[llvm-bugs] [Bug 36023] New: False positive / hidden assumption on separate tests of static variable

2018-01-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=36023

Bug ID: 36023
   Summary: False positive / hidden assumption on separate tests
of static variable
   Product: clang
   Version: 5.0
  Hardware: PC
OS: Linux
Status: NEW
  Severity: enhancement
  Priority: P
 Component: Static Analyzer
  Assignee: dcough...@apple.com
  Reporter: achurch+l...@achurch.org
CC: llvm-bugs@lists.llvm.org

scan-build (clang 5.0.1) reports a null dereference at the marked line in this
code:

 test.c 
static int n = 1;
extern void bar(void);
void foo(void)
{
int *p;
if (n > 0) {
p = &n;
} else {
p = 0;
}
bar();
for (int i = 0; i < n; i++) {
*p += i;  // False positive assuming n is not externally modified.
}
}


If n is declared locally in foo() (whether static or not) or if I remove the
bar() call, the error is not reported, which makes me think that the analyzer
is assuming bar() could modify the value of n.  However, clearly the address of
n can never escape this file, so at least in this case the assumption is
clearly unwarranted.  Even if the file was sufficiently complex that the
analyzer couldn't make that determination, I think it would be sensible to have
the analyzer explicitly state the assumption that bar() is modifying the value
of n in its report, because otherwise it just looks like an analyzer bug.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 35733] Missing leading underscore for 32-bit stdcall exports

2018-01-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=35733

Martin Storsjö  changed:

   What|Removed |Added

 Resolution|--- |FIXED
 Status|NEW |RESOLVED

--- Comment #1 from Martin Storsjö  ---
This has been fixed by LLVM commit r323035 and LLD commit r323036. (They need
to go together.) If this is up for backporting to 6.0, the LLD commit also
requires r321790.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 36024] New: Merge r322993 into the 6.0 branch: [Dominators] Visit affected node candidates found at different root levels

2018-01-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=36024

Bug ID: 36024
   Summary: Merge r322993 into the 6.0 branch: [Dominators] Visit
affected node candidates found at different root
levels
   Product: tools
   Version: 6.0
  Hardware: PC
OS: Linux
Status: NEW
  Severity: release blocker
  Priority: P
 Component: opt
  Assignee: unassignedb...@nondot.org
  Reporter: kubakuder...@gmail.com
CC: llvm-bugs@lists.llvm.org

The patch fixes a bug in the core of the incremental DomTree updater found in
PR35969.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 31265] [Meta] Load/Store/Bitcast Handling of bool vectors

2018-01-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=31265
Bug 31265 depends on bug 35520, which changed state.

Bug 35520 Summary: Wrong codegen for i1 vector truncating stores
https://bugs.llvm.org/show_bug.cgi?id=35520

   What|Removed |Added

 Status|ASSIGNED|RESOLVED
 Resolution|--- |FIXED

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 35520] Wrong codegen for i1 vector truncating stores

2018-01-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=35520

Jonas Paulsson  changed:

   What|Removed |Added

 Resolution|--- |FIXED
 Status|ASSIGNED|RESOLVED

--- Comment #12 from Jonas Paulsson  ---
trunk@323042

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 36025] New: asan: AddressSanitizer-*-linux-dynamic :: TestCases/Linux/asan_rt_confict_test-1.cc fails on Gentoo stand-alone build

2018-01-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=36025

Bug ID: 36025
   Summary: asan: AddressSanitizer-*-linux-dynamic ::
TestCases/Linux/asan_rt_confict_test-1.cc fails on
Gentoo stand-alone build
   Product: compiler-rt
   Version: unspecified
  Hardware: PC
OS: Linux
Status: NEW
  Severity: normal
  Priority: P
 Component: compiler-rt
  Assignee: unassignedb...@nondot.org
  Reporter: mgo...@gentoo.org
CC: llvm-bugs@lists.llvm.org
Blocks: 35804

Created attachment 19715
  --> https://bugs.llvm.org/attachment.cgi?id=19715&action=edit
sys-libs:compiler-rt-sanitizers-6.0.:20180120-132820.log.xz

When testing the 6.0 branch for Gentoo, I have two new ASAN test failures:

AddressSanitizer-i386-linux-dynamic ::
TestCases/Linux/asan_rt_confict_test-1.cc
AddressSanitizer-x86_64-linux-dynamic ::
TestCases/Linux/asan_rt_confict_test-1.cc

In both cases, the test executable segfaults without outputting anything.
Curious enough, I can't reproduce this when building compiler-rt in-tree with
other LLVM components.

I've attempted running the working in-tree executable with LD_LIBRARY_PATH
pointing to libasan built stand-alone, and it segfaulted like the stand-alone
build -- therefore, I suspect the problem lies in libasan itself and not the
test.

I'd appreciate any suggestions how to debug this further. I'm attaching the
build log for compiler-rt sanitizers.


FAIL: AddressSanitizer-i386-linux-dynamic ::
TestCases/Linux/asan_rt_confict_test-1.cc (1354 of 4782)
 TEST 'AddressSanitizer-i386-linux-dynamic ::
TestCases/Linux/asan_rt_confict_test-1.cc' FAILED 
Script:
--
/var/tmp/portage/sys-libs/compiler-rt-sanitizers-6.0./work/compiler-rt-sanitizers-6.0._build/lib/llvm/6/bin/clang
 --driver-mode=g++ -fsanitize=address -mno-omit-leaf-frame-pointer
-fno-omit-frame-pointer -fno-optimize-sibling-calls -gline-tables-only  -m32 
/var/tmp/portage/sys-libs/compiler-rt-sanitizers-6.0./work/compiler-rt-sanitizers-6.0./test/asan/TestCases/Linux/asan_rt_confict_test-1.cc
-o
/var/tmp/portage/sys-libs/compiler-rt-sanitizers-6.0./work/compiler-rt-sanitizers-6.0._build/test/asan/I386LinuxDynamicConfig/TestCases/Linux/Output/asan_rt_confict_test-1.cc.tmp
env LD_PRELOAD=libclang_rt.asan-i386.so not 
/var/tmp/portage/sys-libs/compiler-rt-sanitizers-6.0./work/compiler-rt-sanitizers-6.0._build/test/asan/I386LinuxDynamicConfig/TestCases/Linux/Output/asan_rt_confict_test-1.cc.tmp
2>&1 | FileCheck
/var/tmp/portage/sys-libs/compiler-rt-sanitizers-6.0./work/compiler-rt-sanitizers-6.0./test/asan/TestCases/Linux/asan_rt_confict_test-1.cc
--
Exit Code: 1

Command Output (stderr):
--
+
/var/tmp/portage/sys-libs/compiler-rt-sanitizers-6.0./work/compiler-rt-sanitizers-6.0._build/lib/llvm/6/bin/clang
--driver-mode=g++ -fsanitize=address -mno-omit-leaf-frame-pointer
-fno-omit-frame-pointer -fno-optimize-sibling-calls -gline-tables-only -m32
/var/tmp/portage/sys-libs/compiler-rt-sanitizers-6.0./work/compiler-rt-sanitizers-6.0./test/asan/TestCases/Linux/asan_rt_confict_test-1.cc
-o
/var/tmp/portage/sys-libs/compiler-rt-sanitizers-6.0./work/compiler-rt-sanitizers-6.0._build/test/asan/I386LinuxDynamicConfig/TestCases/Linux/Output/asan_rt_confict_test-1.cc.tmp
+ FileCheck
/var/tmp/portage/sys-libs/compiler-rt-sanitizers-6.0./work/compiler-rt-sanitizers-6.0./test/asan/TestCases/Linux/asan_rt_confict_test-1.cc
+ env LD_PRELOAD=libclang_rt.asan-i386.so not
/var/tmp/portage/sys-libs/compiler-rt-sanitizers-6.0./work/compiler-rt-sanitizers-6.0._build/test/asan/I386LinuxDynamicConfig/TestCases/Linux/Output/asan_rt_confict_test-1.cc.tmp
/var/tmp/portage/sys-libs/compiler-rt-sanitizers-6.0./work/compiler-rt-sanitizers-6.0./test/asan/TestCases/Linux/asan_rt_confict_test-1.cc:13:11:
error: expected string not found in input
// CHECK: Your application is linked against incompatible ASan runtimes
  ^
:1:1: note: scanning from here
ERROR: ld.so: object 'libclang_rt.asan-i386.so' from LD_PRELOAD cannot be
preloaded (wrong ELF class: ELFCLASS32): ignored.
^
:2:1: note: possible intended match here
Error: Segmentation fault
^

