diff --git a/debian/changelog b/debian/changelog index 422876f3..1e2bba1c 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,15 @@ +llvm-toolchain-snapshot (1:3.5~svn210317-1~exp1) experimental; urgency=medium + + * New snapshot release + + -- Sylvestre Ledru Fri, 06 Jun 2014 11:09:47 +0200 + +llvm-toolchain-snapshot (1:3.5~svn210244-1~exp1) experimental; urgency=medium + + * New snapshot release + + -- Sylvestre Ledru Thu, 05 Jun 2014 10:43:41 +0200 + llvm-toolchain-snapshot (1:3.5~svn209039-3) unstable; urgency=medium * Ship lldb-mi in lldb diff --git a/debian/patches/23-strlcpy_strlcat_warning_removed.diff b/debian/patches/23-strlcpy_strlcat_warning_removed.diff index 119f9651..5b35f803 100644 --- a/debian/patches/23-strlcpy_strlcat_warning_removed.diff +++ b/debian/patches/23-strlcpy_strlcat_warning_removed.diff @@ -1,8 +1,8 @@ -Index: llvm-toolchain-snapshot_3.5~svn200375/clang/include/clang/Basic/Builtins.def +Index: llvm-toolchain-snapshot_3.5~svn210317/clang/include/clang/Basic/Builtins.def =================================================================== ---- llvm-toolchain-snapshot_3.5~svn200375.orig/clang/include/clang/Basic/Builtins.def 2014-01-29 07:45:35.840720859 -0800 -+++ llvm-toolchain-snapshot_3.5~svn200375/clang/include/clang/Basic/Builtins.def 2014-01-29 07:45:35.832720859 -0800 -@@ -471,8 +471,8 @@ +--- llvm-toolchain-snapshot_3.5~svn210317.orig/clang/include/clang/Basic/Builtins.def ++++ llvm-toolchain-snapshot_3.5~svn210317/clang/include/clang/Basic/Builtins.def +@@ -473,8 +473,8 @@ BUILTIN(__builtin___memset_chk, "v*v*izz BUILTIN(__builtin___stpcpy_chk, "c*c*cC*z", "nF") BUILTIN(__builtin___strcat_chk, "c*c*cC*z", "nF") BUILTIN(__builtin___strcpy_chk, "c*c*cC*z", "nF") @@ -13,7 +13,7 @@ Index: llvm-toolchain-snapshot_3.5~svn200375/clang/include/clang/Basic/Builtins. BUILTIN(__builtin___strncat_chk, "c*c*cC*zz", "nF") BUILTIN(__builtin___strncpy_chk, "c*c*cC*zz", "nF") BUILTIN(__builtin___stpncpy_chk, "c*c*cC*zz", "nF") -@@ -765,8 +765,8 @@ +@@ -775,8 +775,8 @@ LIBBUILTIN(getcontext, "iK*", "fj", LIBBUILTIN(_longjmp, "vJi", "fr", "setjmp.h", ALL_GNU_LANGUAGES) LIBBUILTIN(siglongjmp, "vSJi", "fr", "setjmp.h", ALL_GNU_LANGUAGES) // non-standard but very common @@ -24,11 +24,11 @@ Index: llvm-toolchain-snapshot_3.5~svn200375/clang/include/clang/Basic/Builtins. // id objc_msgSend(id, SEL, ...) LIBBUILTIN(objc_msgSend, "GGH.", "f", "objc/message.h", OBJC_LANG) // long double objc_msgSend_fpret(id self, SEL op, ...) -Index: llvm-toolchain-snapshot_3.5~svn200375/clang/lib/Sema/SemaChecking.cpp +Index: llvm-toolchain-snapshot_3.5~svn210317/clang/lib/Sema/SemaChecking.cpp =================================================================== ---- llvm-toolchain-snapshot_3.5~svn200375.orig/clang/lib/Sema/SemaChecking.cpp 2014-01-29 07:45:35.840720859 -0800 -+++ llvm-toolchain-snapshot_3.5~svn200375/clang/lib/Sema/SemaChecking.cpp 2014-01-29 07:45:35.836720859 -0800 -@@ -872,9 +872,10 @@ +--- llvm-toolchain-snapshot_3.5~svn210317.orig/clang/lib/Sema/SemaChecking.cpp ++++ llvm-toolchain-snapshot_3.5~svn210317/clang/lib/Sema/SemaChecking.cpp +@@ -832,9 +832,10 @@ bool Sema::CheckFunctionCall(FunctionDec return false; // Handle memory setting and copying functions. @@ -42,11 +42,11 @@ Index: llvm-toolchain-snapshot_3.5~svn200375/clang/lib/Sema/SemaChecking.cpp CheckStrncatArguments(TheCall, FnInfo); else CheckMemaccessArguments(TheCall, CMId, FnInfo); -Index: llvm-toolchain-snapshot_3.5~svn200375/clang/lib/AST/Decl.cpp +Index: llvm-toolchain-snapshot_3.5~svn210317/clang/lib/AST/Decl.cpp =================================================================== ---- llvm-toolchain-snapshot_3.5~svn200375.orig/clang/lib/AST/Decl.cpp 