Author: rnk
Date: Thu Aug 10 14:21:15 2017
New Revision: 310661

URL: http://llvm.org/viewvc/llvm-project?rev=310661&view=rev
Log:
Revert "[clang-tidy] Refactor the code and add a close-on-exec check on 
memfd_create() in Android module."

This reverts commit r310630.

The new code broke on Windows and was untested. On Linux, it was
selecting the "int" overload of operator<<, which definitely does not
print the right thing when fed a "Mode" char.

Removed:
    clang-tools-extra/trunk/clang-tidy/android/CloexecCheck.cpp
    clang-tools-extra/trunk/clang-tidy/android/CloexecCheck.h
    clang-tools-extra/trunk/clang-tidy/android/CloexecMemfdCreateCheck.cpp
    clang-tools-extra/trunk/clang-tidy/android/CloexecMemfdCreateCheck.h
    
clang-tools-extra/trunk/docs/clang-tidy/checks/android-cloexec-memfd-create.rst
    clang-tools-extra/trunk/test/clang-tidy/android-cloexec-memfd-create.cpp
Modified:
    clang-tools-extra/trunk/clang-tidy/android/AndroidTidyModule.cpp
    clang-tools-extra/trunk/clang-tidy/android/CMakeLists.txt
    clang-tools-extra/trunk/docs/ReleaseNotes.rst
    clang-tools-extra/trunk/docs/clang-tidy/checks/list.rst

Modified: clang-tools-extra/trunk/clang-tidy/android/AndroidTidyModule.cpp
URL: 
http://llvm.org/viewvc/llvm-project/clang-tools-extra/trunk/clang-tidy/android/AndroidTidyModule.cpp?rev=310661&r1=310660&r2=310661&view=diff
==============================================================================
--- clang-tools-extra/trunk/clang-tidy/android/AndroidTidyModule.cpp (original)
+++ clang-tools-extra/trunk/clang-tidy/android/AndroidTidyModule.cpp Thu Aug 10 
14:21:15 2017
@@ -12,7 +12,6 @@
 #include "../ClangTidyModuleRegistry.h"
 #include "CloexecCreatCheck.h"
 #include "CloexecFopenCheck.h"
-#include "CloexecMemfdCreateCheck.h"
 #include "CloexecOpenCheck.h"
 #include "CloexecSocketCheck.h"
 
@@ -28,8 +27,6 @@ public:
   void addCheckFactories(ClangTidyCheckFactories &CheckFactories) override {
     CheckFactories.registerCheck<CloexecCreatCheck>("android-cloexec-creat");
     CheckFactories.registerCheck<CloexecFopenCheck>("android-cloexec-fopen");
-    CheckFactories.registerCheck<CloexecMemfdCreateCheck>(
-        "android-cloexec-memfd-create");
     CheckFactories.registerCheck<CloexecOpenCheck>("android-cloexec-open");
     CheckFactories.registerCheck<CloexecSocketCheck>("android-cloexec-socket");
   }

Modified: clang-tools-extra/trunk/clang-tidy/android/CMakeLists.txt
URL: 
http://llvm.org/viewvc/llvm-project/clang-tools-extra/trunk/clang-tidy/android/CMakeLists.txt?rev=310661&r1=310660&r2=310661&view=diff
==============================================================================
--- clang-tools-extra/trunk/clang-tidy/android/CMakeLists.txt (original)
+++ clang-tools-extra/trunk/clang-tidy/android/CMakeLists.txt Thu Aug 10 
14:21:15 2017
@@ -2,10 +2,8 @@ set(LLVM_LINK_COMPONENTS support)
 
 add_clang_library(clangTidyAndroidModule
   AndroidTidyModule.cpp
-  CloexecCheck.cpp
   CloexecCreatCheck.cpp
   CloexecFopenCheck.cpp
-  CloexecMemfdCreateCheck.cpp
   CloexecOpenCheck.cpp
   CloexecSocketCheck.cpp
 

