[llvm-bugs] [Bug 90699] Issues not labelled

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90699




Summary

Issues not labelled




  Labels
  
new issue
  



  Assignees
  
  



  Reporter
  
  xtaltal
  




Can the following two issues be labelled?
https://github.com/llvm/llvm-project/issues/88598
https://github.com/llvm/llvm-project/issues/88599

Close this issue after.


___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90698] llvm 18 regression: LegalizerInfo.cpp:199: llvm::LegalizeActionStep llvm::LegalizeRuleSet::apply(const llvm::LegalityQuery&) const: Assertion `mutationIsSane(Rule, Query, Mutat

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90698




Summary

llvm 18 regression: LegalizerInfo.cpp:199: llvm::LegalizeActionStep llvm::LegalizeRuleSet::apply(const llvm::LegalityQuery&) const: Assertion `mutationIsSane(Rule, Query, Mutation) && "legality mutation invalid for match"' failed




  Labels
  
bug,
backend:AArch64,
regression,
platform:windows
  



  Assignees
  
  



  Reporter
  
  andrewrk
  




version: release/18.x, commit 78b99c73ee4b96fe9ce0e294d4632326afb2db42

reduced.ll
```llvm
target datalayout = "e-m:w-p:64:64-i32:32-i64:64-i128:128-n32:64-S128"
target triple = "aarch64-unknown-windows-gnu"

define fastcc i16 @"behavior.cast.test.@intFromBool on vector.S.doTheTest"() {
Entry:
 %0 = insertelement <3 x i1> zeroinitializer, i1 false, i32 0
  %1 = call fastcc i16 null(ptr null, <3 x i1> zeroinitializer, <3 x i1> %0)
  ret i16 0
}
```

```console
[nix-shell:~/src/zig/build-llvm18]$ ~/local/llvm18-assert/bin/clang -c reduced.ll -target aarch64-windows-gnu
clang: /home/andy/dev/llvm-project-18/llvm/lib/CodeGen/GlobalISel/LegalizerInfo.cpp:199: llvm::LegalizeActionStep llvm::LegalizeRuleSet::apply(const llvm::LegalityQuery&) const: Assertion `mutationIsSane(Rule, Query, Mutation) && "legality mutation invalid for match"' failed.
PLEASE submit a bug report to https://github.com/llvm/llvm-project/issues/ and include the crash backtrace, preprocessed source, and associated run script.
Stack dump:
0.  Program arguments: /home/andy/local/llvm18-assert/bin/clang -c reduced.ll -target aarch64-windows-gnu
1.  Code generation
2. Running pass 'Function Pass Manager' on module 'reduced.ll'.
3. Running pass 'Legalizer' on function '@"behavior.cast.test.@intFromBool on vector.S.doTheTest"'
 #0 0x0387f4db llvm::sys::PrintStackTrace(llvm::raw_ostream&, int) (/home/andy/local/llvm18-assert/bin/clang+0x387f4db)
 #1 0x0387c83b llvm::sys::RunSignalHandlers() (/home/andy/local/llvm18-assert/bin/clang+0x387c83b)
 #2 0x037c1508 CrashRecoverySignalHandler(int) CrashRecoveryContext.cpp:0:0
 #3 0x7f5bd1254a70 __restore_rt (/nix/store/anlf335xlh41yjhm114swi87406mq5pw-glibc-2.38-44/lib/libc.so.6+0x3da70)
 #4 0x7f5bd12a3ddc __pthread_kill_implementation (/nix/store/anlf335xlh41yjhm114swi87406mq5pw-glibc-2.38-44/lib/libc.so.6+0x8cddc)
 #5 0x7f5bd12549c6 gsignal (/nix/store/anlf335xlh41yjhm114swi87406mq5pw-glibc-2.38-44/lib/libc.so.6+0x3d9c6)
 #6 0x7f5bd123d8fa abort (/nix/store/anlf335xlh41yjhm114swi87406mq5pw-glibc-2.38-44/lib/libc.so.6+0x268fa)
 #7 0x7f5bd123d819 _nl_load_domain.cold (/nix/store/anlf335xlh41yjhm114swi87406mq5pw-glibc-2.38-44/lib/libc.so.6+0x26819)
 #8 0x7f5bd124d3c6 (/nix/store/anlf335xlh41yjhm114swi87406mq5pw-glibc-2.38-44/lib/libc.so.6+0x363c6)
 #9 0x04690593 llvm::LegalizeRuleSet::apply(llvm::LegalityQuery const&) const (/home/andy/local/llvm18-assert/bin/clang+0x4690593)
#10 0x04692066 llvm::LegalizerInfo::getAction(llvm::LegalityQuery const&) const (/home/andy/local/llvm18-assert/bin/clang+0x4692066)
#11 0x046924e6 llvm::LegalizerInfo::getAction(llvm::MachineInstr const&, llvm::MachineRegisterInfo const&) const (/home/andy/local/llvm18-assert/bin/clang+0x46924e6)
#12 0x0468f688 llvm::LegalizerHelper::legalizeInstrStep(llvm::MachineInstr&, llvm::LostDebugLocObserver&) (/home/andy/local/llvm18-assert/bin/clang+0x468f688)
#13 0x0464b138 llvm::Legalizer::legalizeMachineFunction(llvm::MachineFunction&, llvm::LegalizerInfo const&, llvm::ArrayRef, llvm::LostDebugLocObserver&, llvm::MachineIRBuilder&, llvm::GISelKnownBits*) (/home/andy/local/llvm18-assert/bin/clang+0x464b138)
#14 0x0464ca37 llvm::Legalizer::runOnMachineFunction(llvm::MachineFunction&) (.part.0) Legalizer.cpp:0:0
#15 0x02c30325 llvm::MachineFunctionPass::runOnFunction(llvm::Function&) (.part.0) MachineFunctionPass.cpp:0:0
#16 0x03213619 llvm::FPPassManager::runOnFunction(llvm::Function&) (/home/andy/local/llvm18-assert/bin/clang+0x3213619)
#17 0x03213751 llvm::FPPassManager::runOnModule(llvm::Module&) (/home/andy/local/llvm18-assert/bin/clang+0x3213751)
#18 0x03214057 llvm::legacy::PassManagerImpl::run(llvm::Module&) (/home/andy/local/llvm18-assert/bin/clang+0x3214057)
#19 0x03aedb33 clang::EmitBackendOutput(clang::DiagnosticsEngine&, clang::HeaderSearchOptions const&, clang::CodeGenOptions const&, clang::TargetOptions const&, clang::LangOptions const&, llvm::StringRef, llvm::Module*, clang::BackendAction, llvm::IntrusiveRefCntPtr, std::unique_ptr>, clang::BackendConsumer*) (/home/andy/local/llvm18-assert/bin/clang+0x3aedb33)
#20 0x040cd0fa clang::CodeGenAction::ExecuteAction() (/home/andy/local/llvm18-assert/bin/clang+0x40cd0fa)
#21 0x0434b2c9 clang::FrontendAction::Execute() (/home/andy/local/llvm18-asse

[llvm-bugs] [Bug 90697] [bug] [x86_64] [ubuntu22.04] clang crash when compiling to bpf

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90697




Summary

[bug] [x86_64] [ubuntu22.04] clang crash when compiling to bpf




  Labels
  
clang
  



  Assignees
  
  



  Reporter
  
  kohshi54
  




Hello. clang crashed with exit code 139 when trying to compile to bpf bytecode.
Stack dump:
0.	Program arguments: clang -v -target bpf -I/usr/include/x86_64-linux-gnu -I/usr/src/linux-hwe-6.5-headers-6.5.0-28/include/ -g -c hello.bpf.c
1.	 parser at end of file
 #0 0x7b4db023fd01 llvm::sys::PrintStackTrace(llvm::raw_ostream&, int) (/lib/x86_64-linux-gnu/libLLVM-14.so.1+0xe3fd01)
 #1 0x7b4db023da3e llvm::sys::RunSignalHandlers() (/lib/x86_64-linux-gnu/libLLVM-14.so.1+0xe3da3e)
 #2 0x7b4db023f0ab llvm::sys::CleanupOnSignal(unsigned long) (/lib/x86_64-linux-gnu/libLLVM-14.so.1+0xe3f0ab)
 #3 0x7b4db016bdff (/lib/x86_64-linux-gnu/libLLVM-14.so.1+0xd6bdff)
 #4 0x7b4daec42520 (/lib/x86_64-linux-gnu/libc.so.6+0x42520)
 #5 0x7b4db6c257ce clang::ASTContext::getASTRecordLayout(clang::RecordDecl const*) const (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0xe257ce)
 #6 0x7b4db68e5f0c clang::ASTContext::getTypeInfoImpl(clang::Type const*) const (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0xae5f0c)
 #7 0x7b4db68e6d96 clang::ASTContext::getTypeInfo(clang::Type const*) const (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0xae6d96)
 #8 0x7b4db68e5e2e clang::ASTContext::getTypeInfoImpl(clang::Type const*) const (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0xae5e2e)
 #9 0x7b4db68e6d96 clang::ASTContext::getTypeInfo(clang::Type const*) const (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0xae6d96)
#10 0x7b4db68e6a59 clang::ASTContext::getTypeInfoInChars(clang::QualType) const (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0xae6a59)
#11 0x7b4db6c30d64 (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0xe30d64)
#12 0x7b4db6c2d316 (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0xe2d316)
#13 0x7b4db6c25bd9 clang::ASTContext::getASTRecordLayout(clang::RecordDecl const*) const (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0xe25bd9)
#14 0x7b4db791bcd3 clang::CodeGen::CodeGenTypes::ComputeRecordLayout(clang::RecordDecl const*, llvm::StructType*) (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x1b1bcd3)
#15 0x7b4db7a07472 clang::CodeGen::CodeGenTypes::ConvertRecordDeclType(clang::RecordDecl const*) (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x1c07472)
#16 0x7b4db7a06554 clang::CodeGen::CodeGenTypes::ConvertType(clang::QualType) (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x1c06554)
#17 0x7b4db7a0646f clang::CodeGen::CodeGenTypes::ConvertTypeForMem(clang::QualType, bool) (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x1c0646f)
#18 0x7b4db7a0698c clang::CodeGen::CodeGenTypes::ConvertType(clang::QualType) (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x1c0698c)
#19 0x7b4db7a0646f clang::CodeGen::CodeGenTypes::ConvertTypeForMem(clang::QualType, bool) (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x1c0646f)
#20 0x7b4db7920390 (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x1b20390)
#21 0x7b4db791cddf (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x1b1cddf)
#22 0x7b4db791bd88 clang::CodeGen::CodeGenTypes::ComputeRecordLayout(clang::RecordDecl const*, llvm::StructType*) (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x1b1bd88)
#23 0x7b4db7a07472 clang::CodeGen::CodeGenTypes::ConvertRecordDeclType(clang::RecordDecl const*) (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x1c07472)
#24 0x7b4db7a06554 clang::CodeGen::CodeGenTypes::ConvertType(clang::QualType) (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x1c06554)
#25 0x7b4db7a0646f clang::CodeGen::CodeGenTypes::ConvertTypeForMem(clang::QualType, bool) (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x1c0646f)
#26 0x7b4db79a521c clang::CodeGen::CodeGenModule::EmitExternalVarDeclaration(clang::VarDecl const*) (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x1ba521c)
#27 0x7b4db6f1e962 clang::Sema::ActOnEndOfTranslationUnit() (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x111e962)
#28 0x7b4db68c1c86 clang::Parser::ParseTopLevelDecl(clang::OpaquePtr&, bool) (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0xac1c86)
#29 0x7b4db68048dd clang::ParseAST(clang::Sema&, bool, bool) (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0xa048dd)
#30 0x7b4db7978b71 clang::CodeGenAction::ExecuteAction() (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x1b78b71)
#31 0x7b4db8314b57 clang::FrontendAction::Execute() (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x2514b57)
#32 0x7b4db826c3a6 clang::CompilerInstance::ExecuteAction(clang::FrontendAction&) (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x246c3a6)
#33 0x7b4db838e45b clang::ExecuteCompilerInvocation(clang::CompilerInstance*) (/lib/x86_64-linux-gnu/libclang-cpp.so.14+0x258e45b)
#34 0x0041328b cc1_main(llvm::ArrayRef, char const*, void*) (/usr/lib/llvm-14/bin/clang+0x41328b)
#35 0x004114bc (/usr

[llvm-bugs] [Bug 90695] llvm 18 regression: GetElementPtrTypeIterator.h:158: llvm::TypeSize llvm::generic_gep_type_iterator::getSequentialElementStride(const llvm::DataLayout&) const [with ItTy

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90695




Summary

llvm 18 regression: GetElementPtrTypeIterator.h:158: llvm::TypeSize llvm::generic_gep_type_iterator::getSequentialElementStride(const llvm::DataLayout&) const [with ItTy = llvm::Value* const*]: Assertion `DL.typeSizeEqualsStoreSize(ElemTy) && "Not byte-addressable"' failed




  Labels
  
bug,
backend:AArch64,
regression,
platform:windows
  



  Assignees
  
  



  Reporter
  
  andrewrk
  




version: release/18.x, commit 78b99c73ee4b96fe9ce0e294d4632326afb2db42

reduced.ll:

