[LLVMbugs] [Bug 20511] New: x86 Intel assembler assembles indirect calls through absolute memory as direct calls to that address
bugzilla-daemon at llvm.org
bugzilla-daemon at llvm.org
Fri Aug 1 13:33:36 PDT 2014
http://llvm.org/bugs/show_bug.cgi?id=20511
Bug ID: 20511
Summary: x86 Intel assembler assembles indirect calls through
absolute memory as direct calls to that address
Product: libraries
Version: trunk
Hardware: PC
OS: Windows NT
Status: NEW
Severity: normal
Priority: P
Component: Backend: X86
Assignee: unassignedbugs at nondot.org
Reporter: rnk at google.com
CC: david.majnemer at gmail.com, ehsan at mozilla.com,
grosbach at apple.com, jmuizelaar at mozilla.com,
llvmbugs at cs.uiuc.edu
Classification: Unclassified
This is obviously broken:
$ cat t.s
.intel_syntax
foo:
call dword ptr [foo]
$ llvm-mc t.s
.text
foo:
calll foo
Both 'foo' and '[foo]' get parsed as absolute memory X86Operands, and the
pcrel32 variants of 'call' match absolute memory operands. Therefore we have
ambiguity. The gas-style assembler looks for an optional '*' token to
disambiguate.
See also http://llvm.org/PR20052.
--
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20140801/cd77f72f/attachment.html>
More information about the llvm-bugs
mailing list