[llvm-bugs] Issue 13244 in oss-fuzz: llvm/llvm-opt-fuzzer--x86_64-earlycse: ASSERT: !FoundVal && "Key already in new map?"

2019-02-20 Thread ClusterFuzz-External via monorail via llvm-bugs

Status: New
Owner: 
CC: k...@google.com, masc...@google.com, jdevlieg...@apple.com,  
igm...@gmail.com, mit...@google.com, bigchees...@gmail.com,  
eney...@google.com, llvm-b...@lists.llvm.org, j...@chromium.org,  
v...@apple.com, mitchphi...@outlook.com, xpl...@gmail.com,  
akils...@apple.com
Labels: ClusterFuzz Stability-Memory-AddressSanitizer Reproducible  
Engine-libfuzzer Proj-llvm Reported-2019-02-21

Type: Bug

New issue 13244 by ClusterFuzz-External:  
llvm/llvm-opt-fuzzer--x86_64-earlycse: ASSERT: !FoundVal && "Key already in  
new map?"

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13244

Detailed report: https://oss-fuzz.com/testcase?key=5730570645012480

Project: llvm
Fuzzer: libFuzzer_llvm_llvm-opt-fuzzer--x86_64-earlycse
Fuzz target binary: llvm-opt-fuzzer--x86_64-earlycse
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: ASSERT
Crash Address:
Crash State:
  !FoundVal && "Key already in new map?"
  llvm::DenseMapBasellvm::ScopedHashTableVal  llvm::DenseMapBasellvm::ScopedHashTableVal

Sanitizer: address (ASAN)

Reproducer Testcase:  
https://oss-fuzz.com/download?testcase_id=5730570645012480


Issue filed automatically.

See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for  
instructions to reproduce this bug locally.


When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any  
stable releases.

  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any  
other feedback, please file an issue at  
https://github.com/google/oss-fuzz/issues.


--
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.
___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40331] [meta] 8.0.0 Release Blockers

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40331
Bug 40331 depends on bug 40547, which changed state.

Bug 40547 Summary: Clang fails to pass validation when compiled with gcc-9 in 
release build.
https://bugs.llvm.org/show_bug.cgi?id=40547

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution|--- |FIXED

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40547] Clang fails to pass validation when compiled with gcc-9 in release build.

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40547

sguel...@redhat.com changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution|--- |FIXED

--- Comment #16 from sguel...@redhat.com ---
Patch merged, thanks Hans!

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40470] CMake config checks lead to invalid output wasm

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40470

Sam Clegg  changed:

   What|Removed |Added

 Resolution|--- |FIXED
 Status|NEW |RESOLVED

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 13243 in oss-fuzz: llvm/clang-fuzzer: Timeout in llvm_clang-fuzzer

2019-02-20 Thread ClusterFuzz-External via monorail via llvm-bugs

Status: New
Owner: 
CC: k...@google.com, masc...@google.com, jdevlieg...@apple.com,  
igm...@gmail.com, mit...@google.com, bigchees...@gmail.com,  
eney...@google.com, llvm-b...@lists.llvm.org, j...@chromium.org,  
v...@apple.com, mitchphi...@outlook.com, xpl...@gmail.com,  
akils...@apple.com
Labels: ClusterFuzz Reproducible Engine-libfuzzer Proj-llvm  
Reported-2019-02-21

Type: Bug

New issue 13243 by ClusterFuzz-External: llvm/clang-fuzzer: Timeout in  
llvm_clang-fuzzer

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13243

Detailed report: https://oss-fuzz.com/testcase?key=5641829305810944

Project: llvm
Fuzzer: libFuzzer_llvm_clang-fuzzer
Fuzz target binary: clang-fuzzer
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: Timeout (exceeds 25 secs)
Crash Address:
Crash State:
  llvm_clang-fuzzer

Sanitizer: address (ASAN)

Reproducer Testcase:  
https://oss-fuzz.com/download?testcase_id=5641829305810944


Issue filed automatically.

See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for  
instructions to reproduce this bug locally.


When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any  
stable releases.

  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any  
other feedback, please file an issue at  
https://github.com/google/oss-fuzz/issues.


--
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.
___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40797] New: Undefined reference with -fsanitize-coverage=trace-pc

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40797

Bug ID: 40797
   Summary: Undefined reference with -fsanitize-coverage=trace-pc
   Product: clang
   Version: 7.0
  Hardware: PC
OS: Windows NT
Status: NEW
  Severity: enhancement
  Priority: P
 Component: -New Bugs
  Assignee: unassignedclangb...@nondot.org
  Reporter: drmin...@gmail.com
CC: htmldevelo...@gmail.com, llvm-bugs@lists.llvm.org,
neeil...@live.com, richard-l...@metafoo.co.uk

I faced issue when compile with -fsanitize-coverage=trace-pc.

test for this:
cov.cc

#include 

__attribute__((noinline))

void foo() { printf("foo\n"); }

int main(int argc, char **argv) {
if (argc == 2)
foo();
printf("main");
}

vmx@vmx-virtual-machine:~/Documents/clang$ clang++-7 -g cov.cc
-fsanitize=address -fsanitize-coverage=trace-pc -v
clang version 7.0.0-3~ubuntu0.18.04.1 (tags/RELEASE_700/final)
Target: x86_64-pc-linux-gnu
Thread model: posix
InstalledDir: /usr/bin
Found candidate GCC installation: /usr/bin/../lib/gcc/x86_64-linux-gnu/7
Found candidate GCC installation: /usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0
Found candidate GCC installation: /usr/bin/../lib/gcc/x86_64-linux-gnu/8
Found candidate GCC installation: /usr/lib/gcc/x86_64-linux-gnu/7
Found candidate GCC installation: /usr/lib/gcc/x86_64-linux-gnu/7.3.0
Found candidate GCC installation: /usr/lib/gcc/x86_64-linux-gnu/8
Selected GCC installation: /usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0
Candidate multilib: .;@m64
Candidate multilib: 32;@m32
Candidate multilib: x32;@mx32
Selected multilib: .;@m64
 "/usr/lib/llvm-7/bin/clang" -cc1 -triple x86_64-pc-linux-gnu -emit-obj
-mrelax-all -disable-free -disable-llvm-verifier -discard-value-names
-main-file-name cov.cc -mrelocation-model static -mthread-model posix
-mdisable-fp-elim -fmath-errno -masm-verbose -mconstructor-aliases
-munwind-tables -fuse-init-array -target-cpu x86-64 -dwarf-column-info
-debug-info-kind=limited -dwarf-version=4 -debugger-tuning=gdb -v -resource-dir
/usr/lib/llvm-7/lib/clang/7.0.0 -internal-isystem
/usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/c++/7.3.0
-internal-isystem
/usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/x86_64-linux-gnu/c++/7.3.0
-internal-isystem
/usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/x86_64-linux-gnu/c++/7.3.0
-internal-isystem
/usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/c++/7.3.0/backward
-internal-isystem /usr/include/clang/7.0.0/include/ -internal-isystem
/usr/local/include -internal-isystem /usr/lib/llvm-7/lib/clang/7.0.0/include
-internal-externc-isystem /usr/include/x86_64-linux-gnu
-internal-externc-isystem /include -internal-externc-isystem /usr/include
-fdeprecated-macro -fdebug-compilation-dir /home/vmx/Documents/clang
-ferror-limit 19 -fmessage-length 210 -fsanitize-coverage-type=3
-fsanitize-coverage-trace-pc -fsanitize=address
-fsanitize-blacklist=/usr/lib/llvm-7/lib/clang/7.0.0/share/asan_blacklist.txt
-fsanitize-address-use-after-scope -fno-assume-sane-operator-new
-fobjc-runtime=gcc -fcxx-exceptions -fexceptions -fdiagnostics-show-option
-fcolor-diagnostics -o /tmp/cov-a15c76.o -x c++ cov.cc -faddrsig
clang -cc1 version 7.0.0 based upon LLVM 7.0.0 default target
x86_64-pc-linux-gnu
ignoring nonexistent directory "/include"
ignoring duplicate directory
"/usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/x86_64-linux-gnu/c++/7.3.0"
ignoring duplicate directory "/usr/include/clang/7.0.0/include"
#include "..." search starts here:
#include <...> search starts here:
 /usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/c++/7.3.0

/usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/x86_64-linux-gnu/c++/7.3.0

/usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/c++/7.3.0/backward
 /usr/include/clang/7.0.0/include
 /usr/local/include
 /usr/include/x86_64-linux-gnu
 /usr/include
End of search list.
 "/usr/bin/ld" --eh-frame-hdr -m elf_x86_64 -dynamic-linker
/lib64/ld-linux-x86-64.so.2 -o a.out
/usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../x86_64-linux-gnu/crt1.o
/usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../x86_64-linux-gnu/crti.o
/usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/crtbegin.o
-L/usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0
-L/usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../x86_64-linux-gnu
-L/lib/x86_64-linux-gnu -L/lib/../lib64 -L/usr/lib/x86_64-linux-gnu
-L/usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../..
-L/usr/lib/llvm-7/bin/../lib -L/lib -L/usr/lib --whole-archive
/usr/lib/llvm-7/lib/clang/7.0.0/lib/linux/libclang_rt.asan-x86_64.a
--no-whole-archive
--dynamic-list=/usr/lib/llvm-7/lib/clang/7.0.0/lib/linux/libclang_rt.asan-x86_64.a.syms
--whole-archive
/usr/lib/llvm-7/lib/clang/7.0.0/lib/linux/libclang_rt.asan_cxx-x86_64.a
--no-whole-archive

[llvm-bugs] [Bug 40796] New: -pthread should pass -lpthread to the linker

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40796

Bug ID: 40796
   Summary: -pthread should pass -lpthread to the linker
   Product: new-bugs
   Version: unspecified
  Hardware: PC
OS: Linux
Status: NEW
  Severity: enhancement
  Priority: P
 Component: new bugs
  Assignee: unassignedb...@nondot.org
  Reporter: mh+l...@glandium.org
CC: htmldevelo...@gmail.com, llvm-bugs@lists.llvm.org

Apparently something changed in clang 9, that made -pthread not do anything
during linkage, per
https://gn.googlesource.com/gn/+/082fbe397d5217dc21b01c63c7f20eb6b77a3093%5E%21/#F0
:

 clang-9: warning: argument unused during compilation: '-pthread'
[-Wunused-command-line-argument]
 ld.lld: error: undefined symbol: pthread_create
 >>> referenced by worker_pool.cc
 >>>   util/worker_pool.o:(WorkerPool::WorkerPool(unsigned
long)) in archive gn_lib.a

However, -pthread *is* meant to add -lpthread during linkage, per GCC
documentation:

https://gcc.gnu.org/onlinedocs/gcc/Link-Options.html#Link-Options

-pthread

Link with the POSIX threads library. This option is supported on GNU/Linux
targets, most other Unix derivatives, and also on x86 Cygwin and MinGW targets.
On some targets this option also sets flags for the preprocessor, so it should
be used consistently for both compilation and linking.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40795] New: clang generates wrong debug information at -O3

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40795

Bug ID: 40795
   Summary: clang generates wrong debug information at -O3
   Product: clang
   Version: unspecified
  Hardware: PC
OS: All
Status: NEW
  Severity: enhancement
  Priority: P
 Component: LLVM Codegen
  Assignee: unassignedclangb...@nondot.org
  Reporter: qrzh...@gatech.edu
CC: llvm-bugs@lists.llvm.org, neeil...@live.com,
richard-l...@metafoo.co.uk

It also affects clang 7.0.

The correct output should be "l_34 = -5".

$ clang-trunk -v
clang version 9.0.0 (trunk 354437)
Target: x86_64-unknown-linux-gnu
Thread model: posix
InstalledDir: /usr/local/bin


$ cat abc.c
volatile int a;
unsigned b = 6;
int main() {
  int l_34 = -5;
  5 >= b && (l_34 = 0, a);
  optimize_me_not();
}


$ cat outer.c
optimize_me_not() {}


$ cat cmds
b 6
r
p l_34
kill
q



$ clang-trunk abc.c outer.c -g
$ lldb-trunk -s cmds -b a.out
(lldb) target create "a.out"
Current executable set to 'a.out' (x86_64).
(lldb) command source -s 0 'cmds'
Executing commands in '/home/absozero/projects/LLDB-testing/reduce/cmds'.
(lldb) b 6
Breakpoint 1: where = a.out`main + 76 at abc.c:6:3, address =
0x004004cc
(lldb) r
Process 2483 stopped
* thread #1, name = 'a.out', stop reason = breakpoint 1.1
frame #0: 0x004004cc a.out`main at abc.c:6:3
   3int main() {
   4  int l_34 = -5;
   5  5 >= b && (l_34 = 0, a);
-> 6  optimize_me_not();
   7}

Process 2483 launched: '/home/absozero/projects/LLDB-testing/reduce/a.out'
(x86_64)
(lldb) p l_34
(int) $0 = -5
(lldb) kill
Process 2483 exited with status = 9 (0x0009)
(lldb) q




$ clang-trunk abc.c outer.c -g -O3
$ lldb-trunk -s cmds -b a.out
(lldb) target create "a.out"
Current executable set to 'a.out' (x86_64).
(lldb) command source -s 0 'cmds'
Executing commands in '/home/absozero/projects/LLDB-testing/reduce/cmds'.
(lldb) b 6
Breakpoint 1: where = a.out`main + 16 at abc.c:6:3, address =
0x00400490
(lldb) r
Process 3094 stopped
* thread #1, name = 'a.out', stop reason = breakpoint 1.1
frame #0: 0x00400490 a.out`main at abc.c:6:3
   3int main() {
   4  int l_34 = -5;
   5  5 >= b && (l_34 = 0, a);
-> 6  optimize_me_not();
   7}

Process 3094 launched: '/home/absozero/projects/LLDB-testing/reduce/a.out'
(x86_64)
(lldb) p l_34
(int) $0 = 0
(lldb) kill
Process 3094 exited with status = 9 (0x0009)
(lldb) q

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 32433] [X86] Failure to use HADDPS for partial register result

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=32433

Sanjay Patel  changed:

   What|Removed |Added

 Status|RESOLVED|REOPENED
 Resolution|FIXED   |---

--- Comment #7 from Sanjay Patel  ---
Reopening because the change was reverted due to an LTO build failure and perf
regressions:
https://reviews.llvm.org/rL354434

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40787] New: [llvm-exegesis] All benchmarks of the same opcode should be within eps of eachanother.

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40787

Bug ID: 40787
   Summary: [llvm-exegesis] All benchmarks of the same opcode
should be within eps of eachanother.
   Product: tools
   Version: trunk
  Hardware: PC
OS: Linux
Status: NEW
  Severity: enhancement
  Priority: P
 Component: llvm-exegesis
  Assignee: unassignedb...@nondot.org
  Reporter: lebedev...@gmail.com
CC: clement.cour...@gmail.com, gchate...@google.com,
llvm-bugs@lists.llvm.org

A follow up for https://bugs.llvm.org/show_bug.cgi?id=40715
I'm not sure if this is working as intended or not, but the current clustering
code may still end up clustering together benchmark points that are different.
I.e. after clustering, given a cluster, the points within that cluster may
be more offset from each another than the `-analysis-epsilon=`.

This might be a bug in itself Is it?

If not, i believe i will need to introduce an early stabilization sweep,
i.e. go through all the points, create a [opcode]=>{p0, ...} mapping,
and then go through each opcode in that map, and if there is more than one
point for an opcode, verify that every combination (every 2 points)
of these points is `isNeighbour()`. If not, add all these points for
this opcode into a new unstable cluster.
Thus, the normal clustering logic will skip them.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40783] r316591 breaks x32

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40783

H.J. Lu  changed:

   What|Removed |Added

 Resolution|--- |FIXED
 Status|NEW |RESOLVED

--- Comment #1 from H.J. Lu  ---
Fixed by revision 354451.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40786] New: obj2yaml symbol output missing section index for SHN_ABS and SHN_COMMON symbols

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40786

Bug ID: 40786
   Summary: obj2yaml symbol output missing section index for
SHN_ABS and SHN_COMMON symbols
   Product: new-bugs
   Version: unspecified
  Hardware: PC
OS: Windows NT
Status: NEW
  Severity: normal
  Priority: P
 Component: new bugs
  Assignee: unassignedb...@nondot.org
  Reporter: jh7370.2...@my.bristol.ac.uk
CC: htmldevelo...@gmail.com, llvm-bugs@lists.llvm.org

If you run obj2yaml on an object containing absolute and/or common symbols, the
yaml output contains no section index for them, resulting in them being
undefined symbols, if yaml2obj were run on the output. We should fix this!

Example failing test:

# RUN: yaml2obj %s > %t
# RUN: obj2yaml %t | FileCheck %s

# CHECK:  Symbols:
# CHECK-NEXT:   Global:
# CHECK-NEXT: - Name:absolute1
# CHECK-NEXT:   Index:   SHN_ABS<--- Missing
# CHECK-NEXT: - Name:absolute2
# CHECK-NEXT:   Index:   SHN_ABS<--- Missing
# CHECK-NEXT: - Name:common1
# CHECK-NEXT:   Index:   SHN_COMMON <--- Missing
# CHECK-NEXT: - Name:common2
# CHECK-NEXT:   Index:   SHN_COMMON <--- Missing
# CHECK-NEXT: - Name:valid_index
# CHECK-NEXT:   Section: .text

!ELF
FileHeader:
  Class:   ELFCLASS64
  Data:ELFDATA2LSB
  Type:ET_EXEC
  Machine: EM_X86_64
Sections:
  - Name: .text
Type: SHT_PROGBITS
Symbols:
  Global:
- Name: absolute1
  Index:SHN_ABS
  Value:0x1234
- Name: absolute2
  Index:0xfff1
  Value:0x4321
- Name: common1
  Index:SHN_COMMON
- Name: common2
  Index:0xfff2
- Name: valid_index
  Index:0x1

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 13091 in oss-fuzz: llvm/clang-fuzzer: Stack-overflow in clang::Lexer::LexTokenInternal

2019-02-20 Thread ClusterFuzz-External via monorail via llvm-bugs

Updates:
Labels: ClusterFuzz-Verified
Status: Verified

Comment #3 on issue 13091 by ClusterFuzz-External: llvm/clang-fuzzer:  
Stack-overflow in clang::Lexer::LexTokenInternal

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13091#c3

ClusterFuzz testcase 5770217924329472 is verified as fixed, so closing  
issue as verified.


If this is incorrect, please file a bug on  
https://github.com/google/oss-fuzz/issues/new


--
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.
___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 13145 in oss-fuzz: llvm/clang-fuzzer: Stack-overflow in clang::APValue::swap

2019-02-20 Thread ClusterFuzz-External via monorail via llvm-bugs

Updates:
Labels: ClusterFuzz-Verified
Status: Verified

Comment #2 on issue 13145 by ClusterFuzz-External: llvm/clang-fuzzer:  
Stack-overflow in clang::APValue::swap

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13145#c2

ClusterFuzz testcase 5724867062661120 is verified as fixed, so closing  
issue as verified.


If this is incorrect, please file a bug on  
https://github.com/google/oss-fuzz/issues/new


--
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.
___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40789] New: for Microsoft compatibility, #include from stddef.h etc

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40789

Bug ID: 40789
   Summary: for Microsoft compatibility, #include  from
stddef.h etc
   Product: clang
   Version: trunk
  Hardware: PC
OS: Windows NT
Status: NEW
  Severity: enhancement
  Priority: P
 Component: C++
  Assignee: unassignedclangb...@nondot.org
  Reporter: mib.bugzi...@gmail.com
CC: blitzrak...@gmail.com, dgre...@apple.com,
erik.pilking...@gmail.com, llvm-bugs@lists.llvm.org,
richard-l...@metafoo.co.uk

I have received a dll from a 3rd party along with a header file. The .h file
compiles OK with the Microsoft compiler, but it fails with clang. This is
because the clang compiler uses a different version of stddef.h than the
Microsoft compiler. The Microsoft version brings in e.g.  which
introduces a lot of names including Microsoft's  file.

Of course I can add a #include to make the compile successful, but I'd like to
know if you would consider allowing modifications to the clang version so that
that change isn't necessary.

I could preprocess all the clang headers to find the other headers that should
be brought in.  Microsoft headers are pretty complex so it's not immediately
obvious which #include's to include, for example their headers accomodate the
"RC" compiler, I assume we wouldn't want the includes specific to RC to be
added.

Here's an example,
clang -c struct.cpp
struct.cpp:9:31: error: unknown type name '_Out_opt_cap_'
 virtual int   QueryLastError(_Out_opt_cap_(cbErrMax) char szError[cbErrMax]) ;
  ^
struct.cpp:9:55: error: expected ')'
 virtual int   QueryLastError(_Out_opt_cap_(cbErrMax) char szError[cbErrMax]) ;
  ^
struct.cpp:9:30: note: to match this '('
 virtual int   QueryLastError(_Out_opt_cap_(cbErrMax) char szError[cbErrMax]) ;
 ^
2 errors generated.
ksh-3.2$ cat struct.cpp
// interface for error reporting
#include 
enum Report_Consts {
cbErrMax = 1024,
};
typedef struct Report_Error {
 virtual int   QueryLastError(_Out_opt_cap_(cbErrMax) char szError[cbErrMax])
};
#endif
Report_Error; 

Would you consider allowing changes like this,
diff --git a/lib/Headers/stddef.h b/lib/Headers/stddef.h
index 7354996711..686a79168d 100644
--- a/lib/Headers/stddef.h
+++ b/lib/Headers/stddef.h
@@ -34,6 +34,11 @@
 #if !__has_feature(modules)
 #define __STDDEF_H
 #endif

+#if defined(_MSC_VER)
+#include 
+#endif // defined(_MSC_VER)

--Melanie Blower
(I work for Intel on the C++ compiler)

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 13091 in oss-fuzz: llvm/clang-fuzzer: Stack-overflow in clang::Lexer::LexTokenInternal

2019-02-20 Thread ClusterFuzz-External via monorail via llvm-bugs


Comment #2 on issue 13091 by ClusterFuzz-External: llvm/clang-fuzzer:  
Stack-overflow in clang::Lexer::LexTokenInternal

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13091#c2

ClusterFuzz has detected this issue as fixed in range  
201902190429:201902200434.


Detailed report: https://oss-fuzz.com/testcase?key=5770217924329472

Project: llvm
Fuzzer: libFuzzer_llvm_clang-fuzzer
Fuzz target binary: clang-fuzzer
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: Stack-overflow
Crash Address: 0x7ffe22239ee0
Crash State:
  clang::Lexer::LexTokenInternal
  clang::Lexer::Lex
  clang::Preprocessor::Lex

Sanitizer: address (ASAN)

Regressed:  
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm=201812220356:201812230356
Fixed:  
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm=201902190429:201902200434


Reproducer Testcase:  
https://oss-fuzz.com/download?testcase_id=5770217924329472


See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for  
instructions to reproduce this bug locally.


If you suspect that the result above is incorrect, try re-doing that job on  
the test case report page.


--
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.
___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40788] New: Use section name for section symbol names in llvm-readobj

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40788

Bug ID: 40788
   Summary: Use section name for section symbol names in
llvm-readobj
   Product: tools
   Version: trunk
  Hardware: PC
OS: Windows NT
Status: NEW
  Severity: enhancement
  Priority: P
 Component: llvm-readobj
  Assignee: unassignedb...@nondot.org
  Reporter: jh7370.2...@my.bristol.ac.uk
CC: jh7370.2...@my.bristol.ac.uk, llvm-bugs@lists.llvm.org

llvm-readobj + llvm-readelf print an empty string for section symbols. This is
technically correct, in the section symbols typically have no name, but it is
not particularly useful and makes the symbol table dump harder to interpret
(you have to lookup the section index and inspect the section header table to
map the symbol to its corresponding section).

This is similar to bug 39995, where section names are now being used for symbol
names for ELF STT_SECTION symbols. However, whereas that bug brought llvm-nm
closer to GNU nm's output, the same is not the case here. It is worth noting
that GNU objdump's -t output also uses the section names for such symbols.

I think we should do the same here. In all likelihood it won't hurt any
parsers, since the name is at the end of the line, and would be an improvement
over GNU readelf. I think we should do it for both GNU and LLVM style output as
GNU style is more compact and more familiar to many developers.

Current output:
C:\llvm\llvm\test\tools\llvm-readobj> c:\llvm\build\debug\bin\llvm-readobj.exe
"--symbols" "C:\llvm\llvm\test\tools\llvm-readobj/Inputs/relocs.obj.elf-x86_64"
"--elf-output-style=GNU"

Symbol table '.symtab' contains 6 entries:
   Num:Value  Size TypeBind   Vis  Ndx Name
 0:  0 NOTYPE  LOCAL  DEFAULT  UND
 1:  0 SECTION LOCAL  DEFAULT1
 2:  0 SECTION LOCAL  DEFAULT3
 3:  0 SECTION LOCAL  DEFAULT4
 4:  0 NOTYPE  GLOBAL DEFAULT  UND
_GLOBAL_OFFSET_TABLE_
 5:  0 TLS GLOBAL DEFAULT  UND sym

Proposal:
C:\llvm\llvm\test\tools\llvm-readobj> c:\llvm\build\debug\bin\llvm-readobj.exe
"--symbols" "C:\llvm\llvm\test\tools\llvm-readobj/Inputs/relocs.obj.elf-x86_64"
"--elf-output-style=GNU"

Symbol table '.symtab' contains 6 entries:
   Num:Value  Size TypeBind   Vis  Ndx Name
 0:  0 NOTYPE  LOCAL  DEFAULT  UND
 1:  0 SECTION LOCAL  DEFAULT1 .text
 2:  0 SECTION LOCAL  DEFAULT3 .data
 3:  0 SECTION LOCAL  DEFAULT4 .bss
 4:  0 NOTYPE  GLOBAL DEFAULT  UND
_GLOBAL_OFFSET_TABLE_
 5:  0 TLS GLOBAL DEFAULT  UND sym

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 13145 in oss-fuzz: llvm/clang-fuzzer: Stack-overflow in clang::APValue::swap

2019-02-20 Thread ClusterFuzz-External via monorail via llvm-bugs


Comment #1 on issue 13145 by ClusterFuzz-External: llvm/clang-fuzzer:  
Stack-overflow in clang::APValue::swap

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13145#c1

ClusterFuzz has detected this issue as fixed in range  
201902190429:201902200434.


Detailed report: https://oss-fuzz.com/testcase?key=5724867062661120

Project: llvm
Fuzzer: libFuzzer_llvm_clang-fuzzer
Fuzz target binary: clang-fuzzer
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: Stack-overflow
Crash Address: 0x7ffe119b9f58
Crash State:
  clang::APValue::swap
  Evaluate
  IntExprEvaluator::VisitCastExpr

Sanitizer: address (ASAN)

Regressed:  
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm=201902150428:201902160424
Fixed:  
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm=201902190429:201902200434


Reproducer Testcase:  
https://oss-fuzz.com/download?testcase_id=5724867062661120


See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for  
instructions to reproduce this bug locally.


If you suspect that the result above is incorrect, try re-doing that job on  
the test case report page.


--
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.
___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40790] New: Crash when compiling template specialization with auto return type

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40790

Bug ID: 40790
   Summary: Crash when compiling template specialization with auto
return type
   Product: clang
   Version: trunk
  Hardware: PC
OS: Linux
Status: NEW
  Severity: normal
  Priority: P
 Component: C++
  Assignee: unassignedclangb...@nondot.org
  Reporter: de...@ukr.net
CC: blitzrak...@gmail.com, dgre...@apple.com,
erik.pilking...@gmail.com, llvm-bugs@lists.llvm.org,
richard-l...@metafoo.co.uk

At least the version 5.0 and all version upwards are affected.

Here is a small test case example:

template 
T foo(int payload);

struct Bar
{ };

template <>
auto foo(int payload)
{
Bar result;
return result;
}

Yes, this code has an error but the compiler should emit an error message
instead of crashing.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40791] New: Crash in template code that

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40791

Bug ID: 40791
   Summary: Crash in template code that
   Product: new-bugs
   Version: 7.0
  Hardware: PC
OS: Windows NT
Status: NEW
  Severity: normal
  Priority: P
 Component: new bugs
  Assignee: unassignedb...@nondot.org
  Reporter: dapa...@mozilla.com
CC: htmldevelo...@gmail.com, llvm-bugs@lists.llvm.org

Created attachment 21496
  --> https://bugs.llvm.org/attachment.cgi?id=21496=edit
Build log with crash stack

Unfortunately, I haven't been able to reproduce this crash with a small test
case and it comes from building a "unified source file" (ie many files smooshed
together) from the Firefox code base so its not small.  I have isolated the
crash to a method A that passes a method pointer P to another method B, where
B's signature pulls apart the method's components (return type, class type,
arguments).  Method A is in a templated class's templated (specialized)
inner-class.  One of method A's templates is the type of the method-pointer P.

Those are the properties that I would have guessed were relevant to the crash
but, as I said, I can't seem to get a smaller version to crash.  So I really
have no idea what the cause is.  I just know that removing these method calls
eliminates the crash.

In the attached source file, the method A's (they are two related methods) are
on lines 1277373 and 1277382.  The are called by the DEFINE_METHOD_DISPATCHER
just below them and that macro is instantiated at line 1282214.

>From the crash log:

 0:56.32 Wrote crash dump file
"C:\Users\DAVIDP~1\AppData\Local\Temp\clang-cl.exe-121290.dmp"
 0:56.85 LLVMSymbolizer: error reading file: PDB Error: Unable to load PDB. 
Make sure the file exists and is readable.  Calling loadDataForExe
 0:56.85 LLVMSymbolizer: error reading file: PDB Error: Unable to load PDB. 
Make sure the file exists and is readable.  Calling loadDataForExe
 0:56.86 #0 0x7ff7f216ffe0 clang::CallExpr::getCallReturnType(class
clang::ASTContext const &)const 
(c:\Users\DAVIDP~1\MOZBUI~1\clang\bin\clang-cl.exe+0x266ffe0)
 0:56.86 #1 0x7ff7f0caed0d
clang::CodeGen::CodeGenFunction::EmitCheckedInBoundsGEP(class llvm::Value
*,class llvm::ArrayRef,bool,bool,class
clang::SourceLocation,class llvm::Twine const &)
(c:\Users\DAVIDP~1\MOZBUI~1\clang\bin\clang-cl.exe+0x11aed0d)
 0:56.86 #2 0x7ff7f0c9fc81
clang::CodeGen::CodeGenFunction::EmitScalarExpr(class clang::Expr const *,bool)
(c:\Users\DAVIDP~1\MOZBUI~1\clang\bin\clang-cl.exe+0x119fc81)
 0:56.86 #3 0x7ff7f0c5687c
clang::CodeGen::CodeGenFunction::EmitReturnStmt(class clang::ReturnStmt const
&) (c:\Users\DAVIDP~1\MOZBUI~1\clang\bin\clang-cl.exe+0x115687c)
 0:56.86 #4 0x7ff7f0c53831 clang::CodeGen::CodeGenFunction::EmitStmt(class
clang::Stmt const *,class llvm::ArrayRef)
(c:\Users\DAVIDP~1\MOZBUI~1\clang\bin\clang-cl.exe+0x1153831)
 0:56.86 #5 0x7ff7f0c5c595
clang::CodeGen::CodeGenFunction::EmitCompoundStmtWithoutScope(class
clang::CompoundStmt const &,bool,class clang::CodeGen::AggValueSlot)
(c:\Users\DAVIDP~1\MOZBUI~1\clang\bin\clang-cl.exe+0x115c595)
 0:56.86 #6 0x7ff7f0b895ce
clang::CodeGen::CodeGenFunction::EmitFunctionBody(class
clang::CodeGen::FunctionArgList &,class clang::Stmt const *)
(c:\Users\DAVIDP~1\MOZBUI~1\clang\bin\clang-cl.exe+0x10895ce)
 0:56.86 #7 0x7ff7f0b89e9f
clang::CodeGen::CodeGenFunction::GenerateCode(class clang::GlobalDecl,class
llvm::Function *,class clang::CodeGen::CGFunctionInfo const &)
(c:\Users\DAVIDP~1\MOZBUI~1\clang\bin\clang-cl.exe+0x1089e9f)
 0:56.86 #8 0x7ff7f0a2caab
clang::CodeGen::CodeGenModule::EmitGlobalFunctionDefinition(class
clang::GlobalDecl,class llvm::GlobalValue *)
(c:\Users\DAVIDP~1\MOZBUI~1\clang\bin\clang-cl.exe+0xf2caab)
 0:56.86 #9 0x7ff7f0a272d7
clang::CodeGen::CodeGenModule::EmitGlobalDefinition(class
clang::GlobalDecl,class llvm::GlobalValue *)
(c:\Users\DAVIDP~1\MOZBUI~1\clang\bin\clang-cl.exe+0xf272d7)
 0:56.86 #10 0x7ff7f0a1eed3
clang::CodeGen::CodeGenModule::EmitDeferred(void)
(c:\Users\DAVIDP~1\MOZBUI~1\clang\bin\clang-cl.exe+0xf1eed3)
 0:56.86 #11 0x7ff7f0a1e1f1 clang::CodeGen::CodeGenModule::Release(void)
(c:\Users\DAVIDP~1\MOZBUI~1\clang\bin\clang-cl.exe+0xf1e1f1)
 0:56.86 #12 0x7ff7f24f3655 clang::CreateLLVMCodeGen(class
clang::DiagnosticsEngine &,class llvm::StringRef,class
clang::HeaderSearchOptions const &,class clang::PreprocessorOptions const
&,class clang::CodeGenOptions const &,class llvm::LLVMContext &,class
clang::CoverageSourceInfo *)
(c:\Users\DAVIDP~1\MOZBUI~1\clang\bin\clang-cl.exe+0x29f3655)
 0:56.86 #13 0x7ff7f24f1854
clang::BackendConsumer::HandleTranslationUnit(class clang::ASTContext &)
(c:\Users\DAVIDP~1\MOZBUI~1\clang\bin\clang-cl.exe+0x29f1854)
 0:56.86 #14 0x7ff7f17802d4 clang::ParseAST(class clang::Sema &,bool,bool)
(c:\Users\DAVIDP~1\MOZBUI~1\clang\bin\clang-cl.exe+0x1c802d4)
 0:56.86 #15 

[llvm-bugs] [Bug 40792] New: cannot convert initializer list argument to std::slice_array

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40792

Bug ID: 40792
   Summary: cannot convert initializer list argument to
std::slice_array
   Product: clang
   Version: 8.0
  Hardware: PC
OS: FreeBSD
Status: NEW
  Severity: enhancement
  Priority: P
 Component: C++
  Assignee: unassignedclangb...@nondot.org
  Reporter: y...@tsoft.com
CC: blitzrak...@gmail.com, dgre...@apple.com,
erik.pilking...@gmail.com, llvm-bugs@lists.llvm.org,
richard-l...@metafoo.co.uk

The test.c below fails in clang-8, but works with gcc-8.

It is natural that a slice array of equal size is initialized using the
initializer list.

It probably shouldn't fail, and implicitly use this operator: void
std::slice_array::operator=(const std::valarray& val_arr).


FreeBSD 11.2

Yuri



---test.cpp---
#include 

void f() {
  typedef std::valarray matrix;
  matrix m;
  m[std::slice(2, 3, 3)] = {0.,0.,0.};
}


---message.txt---
valarray-ilist.cpp:6:26: error: no viable overloaded '='
  m[std::slice(2, 3, 3)] = {0.,0.,0.};
  ~~ ^ ~~
/usr/include/c++/v1/valarray:1258:24: note: candidate function not viable:
cannot convert initializer list argument to 'const
std::__1::slice_array'
const slice_array& operator=(const slice_array& __sa) const;
   ^
/usr/include/c++/v1/valarray:1261:10: note: candidate function not viable:
cannot convert initializer list argument to 'const
std::__1::slice_array::value_type'
  (aka 'const double')
void operator=(const value_type& __x) const;
 ^
/usr/include/c++/v1/valarray:1165:5: note: candidate template ignored: couldn't
infer template argument '_Expr'
operator=(const _Expr& __v) const;
^

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40793] New: X86 ISel gets stuck in infinite loop

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40793

Bug ID: 40793
   Summary: X86 ISel gets stuck in infinite loop
   Product: libraries
   Version: trunk
  Hardware: PC
OS: All
Status: NEW
  Severity: normal
  Priority: P
 Component: Backend: X86
  Assignee: unassignedb...@nondot.org
  Reporter: and...@scheidecker.net
CC: craig.top...@gmail.com, llvm-bugs@lists.llvm.org,
llvm-...@redking.me.uk, spatel+l...@rotateright.com

Created attachment 21498
  --> https://bugs.llvm.org/attachment.cgi?id=21498=edit
IR that triggers bug

Using SVN revision 354401 (from 2019/02/19), llc gets stuck in a loop on the
attached input, when run with the command-line:

  llc llvm-lock.ll -mcpu=skylake-avx512

Using llc from the LLVM 6.0 release does not get stuck in a loop.

Running it with e.g. -mcpu=skylake also does not get stuck in a loop. Based on
this, I've assumed this is an X86/AVX512 target specific bug.

Passing -debug prints the following in a loop:

  Promoting t1036: i16 = and t46, Constant:i16<15>
  Creating new node: t1038: i32 = any_extend t46
  Creating constant: t1039: i32 = Constant<15>
  Creating new node: t1040: i32 = and t1038, Constant:i32<15>
  Creating new node: t1041: i16 = truncate t1040

  Replacing.1 t1036: i16 = and t46, Constant:i16<15>

  With: t1041: i16 = truncate t1040
   and 0 other values

  Combining: t1037: i32 = srl Constant:i32<32733>, t1041
  Creating new node: t1042: i16 = and t46, Constant:i16<15>
  Creating new node: t1043: i32 = srl Constant:i32<32733>, t1042
   ... into: t1043: i32 = srl Constant:i32<32733>, t1042

  Combining: t39: i32 = Constant<32733>

  Combining: t43: i64 = any_extend t1043

  Combining: t1043: i32 = srl Constant:i32<32733>, t1042

  Combining: t1042: i16 = and t46, Constant:i16<15>

Breaking into the debugger shows this call stack:

  `anonymous namespace'::DAGCombiner::CombineTo
  `anonymous namespace'::DAGCombiner::CombineTo
  `anonymous namespace'::DAGCombiner::PromoteIntBinOp
  `anonymous namespace'::DAGCombiner::combine
  `anonymous namespace'::DAGCombiner::Run
  llvm::SelectionDAG::Combine
  llvm::SelectionDAGISel::CodeGenAndEmitDAG
  llvm::SelectionDAGISel::SelectBasicBlock
  llvm::SelectionDAGISel::SelectAllBasicBlocks
  llvm::SelectionDAGISel::runOnMachineFunction
  `anonymous namespace'::X86DAGToDAGISel::runOnMachineFunction
  llvm::MachineFunctionPass::runOnFunction
  llvm::FPPassManager::runOnFunction
  llvm::FPPassManager::runOnModule

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40472] error in backend: Prototypeless function used with conflicting signatures

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40472

Sam Clegg  changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution|--- |FIXED

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40412] Unconvertable type leads to invalid WebAssembly

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40412

Sam Clegg  changed:

   What|Removed |Added

 Resolution|--- |FIXED
 Status|NEW |RESOLVED

--- Comment #1 from Sam Clegg  ---
Fixed in https://reviews.llvm.org/D57909

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40794] New: LLVM fence lowering is not supported

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40794

Bug ID: 40794
   Summary: LLVM fence lowering is not supported
   Product: libraries
   Version: trunk
  Hardware: PC
OS: Linux
Status: NEW
  Severity: enhancement
  Priority: P
 Component: Backend: WebAssembly
  Assignee: unassignedb...@nondot.org
  Reporter: ahee...@gmail.com
CC: llvm-bugs@lists.llvm.org

LLVM's 'fence' instruction lowering is not supported in WebAssembly even with
-mattr=+atomics option on.

A CL (https://reviews.llvm.org/D50277) has been proposed, but we have not yet
reached a decision on what should we lower them to. This is a tracking bug for
this.

Previous discussion thread:
https://github.com/WebAssembly/tool-conventions/issues/59

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 37436] Support for llvm-ar P modifier

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=37436

Jordan Rupprecht  changed:

   What|Removed |Added

 Resolution|--- |FIXED
 Fixed By Commit(s)||https://reviews.llvm.org/rL
   ||354044
 Status|NEW |RESOLVED

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 13242 in oss-fuzz: llvm/llvm-opt-fuzzer--x86_64-gvn: ASSERT: CastInst::castIsValid(Instruction::BitCast, C, DstTy) && "Invalid constantexpr b

2019-02-20 Thread ClusterFuzz-External via monorail via llvm-bugs

Status: New
Owner: 
CC: k...@google.com, masc...@google.com, jdevlieg...@apple.com,  
igm...@gmail.com, mit...@google.com, bigchees...@gmail.com,  
eney...@google.com, llvm-b...@lists.llvm.org, j...@chromium.org,  
v...@apple.com, mitchphi...@outlook.com, xpl...@gmail.com,  
akils...@apple.com
Labels: ClusterFuzz Stability-Memory-AddressSanitizer Reproducible  
Engine-libfuzzer Proj-llvm Reported-2019-02-21

Type: Bug

New issue 13242 by ClusterFuzz-External: llvm/llvm-opt-fuzzer--x86_64-gvn:  
ASSERT: CastInst::castIsValid(Instruction::BitCast, C, DstTy) && "Invalid  
constantexpr b

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13242

Detailed report: https://oss-fuzz.com/testcase?key=5710927142322176

Project: llvm
Fuzzer: libFuzzer_llvm_llvm-opt-fuzzer--x86_64-gvn
Fuzz target binary: llvm-opt-fuzzer--x86_64-gvn
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: ASSERT
Crash Address:
Crash State:
  CastInst::castIsValid(Instruction::BitCast, C, DstTy) && "Invalid  
constantexpr b

  llvm::ConstantExpr::getBitCast
  FoldBitCast

Sanitizer: address (ASAN)

Regressed:  
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm=201802050757:201802060728


Reproducer Testcase:  
https://oss-fuzz.com/download?testcase_id=5710927142322176


Issue filed automatically.

See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for  
instructions to reproduce this bug locally.


When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any  
stable releases.

  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any  
other feedback, please file an issue at  
https://github.com/google/oss-fuzz/issues.


--
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.
___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40715] [llvm-exegesis] If the same instruction lies in multiple clusters, it's noise

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40715

Roman Lebedev  changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Fixed By Commit(s)||354441
 Resolution|--- |FIXED

--- Comment #5 from Roman Lebedev  ---
r354441, thanks!

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40331] [meta] 8.0.0 Release Blockers

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40331
Bug 40331 depends on bug 40511, which changed state.

Bug 40511 Summary: [AArch64] Linux/name_to_handle_at.cc fails
https://bugs.llvm.org/show_bug.cgi?id=40511

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution|--- |FIXED

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40511] [AArch64] Linux/name_to_handle_at.cc fails

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40511

Diana Picus  changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution|--- |FIXED

--- Comment #6 from Diana Picus  ---
Seems fine now, thanks!

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 40785] New: Print unknown st_other value if present in GNU output

2019-02-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=40785

Bug ID: 40785
   Summary: Print unknown st_other value if present in GNU output
   Product: tools
   Version: trunk
  Hardware: PC
OS: Windows NT
Status: NEW
  Severity: enhancement
  Priority: P
 Component: llvm-readobj
  Assignee: unassignedb...@nondot.org
  Reporter: jh7370.2...@my.bristol.ac.uk
CC: jh7370.2...@my.bristol.ac.uk, llvm-bugs@lists.llvm.org

llvm-readelf, when printing an unknown st_other value, simply prints "DEFAULT",
and doesn't list the actual value, unlike readelf:

C:\Work>readelf test.o --dyn-syms
Symbol table '.dynsym' contains 2 entries:
   Num:Value  Size TypeBind   Vis  Ndx Name
 0:  0 NOTYPE  LOCAL  DEFAULT  UND
 1:  0 NOTYPE  LOCAL  DEFAULT [: 4]   UND other

C:\Work>llvm-readelf test.o --dyn-syms
Symbol table '.dynsym' contains 2 entries:
   Num:Value  Size TypeBind   Vis  Ndx Name
 0:  0 NOTYPE  LOCAL  DEFAULT  UND
 1:  0 NOTYPE  LOCAL  DEFAULT  UND other

We can, and should do better, although I don't think we necessarily have to
match GNU's output here, we should at least print the relevant value somehow.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 13229 in oss-fuzz: llvm/llvm-opt-fuzzer--x86_64-loop_vectorize: ASSERT: !getMember(0)->mayWriteToMemory() && "Group should have been invalidated"

2019-02-20 Thread ClusterFuzz-External via monorail via llvm-bugs

Status: New
Owner: 
CC: k...@google.com, masc...@google.com, jdevlieg...@apple.com,  
igm...@gmail.com, mit...@google.com, bigchees...@gmail.com,  
eney...@google.com, llvm-b...@lists.llvm.org, j...@chromium.org,  
v...@apple.com, mitchphi...@outlook.com, xpl...@gmail.com,  
akils...@apple.com
Labels: ClusterFuzz Stability-Memory-AddressSanitizer Reproducible  
Engine-libfuzzer Proj-llvm Reported-2019-02-20

Type: Bug

New issue 13229 by ClusterFuzz-External:  
llvm/llvm-opt-fuzzer--x86_64-loop_vectorize:  
ASSERT: !getMember(0)->mayWriteToMemory() && "Group should have been  
invalidated"

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13229

Detailed report: https://oss-fuzz.com/testcase?key=5713358093811712

Project: llvm
Fuzzer: libFuzzer_llvm_llvm-opt-fuzzer--x86_64-loop_vectorize
Fuzz target binary: llvm-opt-fuzzer--x86_64-loop_vectorize
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: ASSERT
Crash Address:
Crash State:
  !getMember(0)->mayWriteToMemory() && "Group should have been invalidated"
  llvm::LoopVectorizationCostModel::interleavedAccessCanBeWidened
  llvm::LoopVectorizationCostModel::setCostBasedWideningDecision

Sanitizer: address (ASAN)

Regressed:  
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm=201810170227:20181623


Reproducer Testcase:  
https://oss-fuzz.com/download?testcase_id=5713358093811712


Issue filed automatically.

See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for  
instructions to reproduce this bug locally.


When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any  
stable releases.

  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any  
other feedback, please file an issue at  
https://github.com/google/oss-fuzz/issues.


--
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.
___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs