[LLVMbugs] [Bug 20815] New: [META] Fix errors in UBSan bootstrap of LLVM/Clang
bugzilla-daemon at llvm.org
bugzilla-daemon at llvm.org
Fri Aug 29 17:27:00 PDT 2014
http://llvm.org/bugs/show_bug.cgi?id=20815
Bug ID: 20815
Summary: [META] Fix errors in UBSan bootstrap of LLVM/Clang
Product: new-bugs
Version: trunk
Hardware: PC
OS: Linux
Status: NEW
Severity: normal
Priority: P
Component: new bugs
Assignee: unassignedbugs at nondot.org
Reporter: vonosmas at gmail.com
CC: llvmbugs at cs.uiuc.edu, richard-llvm at metafoo.co.uk
Classification: Unclassified
I've recently added bootstrap of LLVM/Clang with UBSan to the
sanitizer-x86_64-linux-boostrap buildbot:
http://lab.llvm.org:8011/builders/sanitizer-x86_64-linux-bootstrap
You can try it on your machine by passing just-built Clang as a host compiler
and -DLLVM_USE_SANITIZER=Undefined option to CMake.
Currently both check-llvm and check-clang test suites have failing tests:
http://lab.llvm.org:8011/builders/sanitizer-x86_64-linux-bootstrap/builds/4368/steps/check-llvm%20ubsan/logs/stdio
http://lab.llvm.org:8011/builders/sanitizer-x86_64-linux-bootstrap/builds/4368/steps/check-clang%20ubsan/logs/stdio
A lot of LLVM failures will be fixed once:
1) http://reviews.llvm.org/D4976 lands (reviewers are welcome!)
2) jit_exit function in lib/ExecutionEngine/JIT/JITMemoryManager.cpp is defined
to return int to pacify function type sanitizer (if it's an appropriate fix).
There is a not-so-long tail of remaining issues there. I'd be grateful if you
can take a look and/or fix some of them.
--
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20140830/53ed86fe/attachment.html>
More information about the llvm-bugs
mailing list