[llvm-bugs] [Bug 44260] New: Unreachable triggered when parsing DWARF V5 line table with unsupported FORM

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=44260

Bug ID: 44260
   Summary: Unreachable triggered when parsing DWARF V5 line table
with unsupported FORM
   Product: libraries
   Version: trunk
  Hardware: PC
OS: Windows NT
Status: NEW
  Severity: normal
  Priority: P
 Component: DebugInfo
  Assignee: unassignedb...@nondot.org
  Reporter: jh7370.2...@my.bristol.ac.uk
CC: jdevliegh...@apple.com, keith.wal...@arm.com,
llvm-bugs@lists.llvm.org,
paul_robin...@playstation.sony.com

I ran into this when writing some llvm-dwarfdump tests. If a DWARF V5
.debug_line table header includes a file name or directory entry type with an
unsupported FORM value, and llvm-dwarfdump is used to dump the said line table,
an llvm_unreachable is triggered when parsing that field.

// example assembly
.section .debug_line,"",@progbits
.long .Lunit0_end - .Lunit0_begin # unit_length
.Lunit0_begin:
.short 5 ## version
.byte 8  ## address_size
.byte 0  ## segment_selector_size
.long .Lheader0_end - .Lheader0_begin ## header_length
.Lheader0_begin:
.byte 1  ## minimum_instruction_length
.byte 1  ## maximum_operations_per_instruction
.byte 1  ## default_is_stmt
.byte -5 ## line_base
.byte 7  ## line_range
.byte 13 ## opcode_base
.byte 0, 1, 1, 1, 1, 0, 0, 0, 1, 0, 0, 1 ## standard_opcode_lengths
.byte 1  ## directory_entry_format_count
.byte 0x1, 0x7F ## DW_LNCT_path, unknown form
.byte 1  ## directories_count
.byte 0  ## directory entry 0
.asciz "dir1/dir2"
.byte 1  ## file_name_entry_format_count
.byte 0x1, 0xB ## DW_LNCT_path, DW_FORM_string
.byte 0x2, 0x5 ## DW_LNCT_directory_index, DW_FORM_data1
.byte 2  ## file_names_count
.byte 0  ## file name entry 0
.asciz "file1.c"
.byte 1  ## file name entry 1
.long 0x12345678
.Lheader0_end:
.Lunit0_end:

C:\Work> llvm-dwarfdump --debug-line test.o
test.o: file format ELF64-x86-64

.debug_line contents:
debug_line[0x]
unsupported form
UNREACHABLE executed at
C:\llvm\llvm-project\llvm\lib\DebugInfo\DWARF\DWARFFormValue.cpp:350!


The unreachable has an associated comment which seems to imply that the
extractValue code was written for parsing .debug_info, and as such unsupported
DW_FORM_* values are not handled (because they should be handled earlier).
Clearly the code needs updating to allow for DW_FORM_* values coming from
.debug_line. It's probably reasonable to abort parsing of the line table when
an unsupported DW_FORM_* is hit, since it's impossible to know how to handle
the file/directory table in this case.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 35540] Clang crash for OpenCL local void** arithmetic

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=35540

Sven van Haastregt  changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 CC||sven.vanhaastr...@arm.com
 Resolution|--- |WORKSFORME

--- Comment #1 from Sven van Haastregt  ---
Cannot reproduce on a recent master (f3e6a612326 ("[OpenCL] Handle address
space conversions for constexpr (PR44177)", 2019-12-09)).

It probably has been fixed in the meantime.  Please reopen if you still hit the
issue.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 44261] New: Print value to adjust by rather than final line value for verbose DW_LNS_advance_line

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=44261

Bug ID: 44261
   Summary: Print value to adjust by rather than final line value
for verbose DW_LNS_advance_line
   Product: tools
   Version: trunk
  Hardware: PC
OS: Windows NT
Status: NEW
  Severity: enhancement
  Priority: P
 Component: llvm-dwarfdump
  Assignee: unassignedb...@nondot.org
  Reporter: jh7370.2...@my.bristol.ac.uk
CC: llvm-bugs@lists.llvm.org

Currently, when llvm-dwarfdump prints the debug line table with --verbose, any
DW_LNS_advance_line opcodes are printed as:

: 03 DW_LNS_advance_line ()

I think this should be changed to:

: 03 DW_LNS_advance_line ()

This would be in keeping with the various operations that change the PC value,
e.g. DW_LNS_advance_pc, which print the value to adjust by.

This inconsistency can easily lead to confusion. Additionally, nothing really
is lost: the next time a line is emitted using e.g. DW_LNS_copy or a special
opcode, the new line value is printed there. Without this change, there is no
direct way of seeing what is actually written in the line program, which is the
point of verbose printing.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 44262] New: variable templates in expressions cause lldb to crash

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=44262

Bug ID: 44262
   Summary: variable templates in expressions cause lldb to crash
   Product: lldb
   Version: unspecified
  Hardware: All
OS: All
Status: NEW
  Severity: normal
  Priority: P
 Component: All Bugs
  Assignee: lldb-...@lists.llvm.org
  Reporter: lab...@google.com
CC: jdevliegh...@apple.com, llvm-bugs@lists.llvm.org

(lldb) expr --top-level -- template T aaa = 1;
(lldb) expr -- aaa
lldb: clang/lib/AST/Type.cpp:2106: bool clang::Type::isConstantSizeType()
const: Assertion `!isDependentType() && "This doesn't make sense for dependent
types"' failed.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 44263] New: false positive memory leak

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=44263

Bug ID: 44263
   Summary: false positive memory leak
   Product: clang
   Version: 8.0
  Hardware: PC
OS: Linux
Status: NEW
  Severity: normal
  Priority: P
 Component: Static Analyzer
  Assignee: dcough...@apple.com
  Reporter: rgerha...@hq.adiscon.com
CC: dcough...@apple.com, llvm-bugs@lists.llvm.org

I think I have found a false positive and am reporting it as suggested.

Build report is here:
http://ubuntu16.rsyslog.com/19-12-10_14-18-34/2019-12-10-141929-8930-1/report-611563.html#EndPath

The same happens also with version 9. It was undetected by version 5 (the one I
used previously). Not sure about 6 and 7. I and a co-worker double checked, we
do not see anything that is wrong. Especially as the missing free is on the
next line.

The code is from the rsyslog project, related PR with all code at
https://github.com/rsyslog/rsyslog/pull/4025

If it is not a false positive, a hint to what is wrong would be appreciated.

Thx,
Rainer

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 44264] New: m[ft]ppr instruction aliases not implemented

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=44264

Bug ID: 44264
   Summary: m[ft]ppr instruction aliases not implemented
   Product: libraries
   Version: trunk
  Hardware: PC
OS: Linux
Status: NEW
  Severity: enhancement
  Priority: P
 Component: Backend: PowerPC
  Assignee: unassignedb...@nondot.org
  Reporter: colin.samp...@gmail.com
CC: llvm-bugs@lists.llvm.org, nemanja.i@gmail.com

Created attachment 22924
  --> https://bugs.llvm.org/attachment.cgi?id=22924&action=edit
patch to implement aliases

The mfppr and mtppr instruction aliases are not implemented in LLVM, but they
are in GCC and xlC. m[ft]ppr32 and quite a number of other m[tf]spr aliases are
also not implemented in LLVM.

I stumbled across this when trying to use the `_mm_pause` function
`clang/lib/Headers/ppc_wrappers/xmmintrin.h`, which uses these instructions in
its implementation.

The attached patch adds the instructions. AFAICT, the PPR was introduced in
POWER6, so this patch checks for that, although it seems like a bit much just
to implement an instruction alias.

Another option would be to just change the implementation in `xmmintrin.h` to
use `mfspr Rx,896`. Thoughts?

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 44124] ICF merges PLT entries and then merges wrongly conflated PLT callers

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=44124

Fangrui Song  changed:

   What|Removed |Added

 Resolution|--- |FIXED
 Status|CONFIRMED   |RESOLVED

--- Comment #5 from Fangrui Song  ---
Fixed by D71163/llvmorg-10-init-11574-gcd0ab2428ff

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 6912] Possible QoI request: Warn when running the analyzer without the core checkers

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=6912

Artem Dergachev  changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 CC||noqnoq...@gmail.com
 Resolution|--- |FIXED

--- Comment #14 from Artem Dergachev  ---
Since https://reviews.llvm.org/D66042 scan-build automatically "silences" core
checkers without disabling them when the user asks to disable them.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 19315 in oss-fuzz: llvm:clang-fuzzer: Stack-overflow in clang::StmtVisitorBase::Visit

2019-12-10 Thread ClusterFuzz-External via monorail via llvm-bugs

Status: New
Owner: 
CC: k...@google.com, masc...@google.com, jdevlieg...@apple.com,  
igm...@gmail.com, d...@google.com, mit...@google.com,  
bigchees...@gmail.com, eney...@google.com, llvm-b...@lists.llvm.org,  
j...@chromium.org, v...@apple.com, mitchphi...@outlook.com,  
xpl...@gmail.com, akils...@apple.com
Labels: ClusterFuzz Stability-Memory-AddressSanitizer Reproducible  
Engine-libfuzzer OS-Linux Proj-llvm Reported-2019-12-10

Type: Bug

New issue 19315 by ClusterFuzz-External: llvm:clang-fuzzer: Stack-overflow  
in clang::StmtVisitorBasebool>::Visit

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19315

Detailed Report: https://oss-fuzz.com/testcase?key=5831514587922432

Project: llvm
Fuzzing Engine: libFuzzer
Fuzz Target: clang-fuzzer
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: Stack-overflow
Crash Address: 0x7ffc13d37fa0
Crash State:
  clang::StmtVisitorBasebool>::Visit

  ComplexExprEvaluator::VisitBinaryOperator

Sanitizer: address (ASAN)

Crash Revision:  
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm&revision=201912090440


Reproducer Testcase:  
https://oss-fuzz.com/download?testcase_id=5831514587922432


Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for  
instructions to reproduce this bug locally.

When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any  
stable releases.

  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any  
other feedback, please file an issue at  
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail  
issues are not monitored.


--
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.
___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 44265] New: LLD does not implement INPUT_SECTION_FLAGS, but parses them as if it does

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=44265

Bug ID: 44265
   Summary: LLD does not implement INPUT_SECTION_FLAGS, but parses
them as if it does
   Product: lld
   Version: unspecified
  Hardware: PC
OS: Linux
Status: NEW
  Severity: enhancement
  Priority: P
 Component: ELF
  Assignee: unassignedb...@nondot.org
  Reporter: peter.sm...@linaro.org
CC: llvm-bugs@lists.llvm.org, peter.sm...@linaro.org

LLD doesn't implement the INPUT_SECTION_FLAGS feature
(https://sourceware.org/binutils/docs/ld/Input-Section-Basics.html)
yet it seems to parse INPUT_SECTION_FLAGS as if it were a file name, hence
ignoring it.

Consider the following example:
SECTIONS {
  .foo : { INPUT_SECTION_FLAGS (SHF_WRITE) *(.foo) }
  .foo2 :  { INPUT_SECTION_FLAGS (!SHF_WRITE) *(.foo) }
}
with obj1.o containing:
.section .foo, "wa", %progbits
.global d1
d1: 
.word 0
and obj2.o containing:
.section .foo, "a", %progbits
.global d2
d2: 
.word 0

The INPUT_SECTION_FLAGS are supposed to constrain the match, so .foo from
obj1.o goes into OutputSection .foo, and .foo from obj2.o goes into
OutuptSection .foo2

This feature can be very useful to filter sections by flag when it is not known
what the names are. Until we support it we should fault INPUT_SECTION_FLAGS if
we see it as a filename in an InputSectionDescription.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 44190] wrong code with #pragma pack(1)

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=44190

yaxun@amd.com changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution|--- |FIXED

--- Comment #5 from yaxun@amd.com ---
https://reviews.llvm.org/rG21b43885b81a6180e7231e575b5433202582f2fb

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 44266] New: Function resolution should follow the same rule in global context as function body.

