Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
114 changes: 114 additions & 0 deletions .github/workflows/sanitizers.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,114 @@
name: Sanitizers
on:
workflow_dispatch:
pull_request:
push:
branches: [master]
concurrency:
group: ${{ github.workflow }}-${{ github.job }}-${{ github.ref }}
cancel-in-progress: true
defaults:
run:
shell: bash -e -l {0}
jobs:
build:
runs-on: ${{ matrix.os }}
name: sanitizer / ${{ matrix.sys.compiler }} ${{ matrix.sys.version }} / ${{ matrix.config.name }} / ${{ matrix.sys.name }}
strategy:
fail-fast: false
matrix:
os: [ubuntu-24.04]
sys:
- {compiler: clang, version: '21', name: asan, sanitizer: address}
- {compiler: clang, version: '21', name: msan, sanitizer: memory}
- {compiler: clang, version: '21', name: lsan, sanitizer: leak}
- {compiler: clang, version: '21', name: ubsan, sanitizer: undefined}
config:
- {name: Debug}

steps:

- name: Install LLVM and Clang
if: matrix.sys.compiler == 'clang'
run: |
wget https://apt.llvm.org/llvm.sh
chmod +x llvm.sh
sudo ./llvm.sh ${{matrix.sys.version}}
sudo apt-get install -y clang-tools-${{matrix.sys.version}}
sudo update-alternatives --install /usr/bin/clang++ clang++ /usr/bin/clang++-${{matrix.sys.version}} 200
sudo update-alternatives --install /usr/bin/clang clang /usr/bin/clang-${{matrix.sys.version}} 200
sudo update-alternatives --install /usr/bin/clang-scan-deps clang-scan-deps /usr/bin/clang-scan-deps-${{matrix.sys.version}} 200
sudo update-alternatives --set clang /usr/bin/clang-${{matrix.sys.version}}
sudo update-alternatives --set clang++ /usr/bin/clang++-${{matrix.sys.version}}
sudo update-alternatives --set clang-scan-deps /usr/bin/clang-scan-deps-${{matrix.sys.version}}

- name: Checkout code
uses: actions/checkout@v6

- name: Set conda environment
uses: mamba-org/setup-micromamba@main
with:
environment-name: myenv
environment-file: environment-dev.yml
init-shell: bash
cache-downloads: true

- name: Configure using CMake
run: |
export CC=clang
export CXX=clang++
cmake -G Ninja \
-Bbuild \
-DCMAKE_BUILD_TYPE=${{matrix.config.name}} \
-DCMAKE_INSTALL_PREFIX=$CONDA_PREFIX \
-DBUILD_TESTS=ON \
-DUSE_SANITIZER=${{ matrix.sys.sanitizer }}

- name: Build tests
working-directory: build
run: cmake --build . --config ${{matrix.config.name}} --target test_xtensor_lib --parallel 8

- name: Run tests
working-directory: build
run: |
SAN=${{ matrix.sys.sanitizer }}
case "$SAN" in
address)
export ASAN_OPTIONS=log_path=asan_log_:alloc_dealloc_mismatch=0:halt_on_error=0:handle_abort=0
export ASAN_SAVE_DUMPS=AsanDump.dmp
;;
memory)
export MSAN_OPTIONS=log_path=msan_log_:halt_on_error=0
;;
leak)
export LSAN_OPTIONS=log_path=lsan_log_:halt_on_error=0
;;
undefined)
export UBSAN_OPTIONS=log_path=ubsan_log_:halt_on_error=0:print_stacktrace=1
;;
esac
ctest -R ^xtest$ --output-on-failure

- name: Upload sanitizer log
if: always()
uses: actions/upload-artifact@v6
with:
name: sanitizer-log-${{ matrix.sys.sanitizer }}-${{ matrix.sys.compiler }}-${{ matrix.sys.version }}-${{ matrix.config.name }}-${{ runner.os }}
path: '**/*san_log_*'
if-no-files-found: ignore

- name: Upload sanitizer dump
if: always()
uses: actions/upload-artifact@v6
with:
name: sanitizer-dump-${{ matrix.sys.sanitizer }}-${{ matrix.sys.compiler }}-${{ matrix.sys.version }}-${{ matrix.config.name }}-${{ runner.os }}
path: '**/AsanDump.dmp'
if-no-files-found: ignore

- name: Return errors if sanitizer log content is not empty
if: always()
run: |
if [ -n "$(find build/test -name '*san_log_*' -type f -size +0 2>/dev/null)" ]; then
echo "Sanitizer detected errors. See the log for details."
exit 1
fi
47 changes: 47 additions & 0 deletions cmake/sanitizers.cmake
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
set(AVALAIBLE_SANITIZERS "address;leak;memory;thread;undefined")
OPTION(USE_SANITIZER "Enable sanitizer(s). Options are: ${AVALAIBLE_SANITIZERS}. Case insensitive; multiple options delimited by comma or space possible." "")
string(TOLOWER "${USE_SANITIZER}" USE_SANITIZER)

if((CMAKE_BUILD_TYPE IN_LIST "Debug;RelWithDebInfo") AND USE_SANITIZER)
message(FATAL_ERROR "❌ Sanitizer only supported in Debug and RelWithDebInfo build types.")
endif()

if(USE_SANITIZER)
if(CMAKE_CXX_COMPILER_ID STREQUAL "MSVC")
set(CMAKE_MSVC_DEBUG_INFORMATION_FORMAT "$<IF:$<AND:$<C_COMPILER_ID:MSVC>,$<CXX_COMPILER_ID:MSVC>>,$<$<CONFIG:Debug,RelWithDebInfo>:EditAndContinue>,$<$<CONFIG:Debug,RelWithDebInfo>:ProgramDatabase>>")

if(USE_SANITIZER MATCHES "address")
list(APPEND SANITIZER_COMPILE_OPTIONS /fsanitize=address /D_DISABLE_VECTOR_ANNOTATION /D_DISABLE_STRING_ANNOTATION)
else()
message(FATAL_ERROR "❌ Sanitizer not supported by MSVC: ${USE_SANITIZER}. It only supports 'address'.")
endif()
elseif(CMAKE_CXX_COMPILER_ID STREQUAL "Clang" AND CMAKE_CXX_COMPILER_FRONTEND_VARIANT STREQUAL "MSVC")
if(USE_SANITIZER MATCHES "address")
list(APPEND SANITIZER_COMPILE_OPTIONS /fsanitize=address /D_DISABLE_VECTOR_ANNOTATION /D_DISABLE_STRING_ANNOTATION)
list(APPEND SANITIZER_LINK_LIBRARIES clang_rt.asan_dynamic-x86_64 clang_rt.asan_dynamic_runtime_thunk-x86_64)
else()
message(FATAL_ERROR "❌ Sanitizer not supported by Clang-MSVC: ${USE_SANITIZER}. It only supports 'address'.")
endif()
elseif(CMAKE_CXX_COMPILER_ID STREQUAL "Clang" OR CMAKE_CXX_COMPILER_ID STREQUAL "AppleClang" OR CMAKE_CXX_COMPILER_ID STREQUAL "GNU")
foreach(sanitizer ${USE_SANITIZER})
if(NOT ${sanitizer} IN_LIST AVALAIBLE_SANITIZERS)
message(FATAL_ERROR "❌ Sanitizer not supported: ${sanitizer}. It should be one of: ${AVALAIBLE_SANITIZERS}.")
endif()
list(APPEND SANITIZER_COMPILE_OPTIONS -fsanitize=${sanitizer})
list(APPEND SANITIZER_LINK_OPTIONS -fsanitize=${sanitizer})
if (${sanitizer} MATCHES "memory")
list(APPEND SANITIZER_LINK_LIBRARIES -fsanitize-memory-track-origins -fPIE -pie)
list(APPEND SANITIZER_LINK_OPTIONS -fsanitize-memory-track-origins -fPIE -pie)
endif()
endforeach()
list(APPEND SANITIZER_COMPILE_OPTIONS -fno-omit-frame-pointer)
else()
message(FATAL_ERROR "❌ Sanitizer: Unsupported compiler: ${CMAKE_CXX_COMPILER_ID}")
endif()

list(REMOVE_DUPLICATES SANITIZER_COMPILE_OPTIONS)
list(REMOVE_DUPLICATES SANITIZER_LINK_OPTIONS)
list(REMOVE_DUPLICATES SANITIZER_LINK_LIBRARIES)

message(STATUS "🔍 Using sanitizer: ${USE_SANITIZER}")
endif()
51 changes: 44 additions & 7 deletions include/xtensor/views/index_mapper.hpp
Original file line number Diff line number Diff line change
Expand Up @@ -193,7 +193,7 @@ namespace xt
* @throws Assertion failure if `i != 0` for integral slices.
* @throws Assertion failure if `i >= slice.size()` for non-integral slices.
*/
template <size_t I, std::integral Index>
template <size_t I, access_t ACCESS, std::integral Index>
size_t map_ith_index(const view_type& view, const Index i) const;

/**
Expand Down Expand Up @@ -490,16 +490,16 @@ namespace xt
{
if constexpr (ACCESS == access_t::SAFE)
{
return container.at(map_ith_index<Is>(view, indices[Is])...);
return container.at(map_ith_index<Is, ACCESS>(view, indices[Is])...);
}
else
{
return container(map_ith_index<Is>(view, indices[Is])...);
return container(map_ith_index<Is, ACCESS>(view, indices[Is])...);
}
}

template <class UnderlyingContainer, class... Slices>
template <size_t I, std::integral Index>
template <size_t I, access_t ACCESS, std::integral Index>
auto
index_mapper<xt::xview<UnderlyingContainer, Slices...>>::map_ith_index(const view_type& view, const Index i) const
-> size_t
Expand All @@ -515,14 +515,51 @@ namespace xt

if constexpr (std::is_integral_v<current_slice>)
{
assert(i == 0);
if constexpr (ACCESS == access_t::SAFE)
{
if (i != 0)
{
XTENSOR_THROW(std::out_of_range, "Index out of range in index_mapper access");
}
}
else
{
assert(i == 0);
}
return size_t(slice);
}
else if constexpr (xt::detail::is_xall_slice<std::decay_t<current_slice>>::value)
{
return size_t(i);
}
else
{
using slice_size_type = typename current_slice::size_type;
assert(i < slice.size());
return size_t(slice(static_cast<slice_size_type>(i)));
const auto slice_index = static_cast<slice_size_type>(i);

if constexpr (ACCESS == access_t::SAFE)
{
if constexpr (std::is_signed_v<slice_size_type>)
{
if (slice_index < 0 || slice_index >= slice.size())
{
XTENSOR_THROW(std::out_of_range, "Index out of range in index_mapper access");
}
}
else if (slice_index >= slice.size())
{
XTENSOR_THROW(std::out_of_range, "Index out of range in index_mapper access");
}
}
else
{
if constexpr (std::is_signed_v<slice_size_type>)
{
assert(slice_index >= 0);
}
assert(slice_index < slice.size());
}
return size_t(slice(slice_index));
}
}
else
Expand Down
8 changes: 8 additions & 0 deletions test/CMakeLists.txt
Original file line number Diff line number Diff line change
Expand Up @@ -231,6 +231,9 @@ endforeach()

file(GLOB XTENSOR_PREPROCESS_FILES files/cppy_source/*.cppy)

# Sanitizer support
include(${CMAKE_SOURCE_DIR}/cmake/sanitizers.cmake)

# This target should only be run when the test source files have been changed.
add_custom_target(
preprocess_cppy
Expand Down Expand Up @@ -258,6 +261,8 @@ foreach(filename IN LISTS COMMON_BASE XTENSOR_TESTS)
endif()
target_include_directories(${targetname} PRIVATE ${XTENSOR_INCLUDE_DIR})
target_link_libraries(${targetname} PRIVATE xtensor doctest::doctest ${CMAKE_THREAD_LIBS_INIT})
target_compile_options(${targetname} PRIVATE $<$<BOOL:USE_SANITIZER>:${SANITIZER_COMPILE_OPTIONS}>)
target_link_options(${targetname} PRIVATE $<$<BOOL:USE_SANITIZER>:${SANITIZER_LINK_OPTIONS}>)
add_custom_target(
x${targetname}
COMMAND ${targetname}
Expand All @@ -282,6 +287,9 @@ if(XTENSOR_USE_OPENMP)
target_compile_definitions(test_xtensor_lib PRIVATE XTENSOR_USE_OPENMP)
endif()

target_compile_options(test_xtensor_lib PRIVATE $<$<BOOL:USE_SANITIZER>:${SANITIZER_COMPILE_OPTIONS}>)
target_link_options(test_xtensor_lib PRIVATE $<$<BOOL:USE_SANITIZER>:${SANITIZER_LINK_OPTIONS}>)

target_include_directories(test_xtensor_lib PRIVATE ${XTENSOR_INCLUDE_DIR})
target_link_libraries(test_xtensor_lib PRIVATE xtensor doctest::doctest ${CMAKE_THREAD_LIBS_INIT})

Expand Down
4 changes: 4 additions & 0 deletions test/test_xadapt.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -132,6 +132,8 @@ namespace xt
a1(1, 0) = static_cast<int>(i);
EXPECT_EQ(i, data[i * size + st]);
}

delete[] data;
}

TEST(xarray_adaptor, pointer_acquire_ownership)
Expand Down Expand Up @@ -300,6 +302,8 @@ namespace xt
a1(1, 0) = static_cast<int>(i);
EXPECT_EQ(i, data[i * size + st]);
}

delete[] data;
}

TEST(xtensor_adaptor, pointer_const_no_ownership)
Expand Down
2 changes: 2 additions & 0 deletions test/test_xbuffer_adaptor.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -201,6 +201,8 @@ namespace xt
size_t size2 = 50;
XT_EXPECT_THROW(adapt.resize(size2), std::runtime_error);
EXPECT_EQ(adapt.size(), size1);

delete[] data1;
}

TEST(xbuffer_adaptor, no_owner_iterating)
Expand Down
Loading