Removed: clang-tools-extra/trunk/clang-tidy/android/CloexecCheck.cpp
URL: 
http://llvm.org/viewvc/llvm-project/clang-tools-extra/trunk/clang-tidy/android/CloexecCheck.cpp?rev=310660&view=auto
==============================================================================
--- clang-tools-extra/trunk/clang-tidy/android/CloexecCheck.cpp (original)
+++ clang-tools-extra/trunk/clang-tidy/android/CloexecCheck.cpp (removed)
@@ -1,105 +0,0 @@
-//===--- CloexecCheck.cpp - 
clang-tidy-------------------------------------===//
-//
-//                     The LLVM Compiler Infrastructure
-//
-// This file is distributed under the University of Illinois Open Source
-// License. See LICENSE.TXT for details.
-//
-//===----------------------------------------------------------------------===//
-
-#include "CloexecCheck.h"
-#include "../utils/ASTUtils.h"
-#include "clang/AST/ASTContext.h"
-#include "clang/ASTMatchers/ASTMatchFinder.h"
-#include "clang/Lex/Lexer.h"
-
-using namespace clang::ast_matchers;
-
-namespace clang {
-namespace tidy {
-namespace android {
-
-namespace {
-
-const char *const FuncDeclBindingStr = "funcDecl";
-const char *const FuncBindingStr = "func";
-
-// Helper function to form the correct string mode for Type3.
-// Build the replace text. If it's string constant, add <Mode> directly in the
-// end of the string. Else, add <Mode>.
-std::string buildFixMsgForStringFlag(const Expr *Arg, const SourceManager &SM,
-                                     const LangOptions &LangOpts, char Mode) {
-  if (Arg->getLocStart().isMacroID())
-    return (Lexer::getSourceText(
-                CharSourceRange::getTokenRange(Arg->getSourceRange()), SM,
-                LangOpts) +
-            " \"" + Twine(Mode) + "\"")
-        .str();
-
-  StringRef SR = cast<StringLiteral>(Arg->IgnoreParenCasts())->getString();
-  return ("\"" + SR + Twine(Mode) + "\"").str();
-}
-} // namespace
-
-void CloexecCheck::registerMatchersImpl(
-    MatchFinder *Finder, internal::Matcher<FunctionDecl> Function) {
-  // We assume all the checked APIs are C functions.
-  Finder->addMatcher(
-      callExpr(
-          callee(functionDecl(isExternC(), Function).bind(FuncDeclBindingStr)))
-          .bind(FuncBindingStr),
-      this);
-}
-
-void CloexecCheck::insertMacroFlag(const MatchFinder::MatchResult &Result,
-                                   StringRef MacroFlag, int ArgPos) {
-  const auto *MatchedCall = Result.Nodes.getNodeAs<CallExpr>(FuncBindingStr);
-  const auto *FlagArg = MatchedCall->getArg(ArgPos);
-  const auto *FD = Result.Nodes.getNodeAs<FunctionDecl>(FuncDeclBindingStr);
-  SourceManager &SM = *Result.SourceManager;
-
-  if (utils::exprHasBitFlagWithSpelling(FlagArg->IgnoreParenCasts(), SM,
-                                        Result.Context->getLangOpts(),
-                                        MacroFlag))
-    return;
-
-  SourceLocation EndLoc =
-      Lexer::getLocForEndOfToken(SM.getFileLoc(FlagArg->getLocEnd()), 0, SM,
-                                 Result.Context->getLangOpts());
-
-  diag(EndLoc, "%0 should use %1 where possible")
-      << FD << MacroFlag
-      << FixItHint::CreateInsertion(EndLoc, (Twine(" | ") + MacroFlag).str());
-}
-
-void CloexecCheck::replaceFunc(const MatchFinder::MatchResult &Result,
-                               StringRef WarningMsg, StringRef FixMsg) {
-  const auto *MatchedCall = Result.Nodes.getNodeAs<CallExpr>(FuncBindingStr);
-  diag(MatchedCall->getLocStart(), WarningMsg)
-      << FixItHint::CreateReplacement(MatchedCall->getSourceRange(), FixMsg);
-}
-
-void CloexecCheck::insertStringFlag(
-    const ast_matchers::MatchFinder::MatchResult &Result, const char Mode,
-    const int ArgPos) {
-  const auto *MatchedCall = Result.Nodes.getNodeAs<CallExpr>(FuncBindingStr);
-  const auto *FD = Result.Nodes.getNodeAs<FunctionDecl>(FuncDeclBindingStr);
-  const auto *ModeArg = MatchedCall->getArg(ArgPos);
-
-  // Check if the <Mode> may be in the mode string.
-  const auto *ModeStr = dyn_cast<StringLiteral>(ModeArg->IgnoreParenCasts());
-  if (!ModeStr || (ModeStr->getString().find(Mode) != StringRef::npos))
-    return;
-
-  const std::string &ReplacementText = buildFixMsgForStringFlag(
-      ModeArg, *Result.SourceManager, Result.Context->getLangOpts(), Mode);
-
-  diag(ModeArg->getLocStart(), "use %0 mode '%1' to set O_CLOEXEC")
-      << FD << Mode
-      << FixItHint::CreateReplacement(ModeArg->getSourceRange(),
-                                      ReplacementText);
-}
-
-} // namespace android
-} // namespace tidy
-} // namespace clang

