[clang] Add VFS support for sanitizers' blacklists

Differential Revision: https://reviews.llvm.org/D69648
This commit is contained in:
Jan Korous 2019-11-08 10:40:27 -08:00
parent 3ffbf9720f
commit 590f279c45
7 changed files with 69 additions and 10 deletions

View File

@ -17,6 +17,7 @@
#include "clang/Basic/Sanitizers.h" #include "clang/Basic/Sanitizers.h"
#include "llvm/ADT/StringRef.h" #include "llvm/ADT/StringRef.h"
#include "llvm/Support/SpecialCaseList.h" #include "llvm/Support/SpecialCaseList.h"
#include "llvm/Support/VirtualFileSystem.h"
#include <memory> #include <memory>
namespace clang { namespace clang {
@ -24,10 +25,12 @@ namespace clang {
class SanitizerSpecialCaseList : public llvm::SpecialCaseList { class SanitizerSpecialCaseList : public llvm::SpecialCaseList {
public: public:
static std::unique_ptr<SanitizerSpecialCaseList> static std::unique_ptr<SanitizerSpecialCaseList>
create(const std::vector<std::string> &Paths, std::string &Error); create(const std::vector<std::string> &Paths, llvm::vfs::FileSystem &VFS,
std::string &Error);
static std::unique_ptr<SanitizerSpecialCaseList> static std::unique_ptr<SanitizerSpecialCaseList>
createOrDie(const std::vector<std::string> &Paths); createOrDie(const std::vector<std::string> &Paths,
llvm::vfs::FileSystem &VFS);
// Query blacklisted entries if any bit in Mask matches the entry's section. // Query blacklisted entries if any bit in Mask matches the entry's section.
bool inSection(SanitizerMask Mask, StringRef Prefix, StringRef Query, bool inSection(SanitizerMask Mask, StringRef Prefix, StringRef Query,

View File

@ -16,7 +16,9 @@ using namespace clang;
SanitizerBlacklist::SanitizerBlacklist( SanitizerBlacklist::SanitizerBlacklist(
const std::vector<std::string> &BlacklistPaths, SourceManager &SM) const std::vector<std::string> &BlacklistPaths, SourceManager &SM)
: SSCL(SanitizerSpecialCaseList::createOrDie(BlacklistPaths)), SM(SM) {} : SSCL(SanitizerSpecialCaseList::createOrDie(
BlacklistPaths, SM.getFileManager().getVirtualFileSystem())),
SM(SM) {}
bool SanitizerBlacklist::isBlacklistedGlobal(SanitizerMask Mask, bool SanitizerBlacklist::isBlacklistedGlobal(SanitizerMask Mask,
StringRef GlobalName, StringRef GlobalName,

View File

@ -16,10 +16,11 @@ using namespace clang;
std::unique_ptr<SanitizerSpecialCaseList> std::unique_ptr<SanitizerSpecialCaseList>
SanitizerSpecialCaseList::create(const std::vector<std::string> &Paths, SanitizerSpecialCaseList::create(const std::vector<std::string> &Paths,
llvm::vfs::FileSystem &VFS,
std::string &Error) { std::string &Error) {
std::unique_ptr<clang::SanitizerSpecialCaseList> SSCL( std::unique_ptr<clang::SanitizerSpecialCaseList> SSCL(
new SanitizerSpecialCaseList()); new SanitizerSpecialCaseList());
if (SSCL->createInternal(Paths, Error)) { if (SSCL->createInternal(Paths, Error, VFS)) {
SSCL->createSanitizerSections(); SSCL->createSanitizerSections();
return SSCL; return SSCL;
} }
@ -27,9 +28,10 @@ SanitizerSpecialCaseList::create(const std::vector<std::string> &Paths,
} }
std::unique_ptr<SanitizerSpecialCaseList> std::unique_ptr<SanitizerSpecialCaseList>
SanitizerSpecialCaseList::createOrDie(const std::vector<std::string> &Paths) { SanitizerSpecialCaseList::createOrDie(const std::vector<std::string> &Paths,
llvm::vfs::FileSystem &VFS) {
std::string Error; std::string Error;
if (auto SSCL = create(Paths, Error)) if (auto SSCL = create(Paths, VFS, Error))
return SSCL; return SSCL;
llvm::report_fatal_error(Error); llvm::report_fatal_error(Error);
} }

View File

@ -0,0 +1,15 @@
{
'version': 0,
'roots': [
{ 'name': '@DIR@', 'type': 'directory',
'contents': [
{ 'name': 'only-virtual-file.blacklist', 'type': 'file',
'external-contents': '@REAL_FILE@'
},
{ 'name': 'invalid-virtual-file.blacklist', 'type': 'file',
'external-contents': '@NONEXISTENT_FILE@'
}
]
}
]
}

