forked from OSchip/llvm-project
[clang] Add VFS support for sanitizers' blacklists
Differential Revision: https://reviews.llvm.org/D69648
This commit is contained in:
parent
3ffbf9720f
commit
590f279c45
|
@ -17,6 +17,7 @@
|
||||||
#include "clang/Basic/Sanitizers.h"
|
#include "clang/Basic/Sanitizers.h"
|
||||||
#include "llvm/ADT/StringRef.h"
|
#include "llvm/ADT/StringRef.h"
|
||||||
#include "llvm/Support/SpecialCaseList.h"
|
#include "llvm/Support/SpecialCaseList.h"
|
||||||
|
#include "llvm/Support/VirtualFileSystem.h"
|
||||||
#include <memory>
|
#include <memory>
|
||||||
|
|
||||||
namespace clang {
|
namespace clang {
|
||||||
|
@ -24,10 +25,12 @@ namespace clang {
|
||||||
class SanitizerSpecialCaseList : public llvm::SpecialCaseList {
|
class SanitizerSpecialCaseList : public llvm::SpecialCaseList {
|
||||||
public:
|
public:
|
||||||
static std::unique_ptr<SanitizerSpecialCaseList>
|
static std::unique_ptr<SanitizerSpecialCaseList>
|
||||||
create(const std::vector<std::string> &Paths, std::string &Error);
|
create(const std::vector<std::string> &Paths, llvm::vfs::FileSystem &VFS,
|
||||||
|
std::string &Error);
|
||||||
|
|
||||||
static std::unique_ptr<SanitizerSpecialCaseList>
|
static std::unique_ptr<SanitizerSpecialCaseList>
|
||||||
createOrDie(const std::vector<std::string> &Paths);
|
createOrDie(const std::vector<std::string> &Paths,
|
||||||
|
llvm::vfs::FileSystem &VFS);
|
||||||
|
|
||||||
// Query blacklisted entries if any bit in Mask matches the entry's section.
|
// Query blacklisted entries if any bit in Mask matches the entry's section.
|
||||||
bool inSection(SanitizerMask Mask, StringRef Prefix, StringRef Query,
|
bool inSection(SanitizerMask Mask, StringRef Prefix, StringRef Query,
|
||||||
|
|
|
@ -16,7 +16,9 @@ using namespace clang;
|
||||||
|
|
||||||
SanitizerBlacklist::SanitizerBlacklist(
|
SanitizerBlacklist::SanitizerBlacklist(
|
||||||
const std::vector<std::string> &BlacklistPaths, SourceManager &SM)
|
const std::vector<std::string> &BlacklistPaths, SourceManager &SM)
|
||||||
: SSCL(SanitizerSpecialCaseList::createOrDie(BlacklistPaths)), SM(SM) {}
|
: SSCL(SanitizerSpecialCaseList::createOrDie(
|
||||||
|
BlacklistPaths, SM.getFileManager().getVirtualFileSystem())),
|
||||||
|
SM(SM) {}
|
||||||
|
|
||||||
bool SanitizerBlacklist::isBlacklistedGlobal(SanitizerMask Mask,
|
bool SanitizerBlacklist::isBlacklistedGlobal(SanitizerMask Mask,
|
||||||
StringRef GlobalName,
|
StringRef GlobalName,
|
||||||
|
|
|
@ -16,10 +16,11 @@ using namespace clang;
|
||||||
|
|
||||||
std::unique_ptr<SanitizerSpecialCaseList>
|
std::unique_ptr<SanitizerSpecialCaseList>
|
||||||
SanitizerSpecialCaseList::create(const std::vector<std::string> &Paths,
|
SanitizerSpecialCaseList::create(const std::vector<std::string> &Paths,
|
||||||
|
llvm::vfs::FileSystem &VFS,
|
||||||
std::string &Error) {
|
std::string &Error) {
|
||||||