Removed: clang-tools-extra/trunk/clang-tidy/android/CloexecCheck.h
URL: 
http://llvm.org/viewvc/llvm-project/clang-tools-extra/trunk/clang-tidy/android/CloexecCheck.h?rev=310660&view=auto
==============================================================================
--- clang-tools-extra/trunk/clang-tidy/android/CloexecCheck.h (original)
+++ clang-tools-extra/trunk/clang-tidy/android/CloexecCheck.h (removed)
@@ -1,95 +0,0 @@
-//===--- CloexecCheck.h - clang-tidy-----------------------------*- C++ 
-*-===//
-//
-//                     The LLVM Compiler Infrastructure
-//
-// This file is distributed under the University of Illinois Open Source
-// License. See LICENSE.TXT for details.
-//
-//===----------------------------------------------------------------------===//
-///
-/// \file
-/// This file contains the declaration of the CloexecCheck class, which is the
-/// base class for all of the close-on-exec checks in Android module.
-///
-//===----------------------------------------------------------------------===//
-
-#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_H
-#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_H
-
-#include "../ClangTidy.h"
-
-namespace clang {
-namespace tidy {
-namespace android {
-
-/// \brief The base class for all close-on-exec checks in Android module.
-/// To be specific, there are some functions that need the close-on-exec flag 
to
-/// prevent the file descriptor leakage on fork+exec and this class provides
-/// utilities to identify and fix these C functions.
-class CloexecCheck : public ClangTidyCheck {
-public:
-  CloexecCheck(StringRef Name, ClangTidyContext *Context)
-      : ClangTidyCheck(Name, Context) {}
-
-protected:
-  void
-  registerMatchersImpl(ast_matchers::MatchFinder *Finder,
-                       ast_matchers::internal::Matcher<FunctionDecl> Function);
-
-  /// Currently, we have three types of fixes.
-  ///
-  /// Type1 is to insert the necessary macro flag in the flag argument. For
-  /// example, 'O_CLOEXEC' is required in function 'open()', so
-  /// \code
-  ///   open(file, O_RDONLY);
-  /// \endcode
-  /// should be
-  /// \code
-  ///   open(file, O_RDONLY | O_CLOEXE);
-  /// \endcode
-  ///
-  /// \param [out] Result MatchResult from AST matcher.
-  /// \param MacroFlag The macro name of the flag.
-  /// \param ArgPos The 0-based position of the flag argument.
-  void insertMacroFlag(const ast_matchers::MatchFinder::MatchResult &Result,
-                       StringRef MarcoFlag, int ArgPos);
-
-  /// Type2 is to replace the API to another function that has required the
-  /// ability. For example:
-  /// \code
-  ///   creat(path, mode);
-  /// \endcode
-  /// should be
-  /// \code
-  ///   open(path, O_CREAT | O_WRONLY | O_TRUNC | O_CLOEXEC, mode)
-  /// \endcode
-  ///
-  /// \param [out] Result MatchResult from AST matcher.
-  /// \param WarningMsg The warning message.
-  /// \param FixMsg The fix message.
-  void replaceFunc(const ast_matchers::MatchFinder::MatchResult &Result,
-                   StringRef WarningMsg, StringRef FixMsg);
-
-  /// Type3 is also to add a flag to the corresponding argument, but this time,
-  /// the flag is some string and each char represents a mode rather than a
-  /// macro. For example, 'fopen' needs char 'e' in its mode argument string, 
so
-  /// \code
-  ///   fopen(in_file, "r");
-  /// \endcode
-  /// should be
-  /// \code
-  ///   fopen(in_file, "re");
-  /// \endcode
-  ///
-  /// \param [out] Result MatchResult from AST matcher.
-  /// \param Mode The required mode char.
-  /// \param ArgPos The 0-based position of the flag argument.
-  void insertStringFlag(const ast_matchers::MatchFinder::MatchResult &Result,
-                        char Mode, const int ArgPos);
-};
-
-} // namespace android
-} // namespace tidy
-} // namespace clang
-
-#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_H