--



FAIL: AddressSanitizer-x86_64-linux-dynamic ::
TestCases/Linux/asan_rt_confict_test-1.cc (2197 of 4782)
 TEST 'AddressSanitizer-x86_64-linux-dynamic ::
TestCases/Linux/asan_rt_confict_test-1.cc' FAILED 
Script:
--
/var/tmp/portage/sys-libs/compiler-rt-sanitizers-6.0./work/compiler-rt-sanitizers-6.0._build/lib/llvm/6/bin/clang
 --driver-mode=g++ -fsanitize=address -mno-omit-leaf-frame-pointer
-fno-omit-frame-pointer -fno-optimize-sibling-calls -gline-tables-only  -m64 
/var/tmp/portage/sys-libs/compiler-

[llvm-bugs] [Bug 36026] New: LeakSanitizer throws fatal error around std::async

2018-01-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=36026

Bug ID: 36026
   Summary: LeakSanitizer throws fatal error around std::async
   Product: new-bugs
   Version: 6.0
  Hardware: PC
OS: All
Status: NEW
  Severity: enhancement
  Priority: P
 Component: new bugs
  Assignee: unassignedb...@nondot.org
  Reporter: gja...@googlemail.com
CC: llvm-bugs@lists.llvm.org

Hello,

I encounter the following leak sanitizer error on Ubuntu Bionic:

#include 
int main()
{
  auto write = std::async(std::launch::async, []() {});
  write.wait();
  return 0;
}

$ clang++-6.0 -fsanitize=address -o testcase testcase.cpp && ./testcase 
==8777==LeakSanitizer has encountered a fatal error.
==8777==HINT: For debugging, try setting environment variable
LSAN_OPTIONS=verbosity=1:log_threads=1
==8777==HINT: LeakSanitizer does not work under ptrace (strace, gdb, etc)

Environment:
* Ubuntu Bionic on amd64
* Clang 1:6.0~svn321357 from llvm-toolchain-snapshot (in universe-proposed
repo)
* Libstdc++ 7.2.0-19ubuntu1

Thanks,
Gregor


Full Debug output with LSAN_OPTIONS=verbosity=1:log_threads=1

==8784==AddressSanitizer: libc interceptors initialized
|| `[0x10007fff8000, 0x7fff]` || HighMem||
|| `[0x02008fff7000, 0x10007fff7fff]` || HighShadow ||
|| `[0x8fff7000, 0x02008fff6fff]` || ShadowGap  ||
|| `[0x7fff8000, 0x8fff6fff]` || LowShadow  ||
|| `[0x, 0x7fff7fff]` || LowMem ||
MemToShadow(shadow): 0x8fff7000 0x91ff6dff 0x004091ff6e00
0x02008fff6fff
redzone=16
max_redzone=2048
quarantine_size_mb=256M
thread_local_quarantine_size_kb=1024K
malloc_context_size=30
SHADOW_SCALE: 3
SHADOW_GRANULARITY: 8
SHADOW_OFFSET: 0x7fff8000
==8784==Installed the sigaction for signal 11
==8784==Installed the sigaction for signal 7
==8784==Installed the sigaction for signal 8
==8784==T0: stack [0x7fff2012a000,0x7fff2092a000) size 0x80;
local=0x7fff20928d88
==8784==AddressSanitizer Init done
==8784==T1: stack [0x7f0e63aff000,0x7f0e642fef40) size 0x7fff40;
local=0x7f0e642fee58
==8784==T1 TSDDtor
==8784==T1 exited
==8786==Could not attach to thread 8784 (errno 1).
==8786==Failed suspending threads.
==8784==LeakSanitizer has encountered a fatal error.
==8784==HINT: For debugging, try setting environment variable
LSAN_OPTIONS=verbosity=1:log_threads=1
==8784==HINT: LeakSanitizer does not work under ptrace (strace, gdb, etc)

