Skip to content
  1. Feb 01, 2019
    • Brian Gesiak's avatar
      [SemaCXX] Param diagnostic matches overload logic · 3aba9fd6
      Brian Gesiak authored
      Summary:
      Given the following test program:
      
      ```
      class C {
      public:
        int A(int a, int& b);
      };
      
      int C::A(const int a, int b) {
        return a * b;
      }
      ```
      
      Clang would produce an error message that correctly diagnosed the
      redeclaration of `C::A` to not match the original declaration (the
      parameters to the two declarations do not match -- the original takes an
      `int &` as its 2nd parameter, but the redeclaration takes an `int`). However,
      it also produced a note diagnostic that inaccurately pointed to the
      first parameter, claiming that `const int` in the redeclaration did not
      match the unqualified `int` in the original. The diagnostic is
      misleading because it has nothing to do with why the program does not
      compile.
      
      The logic for checking for a function overload, in
      `Sema::FunctionParamTypesAreEqual`, discards cv-qualifiers before
      checking whether the types are equal. Do the same when producing the
      overload diagnostic.
      
      Reviewers: rsmith
      
      Reviewed By: rsmith
      
      Subscribers: cpplearner, cfe-commits
      
      Tags: #clang
      
      Differential Revision: https://reviews.llvm.org/D57032
      
      llvm-svn: 352831
      3aba9fd6
    • Julian Lettner's avatar
      [Sanitizers] UBSan unreachable incompatible with ASan in the presence of `noreturn` calls · b6c06dc2
      Julian Lettner authored
      Summary:
      UBSan wants to detect when unreachable code is actually reached, so it
      adds instrumentation before every unreachable instruction. However, the
      optimizer will remove code after calls to functions marked with
      noreturn. To avoid this UBSan removes noreturn from both the call
      instruction as well as from the function itself. Unfortunately, ASan
      relies on this annotation to unpoison the stack by inserting calls to
      _asan_handle_no_return before noreturn functions. This is important for
      functions that do not return but access the the stack memory, e.g.,
      unwinder functions *like* longjmp (longjmp itself is actually
      "double-proofed" via its interceptor). The result is that when ASan and
      UBSan are combined, the noreturn attributes are missing and ASan cannot
      unpoison the stack, so it has false positives when stack unwinding is
      used.
      
      Changes:
      Clang-CodeGen now directly insert calls to `__asan_handle_no_return`
      when a call to a noreturn function is encountered and both
      UBsan-unreachable and ASan are enabled. This allows UBSan to continue
      removing the noreturn attribute from functions without any changes to
      the ASan pass.
      
      Previously generated code:
      ```
        call void @longjmp
        call void @__asan_handle_no_return
        call void @__ubsan_handle_builtin_unreachable
      ```
      
      Generated code (for now):
      ```
        call void @__asan_handle_no_return
        call void @longjmp
        call void @__asan_handle_no_return
        call void @__ubsan_handle_builtin_unreachable
      ```
      
      rdar://problem/40723397
      
      Reviewers: delcypher, eugenis, vsk
      
      Differential Revision: https://reviews.llvm.org/D57278
      
      > llvm-svn: 352690
      
      llvm-svn: 352829
      b6c06dc2
    • James Y Knight's avatar
      [opaque pointer types] Add a FunctionCallee wrapper type, and use it. · 13680223
      James Y Knight authored
      Recommit r352791 after tweaking DerivedTypes.h slightly, so that gcc
      doesn't choke on it, hopefully.
      
      Original Message:
      The FunctionCallee type is effectively a {FunctionType*,Value*} pair,
      and is a useful convenience to enable code to continue passing the
      result of getOrInsertFunction() through to EmitCall, even once pointer
      types lose their pointee-type.
      
      Then:
      - update the CallInst/InvokeInst instruction creation functions to
        take a Callee,
      - modify getOrInsertFunction to return FunctionCallee, and
      - update all callers appropriately.
      
      One area of particular note is the change to the sanitizer
      code. Previously, they had been casting the result of
      `getOrInsertFunction` to a `Function*` via
      `checkSanitizerInterfaceFunction`, and storing that. That would report
      an error if someone had already inserted a function declaraction with
      a mismatching signature.
      
      However, in general, LLVM allows for such mismatches, as
      `getOrInsertFunction` will automatically insert a bitcast if
      needed. As part of this cleanup, cause the sanitizer code to do the
      same. (It will call its functions using the expected signature,
      however they may have been declared.)
      
      Finally, in a small number of locations, callers of
      `getOrInsertFunction` actually were expecting/requiring that a brand
      new function was being created. In such cases, I've switched them to
      Function::Create instead.
      
