[llvm] e5e593e - [Support/Utils] As part of using inclusive language within the

Eric Christopher via llvm-commits llvm-commits at lists.llvm.org
Sat Jun 20 00:16:35 PDT 2020


Author: Eric Christopher
Date: 2020-06-20T00:15:50-07:00
New Revision: e5e593e9e3394c6a992c825d6f65fc4d8859ddb2

URL: https://github.com/llvm/llvm-project/commit/e5e593e9e3394c6a992c825d6f65fc4d8859ddb2
DIFF: https://github.com/llvm/llvm-project/commit/e5e593e9e3394c6a992c825d6f65fc4d8859ddb2.diff

LOG: [Support/Utils] As part of using inclusive language within the
llvm project, migrate away from the use of blacklist and whitelist.

Added: 
    

Modified: 
    llvm/include/llvm/Support/SpecialCaseList.h
    llvm/utils/lint/cpp_lint.py

Removed: 
    


################################################################################
diff  --git a/llvm/include/llvm/Support/SpecialCaseList.h b/llvm/include/llvm/Support/SpecialCaseList.h
index 2d4930fb407e..d022a8f53706 100644
--- a/llvm/include/llvm/Support/SpecialCaseList.h
+++ b/llvm/include/llvm/Support/SpecialCaseList.h
@@ -7,8 +7,8 @@
 //
 // This is a utility class used to parse user-provided text files with
 // "special case lists" for code sanitizers. Such files are used to
-// define an "ABI list" for DataFlowSanitizer and blacklists for sanitizers
-// like AddressSanitizer or UndefinedBehaviorSanitizer.
+// define an "ABI list" for DataFlowSanitizer and allow/exclusion lists for
+// sanitizers like AddressSanitizer or UndefinedBehaviorSanitizer.
 //
 // Empty lines and lines starting with "#" are ignored. Sections are defined
 // using a '[section_name]' header and can be used to specify sanitizers the
@@ -19,18 +19,18 @@
 //   prefix:wildcard_expression[=category]
 // If category is not specified, it is assumed to be empty string.
 // Definitions of "prefix" and "category" are sanitizer-specific. For example,
-// sanitizer blacklists support prefixes "src", "fun" and "global".
+// sanitizer exclusion support prefixes "src", "fun" and "global".
 // Wildcard expressions define, respectively, source files, functions or
 // globals which shouldn't be instrumented.
 // Examples of categories:
 //   "functional": used in DFSan to list functions with pure functional
 //                 semantics.
-//   "init": used in ASan blacklist to disable initialization-order bugs
+//   "init": used in ASan exclusion list to disable initialization-order bugs
 //           detection for certain globals or source files.
 // Full special case list file example:
 // ---
 // [address]
-// # Blacklisted items:
+// # Excluded items:
 // fun:*_ZN4base6subtle*
 // global:*global_with_bad_access_or_initialization*
 // global:*global_with_initialization_issues*=init
@@ -98,7 +98,7 @@ class SpecialCaseList {
   ///   @Prefix:<E>=@Category
   /// \endcode
   /// where @Query satisfies wildcard expression <E> in a given @Section.
-  /// Returns zero if there is no blacklist entry corresponding to this
+  /// Returns zero if there is no exclusion entry corresponding to this
   /// expression.
   unsigned inSectionBlame(StringRef Section, StringRef Prefix, StringRef Query,
                           StringRef Category = StringRef()) const;

diff  --git a/llvm/utils/lint/cpp_lint.py b/llvm/utils/lint/cpp_lint.py
index 2fb8cc93c192..316ad9809035 100755
--- a/llvm/utils/lint/cpp_lint.py
+++ b/llvm/utils/lint/cpp_lint.py
@@ -53,7 +53,7 @@ def VerifyIncludes(filename, lines):
     if system_header:
       curr_system_header = system_header.group(1)
 
-      # Is it blacklisted?
+      # Is it disallowed?
       if curr_system_header in DISALLOWED_SYSTEM_HEADERS:
         lint.append((filename, line_num,
                      'Disallowed system header: <%s>' % curr_system_header))


        


More information about the llvm-commits mailing list