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 36027] New: Merge r323039 into the 6.0 branch

2018-01-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=36027

Bug ID: 36027
   Summary: Merge r323039 into the 6.0 branch
   Product: compiler-rt
   Version: 6.0
  Hardware: Other
OS: OpenBSD
Status: NEW
  Severity: release blocker
  Priority: P
 Component: compiler-rt
  Assignee: unassignedb...@nondot.org
  Reporter: b...@comstyle.com
CC: llvm-bugs@lists.llvm.org
Blocks: 35804

Please merge r323039 to implement __clear_cache() for OpenBSD/mips64.


Referenced Bugs:

https://bugs.llvm.org/show_bug.cgi?id=35804
[Bug 35804] [meta] 6.0.0 Release Blockers
-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 36028] New: Incorrect use of pushf/popf enables/disables interrupts on amd64 kernels

2018-01-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=36028

Bug ID: 36028
   Summary: Incorrect use of pushf/popf enables/disables
interrupts on amd64 kernels
   Product: libraries
   Version: 6.0
  Hardware: PC
OS: FreeBSD
Status: NEW
  Severity: normal
  Priority: P
 Component: Backend: X86
  Assignee: unassignedb...@nondot.org
  Reporter: jonloo...@gmail.com
CC: llvm-bugs@lists.llvm.org

Created attachment 19716
  --> https://bugs.llvm.org/attachment.cgi?id=19716&action=edit
Patch to make LLVM do a slightly better job at restoring the EFLAGS register

I am a FreeBSD kernel developer. While making a seemingly-simple change to the
FreeBSD kernel, I found that interrupt handling was suddenly incorrect. After
troubleshooting for some time, I found that this was due to the way LLVM's x86
backend is using pushf/popf to save/restore EFLAGS across function calls.

Simple reproduction (which requires no headers):

---Start File---
void spinlock_acquire(void);
void spinlock_release(void);
void fx(void);
void otherfx(void);
static int count = 0;

void
fx(void)
{
_Bool needtocall;

spinlock_acquire();
needtocall = (++count == 0);
spinlock_release();
if (needtocall)
otherfx();
}
---End File---

In the above file, assume that spinlock_acquire() may disable interrupts and
spinlock_release() my enable interrupts.

If you compile this code using clang (5.0.0, 5.0.1, or 6.0.0 all behave
similarly in the critical respect) with the -O2 and -S flags for a generic
x86-64 cpu, you will see that LLVM generates this assembly:

---Start Assembly---
.text
.file   "popfqtest.c"
.globl  fx  # -- Begin function fx
.p2align4, 0x90
.type   fx,@function
fx: # @fx
.cfi_startproc
# BB#0: # %entry
pushq   %rbp
.Lcfi0:
.cfi_def_cfa_offset 16
.Lcfi1:
.cfi_offset %rbp, -16
movq%rsp, %rbp
.Lcfi2:
.cfi_def_cfa_register %rbp
pushq   %rbx
pushq   %rax
.Lcfi3:
.cfi_offset %rbx, -24
callq   spinlock_acquire
inclcount(%rip)
pushfq
popq%rbx
callq   spinlock_release
addq$8, %rsp
pushq   %rbx
popfq
je  .LBB0_2
# BB#1: # %if.end
popq%rbx
popq%rbp
retq
.LBB0_2:# %if.then
popq%rbx
popq%rbp
jmp otherfx # TAILCALL
.Lfunc_end0:
.size   fx, .Lfunc_end0-fx
.cfi_endproc
# -- End function
.type   count,@object   # @count
.local  count
.comm   count,4,4

.ident  "FreeBSD clang version 5.0.1 (tags/RELEASE_501/final 320880)
(based on LLVM 5.0.1)"
.section".note.GNU-stack","",@progbits
---End Assembly---



The critical part is the way that LLVM handles the conditional:

1. Increment the value. This will set ZF if count reaches 0:

inclcount(%rip)


2. Now, save the status flags (particularly, ZF) using pushfq. Critically,
pushfq saves the entire EFLAGS value, which includes the interrupt flag.
Because we are holding a spin mutex, interrupts are disabled at this point:

pushfq
popq%rbx


3. Now, call the function to unlock the spin mutex, which will potentially
enable interrupts.

callq   spinlock_release


4. Now, restore the status flags. Critically, popfq restores the entire EFLAGS
value, which includes the interrupt flag. Because interrupts were disabled when
the flags were stored, these instructions will disable them again:

addq$8, %rsp
pushq   %rbx
popfq


5. Now, use the status flags to determine whether to call the function:

je  .LBB0_2



After running this code, interrupts may remain erroneously disabled.

(This is a contrived minimal test case, but I did run into this bug while
testing a code change in the kernel. Interrupts remained erroneously disabled
after dropping a spin lock.)

By now, the bug should be obvious: LLVM shouldn't save and restore the entire
EFLAGS register. It doesn't know what changes these other function calls make
to the values of the EFLAGS register about which clang doesn't care (e.g. IF,
IOPL, AC, etc.). By saving and restoring EFLAGS across function calls, it can
load incorrect values for these other flags.

It looks like the correct solutions are to either not save EFLAGS across
function calls, or to just save the individual flag(s) that need to be
evaluated across the function call. (For example, a simple setz/test would
probably be sufficient -- and more efficient -- in this particular case.)
However, these ap

[llvm-bugs] [Bug 36029] New: After r318497, --as-needed does not seem to work correctly anymore

2018-01-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=36029

Bug ID: 36029
   Summary: After r318497, --as-needed does not seem to work
correctly anymore
   Product: lld
   Version: unspecified
  Hardware: PC
OS: All
Status: NEW
  Severity: release blocker
  Priority: P
 Component: ELF
  Assignee: unassignedb...@nondot.org
  Reporter: dimi...@andric.com
CC: llvm-bugs@lists.llvm.org

Using recent versions of lld 6.0.0 in FreeBSD, we've noticed that libgcc_s.so
always gets linked into executables and libraries, even if none of its
functions appear to be used.

E.g.:

$ cat main.c
int main(void) { return 0; }

$ cc -c main.c -o main.o

(The following is what cc normally runs to link a plain executable)

$ ld.lld  --eh-frame-hdr -dynamic-linker /libexec/ld-elf.so.1 --hash-style=both
--enable-new-dtags -o main /usr/lib/crt1.o /usr/lib/crti.o /usr/lib/crtbegin.o
-L/usr/lib main.o -lgcc --as-needed -lgcc_s --no-as-needed -lc -lgcc
--as-needed -lgcc_s --no-as-needed /usr/lib/crtend.o /usr/lib/crtn.o

$ readelf -d main

Dynamic section at offset 0x3028 contains 19 entries:
  TagType  Name/Value
 0x0001 NEEDED   Shared library: [libgcc_s.so.1]
 0x0001 NEEDED   Shared library: [libc.so.7]
 0x0015 DEBUG0x0
[...]

This appears to have regressed with https://reviews.llvm.org/rL318497 ("Remove
IsLocal").  Linking with lld just before that avoids pulling in libgcc_s.so:

$ ~/obj/lld-318496/bin/ld.lld --eh-frame-hdr -dynamic-linker
/libexec/ld-elf.so.1 --hash-style=both --enable-new-dtags -o main
/usr/lib/crt1.o /usr/lib/crti.o /usr/lib/crtbegin.o -L/usr/lib main.o -lgcc
--as-needed -lgcc_s --no-as-needed -lc -lgcc --as-needed -lgcc_s --no-as-needed
/usr/lib/crtend.o /usr/lib/crtn.o

$ readelf -d main

Dynamic section at offset 0x3028 contains 18 entries:
  TagType  Name/Value
 0x0001 NEEDED   Shared library: [libc.so.7]
 0x0015 DEBUG0x0
[...]

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 36030] New: total crash on big static array

2018-01-20 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=36030

Bug ID: 36030
   Summary: total crash on big static array
   Product: clang
   Version: 3.8
  Hardware: PC
OS: Linux
Status: NEW
  Severity: enhancement
  Priority: P
 Component: -New Bugs
  Assignee: unassignedclangb...@nondot.org
  Reporter: shmuelhan...@gmail.com
CC: llvm-bugs@lists.llvm.org

Hi,

This:


void foo()
{
static int arr[10] = {0};
}

Cause my whole machine to hang badly and crash, when I try to compile it using
clang 3.8.1-24. I am using debian 9.2.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 5532 in oss-fuzz: llvm/llvm-dwarfdump-fuzzer: Abrt in llvm::llvm_unreachable_internal

2018-01-20 Thread ClusterFuzz-External via monorail via llvm-bugs

Status: New
Owner: 
CC: k...@google.com, masc...@google.com, jdevlieg...@apple.com,  
igm...@gmail.com, llvm-b...@lists.llvm.org, v...@apple.com,  
mitchphi...@outlook.com, xpl...@gmail.com, akils...@apple.com
Labels: ClusterFuzz Stability-Memory-AddressSanitizer Reproducible  
Engine-libfuzzer Proj-llvm Reported-2018-01-21

Type: Bug

New issue 5532 by ClusterFuzz-External: llvm/llvm-dwarfdump-fuzzer: Abrt in  
llvm::llvm_unreachable_internal

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5532

Detailed report: https://oss-fuzz.com/testcase?key=6297749109604352

Project: llvm
Fuzzer: libFuzzer_llvm_llvm-dwarfdump-fuzzer
Fuzz target binary: llvm-dwarfdump-fuzzer
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: Abrt
Crash Address: 0x0001
Crash State:
  llvm::llvm_unreachable_internal
  llvm::DWARFFormValue::getFixedByteSize
  llvm::DWARFAbbreviationDeclaration::extract

Sanitizer: address (ASAN)

Regressed:  
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm&range=201708280446:201708291805


Reproducer Testcase:  
https://oss-fuzz.com/download?testcase_id=6297749109604352


Issue filed automatically.

See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for  
more information.


When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any  
stable releases.

  * add any other useful information.
This information can help downstream consumers.

If you have questions for the OSS-Fuzz team, please file an issue at  
https://github.com/google/oss-fuzz/issues.


--
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.
___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 5537 in oss-fuzz: llvm/clang-proto-fuzzer: ASSERT: isLoopInvariant(Operands[i], L) && "SCEVAddRecExpr operand is not loop-invariant

2018-01-20 Thread ClusterFuzz-External via monorail via llvm-bugs

Status: New
Owner: 
CC: k...@google.com, masc...@google.com, jdevlieg...@apple.com,  
igm...@gmail.com, llvm-b...@lists.llvm.org, v...@apple.com,  
mitchphi...@outlook.com, xpl...@gmail.com, akils...@apple.com
Labels: ClusterFuzz Stability-Memory-AddressSanitizer Reproducible  
Engine-libfuzzer Proj-llvm Reported-2018-01-21

Type: Bug

New issue 5537 by ClusterFuzz-External: llvm/clang-proto-fuzzer: ASSERT:  
isLoopInvariant(Operands[i], L) && "SCEVAddRecExpr operand is not  
loop-invariant

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5537

Detailed report: https://oss-fuzz.com/testcase?key=6643839252037632

Project: llvm
Fuzzer: libFuzzer_llvm_clang-proto-fuzzer
Fuzz target binary: clang-proto-fuzzer
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: ASSERT
Crash Address:
Crash State:
  isLoopInvariant(Operands[i], L) && "SCEVAddRecExpr operand is not  
loop-invariant

  llvm::ScalarEvolution::getAddRecExpr
  llvm::ScalarEvolution::getMulExpr

Sanitizer: address (ASAN)

Regressed:  
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm&range=201712190608:201712210617


Reproducer Testcase:  
https://oss-fuzz.com/download?testcase_id=6643839252037632


Issue filed automatically.

See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for  
more information.


When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any  
stable releases.

  * add any other useful information.
This information can help downstream consumers.

If you have questions for the OSS-Fuzz team, please file an issue at  
https://github.com/google/oss-fuzz/issues.


--
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.
___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs