From nobody Sun Jul 23 18:28:07 2023 X-Original-To: toolchain@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4R8BcS1YRtz4p6x8 for ; Sun, 23 Jul 2023 18:28:08 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4R8BcR65Mpz3jy8 for ; Sun, 23 Jul 2023 18:28:07 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1690136887; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=VZcNjaVXvlbA4YbFtNID7AZo1x+4BvemM+4zYo1J9LY=; b=sNCX2ZgnslWUjwxHwj0dJDkoLIF+hp7DBvYkYUsSJuJhwwV1PLGyc4pnfWWWaPpnQnht// zuoRZZ3Lm3KGJY+gkwmGigvodsU01ejB2QdOHmhxdx8jhwwW9gOhXXFVujQ9Npw58AXotZ efkwLge2JhVYt4pN/8R8ZuDSdn/fgaRKOvXLhDY6Qu9LzJ9A/sFGHfdUkNb1BrbLGjRFbq KC8kA/rZ1SwsYhFLshuDy9p8xigOpqQbUbdigc7ryf12hnwC0yG0kb3o6t43WGAI5eHfES PoJyN6bvkZrfeoqBbvf7pUOW7ht3WzFkKO/yJl24q9g+gBbj0DgMgNJE2vIKcw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1690136887; a=rsa-sha256; cv=none; b=Oaqf9FeXR3tbnj5qpnfA6Q4VYXGSttrrniFosmXB6d1FBVWN6O3AgsCJoFaqB/Gtsn/XSP gsi66Ier5/2ossnRMD8JCs+g50IRdHKA0PckPr7cvdrXvrGBr33xxS1lrUWuhPDVsuXbEq GboUKNBYPJlXNso1apJxNpaK3QlqAbKuOvL6ojkUCNCYJo82g+2mdnrsDkiveRGdibB7ON Ssqttxm0wwaFKyVgJAb1i//vwjWIVOMmhopsD9oqCpzc5utHu76ACqsisBhTweG8NE078B ryH5h6cHtFiN/2gGUecRoK6ydmOfqB44vUxtY8c3MB5Id/LHfaJj6qSKg/oatg== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4R8BcR453Vzmkq for ; Sun, 23 Jul 2023 18:28:07 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 36NIS7Mt015715 for ; Sun, 23 Jul 2023 18:28:07 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 36NIS7MS015714 for toolchain@FreeBSD.org; Sun, 23 Jul 2023 18:28:07 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: toolchain@FreeBSD.org Subject: [Bug 265755] clang crashes on math/octave-forge-interval on amd64 on 14 Date: Sun, 23 Jul 2023 18:28:07 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: misc X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: commit-hook@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: toolchain@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Maintenance of FreeBSD s integrated toolchain List-Archive: https://lists.freebsd.org/archives/freebsd-toolchain List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-toolchain@freebsd.org X-BeenThere: freebsd-toolchain@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D265755 --- Comment #7 from commit-hook@FreeBSD.org --- A commit in branch stable/13 references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3D95955fb872c6a51ff18804b93a2065185= 955c2a0 commit 95955fb872c6a51ff18804b93a2065185955c2a0 Author: Dimitry Andric AuthorDate: 2023-07-13 18:57:22 +0000 Commit: Dimitry Andric CommitDate: 2023-07-23 17:38:12 +0000 Merge commit fde5924dcc69 from llvm-project (by Serge Pavlov): [clang] Reset FP options before template instantiation AST nodes that may depend on FP options keep them as a difference relative to the options outside the AST node. At the moment of instantiation the FP options may be different from the default values, defined by command-line option. In such case FP attributes would have unexpected values. For example, the code: template void func_01(int last, C) { func_01(last, int()); } void func_02() { func_01(0, 1); } #pragma STDC FENV_ACCESS ON caused compiler crash, because template instantiation takes place at = the end of translation unit, where pragma STDC FENV_ACCESS is in effect. = As a result, code in the template instantiation would use constrained intrinsics while the function does not have StrictFP attribute. To solve this problem, FP attributes in Sema must be set to default values, defined by command line options. This change resolves https://github.com/llvm/llvm-project/issues/6354= 2. Differential Revision: https://reviews.llvm.org/D154359 Requested by: pkubaj PR: 265755, 265758 MFC after: 1 month (cherry picked from commit 1cd9788408aa9ea4fd0fbc3e06bd9a4eaf8d8d22) contrib/llvm-project/clang/lib/Sema/SemaTemplateInstantiateDecl.cpp | 4 ++= ++ 1 file changed, 4 insertions(+) --=20 You are receiving this mail because: You are the assignee for the bug.=