfs. Currently, we
are only capable of reproducing such crashes in the same machine as they
happen, because of the hardcoded paths in 'external-contents'.
To be able to reproduce a crash in another machine, this patch introduces a new
option in the VFS yaml file called 'overlay-relative'. When it's equal to
'true' it means that the provided path to the YAML file through the
-ivfsoverlay option should also be used to prefix the final path for every
'external-contents'.
Example, given the invocation snippet "... -ivfsoverlay
<name>.cache/vfs/vfs.yaml" and the following entry in the yaml file:
"overlay-relative": "true",
"roots": [
...
"type": "directory",
"name": "/usr/include",
"contents": [
{
"type": "file",
"name": "stdio.h",
"external-contents": "/usr/include/stdio.h"
},
...
Here, a file manager request for virtual "/usr/include/stdio.h", that will map
into real path "/<absolute_path_to>/<name>.cache/vfs/usr/include/stdio.h.
This is a useful feature for debugging module crashes in machines other than
the one where the error happened.
Differential Revision: http://reviews.llvm.org/D17457
rdar://problem/24499339
llvm-svn: 263893
2016-03-20 10:08:48 +08:00
|
|
|
StringRef RPath = Entry.RPath;
|
|
|
|
if (UseOverlayRelative) {
|
|
|
|
unsigned OverlayDirLen = OverlayDir.size();
|
|
|
|
assert(RPath.substr(0, OverlayDirLen) == OverlayDir &&
|
|
|
|
"Overlay dir must be contained in RPath");
|
|
|
|
RPath = RPath.slice(OverlayDirLen, RPath.size());
|
|
|
|
}
|
|
|
|
writeEntry(path::filename(Entry.VPath), RPath);
|
2014-05-22 06:46:51 +08:00
|
|
|
}
|
|
|
|
|
2014-07-15 09:24:35 +08:00
|
|
|
while (!DirStack.empty()) {
|
|
|
|
OS << "\n";
|
|
|
|
endDirectory();
|
|
|
|
}
|
2014-05-22 06:46:51 +08:00
|
|
|
OS << "\n";
|
|
|
|
}
|
|
|
|
|
2014-07-15 09:24:35 +08:00
|
|
|
OS << " ]\n"
|
2014-05-21 05:43:27 +08:00
|
|
|
<< "}\n";
|
|
|
|
}
|
2014-05-22 06:46:51 +08:00
|
|
|
|
|
|
|
void YAMLVFSWriter::write(llvm::raw_ostream &OS) {
|
2018-09-27 06:16:28 +08:00
|
|
|
llvm::sort(Mappings, [](const YAMLVFSEntry &LHS, const YAMLVFSEntry &RHS) {
|
2014-05-22 06:46:51 +08:00
|
|
|
return LHS.VPath < RHS.VPath;
|
|
|
|
});
|
|
|
|
|
2016-04-14 03:28:21 +08:00
|
|
|
JSONWriter(OS).write(Mappings, UseExternalNames, IsCaseSensitive,
|
2016-08-12 09:50:53 +08:00
|
|
|
IsOverlayRelative, IgnoreNonExistentContents,
|
|
|
|
OverlayDir);
|
2014-05-22 06:46:51 +08:00
|
|
|
}
|
2014-06-25 03:37:16 +08:00
|
|
|
|
2015-10-09 21:28:13 +08:00
|
|
|
VFSFromYamlDirIterImpl::VFSFromYamlDirIterImpl(
|
2018-09-14 20:47:38 +08:00
|
|
|
const Twine &_Path, RedirectingDirectoryEntry::iterator Begin,
|
2015-10-09 21:28:13 +08:00
|
|
|
RedirectingDirectoryEntry::iterator End, std::error_code &EC)
|
2018-09-14 20:47:38 +08:00
|
|
|
: Dir(_Path.str()), Current(Begin), End(End) {
|
2018-08-08 07:00:40 +08:00
|
|
|
EC = incrementImpl();
|
2014-06-25 03:37:16 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
std::error_code VFSFromYamlDirIterImpl::increment() {
|
|
|
|
assert(Current != End && "cannot iterate past end");
|
2018-08-08 07:00:40 +08:00
|
|
|
++Current;
|
|
|
|
return incrementImpl();
|
|
|
|
}
|
|
|
|
|
|
|
|
std::error_code VFSFromYamlDirIterImpl::incrementImpl() {
|
|
|
|
while (Current != End) {
|
2014-06-25 03:37:16 +08:00
|
|
|
SmallString<128> PathStr(Dir);
|
|
|
|
llvm::sys::path::append(PathStr, (*Current)->getName());
|
2018-09-14 20:47:38 +08:00
|
|
|
sys::fs::file_type Type;
|
|
|
|
switch ((*Current)->getKind()) {
|
|
|
|
case EK_Directory:
|
|
|
|
Type = sys::fs::file_type::directory_file;
|
|
|
|
break;
|
|
|
|
case EK_File:
|
|
|
|
Type = sys::fs::file_type::regular_file;
|
|
|
|
break;
|
2016-08-13 02:18:24 +08:00
|
|
|
}
|
2018-09-14 20:47:38 +08:00
|
|
|
CurrentEntry = directory_entry(PathStr.str(), Type);
|
2016-08-13 02:18:24 +08:00
|
|
|
break;
|
2016-08-12 10:17:26 +08:00
|
|
|
}
|
2016-08-13 02:18:24 +08:00
|
|
|
|
|
|
|
if (Current == End)
|
2018-09-14 20:47:38 +08:00
|
|
|
CurrentEntry = directory_entry();
|
2018-03-29 06:09:09 +08:00
|
|
|
return {};
|
2014-06-25 03:37:16 +08:00
|
|
|
}
|
2014-06-26 04:25:40 +08:00
|
|
|
|
|
|
|
vfs::recursive_directory_iterator::recursive_directory_iterator(FileSystem &FS_,
|
|
|
|
const Twine &Path,
|
|
|
|
std::error_code &EC)
|
|
|
|
: FS(&FS_) {
|
|
|
|
directory_iterator I = FS->dir_begin(Path, EC);
|
2017-03-14 08:14:40 +08:00
|
|
|
if (I != directory_iterator()) {
|
2014-06-26 04:25:40 +08:00
|
|
|
State = std::make_shared<IterState>();
|
|
|
|
State->push(I);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
vfs::recursive_directory_iterator &
|
|
|
|
recursive_directory_iterator::increment(std::error_code &EC) {
|
|
|
|
assert(FS && State && !State->empty() && "incrementing past end");
|
2018-09-14 20:47:38 +08:00
|
|
|
assert(!State->top()->path().empty() && "non-canonical end iterator");
|
2014-06-26 04:25:40 +08:00
|
|
|
vfs::directory_iterator End;
|
2018-09-14 20:47:38 +08:00
|
|
|
if (State->top()->type() == sys::fs::file_type::directory_file) {
|
|
|
|
vfs::directory_iterator I = FS->dir_begin(State->top()->path(), EC);
|
2014-06-26 04:25:40 +08:00
|
|
|
if (I != End) {
|
|
|
|
State->push(I);
|
|
|
|
return *this;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
while (!State->empty() && State->top().increment(EC) == End)
|
|
|
|
State->pop();
|
|
|
|
|
|
|
|
if (State->empty())
|
|
|
|
State.reset(); // end iterator
|
|
|
|
|
|
|
|
return *this;
|
2014-07-07 01:43:24 +08:00
|
|
|
}
|