std::unique_ptr<clang::SanitizerSpecialCaseList> SSCL(
|
std::unique_ptr<clang::SanitizerSpecialCaseList> SSCL(
|
||||||
new SanitizerSpecialCaseList());
|
new SanitizerSpecialCaseList());
|
||||||
if (SSCL->createInternal(Paths, Error)) {
|
if (SSCL->createInternal(Paths, Error, VFS)) {
|
||||||
SSCL->createSanitizerSections();
|
SSCL->createSanitizerSections();
|
||||||
return SSCL;
|
return SSCL;
|
||||||
}
|
}
|
||||||
|
@ -27,9 +28,10 @@ SanitizerSpecialCaseList::create(const std::vector<std::string> &Paths,
|
||||||
}
|
}
|
||||||
|
|
||||||
std::unique_ptr<SanitizerSpecialCaseList>
|
std::unique_ptr<SanitizerSpecialCaseList>
|
||||||
SanitizerSpecialCaseList::createOrDie(const std::vector<std::string> &Paths) {
|
SanitizerSpecialCaseList::createOrDie(const std::vector<std::string> &Paths,
|
||||||
|
llvm::vfs::FileSystem &VFS) {
|
||||||
std::string Error;
|
std::string Error;
|
||||||
if (auto SSCL = create(Paths, Error))
|
if (auto SSCL = create(Paths, VFS, Error))
|
||||||
return SSCL;
|
return SSCL;
|
||||||
llvm::report_fatal_error(Error);
|
llvm::report_fatal_error(Error);
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,15 @@
|
||||||
|
{
|
||||||
|
'version': 0,
|
||||||
|
'roots': [
|
||||||
|
{ 'name': '@DIR@', 'type': 'directory',
|
||||||
|
'contents': [
|
||||||
|
{ 'name': 'only-virtual-file.blacklist', 'type': 'file',
|
||||||
|
'external-contents': '@REAL_FILE@'
|
||||||
|
},
|
||||||
|
{ 'name': 'invalid-virtual-file.blacklist', 'type': 'file',
|
||||||
|
'external-contents': '@NONEXISTENT_FILE@'
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
|
@ -0,0 +1,36 @@
|
||||||
|
// Verify ubsan doesn't emit checks for blacklisted functions and files
|
||||||
|
// RUN: echo "fun:hash" > %t-func.blacklist
|
||||||
|
// RUN: echo "src:%s" | sed -e 's/\\/\\\\/g' > %t-file.blacklist
|
||||||
|
|
||||||
|
// RUN: rm -f %t-vfsoverlay.yaml
|
||||||
|
// RUN: rm -f %t-nonexistent.blacklist
|
||||||
|
// RUN: sed -e "s|@DIR@|%/T|g" %S/Inputs/sanitizer-blacklist-vfsoverlay.yaml | sed -e "s|@REAL_FILE@|%/t-func.blacklist|g" | sed -e "s|@NONEXISTENT_FILE@|%/t-nonexistent.blacklist|g" > %t-vfsoverlay.yaml
|
||||||
|
// RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -ivfsoverlay %t-vfsoverlay.yaml -fsanitize-blacklist=%/T/only-virtual-file.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FUNC
|
||||||
|
|
||||||
|
// RUN: not %clang_cc1 -fsanitize=unsigned-integer-overflow -ivfsoverlay %t-vfsoverlay.yaml -fsanitize-blacklist=%/T/invalid-virtual-file.blacklist -emit-llvm %s -o - 2>&1 | FileCheck %s --check-prefix=INVALID-MAPPED-FILE
|
||||||
|
// INVALID-MAPPED-FILE: invalid-virtual-file.blacklist': {{[Nn]}}o such file or directory
|
||||||
|
|
||||||
|
// RUN: not %clang_cc1 -fsanitize=unsigned-integer-overflow -ivfsoverlay %t-vfsoverlay.yaml -fsanitize-blacklist=%t-nonexistent.blacklist -emit-llvm %s -o - 2>&1 | FileCheck %s --check-prefix=INVALID