      Differential Revision: https://reviews.llvm.org/D57315
      
      llvm-svn: 352827
      13680223
    • George Karpenkov's avatar
      [analyzer] [RetainCountChecker] Fix object type for CF/Obj-C bridged casts · b6c6ab31
      George Karpenkov authored
      Having an incorrect type for a cast causes the checker to incorrectly
      dismiss the operation under ARC, leading to a false positive
      use-after-release on the test.
      
      rdar://47709885
      
      Differential Revision: https://reviews.llvm.org/D57557
      
      llvm-svn: 352824
      b6c6ab31
    • Akira Hatanaka's avatar
      Revert "[Sema] Make canPassInRegisters return true if the CXXRecordDecl passed" · 9e671831
      Akira Hatanaka authored
      This reverts commit r350920 as it is not clear whether we should force a
      class to be returned in registers when copy and move constructors are
      both deleted.
      
      For more background, see the following discussion:
      http://lists.llvm.org/pipermail/cfe-commits/Week-of-Mon-20190128/259907.html
      
      llvm-svn: 352822
      9e671831
  2. Jan 31, 2019
    • Nico Weber's avatar
      Make clang/test/Index/pch-from-libclang.c pass in more places · 0abcafd8
      Nico Weber authored
      - fixes the test on macOS with LLVM_ENABLE_PIC=OFF
      - together with D57343, gets the test to pass on Windows
      - makes it run everywhere (it seems to just pass on Linux)
      
      The main change is to pull out the resource directory computation into a
      function shared by all 3 places that do it. In CIndexer.cpp, this now works no
      matter if libclang is in lib/ or bin/ or statically linked to a binary in bin/.
      
      
      Differential Revision: https://reviews.llvm.org/D57345
      
      llvm-svn: 352803
      0abcafd8
    • Yaxun Liu's avatar
      Do not copy long double and 128-bit fp format from aux target for AMDGPU · 277e064b
      Yaxun Liu authored
      rC352620 caused regressions because it copied floating point format from
      aux target.
      
      floating point format decides whether extended long double is supported.
      It is x86_fp80 on x86 but IEEE double on amdgcn.
      
      Document usage of long doubel type in HIP programming guide 
      https://github.com/ROCm-Developer-Tools/HIP/pull/890
      
      Differential Revision: https://reviews.llvm.org/D57527
      
      llvm-svn: 352801
      277e064b
    • James Y Knight's avatar
      Revert "[opaque pointer types] Add a FunctionCallee wrapper type, and use it." · fadf2506
      James Y Knight authored
      This reverts commit f47d6b38 (r352791).
      
      Seems to run into compilation failures with GCC (but not clang, where
      I tested it). Reverting while I investigate.
      
      llvm-svn: 352800
      fadf2506
    • Artem Belevich's avatar
      [CUDA] add support for the new kernel launch API in CUDA-9.2+. · c62214da
      Artem Belevich authored
      Instead of calling CUDA runtime to arrange function arguments,
      the new API constructs arguments in a local array and the kernels
      are launched with __cudaLaunchKernel().
      
      The old API has been deprecated and is expected to go away
      in the next CUDA release.
      
      Differential Revision: https://reviews.llvm.org/D57488
      
      llvm-svn: 352799
      c62214da
    • Artem Belevich's avatar
      [CUDA] Propagate detected version of CUDA to cc1 · 8fa28a0d
      Artem Belevich authored
      ..and use it to control that parts of CUDA compilation
      that depend on the specific version of CUDA SDK.
      
      This patch has a placeholder for a 'new launch API' support
      which is in a separate patch. The list will be further
      extended in the upcoming patch to support CUDA-10.1.
      
      Differential Revision: https://reviews.llvm.org/D57487
      
      llvm-svn: 352798
      8fa28a0d
    • Thomas Lively's avatar
      [WebAssembly] Add bulk memory target feature · 88058d4e
      Thomas Lively authored
      Summary: Also clean up some preexisting target feature code.
      
      Reviewers: aheejin
      
      Subscribers: dschuff, sbc100, jgravelle-google, hiraditya, sunfish, jfb
      
      Differential Revision: https://reviews.llvm.org/D57495
      
      llvm-svn: 352793
      88058d4e
    • James Y Knight's avatar
      [opaque pointer types] Add a FunctionCallee wrapper type, and use it. · f47d6b38
      James Y Knight authored
      The FunctionCallee type is effectively a {FunctionType*,Value*} pair,
      and is a useful convenience to enable code to continue passing the
      result of getOrInsertFunction() through to EmitCall, even once pointer
      types lose their pointee-type.
      
      Then:
      - update the CallInst/InvokeInst instruction creation functions to
        take a Callee,
      - modify getOrInsertFunction to return FunctionCallee, and
      - update all callers appropriately.
      
      One area of particular note is the change to the sanitizer
      code. Previously, they had been casting the result of
      `getOrInsertFunction` to a `Function*` via
      `checkSanitizerInterfaceFunction`, and storing that. That would report
      an error if someone had already inserted a function declaraction with
      a mismatching signature.
      
      However, in general, LLVM allows for such mismatches, as
      `getOrInsertFunction` will automatically insert a bitcast if
      needed. As part of this cleanup, cause the sanitizer code to do the
      same. (It will call its functions using the expected signature,
      however they may have been declared.)
      
      Finally, in a small number of locations, callers of
      `getOrInsertFunction` actually were expecting/requiring that a brand
      new function was being created. In such cases, I've switched them to
      Function::Create instead.
      
      Differential Revision: https://reviews.llvm.org/D57315
      
      llvm-svn: 352791
      f47d6b38
    • Ilya Biryukov's avatar
      [CodeComplete] Propagate preferred types through parser in more cases · 4f9543b4
      Ilya Biryukov authored
      Preferred types are used by code completion for ranking. This commit
      considerably increases the number of points in code where those types
      are propagated.
      
      In order to avoid complicating signatures of Parser's methods, a
      preferred type is kept as a member variable in the parser and updated
      during parsing.
      
      Differential revision: https://reviews.llvm.org/D56723
      
      llvm-svn: 352788
      4f9543b4
    • Eric Liu's avatar
      Revert "[Sanitizers] UBSan unreachable incompatible with ASan in the presence of `noreturn` calls" · a22c72ca
      Eric Liu authored
      This reverts commit r352690. This causes clang to crash. Sent reproducer to the
      author in the orginal commit.
      
      llvm-svn: 352755
      a22c72ca
    • Rafael Auler's avatar
      Revert "Support attribute used in member funcs of class templates" · ea94c308
      Rafael Auler authored
      This reverts commit 352740: broke swift build
      
      llvm-svn: 352748
      ea94c308
    • Rafael Auler's avatar
      Support attribute used in member funcs of class templates · 4b702045
      Rafael Auler authored
      Summary:
      As PR17480 describes, clang does not support the used attribute
      for member functions of class templates. This means that if the member
      function is not used, its definition is never instantiated. This patch
      changes clang to emit the definition if it has the used attribute.
      
      Test Plan: Added a testcase
      
      Reviewed By: aaron.ballman
      
      Differential Revision: https://reviews.llvm.org/D56928
      
      llvm-svn: 352740
      4b702045
    • Petr Hosek's avatar
      Revert "[CMake] Unify scripts for generating VCS headers" · 12062e06
      Petr Hosek authored
      This reverts commits r352729 and r352731: this broke Sanitizer Windows bots
      
      llvm-svn: 352733
      12062e06
    • Petr Hosek's avatar
      [CMake] Unify scripts for generating VCS headers · 0e712a76
      Petr Hosek authored
      Previously, there were two different scripts for generating VCS headers:
      one used by LLVM and one used by Clang. They were both similar, but
      different. They were both broken in their own ways, for example the one
      used by Clang didn't properly handle monorepo resulting in an incorrect
      version information reported by Clang.
      
      This change unifies two the scripts by introducing a new script that's
      used from both LLVM and Clang, ensures that the new script supports both
      monorepo and standalone SVN and Git setups, and removes the old scripts.
      
      Differential Revision: https://reviews.llvm.org/D57063
      
      llvm-svn: 352729
      0e712a76
    • Julian Lettner's avatar
      [Sanitizers] UBSan unreachable incompatible with ASan in the presence of `noreturn` calls · 8280c1e2
      Julian Lettner authored
      Summary:
      UBSan wants to detect when unreachable code is actually reached, so it
      adds instrumentation before every unreachable instruction. However, the
      optimizer will remove code after calls to functions marked with
      noreturn. To avoid this UBSan removes noreturn from both the call
      instruction as well as from the function itself. Unfortunately, ASan
      relies on this annotation to unpoison the stack by inserting calls to
      _asan_handle_no_return before noreturn functions. This is important for
      functions that do not return but access the the stack memory, e.g.,
      unwinder functions *like* longjmp (longjmp itself is actually
      "double-proofed" via its interceptor). The result is that when ASan and
      UBSan are combined, the noreturn attributes are missing and ASan cannot
      unpoison the stack, so it has false positives when stack unwinding is
      used.
      
      Changes:
      Clang-CodeGen now directly insert calls to `__asan_handle_no_return`
      when a call to a noreturn function is encountered and both
      UBsan-unreachable and ASan are enabled. This allows UBSan to continue
      removing the noreturn attribute from functions without any changes to
      the ASan pass.
      
      Previously generated code:
      ```
        call void @longjmp
        call void @__asan_handle_no_return
        call void @__ubsan_handle_builtin_unreachable
      ```
      
      Generated code (for now):
      ```
        call void @__asan_handle_no_return
        call void @longjmp
        call void @__asan_handle_no_return
        call void @__ubsan_handle_builtin_unreachable
      ```
      
      rdar://problem/40723397
      
      Reviewers: delcypher, eugenis, vsk
      
      Differential Revision: https://reviews.llvm.org/D57278
      
      llvm-svn: 352690
      8280c1e2
    • Erik Pilkington's avatar
      [CodeGenObjC] Handle exceptions when calling objc_alloc or objc_allocWithZone · 1f7eda5a
      Erik Pilkington authored
      objc_alloc and objc_allocWithZone may throw exceptions if the
      underlying method does. If we're in a @try block, then make sure we
      emit an invoke instead of a call.
      
      rdar://47610407
      
      Differential revision: https://reviews.llvm.org/D57476
      
      llvm-svn: 352687
      1f7eda5a
  3. Jan 30, 2019
  4. Jan 29, 2019
Loading