Removed: clang-tools-extra/trunk/clang-tidy/android/CloexecMemfdCreateCheck.cpp
URL: 
http://llvm.org/viewvc/llvm-project/clang-tools-extra/trunk/clang-tidy/android/CloexecMemfdCreateCheck.cpp?rev=310660&view=auto
==============================================================================
--- clang-tools-extra/trunk/clang-tidy/android/CloexecMemfdCreateCheck.cpp 
(original)
+++ clang-tools-extra/trunk/clang-tidy/android/CloexecMemfdCreateCheck.cpp 
(removed)
@@ -1,32 +0,0 @@
-//===--- CloexecMemfdCreateCheck.cpp - 
clang-tidy--------------------------===//
-//
-//                     The LLVM Compiler Infrastructure
-//
-// This file is distributed under the University of Illinois Open Source
-// License. See LICENSE.TXT for details.
-//
-//===----------------------------------------------------------------------===//
-
-#include "CloexecMemfdCreateCheck.h"
-
-using namespace clang::ast_matchers;
-
-namespace clang {
-namespace tidy {
-namespace android {
-
-void CloexecMemfdCreateCheck::registerMatchers(MatchFinder *Finder) {
-  auto CharPointerType = hasType(pointerType(pointee(isAnyCharacter())));
-  registerMatchersImpl(
-      Finder, functionDecl(returns(isInteger()), hasName("memfd_create"),
-                           hasParameter(0, CharPointerType),
-                           hasParameter(1, hasType(isInteger()))));
-}
-
-void CloexecMemfdCreateCheck::check(const MatchFinder::MatchResult &Result) {
-  insertMacroFlag(Result, "MFD_CLOEXEC", /*ArgPos=*/1);
-}
-
-} // namespace android
-} // namespace tidy
-} // namespace clang