|
||||||
|
// INVALID: nonexistent.blacklist': {{[Nn]}}o such file or directory
|
||||||
|
|
||||||
|
unsigned i;
|
||||||
|
|
||||||
|
// DEFAULT: @hash
|
||||||
|
// FUNC: @hash
|
||||||
|
// FILE: @hash
|
||||||
|
unsigned hash() {
|
||||||
|
// DEFAULT: call {{.*}}void @__ubsan
|
||||||
|
// FUNC-NOT: call {{.*}}void @__ubsan
|
||||||
|
// FILE-NOT: call {{.*}}void @__ubsan
|
||||||
|
return i * 37;
|
||||||
|
}
|
||||||
|
|
||||||
|
// DEFAULT: @add
|
||||||
|
// FUNC: @add
|
||||||
|
// FILE: @add
|
||||||
|
unsigned add() {
|
||||||
|
// DEFAULT: call {{.*}}void @__ubsan
|
||||||
|
// FUNC: call {{.*}}void @__ubsan
|
||||||
|
// FILE-NOT: call {{.*}}void @__ubsan
|
||||||
|
return i + 1;
|
||||||
|
}
|
|
@ -55,6 +55,7 @@
|
||||||
#include "llvm/ADT/StringSet.h"
|
#include "llvm/ADT/StringSet.h"
|
||||||
#include "llvm/Support/Regex.h"
|
#include "llvm/Support/Regex.h"
|
||||||
#include "llvm/Support/TrigramIndex.h"
|
#include "llvm/Support/TrigramIndex.h"
|
||||||
|
#include "llvm/Support/VirtualFileSystem.h"
|
||||||
#include <string>
|
#include <string>
|
||||||
#include <vector>
|
#include <vector>
|
||||||
|
|
||||||
|
@ -102,8 +103,8 @@ public:
|
||||||
protected:
|
protected:
|
||||||
// Implementations of the create*() functions that can also be used by derived
|
// Implementations of the create*() functions that can also be used by derived
|
||||||
// classes.
|
// classes.
|
||||||
bool createInternal(const std::vector<std::string> &Paths,
|
bool createInternal(const std::vector<std::string> &Paths, std::string &Error,
|
||||||
std::string &Error);
|
vfs::FileSystem &VFS = *vfs::getRealFileSystem());
|
||||||
bool createInternal(const MemoryBuffer *MB, std::string &Error);
|
bool createInternal(const MemoryBuffer *MB, std::string &Error);
|
||||||
|
|
||||||
SpecialCaseList() = default;
|
SpecialCaseList() = default;
|
||||||
|
|
|
@ -95,11 +95,11 @@ SpecialCaseList::createOrDie(const std::vector<std::string> &Paths) {
|
||||||
}
|
}
|
||||||
|
|
||||||
bool SpecialCaseList::createInternal(const std::vector<std::string> &Paths,
|
bool SpecialCaseList::createInternal(const std::vector<std::string> &Paths,
|
||||||
std::string &Error) {
|
std::string &Error, vfs::FileSystem &VFS) {
|
||||||
StringMap<size_t> Sections;
|
StringMap<size_t> Sections;
|
||||||
for (const auto &Path : Paths) {
|
for (const auto &Path : Paths) {
|
||||||
ErrorOr<std::unique_ptr<MemoryBuffer>> FileOrErr =
|
ErrorOr<std::unique_ptr<MemoryBuffer>> FileOrErr =
|
||||||
MemoryBuffer::getFile(Path);
|
VFS.getBufferForFile(Path);
|
||||||
if (std::error_code EC = FileOrErr.getError()) {
|
if (std::error_code EC = FileOrErr.getError()) {
|
||||||
Error = (Twine("can't open file '") + Path + "': " + EC.message()).str();
|
Error = (Twine("can't open file '") + Path + "': " + EC.message()).str();
|
||||||
return false;
|
return false;
|
||||||
|
|
Loading…
Reference in New Issue