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=44266

Bug ID: 44266
   Summary: Function resolution should follow the same rule in
global context as function body.
   Product: clang
   Version: trunk
  Hardware: PC
OS: Linux
Status: NEW
  Severity: enhancement
  Priority: P
 Component: CUDA
  Assignee: unassignedclangb...@nondot.org
  Reporter: michael.hl...@gmail.com
CC: llvm-bugs@lists.llvm.org

Created attachment 22925
  --> https://bugs.llvm.org/attachment.cgi?id=22925&action=edit
resolution under function gets the correct host function

In the following sample code


```
__device__ float fn(int);
__host__ float fn(float);

float gvar = fn(1);
```

clang failed to find the correct candidate of `fn`. But, if we modify that to
resolve `fn` under a function body. The correct one is used.

```
__device__ float fn(int);
__host__ float fn(float);

float gfunc() {
  return fn(1);
}
```

For function resolution in (host-side) global initializers, we should follow
the same rule as the one under a function body.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 43753] incorrect fix-it for clang-diagnostic-documentation-deprecated-sync const functions

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=43753

Mark de Wever  changed:

   What|Removed |Added

 Status|CONFIRMED   |RESOLVED
 Resolution|--- |FIXED

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 44267] New: Escaping symbols written to pre-escaped stack regions

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=44267

Bug ID: 44267
   Summary: Escaping symbols written to pre-escaped stack regions
   Product: clang
   Version: trunk
  Hardware: PC
OS: Linux
Status: NEW
  Severity: enhancement
  Priority: P
 Component: Static Analyzer
  Assignee: dcough...@apple.com
  Reporter: xazax@gmail.com
CC: dcough...@apple.com, llvm-bugs@lists.llvm.org

The problem in the title was partially solved in
https://github.com/llvm/llvm-project/commit/f3a28202ef58551db15818f8f51afd21e0f3e231

So we do not warn on:

void save_ptr(int **);
void delete_saved();

void store_to_escaped_region() {
  int *p;
  save_ptr(&p);
  p = new int;
  delete_saved();
} // no-warning

The reason why we decided to revert this change for now because we have not
found out a good way introduce this concept to the checkers. The pre-escape
happens in the analyzer core and the checker has no control over it. If the
checker is not interestd in a pre-escape it would need to do additional work on
each escape to check if the escaped symbol is originated from an
"uninteresting" pre-escaped memory region. In order to keep the checker API
simple we abandoned this solution for now.

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 44268] New: Assertion `is() && "Invalid accessor called"' failed.

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=44268

Bug ID: 44268
   Summary: Assertion `is() && "Invalid accessor called"'
failed.
   Product: clang
   Version: trunk
  Hardware: PC
OS: Linux
Status: NEW
  Severity: normal
  Priority: P
 Component: C
  Assignee: unassignedclangb...@nondot.org
  Reporter: caij2...@gmail.com
CC: blitzrak...@gmail.com, dgre...@apple.com,
erik.pilking...@gmail.com, llvm-bugs@lists.llvm.org,
richard-l...@metafoo.co.uk

Created attachment 22928
  --> https://bugs.llvm.org/attachment.cgi?id=22928&action=edit
Code to reproduce the issue.

We have been testing new LLVM version (4e8231b5cf0) on ChromeOS, and is
currently blocked by http://crbug.com/1032828. Essentially all our builds with
the new LLVM version being tested failed to build net-libs/libproxy:

libproxy-0.4.13-r2: clang-10:
/var/tmp/portage/sys-devel/llvm-10.0_pre370808_p20191029-r6/work/llvm-10.0_pre370808_p20191029/llvm/include/llvm/ADT/PointerUnion.h:195:
T llvm::PointerUnion::get() const [PTs = , T = const clang::Expr *]: Assertion `is() &&
"Invalid accessor called"' failed.