View File

@ -0,0 +1,36 @@
// Verify ubsan doesn't emit checks for blacklisted functions and files
// RUN: echo "fun:hash" > %t-func.blacklist
// RUN: echo "src:%s" | sed -e 's/\\/\\\\/g' > %t-file.blacklist
// RUN: rm -f %t-vfsoverlay.yaml
// RUN: rm -f %t-nonexistent.blacklist
// RUN: sed -e "s|@DIR@|%/T|g" %S/Inputs/sanitizer-blacklist-vfsoverlay.yaml | sed -e "s|@REAL_FILE@|%/t-func.blacklist|g" | sed -e "s|@NONEXISTENT_FILE@|%/t-nonexistent.blacklist|g" > %t-vfsoverlay.yaml
// RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -ivfsoverlay %t-vfsoverlay.yaml -fsanitize-blacklist=%/T/only-virtual-file.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FUNC
// RUN: not %clang_cc1 -fsanitize=unsigned-integer-overflow -ivfsoverlay %t-vfsoverlay.yaml -fsanitize-blacklist=%/T/invalid-virtual-file.blacklist -emit-llvm %s -o - 2>&1 | FileCheck %s --check-prefix=INVALID-MAPPED-FILE
// INVALID-MAPPED-FILE: invalid-virtual-file.blacklist': {{[Nn]}}o such file or directory
// RUN: not %clang_cc1 -fsanitize=unsigned-integer-overflow -ivfsoverlay %t-vfsoverlay.yaml -fsanitize-blacklist=%t-nonexistent.blacklist -emit-llvm %s -o - 2>&1 | FileCheck %s --check-prefix=INVALID
// INVALID: nonexistent.blacklist': {{[Nn]}}o such file or directory
unsigned i;
// DEFAULT: @hash
// FUNC: @hash
// FILE: @hash
unsigned hash() {
// DEFAULT: call {{.*}}void @__ubsan
// FUNC-NOT: call {{.*}}void @__ubsan
// FILE-NOT: call {{.*}}void @__ubsan
return i * 37;
}
// DEFAULT: @add
// FUNC: @add
// FILE: @add
unsigned add() {
// DEFAULT: call {{.*}}void @__ubsan
// FUNC: call {{.*}}void @__ubsan
// FILE-NOT: call {{.*}}void @__ubsan
return i + 1;
}

View File

@ -55,6 +55,7 @@
#include "llvm/ADT/StringSet.h" #include "llvm/ADT/StringSet.h"
#include "llvm/Support/Regex.h" #include "llvm/Support/Regex.h"
#include "llvm/Support/TrigramIndex.h" #include "llvm/Support/TrigramIndex.h"
#include "llvm/Support/VirtualFileSystem.h"
#include <string> #include <string>
#include <vector> #include <vector>
@ -102,8 +103,8 @@ public:
protected: protected:
// Implementations of the create*() functions that can also be used by derived // Implementations of the create*() functions that can also be used by derived
// classes. // classes.
bool createInternal(const std::vector<std::string> &Paths, bool createInternal(const std::vector<std::string> &Paths, std::string &Error,
std::string &Error); vfs::FileSystem &VFS = *vfs::getRealFileSystem());
bool createInternal(const MemoryBuffer *MB, std::string &Error); bool createInternal(const MemoryBuffer *MB, std::string &Error);
SpecialCaseList() = default; SpecialCaseList() = default;

View File

@ -95,11 +95,11 @@ SpecialCaseList::createOrDie(const std::vector<std::string> &Paths) {
} }
bool SpecialCaseList::createInternal(const std::vector<std::string> &Paths, bool SpecialCaseList::createInternal(const std::vector<std::string> &Paths,
std::string &Error) { std::string &Error, vfs::FileSystem &VFS) {
StringMap<size_t> Sections; StringMap<size_t> Sections;
for (const auto &Path : Paths) { for (const auto &Path : Paths) {
ErrorOr<std::unique_ptr<MemoryBuffer>> FileOrErr = ErrorOr<std::unique_ptr<MemoryBuffer>> FileOrErr =
MemoryBuffer::getFile(Path); VFS.getBufferForFile(Path);
if (std::error_code EC = FileOrErr.getError()) { if (std::error_code EC = FileOrErr.getError()) {
Error = (Twine("can't open file '") + Path + "': " + EC.message()).str(); Error = (Twine("can't open file '") + Path + "': " + EC.message()).str();
return false; return false;