[LLVMbugs] [Bug 20815] New: [META] Fix errors in UBSan bootstrap of LLVM/Clang

bugzilla-daemon at llvm.org bugzilla-daemon at llvm.org
Fri Aug 29 17:27:00 PDT 2014


http://llvm.org/bugs/show_bug.cgi?id=20815

            Bug ID: 20815
           Summary: [META] Fix errors in UBSan bootstrap of LLVM/Clang
           Product: new-bugs
           Version: trunk
          Hardware: PC
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P
         Component: new bugs
          Assignee: unassignedbugs at nondot.org
          Reporter: vonosmas at gmail.com
                CC: llvmbugs at cs.uiuc.edu, richard-llvm at metafoo.co.uk
    Classification: Unclassified

I've recently added bootstrap of LLVM/Clang with UBSan to the
sanitizer-x86_64-linux-boostrap buildbot:
http://lab.llvm.org:8011/builders/sanitizer-x86_64-linux-bootstrap

You can try it on your machine by passing just-built Clang as a host compiler
and -DLLVM_USE_SANITIZER=Undefined option to CMake.

Currently both check-llvm and check-clang test suites have failing tests:
http://lab.llvm.org:8011/builders/sanitizer-x86_64-linux-bootstrap/builds/4368/steps/check-llvm%20ubsan/logs/stdio
http://lab.llvm.org:8011/builders/sanitizer-x86_64-linux-bootstrap/builds/4368/steps/check-clang%20ubsan/logs/stdio

A lot of LLVM failures will be fixed once:
1) http://reviews.llvm.org/D4976 lands (reviewers are welcome!)
2) jit_exit function in lib/ExecutionEngine/JIT/JITMemoryManager.cpp is defined
to return int to pacify function type sanitizer (if it's an appropriate fix).

There is a not-so-long tail of remaining issues there. I'd be grateful if you
can take a look and/or fix some of them.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20140830/53ed86fe/attachment.html>


More information about the llvm-bugs mailing list