Call stack is as follows,

libproxy-0.4.13-r2: 1.  ../../libproxy-0.4.13/libproxy/url.cpp:81:10
: current parser token
')'
libproxy-0.4.13-r2: 2.  ../../libproxy-0.4.13/libproxy/url.cpp:78:63: parsing
function body 'copyaddr'
libproxy-0.4.13-r2: 3.  ../../libproxy-0.4.13/libproxy/url.cpp:78:63: in
compound statement ('{}')
libproxy-0.4.13-r2: 4.  ../../libproxy-0.4.13/libproxy/url.cpp:79:26: in
compound statement ('{}')
libproxy-0.4.13-r2:  #0 0x0420f3a8
llvm::sys::PrintStackTrace(llvm::raw_ostream&) (/usr/bin/clang-10+0x420f3a8)
libproxy-0.4.13-r2:  #1 0x0420ce70 llvm::sys::RunSignalHandlers()
(/usr/bin/clang-10+0x420ce70)
libproxy-0.4.13-r2:  #2 0x0420fa8f (/usr/bin/clang-10+0x420fa8f)
libproxy-0.4.13-r2:  #3 0x7f5bd5c5f540 __restore_rt
(/lib64/libpthread.so.0+0x12540)
libproxy-0.4.13-r2:  #4 0x7f5bd5153d31 raise (/lib64/libc.so.6+0x35d31)
libproxy-0.4.13-r2:  #5 0x7f5bd5155a41 abort (/lib64/libc.so.6+0x37a41)
libproxy-0.4.13-r2:  #6 0x7f5bd514c437 (/lib64/libc.so.6+0x2e437)
libproxy-0.4.13-r2:  #7 0x7f5bd514c4e2 (/lib64/libc.so.6+0x2e4e2)
libproxy-0.4.13-r2:  #8 0x06907e30 (/usr/bin/clang-10+0x6907e30)
libproxy-0.4.13-r2:  #9 0x069513ad (/usr/bin/clang-10+0x69513ad)
libproxy-0.4.13-r2: #10 0x069015b9 (/usr/bin/clang-10+0x69015b9)
libproxy-0.4.13-r2: #11 0x06935295 (/usr/bin/clang-10+0x6935295)
libproxy-0.4.13-r2: #12 0x069015b9 (/usr/bin/clang-10+0x69015b9)
libproxy-0.4.13-r2: #13 0x06905328
clang::Expr::EvaluateWithSubstitution(clang::APValue&, clang::ASTContext&,
clang::FunctionDecl const*, llvm::ArrayRef, clang::Expr
const*) const (/usr/bin/clang-10+0x6905328)
libproxy-0.4.13-r2: #14 0x063aa2ad
clang::Sema::diagnoseArgDependentDiagnoseIfAttrs(clang::FunctionDecl const*,
clang::Expr const*, llvm::ArrayRef, clang::SourceLocation)
(/usr/bin/clang-10+0x63aa2ad)
libproxy-0.4.13-r2: #15 0x05e34acd
clang::Sema::checkCall(clang::NamedDecl*, clang::FunctionProtoType const*,
clang::Expr const*, llvm::ArrayRef, bool,
clang::SourceLocation, clang::SourceRange, clang::Sema::VariadicCallType)
(/usr/bin/clang-10+0x5e34acd)
libproxy-0.4.13-r2: #16 0x05e35d88
clang::Sema::CheckFunctionCall(clang::FunctionDecl*, clang::CallExpr*,
clang::FunctionProtoType const*) (/usr/bin/clang-10+0x5e35d88)
libproxy-0.4.13-r2: #17 0x06141b05
clang::Sema::BuildResolvedCallExpr(clang::Expr*, clang::NamedDecl*,
clang::SourceLocation, llvm::ArrayRef, clang::SourceLocation,
clang::Expr*, bool, clang::CallExpr::ADLCallKind) (/usr/bin/clang-10+0x6141b05)
libproxy-0.4.13-r2: #18 0x063be598 (/usr/bin/clang-10+0x63be598)
libproxy-0.4.13-r2: #19 0x063bdc61
clang::Sema::BuildOverloadedCallExpr(clang::Scope*, clang::Expr*,
clang::UnresolvedLookupExpr*, clang::SourceLocation,
llvm::MutableArrayRef, clang::SourceLocation, clang::Expr*, bool,
bool) (/usr/bin/clang-10+0x63bdc61)
libproxy-0.4.13-r2: #20 0x0612468a
clang::Sema::BuildCallExpr(clang::Scope*, clang::Expr*, clang::SourceLocation,
llvm::MutableArrayRef, clang::SourceLocation, clang::Expr*, bool)
(/usr/bin/clang-10+0x612468a)
libproxy-0.4.13-r2: #21 0x0613fa28
clang::Sema::ActOnCallExpr(clang::Scope*, clang::Expr*, clang::SourceLocation,
llvm::MutableArrayRef, clang::SourceLocation, clang::Expr*)
(/usr/bin/clang-10+0x613fa28)
libproxy-0.4.13-r2: #22 0x05cdeb39
clang::Parser::ParsePostfixExpressionSuffix(clang::ActionResult) (/usr/bin/clang-10+0x5cdeb39)
libproxy-0.4.13-r2: #23 0x05ce0e6f
clang::Parser::ParseCastExpression(bool, bool, bool&,
clang::Parser::TypeCastState, bool) (/usr/bin/clang-10+0x5ce0e6f)
libproxy-0.4.13-r2: #24 0x05cdda9b
clang::Parser::ParseCastExpression

[llvm-bugs] Issue 19317 in oss-fuzz: llvm:clang-fuzzer: Segv on unknown address in llvm::llvm_unreachable_internal

2019-12-10 Thread ClusterFuzz-External via monorail via llvm-bugs

Status: New
Owner: 
CC: k...@google.com, masc...@google.com, jdevlieg...@apple.com,  
igm...@gmail.com, d...@google.com, mit...@google.com,  
bigchees...@gmail.com, eney...@google.com, llvm-b...@lists.llvm.org,  
j...@chromium.org, v...@apple.com, mitchphi...@outlook.com,  
xpl...@gmail.com, akils...@apple.com
Labels: ClusterFuzz Reproducible Stability-Memory-MemorySanitizer  
Engine-libfuzzer OS-Linux Proj-llvm Security_Severity-High  
Reported-2019-12-11

Type: Bug-Security

New issue 19317 by ClusterFuzz-External: llvm:clang-fuzzer: Segv on unknown  
address in llvm::llvm_unreachable_internal

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19317

Detailed Report: https://oss-fuzz.com/testcase?key=5639537548328960

Project: llvm
Fuzzing Engine: libFuzzer
Fuzz Target: clang-fuzzer
Job Type: libfuzzer_msan_llvm
Platform Id: linux

Crash Type: Segv on unknown address
Crash Address:
Crash State:
  llvm::llvm_unreachable_internal
  clang::Sema::ActOnComment
  ActionCommentHandler::HandleComment

Sanitizer: memory (MSAN)

Regressed:  
https://oss-fuzz.com/revisions?job=libfuzzer_msan_llvm&range=201911200438:201911230451


Reproducer Testcase:  
https://oss-fuzz.com/download?testcase_id=5639537548328960


Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for  
instructions to reproduce this bug locally.

When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any  
stable releases.

  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any  
other feedback, please file an issue at  
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail  
issues are not monitored.


--
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.
___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 44269] New: please backport https://reviews.llvm.org/D71302 to 9.x

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=44269

Bug ID: 44269
   Summary: please backport https://reviews.llvm.org/D71302 to 9.x
   Product: clang
   Version: 9.0
  Hardware: All
OS: All
Status: NEW
  Severity: normal
  Priority: P
 Component: Tooling
  Assignee: unassignedclangb...@nondot.org
  Reporter: raj.k...@gmail.com
CC: llvm-bugs@lists.llvm.org

This patch enabled building multilib clang SDKs

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 44270] New: clang 9.0.0 crashes with -fopenmp

2019-12-10 Thread via llvm-bugs
https://bugs.llvm.org/show_bug.cgi?id=44270

Bug ID: 44270
   Summary: clang 9.0.0 crashes with -fopenmp
   Product: OpenMP
   Version: unspecified
  Hardware: PC
OS: Linux
Status: NEW
  Severity: enhancement
  Priority: P
 Component: Clang Compiler Support
  Assignee: unassignedclangb...@nondot.org
  Reporter: igor.shevche...@gmail.com
CC: llvm-bugs@lists.llvm.org

Created attachment 22929
  --> https://bugs.llvm.org/attachment.cgi?id=22929&action=edit
code sample

clang 9.0.0 crashes when trying to compile pytorch-dev checkout as of
10/Dec/2019. Trimmed down to a very simple case, see attachment.

cli: clang++ f2.cc -of2 -fopenmp

-- 
You are receiving this mail because:
You are on the CC list for the bug.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs