import clang-13.0.1-1.el9
This commit is contained in:
commit
953e64d942
3
.clang.metadata
Normal file
3
.clang.metadata
Normal file
@ -0,0 +1,3 @@
|
||||
9cdc305550fbd27d52d023e8506c50c41e97b7fa SOURCES/clang-13.0.1.src.tar.xz
|
||||
ee28b71609e57e677205f44076e450fe5f577a22 SOURCES/clang-tools-extra-13.0.1.src.tar.xz
|
||||
b8d2648a01d36ed0186fd2c5af325fd28797f9a0 SOURCES/tstellar-gpg-key.asc
|
3
.gitignore
vendored
Normal file
3
.gitignore
vendored
Normal file
@ -0,0 +1,3 @@
|
||||
SOURCES/clang-13.0.1.src.tar.xz
|
||||
SOURCES/clang-tools-extra-13.0.1.src.tar.xz
|
||||
SOURCES/tstellar-gpg-key.asc
|
10073
SOURCES/0001-Confusable-identifiers-detection.patch
Normal file
10073
SOURCES/0001-Confusable-identifiers-detection.patch
Normal file
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,59 @@
|
||||
From d68a5a7817dc0d43853d8b84c9185dc24338664f Mon Sep 17 00:00:00 2001
|
||||
From: Tom Stellard <tstellar@redhat.com>
|
||||
Date: Wed, 6 Oct 2021 05:32:44 +0000
|
||||
Subject: [PATCH] Driver: Add a gcc equivalent triple to the list of triples to
|
||||
search
|
||||
|
||||
There are some gcc triples, like x86_64-redhat-linux, that provide the
|
||||
same behavior as a clang triple with a similar name (e.g.
|
||||
x86_64-redhat-linux-gnu). When searching for a gcc install, also search
|
||||
for a gcc equivalent triple if one exists.
|
||||
|
||||
Differential Revision: https://reviews.llvm.org/D111207
|
||||
---
|
||||
clang/lib/Driver/ToolChains/Gnu.cpp | 22 ++++++++++++++++++++++
|
||||
1 file changed, 22 insertions(+)
|
||||
|
||||
diff --git a/clang/lib/Driver/ToolChains/Gnu.cpp b/clang/lib/Driver/ToolChains/Gnu.cpp
|
||||
index fe5bda5c6605..fd4a7f72be14 100644
|
||||
--- a/clang/lib/Driver/ToolChains/Gnu.cpp
|
||||
+++ b/clang/lib/Driver/ToolChains/Gnu.cpp
|
||||
@@ -1884,6 +1884,18 @@ static llvm::StringRef getGCCToolchainDir(const ArgList &Args,
|
||||
return GCC_INSTALL_PREFIX;
|
||||
}
|
||||
|
||||
+/// This function takes a 'clang' triple and converts it to an equivalent gcc
|
||||
+/// triple.
|
||||
+static const char *ConvertToGccTriple(StringRef CandidateTriple) {
|
||||
+ return llvm::StringSwitch<const char *>(CandidateTriple)
|
||||
+ .Case("aarch64-redhat-linux-gnu", "aarch64-redhat-linux")
|
||||
+ .Case("i686-redhat-linux-gnu", "i686-redhat-linux")
|
||||
+ .Case("ppc64le-redhat-linux-gnu", "ppc64le-redhat-linux")
|
||||
+ .Case("s390x-redhat-linux-gnu", "s390x-redhat-linux")
|
||||
+ .Case("x86_64-redhat-linux-gnu", "x86_64-redhat-linux")
|
||||
+ .Default(NULL);
|
||||
+}
|
||||
+
|
||||
/// Initialize a GCCInstallationDetector from the driver.
|
||||
///
|
||||
/// This performs all of the autodetection and sets up the various paths.
|
||||
@@ -1904,6 +1916,16 @@ void Generic_GCC::GCCInstallationDetector::init(
|
||||
// The compatible GCC triples for this particular architecture.
|
||||
SmallVector<StringRef, 16> CandidateTripleAliases;
|
||||
SmallVector<StringRef, 16> CandidateBiarchTripleAliases;
|
||||
+
|
||||
+ // In some cases gcc uses a slightly different triple than clang for the
|
||||
+ // same target. Convert the clang triple to the gcc equivalent and use that
|
||||
+ // to search for the gcc install.
|
||||
+ const char *ConvertedTriple = ConvertToGccTriple(TargetTriple.str());
|
||||
+ if (ConvertedTriple) {
|
||||
+ CandidateTripleAliases.push_back(ConvertedTriple);
|
||||
+ CandidateBiarchTripleAliases.push_back(ConvertedTriple);
|
||||
+ }
|
||||
+
|
||||
CollectLibDirsAndTriples(TargetTriple, BiarchVariantTriple, CandidateLibDirs,
|
||||
CandidateTripleAliases, CandidateBiarchLibDirs,
|
||||
CandidateBiarchTripleAliases);
|
||||
--
|
||||
2.26.2
|
||||
|
@ -0,0 +1,36 @@
|
||||
From 62eaebcb6bb872830299efa3f87506f1d23ef366 Mon Sep 17 00:00:00 2001
|
||||
From: serge-sans-paille <sguelton@redhat.com>
|
||||
Date: Mon, 13 Sep 2021 10:25:45 +0200
|
||||
Subject: [PATCH][clang] Fix scan-build-py executable lookup path
|
||||
|
||||
Once installed, scan-build-py doesn't know anything about its auxiliary
|
||||
executable and can't find them.
|
||||
Use relative path wrt. scan-build-py script.
|
||||
|
||||
Differential Revision: https://reviews.llvm.org/D109659
|
||||
|
||||
(cherry picked from commit c84755a046bbdcd0564693e30b2508034b06002b)
|
||||
---
|
||||
clang/tools/scan-build-py/lib/libscanbuild/analyze.py | 6 ++++--
|
||||
1 file changed, 4 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/clang/tools/scan-build-py/lib/libscanbuild/analyze.py b/clang/tools/scan-build-py/lib/libscanbuild/analyze.py
|
||||
index 9a249a8..d83ff2a 100644
|
||||
--- a/clang/tools/scan-build-py/lib/libscanbuild/analyze.py
|
||||
+++ b/clang/tools/scan-build-py/lib/libscanbuild/analyze.py
|
||||
@@ -39,8 +39,10 @@ from libscanbuild.shell import decode
|
||||
|
||||
__all__ = ['scan_build', 'analyze_build', 'analyze_compiler_wrapper']
|
||||
|
||||
-COMPILER_WRAPPER_CC = 'analyze-cc'
|
||||
-COMPILER_WRAPPER_CXX = 'analyze-c++'
|
||||
+scanbuild_dir = os.path.dirname(__import__('sys').argv[0])
|
||||
+
|
||||
+COMPILER_WRAPPER_CC = os.path.join(scanbuild_dir, '..', 'libexec', 'analyze-cc')
|
||||
+COMPILER_WRAPPER_CXX = os.path.join(scanbuild_dir, '..', 'libexec', 'analyze-c++')
|
||||
|
||||
CTU_EXTDEF_MAP_FILENAME = 'externalDefMap.txt'
|
||||
CTU_TEMP_DEFMAP_FOLDER = 'tmpExternalDefMaps'
|
||||
--
|
||||
1.8.3.1
|
||||
|
42
SOURCES/0001-PATCH-clang-Reorganize-gtest-integration.patch
Normal file
42
SOURCES/0001-PATCH-clang-Reorganize-gtest-integration.patch
Normal file
@ -0,0 +1,42 @@
|
||||
From c6b921c8d833546946b70a8c2640032fd7c62461 Mon Sep 17 00:00:00 2001
|
||||
From: serge-sans-paille <sguelton@redhat.com>
|
||||
Date: Thu, 25 Feb 2021 14:04:52 +0100
|
||||
Subject: [PATCH 1/6] [PATCH][clang] Reorganize gtest integration
|
||||
|
||||
---
|
||||
clang/CMakeLists.txt | 12 +++++-------
|
||||
1 file changed, 5 insertions(+), 7 deletions(-)
|
||||
|
||||
diff --git a/clang/CMakeLists.txt b/clang/CMakeLists.txt
|
||||
index 9e74014..0185276 100644
|
||||
--- a/clang/CMakeLists.txt
|
||||
+++ b/clang/CMakeLists.txt
|
||||
@@ -153,12 +153,6 @@ if( CMAKE_SOURCE_DIR STREQUAL CMAKE_CURRENT_SOURCE_DIR )
|
||||
set(LLVM_UTILS_PROVIDED ON)
|
||||
set(CLANG_TEST_DEPS FileCheck count not)
|
||||
endif()
|
||||
- set(UNITTEST_DIR ${LLVM_MAIN_SRC_DIR}/utils/unittest)
|
||||
- if(EXISTS ${UNITTEST_DIR}/googletest/include/gtest/gtest.h
|
||||
- AND NOT EXISTS ${LLVM_LIBRARY_DIR}/${CMAKE_STATIC_LIBRARY_PREFIX}gtest${CMAKE_STATIC_LIBRARY_SUFFIX}
|
||||
- AND EXISTS ${UNITTEST_DIR}/CMakeLists.txt)
|
||||
- add_subdirectory(${UNITTEST_DIR} utils/unittest)
|
||||
- endif()
|
||||
else()
|
||||
# Seek installed Lit.
|
||||
find_program(LLVM_LIT
|
||||
@@ -537,7 +531,11 @@ endif()
|
||||
|
||||
|
||||
if( CLANG_INCLUDE_TESTS )
|
||||
- if(EXISTS ${LLVM_MAIN_SRC_DIR}/utils/unittest/googletest/include/gtest/gtest.h)
|
||||
+ set(UNITTEST_DIR ${LLVM_MAIN_SRC_DIR}/utils/unittest)
|
||||
+ if(EXISTS ${UNITTEST_DIR}/googletest/include/gtest/gtest.h
|
||||
+ AND NOT EXISTS ${LLVM_LIBRARY_DIR}/${CMAKE_STATIC_LIBRARY_PREFIX}gtest${CMAKE_STATIC_LIBRARY_SUFFIX}
|
||||
+ AND EXISTS ${UNITTEST_DIR}/CMakeLists.txt)
|
||||
+ add_subdirectory(${UNITTEST_DIR} utils/unittest)
|
||||
add_subdirectory(unittests)
|
||||
list(APPEND CLANG_TEST_DEPS ClangUnitTests)
|
||||
list(APPEND CLANG_TEST_PARAMS
|
||||
--
|
||||
1.8.3.1
|
||||
|
@ -0,0 +1,39 @@
|
||||
From 3dc5722d5c7673a879f2b4680369d3ac8b6b64b6 Mon Sep 17 00:00:00 2001
|
||||
From: Tom Stellard <tstellar@redhat.com>
|
||||
Date: Wed, 4 Aug 2021 14:05:38 -0700
|
||||
Subject: [PATCH] cmake: Allow shared libraries to customize the soname using
|
||||
LLVM_ABI_REVISION
|
||||
|
||||
The LLVM_ABI_REVISION variable is intended to be used for release
|
||||
candidates which introduce an ABI change to a shared library. This
|
||||
variable can be specified per library, so there is not one global value
|
||||
for all of LLVM.
|
||||
|
||||
For example, if we LLVM X.0.0-rc2 introduces an ABI change for a library
|
||||
compared with LLVM X.0.0-rc1, then the LLVM_ABI_REVISION number for
|
||||
library will be incremented by 1.
|
||||
|
||||
In the main branch, LLVM_ABI_REVISION should always be 0, it is only
|
||||
meant to be used in the release branch.
|
||||
|
||||
Differential Revision: https://reviews.llvm.org/D105594
|
||||
---
|
||||
clang/tools/clang-shlib/CMakeLists.txt | 5 +++++
|
||||
3 files changed, 19 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/clang/tools/clang-shlib/CMakeLists.txt b/clang/tools/clang-shlib/CMakeLists.txt
|
||||
index 9c1f8ea452b3..4d785924e4bb 100644
|
||||
--- a/clang/tools/clang-shlib/CMakeLists.txt
|
||||
+++ b/clang/tools/clang-shlib/CMakeLists.txt
|
||||
@@ -1,3 +1,8 @@
|
||||
+# In the main branch, LLVM_ABI_REVISION should always be 0. In the release
|
||||
+# branches, this should be incremented before each release candidate every
|
||||
+# time the ABI of libclang-cpp.so changes.
|
||||
+set(LLVM_ABI_REVISION 0)
|
||||
+
|
||||
# Building libclang-cpp.so fails if LLVM_ENABLE_PIC=Off
|
||||
if (NOT LLVM_ENABLE_PIC)
|
||||
return()
|
||||
--
|
||||
2.27.0
|
||||
|
340
SOURCES/0002-Misleading-bidirectional-detection.patch
Normal file
340
SOURCES/0002-Misleading-bidirectional-detection.patch
Normal file
@ -0,0 +1,340 @@
|
||||
From e7ab823a5f3f57e843069d43033a16165809723a Mon Sep 17 00:00:00 2001
|
||||
From: serge-sans-paille <sguelton@redhat.com>
|
||||
Date: Thu, 4 Nov 2021 11:11:53 +0100
|
||||
Subject: [PATCH 2/3] Misleading bidirectional detection
|
||||
|
||||
Differential Revision: https://reviews.llvm.org/D112913
|
||||
---
|
||||
clang-tools-extra/clang-tidy/misc/CMakeLists.txt | 1 +
|
||||
.../clang-tidy/misc/MiscTidyModule.cpp | 3 +
|
||||
.../clang-tidy/misc/MisleadingBidirectional.cpp | 131 +++++++++++++++++++++
|
||||
.../clang-tidy/misc/MisleadingBidirectional.h | 38 ++++++
|
||||
clang-tools-extra/docs/ReleaseNotes.rst | 5 +
|
||||
clang-tools-extra/docs/clang-tidy/checks/list.rst | 3 +-
|
||||
.../checks/misc-misleading-bidirectional.rst | 21 ++++
|
||||
.../checkers/misc-misleading-bidirectional.cpp | 31 +++++
|
||||
8 files changed, 232 insertions(+), 1 deletion(-)
|
||||
create mode 100644 clang-tools-extra/clang-tidy/misc/MisleadingBidirectional.cpp
|
||||
create mode 100644 clang-tools-extra/clang-tidy/misc/MisleadingBidirectional.h
|
||||
create mode 100644 clang-tools-extra/docs/clang-tidy/checks/misc-misleading-bidirectional.rst
|
||||
create mode 100644 clang-tools-extra/test/clang-tidy/checkers/misc-misleading-bidirectional.cpp
|
||||
|
||||
diff --git a/clang-tools-extra/clang-tidy/misc/CMakeLists.txt b/clang-tools-extra/clang-tidy/misc/CMakeLists.txt
|
||||
index 7cafe54..e6abac8 100644
|
||||
--- a/clang-tools-extra/clang-tidy/misc/CMakeLists.txt
|
||||
+++ b/clang-tools-extra/clang-tidy/misc/CMakeLists.txt
|
||||
@@ -16,6 +16,7 @@ add_clang_library(clangTidyMiscModule
|
||||
DefinitionsInHeadersCheck.cpp
|
||||
Homoglyph.cpp
|
||||
MiscTidyModule.cpp
|
||||
+ MisleadingBidirectional.cpp
|
||||
MisplacedConstCheck.cpp
|
||||
NewDeleteOverloadsCheck.cpp
|
||||
NoRecursionCheck.cpp
|
||||
diff --git a/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp b/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp
|
||||
index 5c7bd0c..bb5fde2 100644
|
||||
--- a/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp
|
||||
+++ b/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp
|
||||
@@ -11,6 +11,7 @@
|
||||
#include "../ClangTidyModuleRegistry.h"
|
||||
#include "DefinitionsInHeadersCheck.h"
|
||||
#include "Homoglyph.h"
|
||||
+#include "MisleadingBidirectional.h"
|
||||
#include "MisplacedConstCheck.h"
|
||||
#include "NewDeleteOverloadsCheck.h"
|
||||
#include "NoRecursionCheck.h"
|
||||
@@ -35,6 +36,8 @@ public:
|
||||
CheckFactories.registerCheck<DefinitionsInHeadersCheck>(
|
||||
"misc-definitions-in-headers");
|
||||
CheckFactories.registerCheck<Homoglyph>("misc-homoglyph");
|
||||
+ CheckFactories.registerCheck<MisleadingBidirectionalCheck>(
|
||||
+ "misc-misleading-bidirectional");
|
||||
CheckFactories.registerCheck<MisplacedConstCheck>("misc-misplaced-const");
|
||||
CheckFactories.registerCheck<NewDeleteOverloadsCheck>(
|
||||
"misc-new-delete-overloads");
|
||||
diff --git a/clang-tools-extra/clang-tidy/misc/MisleadingBidirectional.cpp b/clang-tools-extra/clang-tidy/misc/MisleadingBidirectional.cpp
|
||||
new file mode 100644
|
||||
index 0000000..7a2f06b
|
||||
--- /dev/null
|
||||
+++ b/clang-tools-extra/clang-tidy/misc/MisleadingBidirectional.cpp
|
||||
@@ -0,0 +1,139 @@
|
||||
+//===--- MisleadingBidirectional.cpp - clang-tidy -------------------------===//
|
||||
+//
|
||||
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
||||
+// See https://llvm.org/LICENSE.txt for license information.