2014-01-29 07:45:35.840720859 -0800 -+++ llvm-toolchain-snapshot_3.5~svn200375/clang/lib/AST/Decl.cpp 2014-01-29 07:45:35.836720859 -0800 -@@ -3025,10 +3025,10 @@ +--- llvm-toolchain-snapshot_3.5~svn210317.orig/clang/lib/AST/Decl.cpp ++++ llvm-toolchain-snapshot_3.5~svn210317/clang/lib/AST/Decl.cpp +@@ -3071,10 +3071,10 @@ unsigned FunctionDecl::getMemoryFunction case Builtin::BImemmove: return Builtin::BImemmove; @@ -61,11 +61,11 @@ Index: llvm-toolchain-snapshot_3.5~svn200375/clang/lib/AST/Decl.cpp case Builtin::BI__builtin_memcmp: case Builtin::BImemcmp: -Index: llvm-toolchain-snapshot_3.5~svn200375/clang/lib/StaticAnalyzer/Checkers/GenericTaintChecker.cpp +Index: llvm-toolchain-snapshot_3.5~svn210317/clang/lib/StaticAnalyzer/Checkers/GenericTaintChecker.cpp =================================================================== ---- llvm-toolchain-snapshot_3.5~svn200375.orig/clang/lib/StaticAnalyzer/Checkers/GenericTaintChecker.cpp 2014-01-29 07:45:35.840720859 -0800 -+++ llvm-toolchain-snapshot_3.5~svn200375/clang/lib/StaticAnalyzer/Checkers/GenericTaintChecker.cpp 2014-01-29 07:45:35.836720859 -0800 -@@ -238,9 +238,9 @@ +--- llvm-toolchain-snapshot_3.5~svn210317.orig/clang/lib/StaticAnalyzer/Checkers/GenericTaintChecker.cpp ++++ llvm-toolchain-snapshot_3.5~svn210317/clang/lib/StaticAnalyzer/Checkers/GenericTaintChecker.cpp +@@ -237,9 +237,9 @@ GenericTaintChecker::TaintPropagationRul case Builtin::BIstrncpy: case Builtin::BIstrncat: return TaintPropagationRule(1, 2, 0, true); @@ -78,214 +78,10 @@ Index: llvm-toolchain-snapshot_3.5~svn200375/clang/lib/StaticAnalyzer/Checkers/G case Builtin::BIstrndup: return TaintPropagationRule(0, 1, ReturnValueIndex); -Index: llvm-toolchain-snapshot_3.5~svn200375/clang/test/Sema/builtins.c +Index: llvm-toolchain-snapshot_3.5~svn210317/clang/test/Sema/warn-strlcpycat-size.c =================================================================== ---- llvm-toolchain-snapshot_3.5~svn200375.orig/clang/test/Sema/builtins.c 2014-01-29 07:45:35.840720859 -0800 -+++ /dev/null 1970-01-01 00:00:00.000000000 +0000 -@@ -1,199 +0,0 @@ --// RUN: %clang_cc1 %s -fsyntax-only -verify -pedantic -Wno-string-plus-int -triple=i686-apple-darwin9 --// This test needs to set the target because it uses __builtin_ia32_vec_ext_v4si -- --int test1(float a, int b) { -- return __builtin_isless(a, b); // expected-note {{declared here}} --} --int test2(int a, int b) { -- return __builtin_islessequal(a, b); // expected-error {{floating point type}} --} -- --int test3(double a, float b) { -- return __builtin_isless(a, b); --} --int test4(int* a, double b) { -- return __builtin_islessequal(a, b); // expected-error {{floating point type}} --} -- --int test5(float a, long double b) { -- return __builtin_isless(a, b, b); // expected-error {{too many arguments}} --} --int test6(float a, long double b) { -- return __builtin_islessequal(a); // expected-error {{too few arguments}} --} -- -- --#define CFSTR __builtin___CFStringMakeConstantString --void test7() { -- const void *X; -- X = CFSTR("\242"); // expected-warning {{input conversion stopped}} -- X = CFSTR("\0"); // no-warning -- X = CFSTR(242); // expected-error {{CFString literal is not a string constant}} expected-warning {{incompatible integer to pointer conversion}} -- X = CFSTR("foo", "bar"); // expected-error {{too many arguments to function call}} --} -- -- --// atomics. -- --void test9(short v) { -- unsigned i, old; -- -- old = __sync_fetch_and_add(); // expected-error {{too few arguments to function call}} -- old = __sync_fetch_and_add(&old); // expected-error {{too few