```llvm
target datalayout = "e-m:w-p:64:64-i32:32-i64:64-i128:128-n32:64-S128"
target triple = "aarch64-unknown-windows-gnu"

define fastcc i16 @"behavior.shuffle.test.@shuffle bool 1.S.doTheTest"() {
Entry:
  %0 = load <2 x i1>, ptr null, align 1
  %1 = shufflevector <2 x i1> %0, <2 x i1> zeroinitializer, <4 x i32> 
  ret i16 0
}
```

```console
[nix-shell:~/src/zig/build-llvm18]$ ~/local/llvm18-assert/bin/llc reduced.ll 
llc: /home/andy/dev/llvm-project-18/llvm/include/llvm/IR/GetElementPtrTypeIterator.h:158: llvm::TypeSize llvm::generic_gep_type_iterator::getSequentialElementStride(const llvm::DataLayout&) const [with ItTy = llvm::Value* const*]: Assertion `DL.typeSizeEqualsStoreSize(ElemTy) && "Not byte-addressable"' failed.
PLEASE submit a bug report to https://github.com/llvm/llvm-project/issues/ and include the crash backtrace.
Stack dump:
0.  Program arguments: /home/andy/local/llvm18-assert/bin/llc reduced.ll
1.  Running pass 'Function Pass Manager' on module 'reduced.ll'.
2.  Running pass 'Interleaved Load Combine Pass' on function '@"behavior.shuffle.test.@shuffle bool 1.S.doTheTest"'
 #0 0x0393ec9b llvm::sys::PrintStackTrace(llvm::raw_ostream&, int) (/home/andy/local/llvm18-assert/bin/llc+0x393ec9b)
 #1 0x0393bffb llvm::sys::RunSignalHandlers() (/home/andy/local/llvm18-assert/bin/llc+0x393bffb)
 #2 0x0393c125 SignalHandler(int) Signals.cpp:0:0
 #3 0x7fb01fd53a70 __restore_rt (/nix/store/anlf335xlh41yjhm114swi87406mq5pw-glibc-2.38-44/lib/libc.so.6+0x3da70)
 #4 0x7fb01fda2ddc __pthread_kill_implementation (/nix/store/anlf335xlh41yjhm114swi87406mq5pw-glibc-2.38-44/lib/libc.so.6+0x8cddc)
 #5 0x7fb01fd539c6 gsignal (/nix/store/anlf335xlh41yjhm114swi87406mq5pw-glibc-2.38-44/lib/libc.so.6+0x3d9c6)
 #6 0x7fb01fd3c8fa abort (/nix/store/anlf335xlh41yjhm114swi87406mq5pw-glibc-2.38-44/lib/libc.so.6+0x268fa)
 #7 0x7fb01fd3c819 _nl_load_domain.cold (/nix/store/anlf335xlh41yjhm114swi87406mq5pw-glibc-2.38-44/lib/libc.so.6+0x26819)
 #8 0x7fb01fd4c3c6 (/nix/store/anlf335xlh41yjhm114swi87406mq5pw-glibc-2.38-44/lib/libc.so.6+0x363c6)
 #9 0x02e05001 llvm::DataLayout::getIndexedOffsetInType(llvm::Type*, llvm::ArrayRef) const (/home/andy/local/llvm18-assert/bin/llc+0x2e05001)
#10 0x0282054d (anonymous namespace)::VectorInfo::computeFromLI(llvm::LoadInst*, (anonymous namespace)::VectorInfo&, llvm::DataLayout const&) InterleavedLoadCombinePass.cpp:0:0
#11 0x02823ae5 (anonymous namespace)::VectorInfo::computeFromSVI(llvm::ShuffleVectorInst*, (anonymous namespace)::VectorInfo&, llvm::DataLayout const&) InterleavedLoadCombinePass.cpp:0:0
#12 0x0282722b (anonymous namespace)::InterleavedLoadCombineImpl::run() InterleavedLoadCombinePass.cpp:0:0
#13 0x02828cfb (anonymous namespace)::InterleavedLoadCombine::runOnFunction(llvm::Function&) InterleavedLoadCombinePass.cpp:0:0
#14 0x02ef1789 llvm::FPPassManager::runOnFunction(llvm::Function&) (/home/andy/local/llvm18-assert/bin/llc+0x2ef1789)
#15 0x02ef18c1 llvm::FPPassManager::runOnModule(llvm::Module&) (/home/andy/local/llvm18-assert/bin/llc+0x2ef18c1)
#16 0x02ef21c7 llvm::legacy::PassManagerImpl::run(llvm::Module&) (/home/andy/local/llvm18-assert/bin/llc+0x2ef21c7)
#17 0x007fe10b compileModule(char**, llvm::LLVMContext&) llc.cpp:0:0
#18 0x007049a7 main (/home/andy/local/llvm18-assert/bin/llc+0x7049a7)
#19 0x7fb01fd3dfce __libc_start_call_main (/nix/store/anlf335xlh41yjhm114swi87406mq5pw-glibc-2.38-44/lib/libc.so.6+0x27fce)
#20 0x7fb01fd3e089 __libc_start_main@GLIBC_2.2.5 (/nix/store/anlf335xlh41yjhm114swi87406mq5pw-glibc-2.38-44/lib/libc.so.6+0x28089)
#21 0x007f3c25 _start (/home/andy/local/llvm18-assert/bin/llc+0x7f3c25)
Aborted (core dumped)
```


___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90685] Slowdown from the `final` keyword

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90685




Summary

Slowdown from the `final` keyword




  Labels
  
new issue
  



  Assignees
  
  



  Reporter
  
  define-private-public
  




Hi.  I published [this blog post](https://16bpp.net/blog/post/the-performance-impact-of-cpp-final-keyword/) last week Monday about the `final` keyword.  I made a note of a slowdown that was found when using clang/LLVM to compile and run the code.

[On Hacker News discussion](https://news.ycombinator.com/item?id=40125240) an LLVM developer commented:
> As an LLVM developer, I really wish the author filed a bug report and waited for some analysis BEFORE publishing an article (that may never get amended) that recommends not using this keyword with clang for performance reasons. I suspect there's just a bug in clang. 

1. Is this an actual bug?
2. Would someone be willing to provide analysis as to what's going on?

I plan on writing a follow up post shortly since the discussion surrounding everything seemed to be a bit more than I anticipated; and I feel a lot of people got the intent of the article wrong.


___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90684] Do you still need commit access?

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90684




Summary

Do you still need commit access?




  Labels
  
infrastructure:commit-access
  



  Assignees
  
  



  Reporter
  
  tstellar
  




### TLDR: If you want to retain your commit access, please comment on this issue.  Otherwise, you can unsubscribe from this issue and ignore it.  Commit access is not required to contribute to the project.  You can still create Pull Requests without commit access.

@jonathanmetzman @s-perron @bmahjour @ShivaChen @Sezoir @mariannems @ShuhongLL @Krishnakariya @vjayathirtha-nv @rarutyun @sks75220 @abelkocsis @ktomi996 @matejaMarjanovic @KappaMikey1337 @plotfi @rdzhabarov @anhtuyenibm @sidbav @zrthxn

LLVM has a policy of downgrading write access to its repositories for accounts with long term inactivity. This is done because inactive accounts with high levels of access tend to be at increased risk of compromise and this is one tactic that the project employs to guard itself from malicious actors.  Note that write access is not required to contribute to the project.  You can still submit pull requests and have someone else merge them.

Our project policy is to ping anyone with less than five 'interactions' with the repositories over a 12 month period to see if they still need commit access.  An 'interaction' and be any one of:

* Pushing a commit.
* Merging a pull request (either their own or someone else’s).
* Commenting on a PR.

If you want to retain your commit access, please post a comment on this issue.  If you do not want to keep your commit access, you can just ignore this issue.  If you have not responded in 6 weeks, then you will move moved from the 'write' role within the project to the 'triage' role.  The 'triage' role is still a privileged role and will allow you to do the following:

* Review Pull Requests.
* Comment on issues.
* Apply/dismiss labels.
* Close, reopen, and assign all issues and pull requests.
* Apply milestones.
* Mark duplicate issues and pull requests.
* Request pull request reviews.
* Hide anyone’s comments.



___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90680] Bug or insufficient utility in `transform.structured.split` op

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90680




Summary

Bug or insufficient utility in `transform.structured.split` op




  Labels
  
  



  Assignees
  
  



  Reporter
  
  srcarroll
  




First of all I've identified an inconsistency in the way static and dynamic split points are handled.  basically, no matter what in the static case, a single split point is provided and works no matter how many target payloads there are (see https://github.com/llvm/llvm-project/blob/main/mlir/lib/Dialect/Linalg/TransformOps/LinalgTransformOps.cpp#L2208). Whereas with the dynamic case, the number of split points is determined by the number of payloads of the dynamic split point operand (see https://github.com/llvm/llvm-project/blob/main/mlir/lib/Dialect/Linalg/TransformOps/LinalgTransformOps.cpp#L2208). but then the number of split points is compared to the number of target payloads (https://github.com/llvm/llvm-project/blob/main/mlir/lib/Dialect/Linalg/TransformOps/LinalgTransformOps.cpp#L2200). 

I can't quite put my finger on it, but this seems wrong to me. For example, consider the edge case where there are no target payloads.  In this case the static doesn't throw any definite failures while the dynamic case does.  I think at the very least, there should be consistency here. but the question is, which one do we go with.  I actually prefer how the static case works for this. because otherwise we would have to know that a payload is present to be able to use the op in the first place, which i don't think is very useful.

I was working on a patch for this to handle some case i needed. but then i realized that there was this discrepancy between the number of split point payloads and number of target payloads. I admit I'm a little confused about what the relationship between these two things should actually be.  But I'm almost certain they shouldn't necessarily be the same size.


___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90675] [PPC] DoubleAPFloat scalbn fails to readjust high double when rounding affects its value

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90675




Summary

[PPC] DoubleAPFloat scalbn fails to readjust high double when rounding affects its value




  Labels
  
backend:PowerPC
  



  Assignees
  
  



  Reporter
  
  hubert-reinterpretcast
  




The `DoubleAPFloat` `scalbn` implementation treats the high and the low double as being independent:
https://github.com/llvm/llvm-project/blob/0c0c5c475857e9cd6a2fe82fd1e46abdb174a1c1/llvm/lib/Support/APFloat.cpp#L5132-L5133

That is incorrect.

As can be observed from the following (https://godbolt.org/z/r64Wfv4zW), when the low double is close to 0.5 ulps of the high double, division by a power of 2 can cause the low double to round to 0.5 ulps of the high double (which can then require that the high double be adjusted so that its value is the value of the `long double` correctly rounded to a `double`):
```
constexpr double subnorm = __DBL_DENORM_MIN__ * 3.;
constexpr double subnormAdjacent = (1. + __DBL_EPSILON__) * 0x1p-1022 * 0x1p+3;
extern constexpr long double theValue = (long double)subnorm + subnormAdjacent;
extern constexpr long double expected = theValue / 2.;
```

The `DoubleAPFloat` implementation of `scalbnl` would (for division by 2 via an `n` of -1) produce a high double that changes from the input value only by the encoded exponent. The (correct) result produced by the division operation above differs from the input value in more than that.


___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90668] Miscompilation of some forms of (x + y) * z

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90668




Summary

Miscompilation of some forms of (x + y) * z




  Labels
  
new issue
  



  Assignees
  
  



  Reporter
  
  glandium
  




Reduced testcase:
```
#include 
#include 