Removed: clang-tools-extra/trunk/clang-tidy/android/CloexecMemfdCreateCheck.h
URL: 
http://llvm.org/viewvc/llvm-project/clang-tools-extra/trunk/clang-tidy/android/CloexecMemfdCreateCheck.h?rev=310660&view=auto
==============================================================================
--- clang-tools-extra/trunk/clang-tidy/android/CloexecMemfdCreateCheck.h 
(original)
+++ clang-tools-extra/trunk/clang-tidy/android/CloexecMemfdCreateCheck.h 
(removed)
@@ -1,35 +0,0 @@
-//===--- CloexecMemfdCreateCheck.h - clang-tidy-----------------*- C++ -*-===//
-//
-//                     The LLVM Compiler Infrastructure
-//
-// This file is distributed under the University of Illinois Open Source
-// License. See LICENSE.TXT for details.
-//
-//===----------------------------------------------------------------------===//
-
-#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_MEMFD_CREATE_H
-#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_MEMFD_CREATE_H
-
-#include "CloexecCheck.h"
-
-namespace clang {
-namespace tidy {
-namespace android {
-
-/// Finds code that uses memfd_create() without using the MFD_CLOEXEC flag.
-///
-/// For the user-facing documentation see:
-/// 
http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-memfd-create.html
-class CloexecMemfdCreateCheck : public CloexecCheck {
-public:
-  CloexecMemfdCreateCheck(StringRef Name, ClangTidyContext *Context)
-      : CloexecCheck(Name, Context) {}
-  void registerMatchers(ast_matchers::MatchFinder *Finder) override;
-  void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
-};
-
-} // namespace android
-} // namespace tidy
-} // namespace clang
-
-#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_MEMFD_CREATE_H

Modified: clang-tools-extra/trunk/docs/ReleaseNotes.rst
URL: 
http://llvm.org/viewvc/llvm-project/clang-tools-extra/trunk/docs/ReleaseNotes.rst?rev=310661&r1=310660&r2=310661&view=diff
==============================================================================
--- clang-tools-extra/trunk/docs/ReleaseNotes.rst (original)
+++ clang-tools-extra/trunk/docs/ReleaseNotes.rst Thu Aug 10 14:21:15 2017
@@ -70,12 +70,6 @@ Improvements to clang-tidy
       ``AllowConditionalIntegerCasts`` -> ``AllowIntegerConditions``,
       ``AllowConditionalPointerCasts`` -> ``AllowPointerConditions``.
 
-- New `android-cloexec-memfd_create
-    
<http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-memfd_create.html>`_
 check
-
-  Checks if the required file flag ``MFD_CLOEXEC`` is present in the argument
-  of ``memfd_create()``.
-
 - New `bugprone-integer-division
   
<http://clang.llvm.org/extra/clang-tidy/checks/bugprone-integer-division.html>`_
 check
 

Removed: 
clang-tools-extra/trunk/docs/clang-tidy/checks/android-cloexec-memfd-create.rst
URL: 
http://llvm.org/viewvc/llvm-project/clang-tools-extra/trunk/docs/clang-tidy/checks/android-cloexec-memfd-create.rst?rev=310660&view=auto
==============================================================================
--- 
clang-tools-extra/trunk/docs/clang-tidy/checks/android-cloexec-memfd-create.rst 
(original)
+++ 
clang-tools-extra/trunk/docs/clang-tidy/checks/android-cloexec-memfd-create.rst 
(removed)
@@ -1,18 +0,0 @@
-.. title:: clang-tidy - android-cloexec-memfd-create
-
-android-cloexec-memfd-create
-============================
-
-``memfd_create()`` should include ``MFD_CLOEXEC`` in its type argument to avoid
-the file descriptor leakage. Without this flag, an opened sensitive file would
-remain open across a fork+exec to a lower-privileged SELinux domain.
-
-Examples:
-
-.. code-block:: c++
-
-  memfd_create(name, MFD_ALLOW_SEALING);
-
-  // becomes
-
-  memfd_create(name, MFD_ALLOW_SEALING | MFD_CLOEXEC);

Modified: clang-tools-extra/trunk/docs/clang-tidy/checks/list.rst
URL: 
http://llvm.org/viewvc/llvm-project/clang-tools-extra/trunk/docs/clang-tidy/checks/list.rst?rev=310661&r1=310660&r2=310661&view=diff
==============================================================================
--- clang-tools-extra/trunk/docs/clang-tidy/checks/list.rst (original)
+++ clang-tools-extra/trunk/docs/clang-tidy/checks/list.rst Thu Aug 10 14:21:15 
2017
@@ -6,7 +6,6 @@ Clang-Tidy Checks
 .. toctree::
    android-cloexec-creat
    android-cloexec-fopen
-   android-cloexec-memfd-create
    android-cloexec-open
    android-cloexec-socket
    boost-use-to-string

Removed: 
clang-tools-extra/trunk/test/clang-tidy/android-cloexec-memfd-create.cpp
URL: 
http://llvm.org/viewvc/llvm-project/clang-tools-extra/trunk/test/clang-tidy/android-cloexec-memfd-create.cpp?rev=310660&view=auto
==============================================================================
--- clang-tools-extra/trunk/test/clang-tidy/android-cloexec-memfd-create.cpp 
(original)
+++ clang-tools-extra/trunk/test/clang-tidy/android-cloexec-memfd-create.cpp 
(removed)
@@ -1,63 +0,0 @@
-// RUN: %check_clang_tidy %s android-cloexec-memfd-create %t
-
-#define MFD_ALLOW_SEALING 1
-#define __O_CLOEXEC 3
-#define MFD_CLOEXEC __O_CLOEXEC
-#define TEMP_FAILURE_RETRY(exp) \
-  ({                            \
-    int _rc;                    \
-    do {                        \
-      _rc = (exp);              \
-    } while (_rc == -1);        \
-  })
-#define NULL 0
-
-extern "C" int memfd_create(const char *name, unsigned int flags);
-
-void a() {
-  memfd_create(NULL, MFD_ALLOW_SEALING);
-  // CHECK-MESSAGES: :[[@LINE-1]]:39: warning: 'memfd_create' should use 
MFD_CLOEXEC where possible [android-cloexec-memfd-create]
-  // CHECK-FIXES: memfd_create(NULL, MFD_ALLOW_SEALING | MFD_CLOEXEC)
-  TEMP_FAILURE_RETRY(memfd_create(NULL, MFD_ALLOW_SEALING));
-  // CHECK-MESSAGES: :[[@LINE-1]]:58: warning: 'memfd_create'
-  // CHECK-FIXES: TEMP_FAILURE_RETRY(memfd_create(NULL, MFD_ALLOW_SEALING | 
MFD_CLOEXEC))
-}
-
-void f() {
-  memfd_create(NULL, 3);
-  // CHECK-MESSAGES: :[[@LINE-1]]:23: warning: 'memfd_create'
-  // CHECK-FIXES: memfd_create(NULL, 3 | MFD_CLOEXEC)
-  TEMP_FAILURE_RETRY(memfd_create(NULL, 3));
-  // CHECK-MESSAGES: :[[@LINE-1]]:42: warning: 'memfd_create'
-  // CHECK-FIXES: TEMP_FAILURE_RETRY(memfd_create(NULL, 3 | MFD_CLOEXEC))
-
-  int flag = 3;
-  memfd_create(NULL, flag);
-  TEMP_FAILURE_RETRY(memfd_create(NULL, flag));
-}
-
-namespace i {
-int memfd_create(const char *name, unsigned int flags);
-
-void d() {
-  memfd_create(NULL, MFD_ALLOW_SEALING);
-  TEMP_FAILURE_RETRY(memfd_create(NULL, MFD_ALLOW_SEALING));
-}
-
-} // namespace i
-
-void e() {
-  memfd_create(NULL, MFD_CLOEXEC);
-  TEMP_FAILURE_RETRY(memfd_create(NULL, MFD_CLOEXEC));
-  memfd_create(NULL, MFD_ALLOW_SEALING | MFD_CLOEXEC);
-  TEMP_FAILURE_RETRY(memfd_create(NULL, MFD_ALLOW_SEALING | MFD_CLOEXEC));
-}
-
-class G {
-public:
-  int memfd_create(const char *name, unsigned int flags);
-  void d() {
-    memfd_create(NULL, MFD_ALLOW_SEALING);
-    TEMP_FAILURE_RETRY(memfd_create(NULL, MFD_ALLOW_SEALING));
-  }
-};


_______________________________________________
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits

Reply via email to