arguments to function call}} -- old = __sync_fetch_and_add((unsigned*)0, 42i); // expected-warning {{imaginary constants are a GNU extension}} -- -- // PR7600: Pointers are implicitly casted to integers and back. -- void *old_ptr = __sync_val_compare_and_swap((void**)0, 0, 0); -- -- // Ensure the return type is correct even when implicit casts are stripped -- // away. This triggers an assertion while checking the comparison otherwise. -- if (__sync_fetch_and_add(&old, 1) == 1) { -- } --} -- --// overloaded atomics should be declared only once. --void test9_1(volatile int* ptr, int val) { -- __sync_fetch_and_add_4(ptr, val); --} --void test9_2(volatile int* ptr, int val) { -- __sync_fetch_and_add(ptr, val); --} --void test9_3(volatile int* ptr, int val) { -- __sync_fetch_and_add_4(ptr, val); -- __sync_fetch_and_add(ptr, val); -- __sync_fetch_and_add(ptr, val); -- __sync_fetch_and_add_4(ptr, val); -- __sync_fetch_and_add_4(ptr, val); --} -- --// rdar://7236819 --void test10(void) __attribute__((noreturn)); -- --void test10(void) { -- __asm__("int3"); -- __builtin_unreachable(); -- -- // No warning about falling off the end of a noreturn function. --} -- --void test11(int X) { -- switch (X) { -- case __builtin_eh_return_data_regno(0): // constant foldable. -- break; -- } -- -- __builtin_eh_return_data_regno(X); // expected-error {{argument to '__builtin_eh_return_data_regno' must be a constant integer}} --} -- --// PR5062 --void test12(void) __attribute__((__noreturn__)); --void test12(void) { -- __builtin_trap(); // no warning because trap is noreturn. --} -- --void test_unknown_builtin(int a, int b) { -- __builtin_isles(a, b); // expected-error{{use of unknown builtin}} \ -- // expected-note{{did you mean '__builtin_isless'?}} --} -- --int test13() { -- __builtin_eh_return(0, 0); // no warning, eh_return never returns. --} -- --// --void test14() { -- int old; -- old = __sync_fetch_and_min((volatile int *)&old, 1); --} -- --// --void test15(const char *s) { -- __builtin_printf("string is %s\n", s); --} -- --// PR7885 --int test16() { -- return __builtin_constant_p() + // expected-error{{too few arguments}} -- __builtin_constant_p(1, 2); // expected-error {{too many arguments}} --} -- --const int test17_n = 0; --const char test17_c[] = {1, 2, 3, 0}; --const char test17_d[] = {1, 2, 3, 4}; --typedef int __attribute__((vector_size(16))) IntVector; --struct Aggregate { int n; char c; }; --enum Enum { EnumValue1, EnumValue2 }; -- --typedef __typeof(sizeof(int)) size_t; --size_t strlen(const char *); -- --void test17() { --#define ASSERT(...) { int arr[(__VA_ARGS__) ? 1 : -1]; } --#define T(...) ASSERT(__builtin_constant_p(__VA_ARGS__)) --#define F(...) ASSERT(!__builtin_constant_p(__VA_ARGS__)) -- -- // __builtin_constant_p returns 1 if the argument folds to: -- // - an arithmetic constant with value which is known at compile time -- T(test17_n); -- T(&test17_c[3] - test17_c); -- T(3i + 5); // expected-warning {{imaginary constant}} -- T(4.2 * 7.6); -- T(EnumValue1); -- T((enum Enum)(int)EnumValue2); -- -- // - the address of the first character of a string literal, losslessly cast -- // to any type -- T("string literal"); -- T((double*)"string literal"); -- T("string literal" + 0); -- T((long)"string literal"); -- -- // ... and otherwise returns 0. -- F("string literal" + 1); -- F(&test17_n); -- F(test17_c); -- F(&test17_c); -- F(&test17_d); -- F((struct Aggregate){0, 1}); -- F((IntVector){0, 1, 2, 3}); -- -- // Ensure that a technique used in glibc is handled correctly. --#define OPT(...) (__builtin_constant_p(__VA_ARGS__) && strlen(__VA_ARGS__) < 4) -- // FIXME: These are incorrectly treated as ICEs because strlen is treated as -- // a builtin. -- ASSERT(OPT("abc")); -- ASSERT(!OPT("abcd")); -- // In these cases, the strlen is non-constant, but the __builtin_constant_p -- // is 0: the array size is not an ICE but is foldable. -- ASSERT(!OPT(test17_c)); // expected-warning {{folded}} -- ASSERT(!OPT(&test17_c[0])); // expected-warning {{folded}} -- ASSERT(!OPT((char*)test17_c)); // expected-warning {{folded}} -- ASSERT(!OPT(test17_d)); // expected-warning {{folded}} -- ASSERT(!OPT(&test17_d[0])); // expected-warning {{folded}} -- ASSERT(!OPT((char*)test17_d)); // expected-warning {{folded}} -- --#undef OPT --#undef T --#undef F --} -- --void test18() { -- char src[1024]; -- char dst[2048]; -- size_t result; -- void *ptr; -- -- ptr = __builtin___memccpy_chk(dst, src, '\037', sizeof(src), sizeof(dst)); -- result = __builtin___strlcpy_chk(dst, src, sizeof(src), sizeof(dst)); -- result = __builtin___strlcat_chk(dst, src, sizeof(src), sizeof(dst)); -- -- ptr = __builtin___memccpy_chk(dst, src, '\037', sizeof(src)); // expected-error {{too few arguments to function call}} -- ptr = __builtin___strlcpy_chk(dst, src, sizeof(src), sizeof(dst)); // expected-warning {{incompatible integer to pointer conversion}} -- ptr = __builtin___strlcat_chk(dst, src, sizeof(src), sizeof(dst)); // expected-warning {{incompatible integer to pointer conversion}} --} -- --void no_ms_builtins() { -- __assume(1); // expected-warning {{implicit declaration}} -- __noop(1); // expected-warning {{implicit declaration}} -- __debugbreak(); // expected-warning {{implicit declaration}} --} -Index: llvm-toolchain-snapshot_3.5~svn200375/clang/test/Sema/warn-strlcpycat-size.c -=================================================================== ---- llvm-toolchain-snapshot_3.5~svn200375.orig/clang/test/Sema/warn-strlcpycat-size.c 2014-01-29 07:45:35.840720859 -0800 -+++ /dev/null 1970-01-01 00:00:00.000000000 +0000 +--- llvm-toolchain-snapshot_3.5~svn210317.orig/clang/test/Sema/warn-strlcpycat-size.c ++++ /dev/null @@ -1,55 +0,0 @@ -// RUN: %clang_cc1 -Wstrlcpy-strlcat-size -verify -fsyntax-only %s - @@ -342,3 +138,21 @@ Index: llvm-toolchain-snapshot_3.5~svn200375/clang/test/Sema/warn-strlcpycat-siz - - strlcpy(z, str, sizeof(str)); // expected-warning {{size argument in 'strlcpy' call appears to be size of the source; expected the size of the destination}} expected-note {{change size argument to be the size of the destination}} -} +Index: llvm-toolchain-snapshot_3.5~svn210317/clang/test/Sema/builtins.c +=================================================================== +--- llvm-toolchain-snapshot_3.5~svn210317.orig/clang/test/Sema/builtins.c ++++ llvm-toolchain-snapshot_3.5~svn210317/clang/test/Sema/builtins.c +@@ -185,11 +185,11 @@ void test18() { + + ptr = __builtin___memccpy_chk(dst, src, '\037', sizeof(src), sizeof(dst)); + result = __builtin___strlcpy_chk(dst, src, sizeof(src), sizeof(dst)); +- result = __builtin___strlcat_chk(dst, src, sizeof(src), sizeof(dst)); ++// result = __builtin___strlcat_chk(dst, src, sizeof(src), sizeof(dst)); + + ptr = __builtin___memccpy_chk(dst, src, '\037', sizeof(src)); // expected-error {{too few arguments to function call}} + ptr = __builtin___strlcpy_chk(dst, src, sizeof(src), sizeof(dst)); // expected-warning {{incompatible integer to pointer conversion}} +- ptr = __builtin___strlcat_chk(dst, src, sizeof(src), sizeof(dst)); // expected-warning {{incompatible integer to pointer conversion}} ++// ptr = __builtin___strlcat_chk(dst, src, sizeof(src), sizeof(dst)); // expected-warning {{incompatible integer to pointer conversion}} + } + + void no_ms_builtins() {