size_t off(int8_t a) {
return (uint8_t)(a + 128) * 8;
}
```
With clang 18, this compiled down to:
```
add dil, -128
movzx   eax, dil
 shl eax, 3
ret
```
With trunk, this compiles down to:
```
movzx   eax, dil
lea eax, [8*rax + 1024]
ret
```

The math in the lea is actually fine, transforming (a+128) * 8 into 8 * a + 1024. But the problem is that a is zero extended instead of sign extended, so the results are wrong for negative values.

Bisection says it started happening with 7177dc2ef7f3a50a1d8b892d7bd298f3d52a1aab.

Cc: @fengfeng09


___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90662] /llvm/lib/Object/MachOObjectFile.cpp:5197: possible cut'n'paste error ?

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90662




Summary

/llvm/lib/Object/MachOObjectFile.cpp:5197: possible cut'n'paste error ?




  Labels
  
new issue
  



  Assignees
  
  



  Reporter
  
  dcb314
  




Static analyser cppcheck says:

llvm/lib/Object/MachOObjectFile.cpp:5197:18: warning: Identical condition 'ImportsEnd>Symbols', second condition is always false [identicalConditionAfterEarlyExit]

Source code is 

 if (ImportsEnd > Symbols)
return malformedError("bad chained fixups: imports end " +
  Twine(ImportsEndOffset) + " extends past end " +
 Twine(DyldChainedFixups.datasize));

  if (ImportsEnd > Symbols)
 return malformedError("bad chained fixups: imports end " +
 Twine(ImportsEndOffset) + " overlaps with symbols");



___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90661] [BOLT] Evaluate and speedup discoverFileObjects

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90661




Summary

[BOLT] Evaluate and speedup discoverFileObjects




  Labels
  
help wanted,
good first issue,
BOLT
  



  Assignees
  
  



  Reporter
  
  aaupov
  




Operations with symbols such as name lookup are expensive and some binaries have millions of symbols, so it makes sense to try to reduce the symbol-related overheads.

Measure how much the following cost and refactor/eliminate:
1. Checks for symbol name being equal to __asan_init and __llvm_coverage_mapping for every single symbol: https://github.com/llvm/llvm-project/blob/a1423ba4278775472523fed074de6dbdfd01898a/bolt/lib/Rewrite/RewriteInstance.cpp#L824-L837
2. FileName set for every local function symbol (with O(1M) for large binaries) while we can instead use file symbol lookup with O(log N_Syms) cost and FileSyms memory cost https://github.com/llvm/llvm-project/pull/89088
3. Merge iteration over two loops over symbols into one: https://github.com/llvm/llvm-project/blob/a1423ba4278775472523fed074de6dbdfd01898a/bolt/lib/Rewrite/RewriteInstance.cpp#L824 and https://github.com/llvm/llvm-project/blob/a1423ba4278775472523fed074de6dbdfd01898a/bolt/lib/Rewrite/RewriteInstance.cpp#L876


___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90653] [libc][test] `atan*` and `smoke/atan*` tests need to have exception and errno checking fixed

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90653




Summary

[libc][test] `atan*` and `smoke/atan*` tests need to have exception and errno checking fixed




  Labels
  
libc
  



  Assignees
  
  



  Reporter
  
  Flandini
  




These depends on `ASSERT_GE` and `EXPECT_GE` in `{ASSERT,EXPECT}_FP_EXCEPTION`. Using RoundingMode with the quick rounding mode tests ends up setting exceptions, so after switching these to `{ASSERT,EXPECT}_EQ`, these tests are failing and need to be changed to wrap the function invocation and not the entire RoundingMode test setup.

See https://github.com/llvm/llvm-project/pull/88816


___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90652] [RISCV] Assertion `LHS.getValueType() == VT && RHS.getValueType() == VT && "Cannot use select on differing types"' failed.

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90652




Summary

[RISCV] Assertion `LHS.getValueType() == VT && RHS.getValueType() == VT && "Cannot use select on differing types"' failed.




  Labels
  
backend:RISC-V,
crash
  



  Assignees
  
dtcxzyw
  



  Reporter
  
  dtcxzyw
  




Reduced test case: https://godbolt.org/z/ToPME8sW1
```
define i1 @test(i64 %x, i1 %cond1, i1 %cond2) {
entry:
  %sadd = call { i64, i1 } @llvm.sadd.with.overflow.i64(i64 %x, i64 1)
  %ov = extractvalue { i64, i1 } %sadd, 1
  %or = or i1 %cond2, %ov
  %sel = select i1 %cond1, i1 %cond2, i1 %or
  ret i1 %sel
}
```
```
llc: /root/llvm-project/llvm/include/llvm/CodeGen/SelectionDAG.h:1239: llvm::SDValue llvm::SelectionDAG::getSelect(const llvm::SDLoc&, llvm::EVT, llvm::SDValue, llvm::SDValue, llvm::SDValue): Assertion `LHS.getValueType() == VT && RHS.getValueType() == VT && "Cannot use select on differing types"' failed.
PLEASE submit a bug report to https://github.com/llvm/llvm-project/issues/ and include the crash backtrace.
Stack dump:
0.	Program arguments: /opt/compiler-explorer/clang-assertions-trunk/bin/llc -o /app/output.s -x86-asm-syntax=intel -mtriple=riscv64 
1.	Running pass 'Function Pass Manager' on module ''.
2.	Running pass 'RISC-V DAG->DAG Pattern Instruction Selection' on function '@test'
 #0 0x0395b768 llvm::sys::PrintStackTrace(llvm::raw_ostream&, int) (/opt/compiler-explorer/clang-assertions-trunk/bin/llc+0x395b768)
 #1 0x03958ebc SignalHandler(int) Signals.cpp:0:0
 #2 0x79ecb9e42520 (/lib/x86_64-linux-gnu/libc.so.6+0x42520)
 #3 0x79ecb9e969fc pthread_kill (/lib/x86_64-linux-gnu/libc.so.6+0x969fc)
 #4 0x79ecb9e42476 gsignal (/lib/x86_64-linux-gnu/libc.so.6+0x42476)
 #5 0x79ecb9e287f3 abort (/lib/x86_64-linux-gnu/libc.so.6+0x287f3)
 #6 0x79ecb9e2871b (/lib/x86_64-linux-gnu/libc.so.6+0x2871b)
 #7 0x79ecb9e39e96 (/lib/x86_64-linux-gnu/libc.so.6+0x39e96)
 #8 0x00bd692f llvm::SelectionDAG::getSelect(llvm::SDLoc const&, llvm::EVT, llvm::SDValue, llvm::SDValue, llvm::SDValue) (/opt/compiler-explorer/clang-assertions-trunk/bin/llc+0xbd692f)
 #9 0x01ab4ab6 tryFoldSelectIntoOp(llvm::SDNode*, llvm::SelectionDAG&, llvm::SDValue, llvm::SDValue, bool) RISCVISelLowering.cpp:0:0
#10 0x01b125a6 llvm::RISCVTargetLowering::PerformDAGCombine(llvm::SDNode*, llvm::TargetLowering::DAGCombinerInfo&) const (/opt/compiler-explorer/clang-assertions-trunk/bin/llc+0x1b125a6)
#11 0x035cdb7d (anonymous namespace)::DAGCombiner::combine(llvm::SDNode*) DAGCombiner.cpp:0:0
#12 0x035cf48c (anonymous namespace)::DAGCombiner::Run(llvm::CombineLevel) DAGCombiner.cpp:0:0
#13 0x035d1a6a llvm::SelectionDAG::Combine(llvm::CombineLevel, llvm::AAResults*, llvm::CodeGenOptLevel) (/opt/compiler-explorer/clang-assertions-trunk/bin/llc+0x35d1a6a)
#14 0x037273d2 llvm::SelectionDAGISel::CodeGenAndEmitDAG() (/opt/compiler-explorer/clang-assertions-trunk/bin/llc+0x37273d2)
#15 0x0372af15 llvm::SelectionDAGISel::SelectAllBasicBlocks(llvm::Function const&) (/opt/compiler-explorer/clang-assertions-trunk/bin/llc+0x372af15)
#16 0x0372c987 llvm::SelectionDAGISel::runOnMachineFunction(llvm::MachineFunction&) (.part.0) SelectionDAGISel.cpp:0:0
#17 0x02976b71 llvm::MachineFunctionPass::runOnFunction(llvm::Function&) (.part.0) MachineFunctionPass.cpp:0:0
#18 0x02f36633 llvm::FPPassManager::runOnFunction(llvm::Function&) (/opt/compiler-explorer/clang-assertions-trunk/bin/llc+0x2f36633)
#19 0x02f36871 llvm::FPPassManager::runOnModule(llvm::Module&) (/opt/compiler-explorer/clang-assertions-trunk/bin/llc+0x2f36871)
#20 0x02f370d5 llvm::legacy::PassManagerImpl::run(llvm::Module&) (/opt/compiler-explorer/clang-assertions-trunk/bin/llc+0x2f370d5)
#21 0x0082aa5c compileModule(char**, llvm::LLVMContext&) llc.cpp:0:0
#22 0x00728f26 main (/opt/compiler-explorer/clang-assertions-trunk/bin/llc+0x728f26)
#23 0x79ecb9e29d90 (/lib/x86_64-linux-gnu/libc.so.6+0x29d90)
#24 0x79ecb9e29e40 __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x29e40)
#25 0x0082157e _start (/opt/compiler-explorer/clang-assertions-trunk/bin/llc+0x82157e)
Program terminated with signal: SIGSEGV
Compiler returned: 139
```


___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90631] [HLSL] Add Intangible AST Type

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90631




Summary

[HLSL] Add Intangible AST Type




  Labels
  
HLSL
  



  Assignees
  
  



  Reporter
  
  llvm-beanz
  




HLSL has a set of _intangible types_, which are described in in the [draft HLSL Specification (**[Basic.types]**)](https://microsoft.github.io/hlsl-specs/specs/hlsl.pdf):
> There are special implementation-defined types such as handle types, which fall into a category of standard intangible types. Intangible types are types that have no defined object representation or value representation, as such the size is unknown at compile time.
>
> A class type T is an intangible class type if it contains an base classes or members of intangible class type, standard intangible type, or arrays of such types. Standard intangible types and intangible class types are collectively called intangible types([9](https://microsoft.github.io/hlsl-specs/specs/hlsl.html#Intangible)).

We need to add a new AST type for intangible types, and a way to generate the appropriate handle types.

## Acceptance Criteria
* New AST Type for intangible types
* New type trait builtin for `__is_intangible`
* Update resource types to use intangible handle



___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90628] [RISCV] Allow RISC-V "V" instructions in inline assembly without having to add the RVV "V" extension to command line

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90628




Summary

[RISCV] Allow RISC-V "V" instructions in inline assembly without having to add the RVV "V" extension to command line




  Labels
  
new issue
  



  Assignees
  
  



  Reporter
  
  johnplatts
  




Here is a snippet of code that compiles successfully with GCC but fails to compile with Clang unless the `-march=rv32gcv1p0` or `-march=rv64gcv1p0` option is added to the command line:
```
#include 
#include 
#include 
#include 

#ifndef COMPAT_HWCAP_ISA_V
#define COMPAT_HWCAP_ISA_V (1 << ('V' - 'A'))
#endif

bool IsRvv1_0Supported() {
  int64_t bits = 0;

  const unsigned long hw = getauxval(AT_HWCAP);

  if ((hw & COMPAT_HWCAP_ISA_V) == COMPAT_HWCAP_ISA_V) {
size_t e8m1_vec_len;
#if __riscv_xlen == 64
int64_t vtype_reg_val;
#else
int32_t vtype_reg_val;
#endif

// Check that a vuint8m1_t vector is at least 16 bytes and that tail
// agnostic and mask agnostic mode are supported
asm volatile(
 "vsetvli %0, zero, e8, m1, ta, ma\n\t"
"csrr %1, vtype"
 : "=r"(e8m1_vec_len), "=r"(vtype_reg_val));

// The RVV target is supported if the VILL bit of VTYPE (the MSB bit of
// VTYPE) is not set and the length of a vuint8m1_t vector is at least 16
// bytes
if (vtype_reg_val >= 0 && e8m1_vec_len >= 16) {
  return true;
}
  }

  return false;
}
```

We really want Clang to allow the above code to compile on RISC-V, even without specifying the -march=rv32gcv1p0 or -march=rv64gcv1p0 option (or another option that enables at least the RISC-V Zve32x extension), as the instructions in the inline assembly statement are only executed if the RISC-V "V" extension is present due to the check of the result returned by `getauxval(AT_HWCAP)`.


___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90620] [C++20] [Modules] Cannot export type_info/operator new/operator delete

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90620




Summary

[C++20] [Modules] Cannot export type_info/operator new/operator delete




  Labels
  
new issue
  



  Assignees
  
  



  Reporter
  
  huangqinjin
  




 `test.cppm`

```c++
module;

#include 

export module test;

extern "C++"
{
export class type_info; // 0

export void* operator new(size_t);  // 1
export void* operator new[](size_t);// 2
export void operator delete(void*) noexcept;// 3
export void operator delete[](void*) noexcept;  // 4

export void operator delete(void*, size_t) noexcept;// 5
export void operator delete[](void*, size_t) noexcept;  // 6
}
```

 targeting x86_64-linux-gnu
```shell
✗ clang --target=x86_64-linux-gnu -std=c++20 --precompile test.cppm
test.cppm:11:18: error: cannot export redeclaration 'operator new' here since the previous declaration is not exported
   11 | export void* operator new(size_t);  // 1
  |  ^
note: previous declaration is here
test.cppm:12:18: error: cannot export redeclaration 'operator new[]' here since the previous declaration is not exported
   12 | export void* operator new[](size_t);// 2
  |  ^
note: previous declaration is here
test.cppm:13:17: error: cannot export redeclaration 'operator delete' here since the previous declaration is not exported
   13 | export void operator delete(void*) noexcept;// 3
  | ^
note: previous declaration is here
test.cppm:14:17: error: cannot export redeclaration 'operator delete[]' here since the previous declaration is not exported
   14 | export void operator delete[](void*) noexcept;  // 4
  | ^
note: previous declaration is here
4 errors generated.
```

 targeting x86_64-windows-msvc
```shell
✗ clang --target=x86_64-windows-msvc -std=c++20 --precompile test.cppm
test.cppm:9:18: error: cannot export redeclaration 'type_info' here since the previous declaration is not exported
9 | export class type_info; // 0
  |  ^
note: previous declaration is here
test.cppm:11:18: error: cannot export redeclaration 'operator new' here since the previous declaration is not exported
   11 | export void* operator new(size_t);  // 1
  |  ^
note: previous declaration is here
test.cppm:12:18: error: cannot export redeclaration 'operator new[]' here since the previous declaration is not exported
   12 | export void* operator new[](size_t);// 2
  |  ^
note: previous declaration is here
test.cppm:13:17: error: cannot export redeclaration 'operator delete' here since the previous declaration is not exported
   13 | export void operator delete(void*) noexcept;// 3
  | ^
note: previous declaration is here
test.cppm:14:17: error: cannot export redeclaration 'operator delete[]' here since the previous declaration is not exported
   14 | export void operator delete[](void*) noexcept;  // 4
  | ^
note: previous declaration is here
5 errors generated.
```

The strange thing is that other overloads of `operator new` and `operator delete` can be exported without error.


___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 68415 in oss-fuzz: llvm:llvm-dwarfdump-fuzzer: Null-dereference READ in llvm::DataExtractor::getU8

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Status: New
Owner: 
CC: k...@google.com, masc...@google.com, igm...@gmail.com, 
sammcc...@google.com, da...@adalogics.com, d...@google.com, mit...@google.com, 
bigch...@gmail.com, eney...@google.com, llvm-...@lists.llvm.org, 
jo...@devlieghere.com, j...@chromium.org, v...@apple.com, mitch...@outlook.com, 
xpl...@gmail.com, akils...@apple.com 
Labels: ClusterFuzz Stability-Memory-AddressSanitizer Reproducible 
Engine-libfuzzer OS-Linux Proj-llvm Reported-2024-04-30
Type: Bug

New issue 68415 by ClusterFuzz-External: llvm:llvm-dwarfdump-fuzzer: 
Null-dereference READ in llvm::DataExtractor::getU8
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=68415

Detailed Report: https://oss-fuzz.com/testcase?key=6257425133993984

Project: llvm
Fuzzing Engine: libFuzzer
Fuzz Target: llvm-dwarfdump-fuzzer
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: Null-dereference READ
Crash Address: 0x
Crash State:
  llvm::DataExtractor::getU8
  llvm::DWARFExpression::Operation::extract
  llvm::DWARFExpression::print
  
Sanitizer: address (ASAN)

Regressed: 
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm&range=202004090442:202004100305

Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=6257425133993984

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for 
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any 
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any other 
feedback, please file an issue at https://github.com/google/oss-fuzz/issues. 
Comments on individual Monorail issues are not monitored.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 68401 in oss-fuzz: llvm:llvm-dwarfdump-fuzzer: Abrt in llvm::llvm_unreachable_internal

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Status: New
Owner: 
CC: k...@google.com, masc...@google.com, igm...@gmail.com, 
sammcc...@google.com, da...@adalogics.com, d...@google.com, mit...@google.com, 
bigch...@gmail.com, eney...@google.com, llvm-...@lists.llvm.org, 
jo...@devlieghere.com, j...@chromium.org, v...@apple.com, mitch...@outlook.com, 
xpl...@gmail.com, akils...@apple.com 
Labels: ClusterFuzz Stability-Memory-AddressSanitizer Reproducible 
Engine-libfuzzer OS-Linux Proj-llvm Reported-2024-04-30
Type: Bug

New issue 68401 by ClusterFuzz-External: llvm:llvm-dwarfdump-fuzzer: Abrt in 
llvm::llvm_unreachable_internal
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=68401

Detailed Report: https://oss-fuzz.com/testcase?key=5749124381278208

Project: llvm
Fuzzing Engine: libFuzzer
Fuzz Target: llvm-dwarfdump-fuzzer
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: Abrt
Crash Address: 0x0001
Crash State:
  llvm::llvm_unreachable_internal
  llvm::DWARFFormValue::extractValue
  llvm::DWARFDebugNames::NameIndex::getEntry
  
Sanitizer: address (ASAN)

Regressed: 
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm&range=201801290646:201801300702

Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=5749124381278208

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for 
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any 
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any other 
feedback, please file an issue at https://github.com/google/oss-fuzz/issues. 
Comments on individual Monorail issues are not monitored.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 68400 in oss-fuzz: llvm:clang-fuzzer: ASSERT: DD && "queried property of class with no definition"

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Status: New
Owner: 
CC: k...@google.com, masc...@google.com, igm...@gmail.com, 
sammcc...@google.com, da...@adalogics.com, d...@google.com, mit...@google.com, 
bigch...@gmail.com, eney...@google.com, llvm-...@lists.llvm.org, 
jo...@devlieghere.com, j...@chromium.org, v...@apple.com, mitch...@outlook.com, 
xpl...@gmail.com, akils...@apple.com 
Labels: ClusterFuzz Stability-Memory-AddressSanitizer Reproducible 
Engine-libfuzzer OS-Linux Proj-llvm Reported-2024-04-30
Type: Bug

New issue 68400 by ClusterFuzz-External: llvm:clang-fuzzer: ASSERT: DD && 
"queried property of class with no definition"
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=68400

Detailed Report: https://oss-fuzz.com/testcase?key=5747178676420608

Project: llvm
Fuzzing Engine: libFuzzer
Fuzz Target: clang-fuzzer
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: ASSERT
Crash Address: 
Crash State:
  DD && "queried property of class with no definition"
  clang::CXXRecordDecl::data
  clang::Sema::FinalizeVarWithDestructor
  
Sanitizer: address (ASAN)

Crash Revision: 
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm&revision=201909210337

Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=5747178676420608

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for 
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any 
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any other 
feedback, please file an issue at https://github.com/google/oss-fuzz/issues. 
Comments on individual Monorail issues are not monitored.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90605] [Clang] __is_trivially_assignable

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90605




Summary

[Clang] __is_trivially_assignable




  Labels
  
clang:frontend,
rejects-valid
  



  Assignees
  
  



  Reporter
  
  philnik777
  




In C++03, Clang claims that a struct containing a member with a deleted assignment operator is assignable, but diagnoses the instantiation as using a deleted function.

```c++
struct Element {
Element& operator=(const Element&) = delete;
};

struct S {
Element i;

S& operator=(const S&) = default;
};

_Static_assert(!__is_trivially_assignable(S&, const S&)); // assertion fails
_Static_assert(!__is_assignable(S&, const S&)); // assertion fails

void test() {
S s;
S s2;
s2 = s; // diagnosed as an error
}
```



___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 68383 in oss-fuzz: llvm:clang-fuzzer: Abrt in llvm::llvm_unreachable_internal

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Status: New
Owner: 
CC: k...@google.com, masc...@google.com, igm...@gmail.com, 
sammcc...@google.com, da...@adalogics.com, d...@google.com, mit...@google.com, 
bigch...@gmail.com, eney...@google.com, llvm-...@lists.llvm.org, 
jo...@devlieghere.com, j...@chromium.org, v...@apple.com, mitch...@outlook.com, 
xpl...@gmail.com, akils...@apple.com 
Labels: ClusterFuzz Stability-Memory-AddressSanitizer Reproducible 
Engine-libfuzzer OS-Linux Proj-llvm Reported-2024-04-30
Type: Bug

New issue 68383 by ClusterFuzz-External: llvm:clang-fuzzer: Abrt in 
llvm::llvm_unreachable_internal
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=68383

Detailed Report: https://oss-fuzz.com/testcase?key=4525671903002624

Project: llvm
Fuzzing Engine: libFuzzer
Fuzz Target: clang-fuzzer
Job Type: libfuzzer_asan_llvm
Platform Id: linux

Crash Type: Abrt
Crash Address: 0x05393921
Crash State:
  llvm::llvm_unreachable_internal
  CXXNameMangler::mangleExpression
  CXXNameMangler::mangleExpression
  
Sanitizer: address (ASAN)

Regressed: 
https://oss-fuzz.com/revisions?job=libfuzzer_asan_llvm&range=202006110252:202006121812

Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=4525671903002624

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for 
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any 
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any other 
feedback, please file an issue at https://github.com/google/oss-fuzz/issues. 
Comments on individual Monorail issues are not monitored.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90596] Overzealous -Wstrict-prototypes warnings on function definitions

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90596




Summary

Overzealous -Wstrict-prototypes warnings on function definitions




  Labels
  
new issue
  



  Assignees
  
  



  Reporter
  
  jmarshall
  




Consider the following, _foo.c_:

```c
int foo() {
return 42;
}
```

Current clang (19.0.0git c3598b161a4d868b1cd10a7ee7ac37d68e5a36fe) with `-pedantic` or `-Wstrict-prototypes` produces a warning for this code:

```
clang -c -Wstrict-prototypes foo.c 
foo.c:1:8: warning: a function declaration without a prototype is deprecated in all versions of C [-Wstrict-prototypes]
1 | int foo() {
  |^
  | void
```

The discussion in [[RFC] Enabling -Wstrict-prototypes by default in C](https://discourse.llvm.org/t/rfc-enabling-wstrict-prototypes-by-default-in-c/60521) largely focusses on encouraging users to write declarations as `int foo(void);` but I am interested in the application of this warning to function **definitions**.

The diagnostic message above is somewhat confusing as this is a function definition, not just a function declaration. More importantly, I believe there is no confusion about a function definition with an empty parameter list. In particular C17 N2176 §6.7.6.3/14 says [similar text appears in earlier versions; emphasis added]

> An identifier list declares only the identifiers of the parameters of the function. **An empty list in a function declarator that is part of a definition of that function specifies that the function has no parameters.** The empty list in a function declarator that is not part of a definition of that function specifies that no information about the number or types of the parameters is supplied. [Footnote 147: See “future language directions” (6.11.6).]

I would take this to mean that a function **definition** with an empty parameter list effectively provides a prototype, and therefore that the warning is spurious in this case. It seems unfortunate to encourage users to hypercorrect their code to define such functions as `int foo(void) { return 42; }` when the `void` doesn't add anything in a function **definition**.


I also tried to find the chapter and verse of the standard saying that this scenario is “deprecated in all versions of C”. I guess this is based on §6.11.6, which says

> The use of function declarators with empty parentheses (not prototype-format parameter type declarators) is an obsolescent feature.

Based on the two “…empty list…” sentences in the paragraph quoted above whose footnote refers to §6.11.6 and the fact that the obsolescent feature we're trying to get rid of in §6.11.6 is non-prototype declarations, I think this sentence intends only to refer to the latter and should perhaps read

> The use of function declarators **(that are not part of definitions of the respective functions)** with empty parentheses (not prototype-format parameter type declarators) is an obsolescent feature.

in which case it would not provide motivation for emitting this warning on function **definitions**. (I did not see a defect report to this effect or otherwise relating to §6.11.6.)


___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] [Bug 90589] [AArch64][MC] Error "Implement any new match types added!" with invalid SME2 ZIP instruction

2024-04-30 Thread LLVM Bugs via llvm-bugs


Issue

90589




Summary

[AArch64][MC] Error "Implement any new match types added!" with invalid SME2 ZIP instruction




  Labels
  
backend:AArch64,
crash-on-invalid,
mc
  



  Assignees
  
  



  Reporter
  
  ostannard
  




This invalid SME2 instruction causes an UNREACHABLE crash in the AArch64 assembly parser:

```
$ echo "zip {z1.q-z2.q}, z0.q, z0.q" | /work/llvm/build/bin/llvm-mc --triple aarch64 -mattr=+sme2
.text
Implement any new match types added!
UNREACHABLE executed at /work/llvm/llvm-project/llvm/lib/Target/AArch64/AsmParser/AArch64AsmParser.cpp:6767!
PLEASE submit a bug report to https://github.com/llvm/llvm-project/issues/ and include the crash backtrace.
Stack dump:
0.  Program arguments: /work/llvm/build/bin/llvm-mc --triple aarch64 -mattr=+sme2
 #0 0x55a08a559aa7 llvm::sys::PrintStackTrace(llvm::raw_ostream&, int) (/work/llvm/build/bin/llvm-mc+0xe05aa7)
 #1 0x55a08a5577be llvm::sys::RunSignalHandlers() (/work/llvm/build/bin/llvm-mc+0xe037be)
 #2 0x55a08a55a3fa SignalHandler(int) Signals.cpp:0:0
 #3 0x7f45f4a42520 (/lib/x86_64-linux-gnu/libc.so.6+0x42520)
 #4 0x7f45f4a969fc __pthread_kill_implementation ./nptl/pthread_kill.c:44:76
 #5 0x7f45f4a969fc __pthread_kill_internal ./nptl/pthread_kill.c:78:10
 #6 0x7f45f4a969fc pthread_kill ./nptl/pthread_kill.c:89:10
 #7 0x7f45f4a42476 gsignal ./signal/../sysdeps/posix/raise.c:27:6
 #8 0x7f45f4a287f3 abort ./stdlib/abort.c:81:7
 #9 0x55a08a534601 (/work/llvm/build/bin/llvm-mc+0xde0601)
#10 0x55a08a334195 (anonymous namespace)::AArch64AsmParser::MatchAndEmitInstruction(llvm::SMLoc, unsigned int&, llvm::SmallVectorImpl>>&, llvm::MCStreamer&, unsigned long&, bool) AArch64AsmParser.cpp:0:0
#11 0x55a08a4feb5a (anonymous namespace)::AsmParser::parseAndMatchAndEmitTargetInstruction((anonymous namespace)::ParseStatementInfo&, llvm::StringRef, llvm::AsmToken, llvm::SMLoc) AsmParser.cpp:0:0
#12 0x55a08a4f1d6f (anonymous namespace)::AsmParser::parseStatement((anonymous namespace)::ParseStatementInfo&, llvm::MCAsmParserSemaCallback*) AsmParser.cpp:0:0
#13 0x55a08a4ea9e5 (anonymous namespace)::AsmParser::Run(bool, bool) AsmParser.cpp:0:0
#14 0x55a08a2cc51b AssembleInput(char const*, llvm::Target const*, llvm::SourceMgr&, llvm::MCContext&, llvm::MCStreamer&, llvm::MCAsmInfo&, llvm::MCSubtargetInfo&, llvm::MCInstrInfo&, llvm::MCTargetOptions const&) llvm-mc.cpp:0:0
#15 0x55a08a2cb2cd main (/work/llvm/build/bin/llvm-mc+0xb772cd)
#16 0x7f45f4a29d90 __libc_start_call_main ./csu/../sysdeps/nptl/libc_start_call_main.h:58:16
#17 0x7f45f4a29e40 call_init ./csu/../csu/libc-start.c:128:20
#18 0x7f45f4a29e40 __libc_start_main ./csu/../csu/libc-start.c:379:5
#19 0x55a08a2c6465 _start (/work/llvm/build/bin/llvm-mc+0xb72465)
fish: Process 441908, '/work/llvm/build/bin/llvm-mc' from job 1, 'echo "zip {z1.q-z2.q}, z0.q, z0…' terminated by signal SIGABRT (Abort)
```

The instruction is invalid because the first register in the curly brackets must be even-numbered, but this should be reported as an error, not a crash.


___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 65216 in oss-fuzz: llvm:llvm-opt-fuzzer--x86_64-loop_vectorize: ASSERT: Idx >= 0 && "Invalid basic block argument!"

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #1 on issue 65216 by ClusterFuzz-External: 
llvm:llvm-opt-fuzzer--x86_64-loop_vectorize: ASSERT: Idx >= 0 && "Invalid basic 
block argument!"
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=65216#c1

ClusterFuzz testcase 6677353610477568 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 43221 in oss-fuzz: llvm:clang-fuzzer: ASSERT: !isNull() && "Cannot retrieve a NULL type pointer"

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #4 on issue 43221 by ClusterFuzz-External: llvm:clang-fuzzer: ASSERT: 
!isNull() && "Cannot retrieve a NULL type pointer"
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43221#c4

ClusterFuzz testcase 6631396272111616 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 51196 in oss-fuzz: llvm:clang-fuzzer: ASSERT: B > 0 && "Bit width can't be 0."

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #2 on issue 51196 by ClusterFuzz-External: llvm:clang-fuzzer: ASSERT: B 
> 0 && "Bit width can't be 0."
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51196#c2

ClusterFuzz testcase 6605178781958144 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 51229 in oss-fuzz: llvm:clang-fuzzer: Stack-overflow in clang::RecursiveASTVisitor::TraverseDecl

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #2 on issue 51229 by ClusterFuzz-External: llvm:clang-fuzzer: 
Stack-overflow in clang::RecursiveASTVisitor::TraverseDecl
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51229#c2

ClusterFuzz testcase 6594598375391232 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 65374 in oss-fuzz: llvm:llvm-yaml-parser-fuzzer: Stack-overflow in void llvm::yaml::skip

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #1 on issue 65374 by ClusterFuzz-External: 
llvm:llvm-yaml-parser-fuzzer: Stack-overflow in void 
llvm::yaml::skip
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=65374#c1

ClusterFuzz testcase 6540028272508928 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 33042 in oss-fuzz: llvm:llvm-microsoft-demangle-fuzzer: Stack-overflow in llvm::ms_demangle::Demangler::parse

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #4 on issue 33042 by ClusterFuzz-External: 
llvm:llvm-microsoft-demangle-fuzzer: Stack-overflow in 
llvm::ms_demangle::Demangler::parse
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33042#c4

ClusterFuzz testcase 6527584180502528 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 64776 in oss-fuzz: llvm:llvm-opt-fuzzer--x86_64-loop_vectorize: Null-dereference READ in llvm::StructType::getTypeAtIndex

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #1 on issue 64776 by ClusterFuzz-External: 
llvm:llvm-opt-fuzzer--x86_64-loop_vectorize: Null-dereference READ in 
llvm::StructType::getTypeAtIndex
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64776#c1

ClusterFuzz testcase 6517670174130176 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 33328 in oss-fuzz: llvm:clang-objc-fuzzer: Stack-overflow in clang::Parser::SkipUntil

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #4 on issue 33328 by ClusterFuzz-External: llvm:clang-objc-fuzzer: 
Stack-overflow in clang::Parser::SkipUntil
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33328#c4

ClusterFuzz testcase 6441486293008384 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 64924 in oss-fuzz: llvm:llvm-isel-fuzzer--x86_64-O2: Abrt in llvm::llvm_unreachable_internal

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #1 on issue 64924 by ClusterFuzz-External: 
llvm:llvm-isel-fuzzer--x86_64-O2: Abrt in llvm::llvm_unreachable_internal
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64924#c1

ClusterFuzz testcase 6432838563790848 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 50278 in oss-fuzz: llvm:clang-fuzzer: Use-of-uninitialized-value in clang::TemplateName::getKind

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #2 on issue 50278 by ClusterFuzz-External: llvm:clang-fuzzer: 
Use-of-uninitialized-value in clang::TemplateName::getKind
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50278#c2

ClusterFuzz testcase 6249243525906432 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 65483 in oss-fuzz: llvm:llvm-isel-fuzzer--x86_64-O2: Unexpected-exit in llvm::LLVMContext::diagnose

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #1 on issue 65483 by ClusterFuzz-External: 
llvm:llvm-isel-fuzzer--x86_64-O2: Unexpected-exit in llvm::LLVMContext::diagnose
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=65483#c1

ClusterFuzz testcase 6150347533910016 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 52015 in oss-fuzz: llvm:clang-fuzzer: Stack-overflow in clang::Parser::ParseDirectDeclarator

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #2 on issue 52015 by ClusterFuzz-External: llvm:clang-fuzzer: 
Stack-overflow in clang::Parser::ParseDirectDeclarator
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=52015#c2

ClusterFuzz testcase 6031855258566656 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 20946 in oss-fuzz: llvm:clang-fuzzer: Null-dereference READ in GetFullTypeForDeclarator

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #7 on issue 20946 by ClusterFuzz-External: llvm:clang-fuzzer: 
Null-dereference READ in GetFullTypeForDeclarator
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20946#c7

ClusterFuzz testcase 5970362481508352 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 53447 in oss-fuzz: llvm:clang-fuzzer: Stack-overflow in clang::TypePropertyCache::ensure

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #2 on issue 53447 by ClusterFuzz-External: llvm:clang-fuzzer: 
Stack-overflow in clang::TypePropertyCache::ensure
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53447#c2

ClusterFuzz testcase 5903883046354944 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 26936 in oss-fuzz: llvm:clang-fuzzer: ASSERT: !isValueDependent() && "Expression evaluator can't be called on a dependent expr

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #5 on issue 26936 by ClusterFuzz-External: llvm:clang-fuzzer: ASSERT: 
!isValueDependent() && "Expression evaluator can't be called on a dependent expr
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26936#c5

ClusterFuzz testcase 5757580271681536 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 15924 in oss-fuzz: llvm/llvm-dwarfdump-fuzzer: ASSERT: !KeyInfoT::isEqual(Val, EmptyKey) && !KeyInfoT::isEqual(Val, TombstoneKey) && "E

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #6 on issue 15924 by ClusterFuzz-External: llvm/llvm-dwarfdump-fuzzer: 
ASSERT: !KeyInfoT::isEqual(Val, EmptyKey) && !KeyInfoT::isEqual(Val, 
TombstoneKey) && "E
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15924#c6

ClusterFuzz testcase 5750352378331136 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 20938 in oss-fuzz: llvm:clang-fuzzer: Null-dereference READ in processTypeAttrs

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #7 on issue 20938 by ClusterFuzz-External: llvm:clang-fuzzer: 
Null-dereference READ in processTypeAttrs
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20938#c7

ClusterFuzz testcase 5705616855400448 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 49199 in oss-fuzz: llvm:clang-fuzzer: Stack-overflow in clang::StmtVisitorBase::Visit

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #3 on issue 49199 by ClusterFuzz-External: llvm:clang-fuzzer: 
Stack-overflow in clang::StmtVisitorBase::Visit
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49199#c3

ClusterFuzz testcase 5566192374382592 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 64824 in oss-fuzz: llvm:llvm-isel-fuzzer--x86_64-O2: ASSERT: (VTy->isFirstClassType() || VTy->isVoidTy()) && "Cannot create non-first-class v

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #1 on issue 64824 by ClusterFuzz-External: 
llvm:llvm-isel-fuzzer--x86_64-O2: ASSERT: (VTy->isFirstClassType() || 
VTy->isVoidTy()) && "Cannot create non-first-class v
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64824#c1

ClusterFuzz testcase 5345559573299200 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 39058 in oss-fuzz: llvm:clang-fuzzer: ASSERT: !isNull() && "Cannot retrieve a NULL type pointer"

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #4 on issue 39058 by ClusterFuzz-External: llvm:clang-fuzzer: ASSERT: 
!isNull() && "Cannot retrieve a NULL type pointer"
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39058#c4

ClusterFuzz testcase 5328159822708736 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 30308 in oss-fuzz: llvm:llvm-dwarfdump-fuzzer: Crash in llvm::DWARFUnitIndex::parseImpl

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #5 on issue 30308 by ClusterFuzz-External: llvm:llvm-dwarfdump-fuzzer: 
Crash in llvm::DWARFUnitIndex::parseImpl
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30308#c5

ClusterFuzz testcase 5289587515719680 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 65067 in oss-fuzz: llvm:llvm-isel-fuzzer--x86_64-O2: ASSERT: (getOperand(0)->getType()->isIntOrIntVectorTy() || getOperand(0)->getType()->isP

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #1 on issue 65067 by ClusterFuzz-External: 
llvm:llvm-isel-fuzzer--x86_64-O2: ASSERT: 
(getOperand(0)->getType()->isIntOrIntVectorTy() || getOperand(0)->getType()->isP
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=65067#c1

ClusterFuzz testcase 5282853872861184 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 64706 in oss-fuzz: llvm:llvm-dwarfdump-fuzzer: Abrt in llvm::llvm_unreachable_internal

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #1 on issue 64706 by ClusterFuzz-External: llvm:llvm-dwarfdump-fuzzer: 
Abrt in llvm::llvm_unreachable_internal
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64706#c1

ClusterFuzz testcase 5207109557026816 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 26130 in oss-fuzz: llvm:clang-fuzzer: ASSERT: SS == getCurFunction()->SwitchStack.back().getPointer() && "switch stack missing

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #5 on issue 26130 by ClusterFuzz-External: llvm:clang-fuzzer: ASSERT: 
SS == getCurFunction()->SwitchStack.back().getPointer() && "switch stack missing
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26130#c5

ClusterFuzz testcase 5188216376000512 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 51257 in oss-fuzz: llvm:clang-fuzzer: ASSERT: DD && "queried property of class with no definition"

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #2 on issue 51257 by ClusterFuzz-External: llvm:clang-fuzzer: ASSERT: 
DD && "queried property of class with no definition"
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51257#c2

ClusterFuzz testcase 5176200262713344 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 27444 in oss-fuzz: llvm:llvm-dwarfdump-fuzzer: Null-dereference READ in unsigned char llvm::DataExtractor::getU

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #5 on issue 27444 by ClusterFuzz-External: llvm:llvm-dwarfdump-fuzzer: 
Null-dereference READ in unsigned char llvm::DataExtractor::getU
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27444#c5

ClusterFuzz testcase 5162010651918336 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 25883 in oss-fuzz: llvm:clang-objc-fuzzer: ASSERT: D && !D->isInvalidDecl() && D->isThisDeclarationADefinition() && "Invalid interf

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #5 on issue 25883 by ClusterFuzz-External: llvm:clang-objc-fuzzer: 
ASSERT: D && !D->isInvalidDecl() && D->isThisDeclarationADefinition() && 
"Invalid interf
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25883#c5

ClusterFuzz testcase 5155506841452544 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 64819 in oss-fuzz: llvm:llvm-opt-fuzzer--x86_64-loop_vectorize: ASSERT: !(Rewrite.second).empty() && "Expected to find Predicates"

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #1 on issue 64819 by ClusterFuzz-External: 
llvm:llvm-opt-fuzzer--x86_64-loop_vectorize: ASSERT: !(Rewrite.second).empty() 
&& "Expected to find Predicates"
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64819#c1

ClusterFuzz testcase 5152493814022144 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs


[llvm-bugs] Issue 64844 in oss-fuzz: llvm:llvm-isel-fuzzer--wasm32-O2: ASSERT: MBB != &MF->front() && "Can't find reaching def for virtreg"

2024-04-30 Thread ClusterFuzz-External via monorail via llvm-bugs
Updates:
Status: WontFix

Comment #1 on issue 64844 by ClusterFuzz-External: 
llvm:llvm-isel-fuzzer--wasm32-O2: ASSERT: MBB != &MF->front() && "Can't find 
reaching def for virtreg"
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64844#c1

ClusterFuzz testcase 5150786497413120 is closed as invalid, so closing issue.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.___
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs