[LLVMbugs] [Bug 20511] New: x86 Intel assembler assembles indirect calls through absolute memory as direct calls to that address

bugzilla-daemon at llvm.org bugzilla-daemon at llvm.org
Fri Aug 1 13:33:36 PDT 2014


http://llvm.org/bugs/show_bug.cgi?id=20511

            Bug ID: 20511
           Summary: x86 Intel assembler assembles indirect calls through
                    absolute memory as direct calls to that address
           Product: libraries
           Version: trunk
          Hardware: PC
                OS: Windows NT
            Status: NEW
          Severity: normal
          Priority: P
         Component: Backend: X86
          Assignee: unassignedbugs at nondot.org
          Reporter: rnk at google.com
                CC: david.majnemer at gmail.com, ehsan at mozilla.com,
                    grosbach at apple.com, jmuizelaar at mozilla.com,
                    llvmbugs at cs.uiuc.edu
    Classification: Unclassified

This is obviously broken:

$ cat t.s
.intel_syntax
foo:
        call dword ptr [foo]

$ llvm-mc t.s
        .text
foo:
        calll   foo

Both 'foo' and '[foo]' get parsed as absolute memory X86Operands, and the
pcrel32 variants of 'call' match absolute memory operands.  Therefore we have
ambiguity.  The gas-style assembler looks for an optional '*' token to
disambiguate.

See also http://llvm.org/PR20052.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20140801/cd77f72f/attachment.html>


More information about the llvm-bugs mailing list