|
||||
+// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
||||
+//
|
||||
+//===----------------------------------------------------------------------===//
|
||||
+
|
||||
+#include "MisleadingBidirectional.h"
|
||||
+
|
||||
+#include "clang/Frontend/CompilerInstance.h"
|
||||
+#include "clang/Lex/Preprocessor.h"
|
||||
+#include "llvm/Support/ConvertUTF.h"
|
||||
+
|
||||
+using namespace clang;
|
||||
+using namespace clang::tidy::misc;
|
||||
+
|
||||
+static bool containsMisleadingBidi(StringRef Buffer,
|
||||
+ bool HonorLineBreaks = true) {
|
||||
+ const char *CurPtr = Buffer.begin();
|
||||
+
|
||||
+ enum BidiChar {
|
||||
+ PS = 0x2029,
|
||||
+ RLO = 0x202E,
|
||||
+ RLE = 0x202B,
|
||||
+ LRO = 0x202D,
|
||||
+ LRE = 0x202A,
|
||||
+ PDF = 0x202C,
|
||||
+ RLI = 0x2067,
|
||||
+ LRI = 0x2066,
|
||||
+ FSI = 0x2068,
|
||||
+ PDI = 0x2069
|
||||
+ };
|
||||
+
|
||||
+ SmallVector<BidiChar> BidiContexts;
|
||||
+
|
||||
+ // Scan each character while maintaining a stack of opened bidi context.
|
||||
+ // RLO/RLE/LRO/LRE all are closed by PDF while RLI LRI and FSI are closed by
|
||||
+ // PDI. New lines reset the context count. Extra PDF / PDI are ignored.
|
||||
+ //
|
||||
+ // Warn if we end up with an unclosed context.
|
||||
+ while (CurPtr < Buffer.end()) {
|
||||
+ unsigned char C = *CurPtr;
|
||||
+ if (isASCII(C)) {
|
||||
+ ++CurPtr;
|
||||
+ bool IsParagrapSep =
|
||||
+ (C == 0xA || C == 0xD || (0x1C <= C && C <= 0x1E) || C == 0x85);
|
||||
+ bool IsSegmentSep = (C == 0x9 || C == 0xB || C == 0x1F);
|
||||
+ if (IsParagrapSep || IsSegmentSep)
|
||||
+ BidiContexts.clear();
|
||||
+ continue;
|
||||
+ }
|
||||
+ llvm::UTF32 CodePoint;
|
||||
+ llvm::ConversionResult Result = llvm::convertUTF8Sequence(
|
||||
+ (const llvm::UTF8 **)&CurPtr, (const llvm::UTF8 *)Buffer.end(),
|
||||
+ &CodePoint, llvm::strictConversion);
|
||||
+
|
||||
+ // If conversion fails, utf-8 is designed so that we can just try next char.
|
||||
+ if (Result != llvm::conversionOK) {
|
||||
+ ++CurPtr;
|
||||
+ continue;
|
||||
+ }
|
||||
+
|
||||
+ // Open a PDF context.
|
||||
+ if (CodePoint == RLO || CodePoint == RLE || CodePoint == LRO ||
|
||||
+ CodePoint == LRE)
|
||||
+ BidiContexts.push_back(PDF);
|
||||
+ // Close PDF Context.
|
||||
+ else if (CodePoint == PDF) {
|
||||
+ if (!BidiContexts.empty() && BidiContexts.back() == PDF)
|
||||
+ BidiContexts.pop_back();
|
||||
+ }
|
||||
+ // Open a PDI Context.
|
||||
+ else if (CodePoint == RLI || CodePoint == LRI || CodePoint == FSI)
|
||||
+ BidiContexts.push_back(PDI);
|
||||
+ // Close a PDI Context.
|
||||
+ else if (CodePoint == PDI) {
|
||||
+ auto R = std::find(BidiContexts.rbegin(), BidiContexts.rend(), PDI);
|
||||
+ if (R != BidiContexts.rend())
|
||||
+ BidiContexts.resize(BidiContexts.rend() - R - 1);
|
||||
+ }
|
||||
+ // Line break or equivalent
|
||||
+ else if (CodePoint == PS)
|
||||
+ BidiContexts.clear();
|
||||
+ }
|
||||
+ return !BidiContexts.empty();
|
||||
+}
|
||||
+
|
||||
+class MisleadingBidirectionalCheck::MisleadingBidirectionalHandler
|
||||
+ : public CommentHandler {
|
||||
+public:
|
||||
+ MisleadingBidirectionalHandler(MisleadingBidirectionalCheck &Check,
|
||||
+ llvm::Optional<std::string> User)
|
||||
+ : Check(Check) {}
|
||||
+
|
||||
+ bool HandleComment(Preprocessor &PP, SourceRange Range) override {
|
||||
+ // FIXME: check that we are in a /* */ comment
|
||||
+ StringRef Text =
|
||||
+ Lexer::getSourceText(CharSourceRange::getCharRange(Range),
|
||||
+ PP.getSourceManager(), PP.getLangOpts());
|
||||
+
|
||||
+ if (containsMisleadingBidi(Text, true))
|
||||
+ Check.diag(
|
||||
+ Range.getBegin(),
|
||||
+ "comment contains misleading bidirectional Unicode characters");
|
||||
+ return false;
|
||||
+ }
|
||||
+
|
||||
+private:
|
||||
+ MisleadingBidirectionalCheck &Check;
|
||||
+};
|
||||
+
|
||||
+MisleadingBidirectionalCheck::MisleadingBidirectionalCheck(
|
||||
+ StringRef Name, ClangTidyContext *Context)
|
||||
+ : ClangTidyCheck(Name, Context),
|
||||
+ Handler(std::make_unique<MisleadingBidirectionalHandler>(
|
||||
+ *this, Context->getOptions().User)) {}
|
||||
+
|
||||
+MisleadingBidirectionalCheck::~MisleadingBidirectionalCheck() = default;
|
||||
+
|
||||
+void MisleadingBidirectionalCheck::registerPPCallbacks(
|
||||
+ const SourceManager &SM, Preprocessor *PP, Preprocessor *ModuleExpanderPP) {
|
||||
+ PP->addCommentHandler(Handler.get());
|
||||
+}
|
||||
+
|
||||
+void MisleadingBidirectionalCheck::check(
|
||||
+ const ast_matchers::MatchFinder::MatchResult &Result) {
|
||||
+ if (const auto *SL = Result.Nodes.getNodeAs<StringLiteral>("strlit")) {
|
||||
+ StringRef Literal = SL->getBytes();
|
||||
+ if (containsMisleadingBidi(Literal, false))
|
||||
+ diag(SL->getBeginLoc(), "string literal contains misleading "
|
||||
+ "bidirectional Unicode characters");
|
||||
+ }
|
||||
+}
|
||||
+
|
||||
+void MisleadingBidirectionalCheck::registerMatchers(
|
||||
+ ast_matchers::MatchFinder *Finder) {
|
||||
+ Finder->addMatcher(ast_matchers::stringLiteral().bind("strlit"), this);
|
||||
+}
|
||||
diff --git a/clang-tools-extra/clang-tidy/misc/MisleadingBidirectional.h b/clang-tools-extra/clang-tidy/misc/MisleadingBidirectional.h
|
||||
new file mode 100644
|
||||
index 0000000..18e7060
|
||||
--- /dev/null
|
||||
+++ b/clang-tools-extra/clang-tidy/misc/MisleadingBidirectional.h
|
||||
@@ -0,0 +1,38 @@
|
||||
+//===--- MisleadingBidirectionalCheck.h - clang-tidy ------------*- C++ -*-===//
|
||||
+//
|
||||
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
||||
+// See https://llvm.org/LICENSE.txt for license information.
|
||||
+// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
||||
+//
|
||||
+//===----------------------------------------------------------------------===//
|
||||
+
|
||||
+#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_MISLEADINGBIDIRECTIONALCHECK_H
|
||||
+#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_MISLEADINGBIDIRECTIONALCHECK_H
|
||||
+
|
||||
+#include "../ClangTidyCheck.h"
|
||||
+
|
||||
+namespace clang {
|
||||
+namespace tidy {
|
||||
+namespace misc {
|
||||
+
|
||||
+class MisleadingBidirectionalCheck : public ClangTidyCheck {
|
||||
+public:
|
||||
+ MisleadingBidirectionalCheck(StringRef Name, ClangTidyContext *Context);
|
||||
+ ~MisleadingBidirectionalCheck();
|
||||
+
|
||||
+ void registerPPCallbacks(const SourceManager &SM, Preprocessor *PP,
|
||||
+ Preprocessor *ModuleExpanderPP) override;
|
||||
+
|
||||
+ void registerMatchers(ast_matchers::MatchFinder *Finder) override;
|
||||
+ void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
|
||||
+
|
||||
+private:
|
||||
+ class MisleadingBidirectionalHandler;
|
||||
+ std::unique_ptr<MisleadingBidirectionalHandler> Handler;
|
||||
+};
|
||||
+
|
||||
+} // namespace misc
|
||||
+} // namespace tidy
|
||||
+} // namespace clang
|
||||
+
|
||||
+#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_MISLEADINGBIDIRECTIONALCHECK_H
|
||||
diff --git a/clang-tools-extra/docs/ReleaseNotes.rst b/clang-tools-extra/docs/ReleaseNotes.rst
|
||||
index 37a717e..1eec7db 100644
|
||||
--- a/clang-tools-extra/docs/ReleaseNotes.rst
|
||||
+++ b/clang-tools-extra/docs/ReleaseNotes.rst
|
||||
@@ -218,6 +218,11 @@ New checks
|
||||
|
||||
Detects confusable unicode identifiers.
|
||||
|
||||
+- New :doc:`misc-misleading-bidirectional <clang-tidy/checks/misc-misleading-bidirectional>` check.
|
||||
+
|
||||
+ Inspect string literal and comments for unterminated bidirectional Unicode
|
||||
+ characters.
|
||||
+
|
||||
New check aliases
|
||||
^^^^^^^^^^^^^^^^^
|
||||
|
||||
diff --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst b/clang-tools-extra/docs/clang-tidy/checks/list.rst
|
||||
index df9a95c..b118639 100644
|
||||
--- a/clang-tools-extra/docs/clang-tidy/checks/list.rst
|
||||
+++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst
|
||||
@@ -207,7 +207,8 @@ Clang-Tidy Checks
|
||||
`llvmlibc-implementation-in-namespace <llvmlibc-implementation-in-namespace.html>`_,
|
||||
`llvmlibc-restrict-system-libc-headers <llvmlibc-restrict-system-libc-headers.html>`_, "Yes"
|
||||
`misc-definitions-in-headers <misc-definitions-in-headers.html>`_, "Yes"
|
||||
- `misc-homoglyph <misc-homoglyph.html>`_, "Yes"
|
||||
+ `misc-homoglyph <misc-homoglyph.html>`_,
|
||||
+ `misc-misleading-bidirectional <misc-misleading-bidirectional.html>`_,
|
||||
`misc-misplaced-const <misc-misplaced-const.html>`_,
|
||||
`misc-new-delete-overloads <misc-new-delete-overloads.html>`_,
|
||||
`misc-no-recursion <misc-no-recursion.html>`_,
|
||||
diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc-misleading-bidirectional.rst b/clang-tools-extra/docs/clang-tidy/checks/misc-misleading-bidirectional.rst
|
||||
new file mode 100644
|
||||
index 0000000..16ffc97
|
||||
--- /dev/null
|
||||
+++ b/clang-tools-extra/docs/clang-tidy/checks/misc-misleading-bidirectional.rst
|
||||
@@ -0,0 +1,21 @@
|
||||
+.. title:: clang-tidy - misc-misleading-bidirectional
|
||||
+
|
||||
+misc-misleading-bidirectional
|
||||
+=============================
|
||||
+
|
||||
+Warn about unterminated bidirectional unicode sequence, detecting potential attack
|
||||
+as described in the `Trojan Source <https://www.trojansource.codes>`_ attack.
|
||||
+
|
||||
+Example:
|
||||
+
|
||||
+.. code-block:: c++
|
||||
+
|
||||
+ #include <iostream>
|
||||
+
|
||||
+ int main() {
|
||||
+ bool isAdmin = false;
|
||||
+ /* } if (isAdmin) begin admins only */
|
||||
+ std::cout << "You are an admin.\n";
|
||||
+ /* end admins only { */
|
||||
+ return 0;
|
||||
+ }
|
||||
diff --git a/clang-tools-extra/test/clang-tidy/checkers/misc-misleading-bidirectional.cpp b/clang-tools-extra/test/clang-tidy/checkers/misc-misleading-bidirectional.cpp
|
||||
new file mode 100644
|
||||
index 0000000..7a1746d
|
||||
--- /dev/null
|
||||
+++ b/clang-tools-extra/test/clang-tidy/checkers/misc-misleading-bidirectional.cpp
|
||||
@@ -0,0 +1,31 @@
|
||||
+// RUN: %check_clang_tidy %s misc-misleading-bidirectional %t
|
||||
+
|
||||
+void func(void) {
|
||||
+ int admin = 0;
|
||||
+ /* }if(admin) begin*/
|
||||
+ // CHECK-MESSAGES: :[[@LINE-1]]:3: warning: comment contains misleading bidirectional Unicode characters [misc-misleading-bidirectional]
|
||||
+ const char msg[] = "if(admin) tes";
|
||||
+ // CHECK-MESSAGES: :[[@LINE-1]]:22: warning: string literal contains misleading bidirectional Unicode characters [misc-misleading-bidirectional]
|
||||
+}
|
||||
+
|
||||
+void all_fine(void) {
|
||||
+ char valid[] = "somevalidsequence";
|
||||
+ /* EOL ends bidi sequence
|
||||
+ * end it's fine to do so.
|
||||
+ * EOL ends isolate too
|
||||
+ */
|
||||
+}
|
||||
+
|
||||
+int invalid_utf_8(void) {
|
||||
+ bool isAdmin = false;
|
||||
+
|
||||
+ // the comment below contains an invalid utf8 character, but should still be
|
||||
+ // processed.
|
||||
+
|
||||
+ // CHECK-MESSAGES: :[[@LINE+1]]:3: warning: comment contains misleading bidirectional Unicode characters [misc-misleading-bidirectional]
|
||||
+ /* } if (isAdmin) begin admins only */
|
||||
+ return 1;
|
||||
+ /* end admins only { */
|
||||
+ // CHECK-MESSAGES: :[[@LINE-1]]:3: warning: comment contains misleading bidirectional Unicode characters [misc-misleading-bidirectional]
|
||||
+ return 0;
|
||||
+}
|
||||
--
|
||||
1.8.3.1
|
||||
|
@ -0,0 +1,29 @@
|
||||
From c87abee7356b8fde81512ffceadd520776c465d2 Mon Sep 17 00:00:00 2001
|
||||
From: serge-sans-paille <sguelton@redhat.com>
|
||||
Date: Thu, 25 Feb 2021 14:09:29 +0100
|
||||
Subject: [PATCH] [PATCH][clang] Make -funwind-tables the default on all archs
|
||||
|
||||
---
|
||||
clang/lib/Driver/ToolChains/Gnu.cpp | 6 ++++++
|
||||
1 file changed, 6 insertions(+)
|
||||
|
||||
diff --git a/clang/lib/Driver/ToolChains/Gnu.cpp b/clang/lib/Driver/ToolChains/Gnu.cpp
|
||||
index a27841dc5985..7489e6785150 100644
|
||||
--- a/clang/lib/Driver/ToolChains/Gnu.cpp
|
||||
+++ b/clang/lib/Driver/ToolChains/Gnu.cpp
|
||||
@@ -2709,6 +2709,12 @@ bool Generic_GCC::IsUnwindTablesDefault(const ArgList &Args) const {
|
||||
case llvm::Triple::ppc64:
|
||||
case llvm::Triple::ppc64le:
|
||||
case llvm::Triple::x86_64:
|
||||
+
|
||||
+ // Enable -funwind-tables on all architectures supported by Fedora:
|
||||
+ // rhbz#1655546
|
||||
+ case llvm::Triple::x86:
|
||||
+ case llvm::Triple::systemz:
|
||||
+ case llvm::Triple::arm:
|
||||
return true;
|
||||
default:
|
||||
return false;
|
||||
--
|
||||
2.27.0
|
||||
|
363
SOURCES/0003-Misleading-unicode-identifier-detection-pass.patch
Normal file
363
SOURCES/0003-Misleading-unicode-identifier-detection-pass.patch
Normal file
@ -0,0 +1,363 @@
|
||||
From dbfbbab65139552549604931dfa2759c9aa392de Mon Sep 17 00:00:00 2001
|
||||
From: serge-sans-paille <sguelton@redhat.com>
|
||||
Date: Fri, 15 Oct 2021 15:18:52 +0200
|
||||
Subject: [PATCH 3/3] Misleading unicode identifier detection pass
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain; charset=UTF-8
|
||||
Content-Transfer-Encoding: 8bit
|
||||
|
||||
Detect when an identifier contains some Right-To-Left characters.
|
||||
This pass relates to https://trojansource.codes/
|
||||
|
||||
Example of misleading source:
|
||||
|
||||
short int א = (short int)0;
|
||||
short int ג = (short int)12345;
|
||||
|
||||
int main() {
|
||||
int א = ג; // a local variable, set to zero?
|
||||
printf("ג is %d\n", ג);
|
||||
printf("א is %d\n", א);
|
||||
}
|
||||
|
||||
This is a recommit of 299aa4dfa1d8c120648b1404b481d858b76c8173 with missing
|
||||
option registration fixed.
|
||||
|
||||
Differential Revision: https://reviews.llvm.org/D112914
|
||||
---
|
||||
clang-tools-extra/clang-tidy/misc/CMakeLists.txt | 1 +
|
||||
.../clang-tidy/misc/MiscTidyModule.cpp | 3 +
|
||||
.../clang-tidy/misc/MisleadingIdentifier.cpp | 166 +++++++++++++++++++++
|
||||
.../clang-tidy/misc/MisleadingIdentifier.h | 31 ++++
|
||||
clang-tools-extra/docs/ReleaseNotes.rst | 4 +
|
||||
clang-tools-extra/docs/clang-tidy/checks/list.rst | 1 +
|
||||
.../checks/misc-misleading-identifier.rst | 23 +++
|
||||
.../checkers/misc-misleading-identifier.cpp | 15 ++
|
||||
8 files changed, 244 insertions(+)
|
||||
create mode 100644 clang-tools-extra/clang-tidy/misc/MisleadingIdentifier.cpp
|
||||
create mode 100644 clang-tools-extra/clang-tidy/misc/MisleadingIdentifier.h
|
||||
create mode 100644 clang-tools-extra/docs/clang-tidy/checks/misc-misleading-identifier.rst
|
||||
create mode 100644 clang-tools-extra/test/clang-tidy/checkers/misc-misleading-identifier.cpp
|
||||
|
||||
diff --git a/clang-tools-extra/clang-tidy/misc/CMakeLists.txt b/clang-tools-extra/clang-tidy/misc/CMakeLists.txt
|
||||
index e6abac8..22d1659 100644
|
||||
--- a/clang-tools-extra/clang-tidy/misc/CMakeLists.txt
|
||||
+++ b/clang-tools-extra/clang-tidy/misc/CMakeLists.txt
|
||||
@@ -17,6 +17,7 @@ add_clang_library(clangTidyMiscModule
|
||||
Homoglyph.cpp
|
||||
MiscTidyModule.cpp
|
||||
MisleadingBidirectional.cpp
|
||||
+ MisleadingIdentifier.cpp
|
||||
MisplacedConstCheck.cpp
|
||||
NewDeleteOverloadsCheck.cpp
|
||||
NoRecursionCheck.cpp
|
||||
diff --git a/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp b/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp
|
||||
index bb5fde2..b484db8 100644
|
||||
--- a/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp
|
||||
+++ b/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp
|
||||
@@ -12,6 +12,7 @@
|
||||
#include "DefinitionsInHeadersCheck.h"
|
||||
#include "Homoglyph.h"
|
||||
#include "MisleadingBidirectional.h"
|
||||
+#include "MisleadingIdentifier.h"
|
||||
#include "MisplacedConstCheck.h"
|
||||
#include "NewDeleteOverloadsCheck.h"
|
||||
#include "NoRecursionCheck.h"
|
||||
@@ -38,6 +39,8 @@ public:
|
||||
CheckFactories.registerCheck<Homoglyph>("misc-homoglyph");
|
||||
CheckFactories.registerCheck<MisleadingBidirectionalCheck>(
|
||||
"misc-misleading-bidirectional");
|
||||
+ CheckFactories.registerCheck<MisleadingIdentifierCheck>(
|
||||
+ "misc-misleading-identifier");
|
||||
CheckFactories.registerCheck<MisplacedConstCheck>("misc-misplaced-const");
|
||||
CheckFactories.registerCheck<NewDeleteOverloadsCheck>(
|
||||
"misc-new-delete-overloads");
|
||||
diff --git a/clang-tools-extra/clang-tidy/misc/MisleadingIdentifier.cpp b/clang-tools-extra/clang-tidy/misc/MisleadingIdentifier.cpp
|
||||
new file mode 100644
|
||||
index 0000000..4ddb8ba
|
||||
--- /dev/null
|
||||
+++ b/clang-tools-extra/clang-tidy/misc/MisleadingIdentifier.cpp
|
||||
@@ -0,0 +1,166 @@
|
||||
+//===--- MisleadingIdentifier.cpp - clang-tidy-----------------------------===//
|
||||
+//
|
||||
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
||||
+// See https://llvm.org/LICENSE.txt for license information.
|
||||
+// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
||||
+//
|
||||
+//===----------------------------------------------------------------------===//
|
||||
+
|
||||
+#include "MisleadingIdentifier.h"
|
||||
+
|
||||
+#include "clang/Frontend/CompilerInstance.h"
|
||||
+#include "llvm/Support/ConvertUTF.h"
|
||||
+
|
||||
+namespace clang {
|
||||
+namespace tidy {
|
||||
+namespace misc {
|
||||
+
|
||||
+// See https://www.unicode.org/Public/14.0.0/ucd/extracted/DerivedBidiClass.txt
|
||||
+static bool isUnassignedAL(llvm::UTF32 CP) {
|
||||
+ return (0x0600 <= CP && CP <= 0x07BF) || (0x0860 <= CP && CP <= 0x08FF) ||
|
||||
+ (0xFB50 <= CP && CP <= 0xFDCF) || (0xFDF0 <= CP && CP <= 0xFDFF) ||
|
||||
+ (0xFE70 <= CP && CP <= 0xFEFF) ||
|
||||
+ (0x00010D00 <= CP && CP <= 0x00010D3F) ||
|
||||
+ (0x00010F30 <= CP && CP <= 0x00010F6F) ||
|
||||
+ (0x0001EC70 <= CP && CP <= 0x0001ECBF) ||
|
||||
+ (0x0001ED00 <= CP && CP <= 0x0001ED4F) ||
|
||||
+ (0x0001EE00 <= CP && CP <= 0x0001EEFF);
|
||||
+}
|
||||
+
|
||||
+// See https://www.unicode.org/Public/14.0.0/ucd/extracted/DerivedBidiClass.txt
|
||||
+static bool isUnassignedR(llvm::UTF32 CP) {
|
||||
+ return (0x0590 <= CP && CP <= 0x05FF) || (0x07C0 <= CP && CP <= 0x085F) ||
|
||||
+ (0xFB1D <= CP && CP <= 0xFB4F) ||
|
||||
+ (0x00010800 <= CP && CP <= 0x00010CFF) ||
|
||||
+ (0x00010D40 <= CP && CP <= 0x00010F2F) ||
|
||||
+ (0x00010F70 <= CP && CP <= 0x00010FFF) ||
|
||||
+ (0x0001E800 <= CP && CP <= 0x0001EC6F) ||
|
||||
+ (0x0001ECC0 <= CP && CP <= 0x0001ECFF) ||
|
||||
+ (0x0001ED50 <= CP && CP <= 0x0001EDFF) ||
|
||||
+ (0x0001EF00 <= CP && CP <= 0x0001EFFF);
|
||||
+}
|
||||
+
|
||||
+// See https://www.unicode.org/Public/14.0.0/ucd/extracted/DerivedBidiClass.txt
|
||||
+static bool isR(llvm::UTF32 CP) {
|
||||
+ return (CP == 0x0590) || (CP == 0x05BE) || (CP == 0x05C0) || (CP == 0x05C3) ||
|
||||
+ (CP == 0x05C6) || (0x05C8 <= CP && CP <= 0x05CF) ||
|
||||
+ (0x05D0 <= CP && CP <= 0x05EA) || (0x05EB <= CP && CP <= 0x05EE) ||
|
||||
+ (0x05EF <= CP && CP <= 0x05F2) || (0x05F3 <= CP && CP <= 0x05F4) ||
|
||||
+ (0x05F5 <= CP && CP <= 0x05FF) || (0x07C0 <= CP && CP <= 0x07C9) ||
|
||||
+ (0x07CA <= CP && CP <= 0x07EA) || (0x07F4 <= CP && CP <= 0x07F5) ||
|
||||
+ (CP == 0x07FA) || (0x07FB <= CP && CP <= 0x07FC) ||
|
||||
+ (0x07FE <= CP && CP <= 0x07FF) || (0x0800 <= CP && CP <= 0x0815) ||
|
||||
+ (CP == 0x081A) || (CP == 0x0824) || (CP == 0x0828) ||
|
||||
+ (0x082E <= CP && CP <= 0x082F) || (0x0830 <= CP && CP <= 0x083E) ||
|
||||
+ (CP == 0x083F) || (0x0840 <= CP && CP <= 0x0858) ||
|
||||
+ (0x085C <= CP && CP <= 0x085D) || (CP == 0x085E) || (CP == 0x085F) ||
|
||||
+ (CP == 0x200F) || (CP == 0xFB1D) || (0xFB1F <= CP && CP <= 0xFB28) ||
|
||||
+ (0xFB2A <= CP && CP <= 0xFB36) || (CP == 0xFB37) ||
|
||||
+ (0xFB38 <= CP && CP <= 0xFB3C) || (CP == 0xFB3D) || (CP == 0xFB3E) ||
|
||||
+ (CP == 0xFB3F) || (0xFB40 <= CP && CP <= 0xFB41) || (CP == 0xFB42) ||
|
||||
+ (0xFB43 <= CP && CP <= 0xFB44) || (CP == 0xFB45) ||
|
||||
+ (0xFB46 <= CP && CP <= 0xFB4F) || (0x10800 <= CP && CP <= 0x10805) ||
|
||||
+ (0x10806 <= CP && CP <= 0x10807) || (CP == 0x10808) ||
|
||||
+ (CP == 0x10809) || (0x1080A <= CP && CP <= 0x10835) ||
|
||||
+ (CP == 0x10836) || (0x10837 <= CP && CP <= 0x10838) ||
|
||||
+ (0x10839 <= CP && CP <= 0x1083B) || (CP == 0x1083C) ||
|
||||
+ (0x1083D <= CP && CP <= 0x1083E) || (0x1083F <= CP && CP <= 0x10855) ||
|
||||
+ (CP == 0x10856) || (CP == 0x10857) ||
|
||||
+ (0x10858 <= CP && CP <= 0x1085F) || (0x10860 <= CP && CP <= 0x10876) ||
|
||||
+ (0x10877 <= CP && CP <= 0x10878) || (0x10879 <= CP && CP <= 0x1087F) ||
|
||||
+ (0x10880 <= CP && CP <= 0x1089E) || (0x1089F <= CP && CP <= 0x108A6) ||
|
||||
+ (0x108A7 <= CP && CP <= 0x108AF) || (0x108B0 <= CP && CP <= 0x108DF) ||
|
||||
+ (0x108E0 <= CP && CP <= 0x108F2) || (CP == 0x108F3) ||
|
||||
+ (0x108F4 <= CP && CP <= 0x108F5) || (0x108F6 <= CP && CP <= 0x108FA) ||
|
||||
+ (0x108FB <= CP && CP <= 0x108FF) || (0x10900 <= CP && CP <= 0x10915) ||
|
||||
+ (0x10916 <= CP && CP <= 0x1091B) || (0x1091C <= CP && CP <= 0x1091E) ||
|
||||
+ (0x10920 <= CP && CP <= 0x10939) || (0x1093A <= CP && CP <= 0x1093E) ||
|
||||
+ (CP == 0x1093F) || (0x10940 <= CP && CP <= 0x1097F) ||
|
||||
+ (0x10980 <= CP && CP <= 0x109B7) || (0x109B8 <= CP && CP <= 0x109BB) ||
|
||||
+ (0x109BC <= CP && CP <= 0x109BD) || (0x109BE <= CP && CP <= 0x109BF) ||
|
||||
+ (0x109C0 <= CP && CP <= 0x109CF) || (0x109D0 <= CP && CP <= 0x109D1) ||
|
||||
+ (0x109D2 <= CP && CP <= 0x109FF) || (CP == 0x10A00) ||
|
||||
+ (CP == 0x10A04) || (0x10A07 <= CP && CP <= 0x10A0B) ||
|
||||
+ (0x10A10 <= CP && CP <= 0x10A13) || (CP == 0x10A14) ||
|
||||
+ (0x10A15 <= CP && CP <= 0x10A17) || (CP == 0x10A18) ||
|
||||
+ (0x10A19 <= CP && CP <= 0x10A35) || (0x10A36 <= CP && CP <= 0x10A37) ||
|
||||
+ (0x10A3B <= CP && CP <= 0x10A3E) || (0x10A40 <= CP && CP <= 0x10A48) ||
|
||||
+ (0x10A49 <= CP && CP <= 0x10A4F) || (0x10A50 <= CP && CP <= 0x10A58) ||
|
||||
+ (0x10A59 <= CP && CP <= 0x10A5F) || (0x10A60 <= CP && CP <= 0x10A7C) ||
|
||||
+ (0x10A7D <= CP && CP <= 0x10A7E) || (CP == 0x10A7F) ||
|
||||
+ (0x10A80 <= CP && CP <= 0x10A9C) || (0x10A9D <= CP && CP <= 0x10A9F) ||
|
||||
+ (0x10AA0 <= CP && CP <= 0x10ABF) || (0x10AC0 <= CP && CP <= 0x10AC7) ||
|
||||
+ (CP == 0x10AC8) || (0x10AC9 <= CP && CP <= 0x10AE4) ||
|
||||
+ (0x10AE7 <= CP && CP <= 0x10AEA) || (0x10AEB <= CP && CP <= 0x10AEF) ||
|
||||
+ (0x10AF0 <= CP && CP <= 0x10AF6) || (0x10AF7 <= CP && CP <= 0x10AFF) ||
|
||||
+ (0x10B00 <= CP && CP <= 0x10B35) || (0x10B36 <= CP && CP <= 0x10B38) ||
