From nobody Thu Jul 13 18:59:36 2023 X-Original-To: toolchain@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4R23nN6pPgz4mZJS for ; Thu, 13 Jul 2023 18:59:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4R23nN5LYXz4Lbs for ; Thu, 13 Jul 2023 18:59:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1689274776; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=txn49PHczBW7uOm6fsjzYwsiDm7+2vTJDS2L8R2eHl0=; b=K9zB+2Cw+L3zZYapbO+ir7gPPNfHTcK3LOKZG96VT+2M11vFEhjpzFFBxRCMxGdrcabdev 4iTZ3/p8q5q8q2i7HkcVTO53kj2oT9QS9GYBC8scSYLvfsjSPmUPhNQQC2/xJYrJak7Gck IYmI8XBw8CfhlM43uOUxffPC6XdH515/pwo0j5fZQxN4RjDSCGBrjvvWb21srMqGCsYLvC cdDrixsQOh+D/abw/VZCqah0JAaStP+jCMZX97eN55vgyBOj+xg62MOtrrntoDogH2C5Ls 48KyI5F69krHxxIhbwq1kAL69VxIw/ZL9CHY68LNTHtQEj4OtKgIXA/EDcFK7A== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1689274776; a=rsa-sha256; cv=none; b=XZq/7khErT1uAyQRKmIpP30LrQEeMhLPBbQjSfkoCwBMIRyBXpGoyU5bmOQaWDI54+e28t 4b71JFKQCSt6LF6azrf0gwOTpRlXfb6l107nYPtHakFnZF/pdo+XjkhG3JLMYSZv+A102M iou8jfqG70Z3UVSfwNtxF0VFjW++RTu22huFr4yHpbh7d11PEK3eh885OqbThJqv9nlKS+ 838M4nqqAB0R2sULkEYDZPJkLNzESmqUW4sLM5YnOBApngalu5kEGCUvNafixd8rUhL8+M Hxr9zhD92QzUgcMIDVAjGCCr4n5CHXLK29S7s4Mv0Z2eZKmja/VoBJPl6AJPug== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4R23nN4KwVz131v for ; Thu, 13 Jul 2023 18:59:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 36DIxaUY044017 for ; Thu, 13 Jul 2023 18:59:36 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 36DIxaaG044016 for toolchain@FreeBSD.org; Thu, 13 Jul 2023 18:59:36 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: toolchain@FreeBSD.org Subject: [Bug 265758] clang crashes on math/py-fastcluster on 14/amd64 Date: Thu, 13 Jul 2023 18:59:36 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: misc X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: commit-hook@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: toolchain@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Maintenance of FreeBSD s integrated toolchain List-Archive: https://lists.freebsd.org/archives/freebsd-toolchain List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-toolchain@freebsd.org X-BeenThere: freebsd-toolchain@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D265758 --- Comment #5 from commit-hook@FreeBSD.org --- A commit in branch main references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3D1cd9788408aa9ea4fd0fbc3e06bd9a4ea= f8d8d22 commit 1cd9788408aa9ea4fd0fbc3e06bd9a4eaf8d8d22 Author: Dimitry Andric AuthorDate: 2023-07-13 18:57:22 +0000 Commit: Dimitry Andric CommitDate: 2023-07-13 18:57:22 +0000 Merge commit fde5924dcc69 from llvm-project (by Serge Pavlov): [clang] Reset FP options before template instantiation AST nodes that may depend on FP options keep them as a difference relative to the options outside the AST node. At the moment of instantiation the FP options may be different from the default values, defined by command-line option. In such case FP attributes would have unexpected values. For example, the code: template void func_01(int last, C) { func_01(last, int()); } void func_02() { func_01(0, 1); } #pragma STDC FENV_ACCESS ON caused compiler crash, because template instantiation takes place at = the end of translation unit, where pragma STDC FENV_ACCESS is in effect. = As a result, code in the template instantiation would use constrained intrinsics while the function does not have StrictFP attribute. To solve this problem, FP attributes in Sema must be set to default values, defined by command line options. This change resolves https://github.com/llvm/llvm-project/issues/6354= 2. Differential Revision: https://reviews.llvm.org/D154359 Requested by: pkubaj PR: 265755, 265758 MFC after: 1 month contrib/llvm-project/clang/lib/Sema/SemaTemplateInstantiateDecl.cpp | 4 ++= ++ 1 file changed, 4 insertions(+) --=20 You are receiving this mail because: You are the assignee for the bug.=