From nobody Sun Jul 23 18:28:28 2023 X-Original-To: toolchain@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4R8Bcr4RXlz4p701 for ; Sun, 23 Jul 2023 18:28:28 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4R8Bcr0ZG2z3kqj for ; Sun, 23 Jul 2023 18:28:28 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1690136908; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=ag+2fXGqCSVkzckqY7xyEj0mB0Xu51zwK45Vu8u8TDQ=; b=DqzEfiYdhpcr1axzOfGQKVnyQZLjiuvHX+h4nl3r2IDXFqOy1Y0ViHy917lx4/m9HitV5+ WHIHeSeL/fyi9vJIS3VM1LbxCE9jNkJ90cre33UYUFh1qQ7SERUq99lB9PkX3l4N8sZkGd lPZogwwZWdL2cvABceo6AJ0Im0/774inXhinN72pzGZ/T7KEhEeQ7X0Z8qcW0wIRmq5x0A D9BQhHHQnDhrHPeaFnyRUMKTPaUUr/F0iIfRJ0B/x7XZa7freuRKLuh1G3IXQuR33sIU9x tS6GBdGYfxyIPeFNzuM49Pv6Ka/ulIolnz6L3DUx4RVE8H2Q7B8AKwGol2LONA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1690136908; a=rsa-sha256; cv=none; b=LdVuBTowuAukojCIsFtlCvimeyDpPzpZeIknp5YaXvHo+s8xE0lRGvg98uHN8d4gNEQoCr vyLnqRWxRf+RWfN6yUnUkS63KtQ6b3IKSNpEjo2XEK4vh8HeQeqpnEhIsShIgQc1T9GltI 6C9xdhXib/0HL63BBJNacb4AjsfI05drzu+xRa1qseJiDju+T6stlPrTKYEEAFkgIdQEQw UlX8D+44TnzOhy2RBi6jgip3F+7cAB2d7s7OTfm10yzLOaTLnkCdioVyTR6wPqpi1NfpZY itJ8COEMPlRJSARMEkPwiKCEt47nUoLzzPlfPfPJQfEtFDiaBk3K4lVnICMS2A== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4R8Bcq6cY2zmfs for ; Sun, 23 Jul 2023 18:28:27 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 36NISRF3016319 for ; Sun, 23 Jul 2023 18:28:27 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 36NISR2i016318 for toolchain@FreeBSD.org; Sun, 23 Jul 2023 18:28:27 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: toolchain@FreeBSD.org Subject: [Bug 265758] clang crashes on math/py-fastcluster on 14/amd64 Date: Sun, 23 Jul 2023 18:28:28 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: misc X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: commit-hook@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: toolchain@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Maintenance of FreeBSD s integrated toolchain List-Archive: https://lists.freebsd.org/archives/freebsd-toolchain List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-toolchain@freebsd.org X-BeenThere: freebsd-toolchain@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D265758 --- Comment #6 from commit-hook@FreeBSD.org --- A commit in branch stable/13 references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3D95955fb872c6a51ff18804b93a2065185= 955c2a0 commit 95955fb872c6a51ff18804b93a2065185955c2a0 Author: Dimitry Andric AuthorDate: 2023-07-13 18:57:22 +0000 Commit: Dimitry Andric CommitDate: 2023-07-23 17:38:12 +0000 Merge commit fde5924dcc69 from llvm-project (by Serge Pavlov): [clang] Reset FP options before template instantiation AST nodes that may depend on FP options keep them as a difference relative to the options outside the AST node. At the moment of instantiation the FP options may be different from the default values, defined by command-line option. In such case FP attributes would have unexpected values. For example, the code: template void func_01(int last, C) { func_01(last, int()); } void func_02() { func_01(0, 1); } #pragma STDC FENV_ACCESS ON caused compiler crash, because template instantiation takes place at = the end of translation unit, where pragma STDC FENV_ACCESS is in effect. = As a result, code in the template instantiation would use constrained intrinsics while the function does not have StrictFP attribute. To solve this problem, FP attributes in Sema must be set to default values, defined by command line options. This change resolves https://github.com/llvm/llvm-project/issues/6354= 2. Differential Revision: https://reviews.llvm.org/D154359 Requested by: pkubaj PR: 265755, 265758 MFC after: 1 month (cherry picked from commit 1cd9788408aa9ea4fd0fbc3e06bd9a4eaf8d8d22) contrib/llvm-project/clang/lib/Sema/SemaTemplateInstantiateDecl.cpp | 4 ++= ++ 1 file changed, 4 insertions(+) --=20 You are receiving this mail because: You are the assignee for the bug.=