|
||||
+ (0x10B40 <= CP && CP <= 0x10B55) || (0x10B56 <= CP && CP <= 0x10B57) ||
|
||||
+ (0x10B58 <= CP && CP <= 0x10B5F) || (0x10B60 <= CP && CP <= 0x10B72) ||
|
||||
+ (0x10B73 <= CP && CP <= 0x10B77) || (0x10B78 <= CP && CP <= 0x10B7F) ||
|
||||
+ (0x10B80 <= CP && CP <= 0x10B91) || (0x10B92 <= CP && CP <= 0x10B98) ||
|
||||
+ (0x10B99 <= CP && CP <= 0x10B9C) || (0x10B9D <= CP && CP <= 0x10BA8) ||
|
||||
+ (0x10BA9 <= CP && CP <= 0x10BAF) || (0x10BB0 <= CP && CP <= 0x10BFF) ||
|
||||
+ (0x10C00 <= CP && CP <= 0x10C48) || (0x10C49 <= CP && CP <= 0x10C7F) ||
|
||||
+ (0x10C80 <= CP && CP <= 0x10CB2) || (0x10CB3 <= CP && CP <= 0x10CBF) ||
|
||||
+ (0x10CC0 <= CP && CP <= 0x10CF2) || (0x10CF3 <= CP && CP <= 0x10CF9) ||
|
||||
+ (0x10CFA <= CP && CP <= 0x10CFF) || (0x10D40 <= CP && CP <= 0x10E5F) ||
|
||||
+ (CP == 0x10E7F) || (0x10E80 <= CP && CP <= 0x10EA9) ||
|
||||
+ (CP == 0x10EAA) || (CP == 0x10EAD) ||
|
||||
+ (0x10EAE <= CP && CP <= 0x10EAF) || (0x10EB0 <= CP && CP <= 0x10EB1) ||
|
||||
+ (0x10EB2 <= CP && CP <= 0x10EFF) || (0x10F00 <= CP && CP <= 0x10F1C) ||
|
||||
+ (0x10F1D <= CP && CP <= 0x10F26) || (CP == 0x10F27) ||
|
||||
+ (0x10F28 <= CP && CP <= 0x10F2F) || (0x10F70 <= CP && CP <= 0x10F81) ||
|
||||
+ (0x10F86 <= CP && CP <= 0x10F89) || (0x10F8A <= CP && CP <= 0x10FAF) ||
|
||||
+ (0x10FB0 <= CP && CP <= 0x10FC4) || (0x10FC5 <= CP && CP <= 0x10FCB) ||
|
||||
+ (0x10FCC <= CP && CP <= 0x10FDF) || (0x10FE0 <= CP && CP <= 0x10FF6) ||
|
||||
+ (0x10FF7 <= CP && CP <= 0x10FFF) || (0x1E800 <= CP && CP <= 0x1E8C4) ||
|
||||
+ (0x1E8C5 <= CP && CP <= 0x1E8C6) || (0x1E8C7 <= CP && CP <= 0x1E8CF) ||
|
||||
+ (0x1E8D7 <= CP && CP <= 0x1E8FF) || (0x1E900 <= CP && CP <= 0x1E943) ||
|
||||
+ (CP == 0x1E94B) || (0x1E94C <= CP && CP <= 0x1E94F) ||
|
||||
+ (0x1E950 <= CP && CP <= 0x1E959) || (0x1E95A <= CP && CP <= 0x1E95D) ||
|
||||
+ (0x1E95E <= CP && CP <= 0x1E95F) || (0x1E960 <= CP && CP <= 0x1EC6F) ||
|
||||
+ (0x1ECC0 <= CP && CP <= 0x1ECFF) || (0x1ED50 <= CP && CP <= 0x1EDFF);
|
||||
+}
|
||||
+
|
||||
+static bool hasRTLCharacters(StringRef Buffer) {
|
||||
+ const char *CurPtr = Buffer.begin();
|
||||
+ const char *EndPtr = Buffer.end();
|
||||
+ while (CurPtr < EndPtr) {
|
||||
+ llvm::UTF32 CodePoint;
|
||||
+ llvm::ConversionResult Result = llvm::convertUTF8Sequence(
|
||||
+ (const llvm::UTF8 **)&CurPtr, (const llvm::UTF8 *)EndPtr, &CodePoint,
|
||||
+ llvm::strictConversion);
|
||||
+ if (Result != llvm::conversionOK)
|
||||
+ break;
|
||||
+ if (isUnassignedAL(CodePoint) || isUnassignedR(CodePoint) || isR(CodePoint))
|
||||
+ return true;
|
||||
+ }
|
||||
+ return false;
|
||||
+}
|
||||
+
|
||||
+MisleadingIdentifierCheck::MisleadingIdentifierCheck(StringRef Name,
|
||||
+ ClangTidyContext *Context)
|
||||
+ : ClangTidyCheck(Name, Context) {}
|
||||
+
|
||||
+MisleadingIdentifierCheck::~MisleadingIdentifierCheck() = default;
|
||||
+
|
||||
+void MisleadingIdentifierCheck::check(
|
||||
+ const ast_matchers::MatchFinder::MatchResult &Result) {
|
||||
+ if (const auto *ND = Result.Nodes.getNodeAs<NamedDecl>("nameddecl")) {
|
||||
+ IdentifierInfo *II = ND->getIdentifier();
|
||||
+ if (II) {
|
||||
+ StringRef NDName = II->getName();
|
||||
+ if (hasRTLCharacters(NDName))
|
||||
+ diag(ND->getBeginLoc(), "identifier has right-to-left codepoints");
|
||||
+ }
|
||||
+ }
|
||||
+}
|
||||
+
|
||||
+void MisleadingIdentifierCheck::registerMatchers(
|
||||
+ ast_matchers::MatchFinder *Finder) {
|
||||
+ Finder->addMatcher(ast_matchers::namedDecl().bind("nameddecl"), this);
|
||||
+}
|
||||
+
|
||||
+} // namespace misc
|
||||
+} // namespace tidy
|
||||
+} // namespace clang
|
||||
diff --git a/clang-tools-extra/clang-tidy/misc/MisleadingIdentifier.h b/clang-tools-extra/clang-tidy/misc/MisleadingIdentifier.h
|
||||
new file mode 100644
|
||||
index 0000000..9580ae6
|
||||
--- /dev/null
|
||||
+++ b/clang-tools-extra/clang-tidy/misc/MisleadingIdentifier.h
|
||||
@@ -0,0 +1,31 @@
|
||||
+//===--- MisleadingIdentifierCheck.h - clang-tidy ---------------*- C++ -*-===//
|
||||
+//
|
||||
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
||||
+// See https://llvm.org/LICENSE.txt for license information.
|
||||
+// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
||||
+//
|
||||
+//===----------------------------------------------------------------------===//
|
||||
+
|
||||
+#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_MISLEADINGIDENTIFIERCHECK_H
|
||||
+#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_MISLEADINGIDENTIFIERCHECK_H
|
||||
+
|
||||
+#include "../ClangTidyCheck.h"
|
||||
+
|
||||
+namespace clang {
|
||||
+namespace tidy {
|
||||
+namespace misc {
|
||||
+
|
||||
+class MisleadingIdentifierCheck : public ClangTidyCheck {
|
||||
+public:
|
||||
+ MisleadingIdentifierCheck(StringRef Name, ClangTidyContext *Context);
|
||||
+ ~MisleadingIdentifierCheck();
|
||||
+
|
||||
+ void registerMatchers(ast_matchers::MatchFinder *Finder) override;
|
||||
+ void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
|
||||
+};
|
||||
+
|
||||
+} // namespace misc
|
||||
+} // namespace tidy
|
||||
+} // namespace clang
|
||||
+
|
||||
+#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_MISLEADINGIDENTIFIERCHECK_H
|
||||
diff --git a/clang-tools-extra/docs/ReleaseNotes.rst b/clang-tools-extra/docs/ReleaseNotes.rst
|
||||
index 1eec7db..07977d0 100644
|
||||
--- a/clang-tools-extra/docs/ReleaseNotes.rst
|
||||
+++ b/clang-tools-extra/docs/ReleaseNotes.rst
|
||||
@@ -223,6 +223,10 @@ New checks
|
||||
Inspect string literal and comments for unterminated bidirectional Unicode
|
||||
characters.
|
||||
|
||||
+- New :doc:`misc-misleading-identifier <clang-tidy/checks/misc-misleading-identifier>` check.
|
||||
+
|
||||
+ Reports identifier with unicode right-to-left characters.
|
||||
+
|
||||
New check aliases
|
||||
^^^^^^^^^^^^^^^^^
|
||||
|
||||
diff --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst b/clang-tools-extra/docs/clang-tidy/checks/list.rst
|
||||
index b118639..592d69b 100644
|
||||
--- a/clang-tools-extra/docs/clang-tidy/checks/list.rst
|
||||
+++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst
|
||||
@@ -209,6 +209,7 @@ Clang-Tidy Checks
|
||||
`misc-definitions-in-headers <misc-definitions-in-headers.html>`_, "Yes"
|
||||
`misc-homoglyph <misc-homoglyph.html>`_,
|
||||
`misc-misleading-bidirectional <misc-misleading-bidirectional.html>`_,
|
||||
+ `misc-misleading-identifier <misc-mileading-identifier.html>`_,
|
||||
`misc-misplaced-const <misc-misplaced-const.html>`_,
|
||||
`misc-new-delete-overloads <misc-new-delete-overloads.html>`_,
|
||||
`misc-no-recursion <misc-no-recursion.html>`_,
|
||||
diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc-misleading-identifier.rst b/clang-tools-extra/docs/clang-tidy/checks/misc-misleading-identifier.rst
|
||||
new file mode 100644
|
||||
index 0000000..8bd9999
|
||||
--- /dev/null
|
||||
+++ b/clang-tools-extra/docs/clang-tidy/checks/misc-misleading-identifier.rst
|
||||
@@ -0,0 +1,23 @@
|
||||
+.. title:: clang-tidy - misc-misleading-identifier
|
||||
+
|
||||
+misc-misleading-identifier
|
||||
+==========================
|
||||
+
|
||||
+Finds identifiers that contain Unicode characters with right-to-left direction,
|
||||
+which can be confusing as they may change the understanding of a whole statement
|
||||
+line, as described in `Trojan Source <https://trojansource.codes>`_.
|
||||
+
|
||||
+An example of such misleading code follows:
|
||||
+
|
||||
+.. code-block:: c
|
||||
+
|
||||
+ #include <stdio.h>
|
||||
+
|
||||
+ short int א = (short int)0;
|
||||
+ short int ג = (short int)12345;
|
||||
+
|
||||
+ int main() {
|
||||
+ int א = ג; // a local variable, set to zero?
|
||||
+ printf("ג is %d\n", ג);
|
||||
+ printf("א is %d\n", א);
|
||||
+ }
|
||||
diff --git a/clang-tools-extra/test/clang-tidy/checkers/misc-misleading-identifier.cpp b/clang-tools-extra/test/clang-tidy/checkers/misc-misleading-identifier.cpp
|
||||
new file mode 100644
|
||||
index 0000000..cb036f9
|
||||
--- /dev/null
|
||||
+++ b/clang-tools-extra/test/clang-tidy/checkers/misc-misleading-identifier.cpp
|
||||
@@ -0,0 +1,15 @@
|
||||
+// RUN: %check_clang_tidy %s misc-misleading-identifier %t
|
||||
+
|
||||
+#include <stdio.h>
|
||||
+
|
||||
+// CHECK-MESSAGES: :[[#@LINE+1]]:1: warning: identifier has right-to-left codepoints [misc-misleading-identifier]
|
||||
+short int א = (short int)0;
|
||||
+// CHECK-MESSAGES: :[[#@LINE+1]]:1: warning: identifier has right-to-left codepoints [misc-misleading-identifier]
|
||||
+short int ג = (short int)12345;
|
||||
+
|
||||
+int main() {
|
||||
+ // CHECK-MESSAGES: :[[#@LINE+1]]:3: warning: identifier has right-to-left codepoints [misc-misleading-identifier]
|
||||
+ int א = ג; // a local variable, set to zero?
|
||||
+ printf("ג is %d\n", ג);
|
||||
+ printf("א is %d\n", א);
|
||||
+}
|
||||
--
|
||||
1.8.3.1
|
||||
|
@ -0,0 +1,25 @@
|
||||
From 88704fc2eabb9dd19a9c3eb81a9b3dc37d95651c Mon Sep 17 00:00:00 2001
|
||||
From: Tom Stellard <tstellar@redhat.com>
|
||||
Date: Fri, 31 Jan 2020 11:04:57 -0800
|
||||
Subject: [PATCH][clang] Don't install static libraries
|
||||
|
||||
---
|
||||
clang/cmake/modules/AddClang.cmake | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/clang/cmake/modules/AddClang.cmake b/clang/cmake/modules/AddClang.cmake
|
||||
index 5752f4277444..0f52822d91f0 100644
|
||||
--- a/clang/cmake/modules/AddClang.cmake
|
||||
+++ b/clang/cmake/modules/AddClang.cmake
|
||||
@@ -113,7 +113,7 @@ macro(add_clang_library name)
|
||||
if(TARGET ${lib})
|
||||
target_link_libraries(${lib} INTERFACE ${LLVM_COMMON_LIBS})
|
||||
|
||||
- if (NOT LLVM_INSTALL_TOOLCHAIN_ONLY OR ARG_INSTALL_WITH_TOOLCHAIN)
|
||||
+ if (ARG_SHARED AND (NOT LLVM_INSTALL_TOOLCHAIN_ONLY OR ARG_INSTALL_WITH_TOOLCHAIN))
|
||||
get_target_export_arg(${name} Clang export_to_clangtargets UMBRELLA clang-libraries)
|
||||
install(TARGETS ${lib}
|
||||
COMPONENT ${lib}
|
||||
--
|
||||
2.30.2
|
||||
|
BIN
SOURCES/clang-13.0.1.src.tar.xz.sig
Normal file
BIN
SOURCES/clang-13.0.1.src.tar.xz.sig
Normal file
Binary file not shown.
BIN
SOURCES/clang-tools-extra-13.0.1.src.tar.xz.sig
Normal file
BIN
SOURCES/clang-tools-extra-13.0.1.src.tar.xz.sig
Normal file
Binary file not shown.
16
SOURCES/macros.clang
Normal file
16
SOURCES/macros.clang
Normal file
@ -0,0 +1,16 @@
|
||||
%clang_major_version @@CLANG_MAJOR_VERSION@@
|
||||
%clang_minor_version @@CLANG_MINOR_VERSION@@
|
||||
%clang_patch_version @@CLANG_PATCH_VERSION@@
|
||||
|
||||
%clang_version %{clang_major_version}.%{clang_minor_version}.%{clang_patch_version}
|
||||
|
||||
# This is the path to the clang resource directory that has clang's internal
|
||||
# headers and libraries. This path should be used by packages that need to
|
||||
# install files into this directory. This macro's value changes every time
|
||||
# clang's version changes.
|
||||
%clang_resource_dir %{_libdir}/clang/%{clang_version}
|
||||
|
||||
# This is the path to the clang resource directory that should be used
|
||||
# by packages that need to read files from this directory at runtime.
|
||||
# This macro only changes when clang's major version changes.
|
||||
%clang_resource_dir_readonly %{_libdir}/clang/%{clang_major_version}
|
1154
SPECS/clang.spec
Normal file
1154
SPECS/clang.spec
Normal file
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user