[LLVMbugs] [Bug 24093] New: bootstrap failure on Linux with gcc 5.1
bugzilla-daemon at llvm.org
bugzilla-daemon at llvm.org
Sun Jul 12 00:12:47 PDT 2015
https://llvm.org/bugs/show_bug.cgi?id=24093
Bug ID: 24093
Summary: bootstrap failure on Linux with gcc 5.1
Product: compiler-rt
Version: unspecified
Hardware: PC
OS: Linux
Status: NEW
Severity: normal
Priority: P
Component: compiler-rt
Assignee: unassignedbugs at nondot.org
Reporter: bero at linaro.org
CC: llvmbugs at cs.uiuc.edu
Classification: Unclassified
Trying to build llvm with all the extras (compiler-rt, clang, libc++, ...) in
the tree with gcc 5.1 fails with a sizeof(OFF_T) == sizeof(off_t) assert:
cd
/home/bero/abf/llvm/BUILD/llvm-3.7.0.src/build/projects/compiler-rt/lib/interception
&& /usr/bin/g++ -D_GNU_SOURCE -D__STDC_CONSTANT_MACROS -D__STDC_FORMAT_MACROS
-D__STDC_LIMIT_MACROS -Os -gdwarf-4 -Wstrict-aliasing=2 -pipe -Wformat
-Werror=format-security -D_FORTIFY_SOURCE=2 -fstack-protector
--param=ssp-buffer-size=4 -fPIC -fvisibility-inlines-hidden -Wall -W
-Wno-unused-parameter -Wwrite-strings -Wcast-qual
-Wno-missing-field-initializers -pedantic -Wno-long-long
-Wno-maybe-uninitialized -Wnon-virtual-dtor -Wno-comment -std=c++1y
-ffunction-sections -fdata-sections -Wall -std=c++11 -Os -gdwarf-4
-Wstrict-aliasing=2 -pipe -Wformat -Werror=format-security -D_FORTIFY_SOURCE=2
-fstack-protector --param=ssp-buffer-size=4 -fPIC
-I/home/bero/abf/llvm/BUILD/llvm-3.7.0.src/build/projects/compiler-rt/lib/interception
-I/home/bero/abf/llvm/BUILD/llvm-3.7.0.src/projects/compiler-rt/lib/interception
-I/home/bero/abf/llvm/BUILD/llvm-3.7.0.src/build/include
-I/home/bero/abf/llvm/BUILD/llvm-3.7.0.src/include
-I/home/bero/abf/llvm/BUILD/llvm-3.7.0.src/projects/compiler-rt/lib/interception/..
-Os -gdwarf-4 -Wstrict-aliasing=2 -pipe -Wformat -Werror=format-security
-D_FORTIFY_SOURCE=2 -fstack-protector --param=ssp-buffer-size=4 -fPIC
-fvisibility-inlines-hidden -Wall -W -Wno-unused-parameter -Wwrite-strings
-Wcast-qual -Wno-missing-field-initializers -pedantic -Wno-long-long
-Wno-maybe-uninitialized -Wnon-virtual-dtor -Wno-comment -std=c++1y
-ffunction-sections -fdata-sections -Wall -std=c++11 -m32 -fPIC -fno-builtin
-fno-exceptions -fomit-frame-pointer -funwind-tables -fno-stack-protector
-fvisibility=hidden -fno-function-sections -fno-lto -Os -g -Wno-variadic-macros
-Wno-non-virtual-dtor -fno-rtti -o
CMakeFiles/RTInterception.i386.dir/interception_type_test.cc.o -c
/home/bero/abf/llvm/BUILD/llvm-3.7.0.src/projects/compiler-rt/lib/interception/interception_type_test.cc
In file included from
/home/bero/abf/llvm/BUILD/llvm-3.7.0.src/projects/compiler-rt/lib/interception/interception.h:23:0,
from
/home/bero/abf/llvm/BUILD/llvm-3.7.0.src/projects/compiler-rt/lib/interception/interception_type_test.cc:17:
/home/bero/abf/llvm/BUILD/llvm-3.7.0.src/projects/compiler-rt/lib/interception/../sanitizer_common/sanitizer_internal_defs.h:253:72:
error: size of array 'assertion_failed__36' is negative
typedef char IMPL_PASTE(assertion_failed_##_, line)[2*(int)(pred)-1]
^
/home/bero/abf/llvm/BUILD/llvm-3.7.0.src/projects/compiler-rt/lib/interception/../sanitizer_common/sanitizer_internal_defs.h:247:30:
note: in expansion of macro 'IMPL_COMPILER_ASSERT'
#define COMPILER_CHECK(pred) IMPL_COMPILER_ASSERT(pred, __LINE__)
^
/home/bero/abf/llvm/BUILD/llvm-3.7.0.src/projects/compiler-rt/lib/interception/interception_type_test.cc:36:1:
note: in expansion of macro 'COMPILER_CHECK'
COMPILER_CHECK(sizeof(::OFF_T) == sizeof(off_t));
^
projects/compiler-rt/lib/interception/CMakeFiles/RTInterception.i386.dir/build.make:137:
recipe for target
'projects/compiler-rt/lib/interception/CMakeFiles/RTInterception.i386.dir/interception_type_test.cc.o'
failed
make[2]: ***
[projects/compiler-rt/lib/interception/CMakeFiles/RTInterception.i386.dir/interception_type_test.cc.o]
Error 1
This is on x86_64, looks like it happens while building x86_32 compat libraries
in the sanitizer.
--
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20150712/526de72d/attachment.html>
More information about the llvm-bugs
mailing list