Re: r339428 - Add Windows support for the GNUstep Objective-C ABI V2.

2018-08-13 Thread Galina Kistanova via cfe-commits
Hello David,

This commit broke the following test on the expensive check builder:
CodeGenObjC/2007-04-03-ObjcEH.m

The last green build is for r339427 -
http://lab.llvm.org:8011/builders/llvm-clang-x86_64-expensive-checks-win/builds/11726
r339428 makes it red -
http://lab.llvm.org:8011/builders/llvm-clang-x86_64-expensive-checks-win/builds/11723

Could you take care of this, please?

Thanks

Galina

On Fri, Aug 10, 2018 at 5:53 AM, David Chisnall via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: theraven
> Date: Fri Aug 10 05:53:13 2018
> New Revision: 339428
>
> URL: http://llvm.org/viewvc/llvm-project?rev=339428&view=rev
> Log:
> Add Windows support for the GNUstep Objective-C ABI V2.
>
> Summary:
> Introduces funclet-based unwinding for Objective-C and fixes an issue
> where global blocks can't have their isa pointers initialised on
> Windows.
>
> After discussion with Dustin, this changes the name mangling of
> Objective-C types to prevent a C++ catch statement of type struct X*
> from catching an Objective-C object of type X*.
>
> Reviewers: rjmccall, DHowett-MSFT
>
> Reviewed By: rjmccall, DHowett-MSFT
>
> Subscribers: mgrang, mstorsjo, smeenai, cfe-commits
>
> Differential Revision: https://reviews.llvm.org/D50144
>
> Modified:
> cfe/trunk/include/clang/Driver/Options.td
> cfe/trunk/lib/AST/MicrosoftMangle.cpp
> cfe/trunk/lib/CodeGen/CGException.cpp
> cfe/trunk/lib/CodeGen/CGObjCGNU.cpp
> cfe/trunk/lib/CodeGen/CGObjCRuntime.cpp
> cfe/trunk/lib/CodeGen/CGObjCRuntime.h
> cfe/trunk/lib/CodeGen/CodeGenFunction.h
> cfe/trunk/lib/Driver/ToolChains/Clang.cpp
> cfe/trunk/test/CodeGenObjC/gnu-init.m
> cfe/trunk/test/CodeGenObjC/gnustep2-proto.m
> cfe/trunk/test/CodeGenObjCXX/arc-marker-funclet.mm
> cfe/trunk/test/CodeGenObjCXX/microsoft-abi-arc-param-order.mm
> cfe/trunk/test/CodeGenObjCXX/msabi-objc-extensions.mm
> cfe/trunk/test/CodeGenObjCXX/msabi-objc-types.mm
>
> Modified: cfe/trunk/include/clang/Driver/Options.td
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/include/
> clang/Driver/Options.td?rev=339428&r1=339427&r2=339428&view=diff
> 
> ==
> --- cfe/trunk/include/clang/Driver/Options.td (original)
> +++ cfe/trunk/include/clang/Driver/Options.td Fri Aug 10 05:53:13 2018
> @@ -1488,7 +1488,7 @@ def fobjc_weak : Flag<["-"], "fobjc-weak
>HelpText<"Enable ARC-style weak references in Objective-C">;
>
>  // Objective-C ABI options.
> -def fobjc_runtime_EQ : Joined<["-"], "fobjc-runtime=">, Group,
> Flags<[CC1Option]>,
> +def fobjc_runtime_EQ : Joined<["-"], "fobjc-runtime=">, Group,
> Flags<[CC1Option, CoreOption]>,
>HelpText<"Specify the target Objective-C runtime kind and version">;
>  def fobjc_abi_version_EQ : Joined<["-"], "fobjc-abi-version=">,
> Group;
>  def fobjc_nonfragile_abi_version_EQ : Joined<["-"],
> "fobjc-nonfragile-abi-version=">, Group;
>
> Modified: cfe/trunk/lib/AST/MicrosoftMangle.cpp
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/AST/
> MicrosoftMangle.cpp?rev=339428&r1=339427&r2=339428&view=diff
> 
> ==
> --- cfe/trunk/lib/AST/MicrosoftMangle.cpp (original)
> +++ cfe/trunk/lib/AST/MicrosoftMangle.cpp Fri Aug 10 05:53:13 2018
> @@ -445,7 +445,7 @@ void MicrosoftCXXNameMangler::mangle(con
>  mangleFunctionEncoding(FD, Context.shouldMangleDeclName(FD));
>else if (const VarDecl *VD = dyn_cast(D))
>  mangleVariableEncoding(VD);
> -  else
> +  else if (!isa(D))
>  llvm_unreachable("Tried to mangle unexpected NamedDecl!");
>  }
>
> @@ -1884,13 +1884,13 @@ void MicrosoftCXXNameMangler::mangleType
>  llvm_unreachable("placeholder types shouldn't get to name mangling");
>
>case BuiltinType::ObjCId:
> -mangleArtificalTagType(TTK_Struct, "objc_object");
> +mangleArtificalTagType(TTK_Struct, ".objc_object");
>  break;
>case BuiltinType::ObjCClass:
> -mangleArtificalTagType(TTK_Struct, "objc_class");
> +mangleArtificalTagType(TTK_Struct, ".objc_class");
>  break;
>case BuiltinType::ObjCSel:
> -mangleArtificalTagType(TTK_Struct, "objc_selector");
> +mangleArtificalTagType(TTK_Struct, ".objc_selector");
>  break;
>
>  #define IMAGE_TYPE(ImgType, Id, SingletonId, Access, Suffix) \
> @@ -2570,9 +2570,10 @@ void MicrosoftCXXNameMangler::mangleType
>
>  void MicrosoftCXXNameMangler::mangleType(const ObjCInterfaceType *T,
> Qualifiers,
>   SourceRange) {
> -  // ObjC interfaces have structs underlying them.
> +  // ObjC interfaces are mangled as if they were structs with a name that
> is
> +  // not a valid C/C++ identifier
>mangleTagTypeKind(TTK_Struct);
> -  mangleName(T->getDecl());
> +  mangle(T->getDecl(), ".objc_cls_");
>  }
>
>  void MicrosoftCXXNameMangler::mangleType(const ObjCObjectType *T,
> Qualifiers,
> @@ -2590,11 +2591,11 @@ void Micros

Re: r339629 - [analyzer] [NFC] Introduce separate targets for testing the analyzer: check-clang-analyzer and check-clang-analyzer-z3

2018-08-14 Thread Galina Kistanova via cfe-commits
Hello George,

This commit broke few of our builders:

http://lab.llvm.org:8011/builders/llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast/builds/34845
http://lab.llvm.org:8011/builders/llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast/builds/19056

http://lab.llvm.org:8011/builders/clang-lld-x86_64-2stage
http://lab.llvm.org:8011/builders/clang-with-lto-ubuntu
etc...

...
Failing Tests (11):
Clang :: Analysis/auto-obj-dtors-cfg-output.cpp
Clang :: Analysis/blocks.mm
Clang :: Analysis/cfg-rich-constructors.cpp
Clang :: Analysis/cfg-rich-constructors.mm
Clang :: Analysis/conditional-path-notes.c
Clang :: Analysis/diagnostics/plist-multi-file.c
Clang :: Analysis/html-diags.c
Clang :: Analysis/plist-html-macros.c
Clang :: Analysis/plist-html-macros.c
Clang :: Analysis/retain-release-path-notes-gc.m
Clang :: Analysis/temp-obj-dtors-cfg-output.cpp

Please have a look ASAP?

Thanks

Galina


On Mon, Aug 13, 2018 at 4:12 PM, George Karpenkov via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: george.karpenkov
> Date: Mon Aug 13 16:12:43 2018
> New Revision: 339629
>
> URL: http://llvm.org/viewvc/llvm-project?rev=339629&view=rev
> Log:
> [analyzer] [NFC] Introduce separate targets for testing the analyzer:
> check-clang-analyzer and check-clang-analyzer-z3
>
> Current testing setup for analyzer tests with Z3 is rather inconvenient:
>
> There's no way to run the analyzer tests separately (I use
> LIT_FILTER=Analysis ninja check-clang, but a direct target is nicer).
>
> When Clang is built with Z3 support, there's no way to *not* run tests
> with Z3 solver, and this is often desired, as tests with Z3 solver take
> a very long time.
>
> This patch introduces two extra targets:
>
>  - check-clang-analyzer
>  - check-clang-analyzer-z3
>
> which solve those problems.
>
> Differential Revision: https://reviews.llvm.org/D50594
>
> Modified:
> cfe/trunk/test/Analysis/analyzer_test.py
> cfe/trunk/test/Analysis/lit.local.cfg
> cfe/trunk/test/CMakeLists.txt
> cfe/trunk/test/lit.site.cfg.py.in
>
> Modified: cfe/trunk/test/Analysis/analyzer_test.py
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/
> Analysis/analyzer_test.py?rev=339629&r1=339628&r2=339629&view=diff
> 
> ==
> --- cfe/trunk/test/Analysis/analyzer_test.py (original)
> +++ cfe/trunk/test/Analysis/analyzer_test.py Mon Aug 13 16:12:43 2018
> @@ -4,6 +4,10 @@ import lit.TestRunner
>  # Custom format class for static analyzer tests
>  class AnalyzerTest(lit.formats.ShTest):
>
> +def __init__(self, execute_external, use_z3_solver=False):
> +super(AnalyzerTest, self).__init__(execute_external)
> +self.use_z3_solver = use_z3_solver
> +
>  def execute(self, test, litConfig):
>  results = []
>
> @@ -19,7 +23,8 @@ class AnalyzerTest(lit.formats.ShTest):
>  return results[-1]
>
>  # If z3 backend available, add an additional run line for it
> -if test.config.clang_staticanalyzer_z3 == '1':
> +if self.use_z3_solver == '1':
> +assert(test.config.clang_staticanalyzer_z3 == '1')
>  results.append(self.executeWithAnalyzeSubstitution(
>  saved_test, litConfig, '-analyzer-constraints=z3
> -DANALYZER_CM_Z3'))
>
>
> Modified: cfe/trunk/test/Analysis/lit.local.cfg
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/
> Analysis/lit.local.cfg?rev=339629&r1=339628&r2=339629&view=diff
> 
> ==
> --- cfe/trunk/test/Analysis/lit.local.cfg (original)
> +++ cfe/trunk/test/Analysis/lit.local.cfg Mon Aug 13 16:12:43 2018
> @@ -7,7 +7,7 @@ import site
>  site.addsitedir(os.path.dirname(__file__))
>  import analyzer_test
>  config.test_format = analyzer_test.AnalyzerTest(
> -config.test_format.execute_external)
> +config.test_format.execute_external, config.use_z3_solver)
>
>  if not config.root.clang_staticanalyzer:
>  config.unsupported = True
>
> Modified: cfe/trunk/test/CMakeLists.txt
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/
> CMakeLists.txt?rev=339629&r1=339628&r2=339629&view=diff
> 
> ==
> --- cfe/trunk/test/CMakeLists.txt (original)
> +++ cfe/trunk/test/CMakeLists.txt Mon Aug 13 16:12:43 2018
> @@ -88,8 +88,15 @@ endif ()
>
>  set(CLANG_TEST_PARAMS
>clang_site_config=${CMAKE_CURRENT_BINARY_DIR}/lit.site.cfg
> +  USE_Z3_SOLVER=0
>)
>
> +set(ANALYZER_TEST_PARAMS
> +  USE_Z3_SOLVER=0)
> +
> +set(ANALYZER_TEST_PARAMS_Z3
> +  USE_Z3_SOLVER=1)
> +
>  if( NOT CLANG_BUILT_STANDALONE )
>list(APPEND CLANG_TEST_DEPS
>  llvm-config
> @@ -126,6 +133,24 @@ add_lit_testsuite(check-clang "Running t
>)
>  set_target_properties(check-clang PROPERTIES FOLDER "Clang tests")
>
> +if (CLANG_ENABLE_STATIC_ANALYZER)
> +  add_lit_testsuite(check-cl

Re: [clang-tools-extra] r339665 - [clangd] Show non-instantiated decls in signatureHelp

2018-08-15 Thread Galina Kistanova via cfe-commits
Hello Ilya,

This commit has broken the ABI test builder - lab.llvm.org:8011/builders/
clang-x86_64-linux-abi-test/builds/30676

Could you take care of this, please?

Thanks

Galina

. . .

FAILED: 
tools/clang/tools/extra/unittests/clangd/CMakeFiles/ClangdTests.dir/CodeCompleteTests.cpp.o
/usr/bin/c++   -DGTEST_HAS_RTTI=0 -DGTEST_HAS_TR1_TUPLE=0
-DGTEST_LANG_CXX11=1 -D_DEBUG -D_GNU_SOURCE -D__STDC_CONSTANT_MACROS
-D__STDC_FORMAT_MACROS -D__STDC_LIMIT_MACROS
-Itools/clang/tools/extra/unittests/clangd
-I/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/tools/extra/unittests/clangd
-I/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/include
-Itools/clang/include -Iinclude
-I/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/include
-I/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/tools/extra/clangd
-I/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/utils/unittest/googletest/include
-I/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/utils/unittest/googlemock/include
-fPIC -fvisibility-inlines-hidden -std=c++11 -Wall -Wextra
-Wno-unused-parameter -Wwrite-strings -Wcast-qual
-Wno-missing-field-initializers -pedantic -Wno-long-long
-Wno-maybe-uninitialized -Wdelete-non-virtual-dtor -Wno-comment
-ffunction-sections -fdata-sections -fno-common -Woverloaded-virtual
-fno-strict-aliasing -O3-UNDEBUG  -Wno-variadic-macros
-fno-exceptions -fno-rtti -MD -MT
tools/clang/tools/extra/unittests/clangd/CMakeFiles/ClangdTests.dir/CodeCompleteTests.cpp.o
-MF 
tools/clang/tools/extra/unittests/clangd/CMakeFiles/ClangdTests.dir/CodeCompleteTests.cpp.o.d
-o 
tools/clang/tools/extra/unittests/clangd/CMakeFiles/ClangdTests.dir/CodeCompleteTests.cpp.o
-c 
/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/tools/extra/unittests/clangd/CodeCompleteTests.cpp
/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/tools/extra/unittests/clangd/CodeCompleteTests.cpp:1541:26:
error: unterminated raw string
   EXPECT_THAT(signatures(R"cpp(
  ^
/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/tools/extra/unittests/clangd/CodeCompleteTests.cpp:1548:7:
warning: missing terminating " character [enabled by default]
   )cpp")
   ^
/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/tools/extra/unittests/clangd/CodeCompleteTests.cpp:1541:3:
error: stray ‘R’ in program
   EXPECT_THAT(signatures(R"cpp(
   ^
/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/tools/extra/unittests/clangd/CodeCompleteTests.cpp:1541:3:
error: missing terminating " character
/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/tools/extra/unittests/clangd/CodeCompleteTests.cpp:1552:26:
error: unterminated raw string
   EXPECT_THAT(signatures(R"cpp(
  ^
/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/tools/extra/unittests/clangd/CodeCompleteTests.cpp:1558:10:
warning: missing terminating " character [enabled by default]
 })cpp")
  ^
etc...



On Tue, Aug 14, 2018 at 2:36 AM, Ilya Biryukov via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: ibiryukov
> Date: Tue Aug 14 02:36:32 2018
> New Revision: 339665
>
> URL: http://llvm.org/viewvc/llvm-project?rev=339665&view=rev
> Log:
> [clangd] Show non-instantiated decls in signatureHelp
>
> Summary:
> To avoid producing very verbose output in substitutions involving
> typedefs, e.g.
>   T -> std::vector::iterator
> gets turned into an unreadable mess when printed out for libstdc++,
> result contains internal types (std::__Vector_iterator<...>) and
> expanded well-defined typedefs (std::basic_string).
>
> Until we improve the presentation code in clang, going with
> non-instantiated decls looks like a better UX trade-off.
>
> Reviewers: hokein, ioeric, kadircet
>
> Reviewed By: hokein
>
> Subscribers: MaskRay, jkorous, arphaman, cfe-commits
>
> Differential Revision: https://reviews.llvm.org/D50645
>
> Modified:
> clang-tools-extra/trunk/clangd/CodeComplete.cpp
> clang-tools-extra/trunk/unittests/clangd/CodeCompleteTests.cpp
>
> Modified: clang-tools-extra/trunk/clangd/CodeComplete.cpp
> URL: http://llvm.org/viewvc/llvm-project/clang-tools-extra/
> trunk/clangd/CodeComplete.cpp?rev=339665&r1=339664&r2=339665&view=diff
> 
> ==
> --- clang-tools-extra/trunk/clangd/CodeComplete.cpp (original)
> +++ clang-tools-extra/trunk/clangd/CodeComplete.cpp Tue Aug 14 02:36:32
> 2018
> @@ -714,7 +714,15 @@ public:
> "too many arguments");
>  SigHelp.activeParameter = static_cast(CurrentArg);
>  for (unsigned I = 0; I < NumCandidates; ++I) {
> -  const auto &Candidate = Candidates[I];
> +  OverloadCandidate Candidate = Candidates[I];
> +  // We want to avoid showing instantia

LLVM buildmaster will be restarted tonight

2018-08-16 Thread Galina Kistanova via cfe-commits
 Hello everyone,

LLVM buildmaster will be updated and restarted after 6PM Pacific time today.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Buildbot numbers for the week of 7/29/2018 - 8/04/2018

2018-08-16 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the week of 7/29/2018 - 8/04/2018.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:
  buildername  |  was_red
---+--
 clang-x64-ninja-win7  | 130:45:42
 openmp-gcc-x86_64-linux-debian| 62:46:33
 libcxx-libcxxabi-libunwind-x86_64-linux-debian| 49:53:23
 clang-cmake-aarch64-lld   | 41:54:27
 clang-ppc64le-linux-lnt   | 37:37:32
 clang-cmake-x86_64-avx2-linux | 37:34:26
 clang-cmake-x86_64-avx2-linux-perf| 37:33:08
 clang-ppc64be-linux-lnt   | 37:08:39
 clang-cmake-x86_64-sde-avx512-linux   | 36:58:53
 llvm-clang-x86_64-expensive-checks-win| 32:24:18
 lldb-amd64-ninja-netbsd8  | 26:56:20
 sanitizer-x86_64-linux-bootstrap-ubsan| 25:59:23
 libcxx-libcxxabi-x86_64-linux-debian  | 25:54:40
 sanitizer-x86_64-linux-fast   | 25:44:51
 aosp-O3-polly-before-vectorizer-unprofitable  | 24:20:09
 clang-x86-windows-msvc2015| 20:53:57
 clang-cmake-thumbv8-full-sh   | 19:20:05
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast  | 18:48:01
 clang-with-thin-lto-windows   | 17:46:01
 lldb-x86_64-ubuntu-14.04-cmake| 16:06:23
 clang-cmake-thumbv7-full-sh   | 15:28:01
 lldb-windows7-android | 15:18:52
 clang-cmake-armv7-selfhost| 15:05:11
 clang-cmake-armv7-selfhost-neon   | 14:47:38
 lldb-x86_64-darwin-13.4   | 14:27:05
 libcxx-libcxxabi-x86_64-linux-debian-noexceptions | 13:34:13
 clang-lld-x86_64-2stage   | 13:28:10
 clang-cmake-armv8-selfhost-neon   | 13:05:48
 sanitizer-x86_64-linux-bootstrap  | 10:22:07
 clang-hexagon-elf | 09:33:24
 sanitizer-ppc64le-linux   | 09:08:34
 clang-x86_64-linux-selfhost-modules   | 08:57:56
 clang-with-lto-ubuntu | 08:47:46
 clang-x86_64-debian-fast  | 08:41:31
 sanitizer-x86_64-linux-bootstrap-msan | 08:31:36
 polly-arm-linux   | 08:31:25
 clang-ppc64le-linux-multistage| 08:07:22
 clang-with-thin-lto-ubuntu| 07:46:33
 clang-cmake-aarch64-full  | 07:45:12
 sanitizer-x86_64-linux| 07:30:13
 libcxx-libcxxabi-x86_64-linux-ubuntu-asan | 07:17:23
 lld-perf-testsuite| 07:09:20
 sanitizer-ppc64be-linux   | 06:52:45
 clang-s390x-linux-multistage  | 06:43:15
 clang-cmake-armv7-global-isel | 06:42:11
 clang-cuda-build  | 06:40:51
 clang-ppc64be-linux-multistage| 06:36:33
 clang-cmake-armv8-global-isel | 06:35:43
 clang-cmake-armv8-quick   | 06:27:00
 reverse-iteration | 06:26:48
 clang-cmake-armv7-quick   | 06:26:38
 clang-cmake-armv8-full| 06:16:06
 clang-cmake-armv7-full| 06:15:23
 sanitizer-x86_64-linux-fuzzer | 06:07:19
 clang-x86_64-linux-abi-test   | 04:19:31
 clang-ppc64be-linux   | 03:44:49
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast| 03:42:53
 clang-s390x-linux | 03:41:54
 polly-amd64-linux | 03:33:37
 libcxx-libcxxabi-x86_64-linux-ubuntu-gcc49-cxx11  | 03:19:24
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx03| 03:18:34
 clang-ppc64le-linux   | 03:12:27
 libcxx-libcxxabi-libunwind-aarch64-linux-noexceptions | 03:05:05
 clang-cmake-aarch64-quick | 03:01:55
 clang-s390x-li

Buildbot numbers for the week of 8/05/2018 - 8/11/2018

2018-08-16 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the last week of 8/05/2018 - 8/11/2018.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:
   buildername| was_red
--+-
 clang-x86_64-linux-selfhost-modules  | 30:22:42
 clang-x64-ninja-win7 | 28:55:54
 aosp-O3-polly-before-vectorizer-unprofitable | 27:20:19
 clang-lld-x86_64-2stage  | 26:49:33
 lld-x86_64-darwin13  | 24:20:25
 clang-cmake-aarch64-full | 19:33:39
 clang-x86-windows-msvc2015   | 15:36:50
 clang-with-lto-ubuntu| 14:57:09
 clang-with-thin-lto-ubuntu   | 14:53:10
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast | 13:54:29
 sanitizer-windows| 13:44:27
 llvm-sphinx-docs | 11:46:11
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx2a   | 10:47:21
 clang-cmake-thumbv7-full-sh  | 08:10:02
 lldb-amd64-ninja-netbsd8 | 08:06:13
 clang-cmake-aarch64-lld  | 07:52:40
 clang-cmake-armv7-full   | 06:48:56
 clang-cmake-aarch64-global-isel  | 05:57:24
 clang-cmake-armv7-selfhost   | 05:51:06
 clang-cmake-armv7-selfhost-neon  | 05:49:55
 clang-ppc64le-linux-multistage   | 05:44:48
 clang-cmake-armv7-quick  | 05:05:11
 sanitizer-ppc64le-linux  | 05:02:51
 llvm-hexagon-elf | 04:58:46
 sanitizer-x86_64-linux-fast  | 04:43:30
 sanitizer-x86_64-linux-bootstrap | 04:39:34
 reverse-iteration| 04:19:50
 clang-hexagon-elf| 03:52:58
 libcxx-libcxxabi-x86_64-linux-ubuntu-msan| 03:47:03
 sanitizer-x86_64-linux   | 03:34:47
 libcxx-libcxxabi-x86_64-linux-ubuntu-tsan| 03:33:24
 clang-cmake-x86_64-avx2-linux| 03:14:19
 clang-sphinx-docs| 03:07:27
 clang-s390x-linux-lnt| 02:56:18
 clang-cmake-armv8-quick  | 02:56:16
 clang-cmake-armv8-full   | 02:56:06
 clang-cmake-armv8-global-isel| 02:52:47
 clang-s390x-linux| 02:43:52
 llvm-clang-x86_64-expensive-checks-win   | 02:43:29
 clang-cmake-thumbv8-full-sh  | 02:38:41
 clang-cmake-armv8-selfhost-neon  | 02:38:13
 sanitizer-ppc64be-linux  | 02:35:59
 clang-ppc64le-linux  | 02:35:49
 sanitizer-x86_64-linux-bootstrap-msan| 02:32:44
 clang-cuda-build | 02:32:43
 clang-ppc64be-linux-lnt  | 02:28:34
 clang-ppc64be-linux  | 02:27:29
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast   | 02:23:52
 clang-cmake-x86_64-sde-avx512-linux  | 02:23:50
 clang-cmake-armv7-global-isel| 02:18:09
 sanitizer-x86_64-linux-bootstrap-ubsan   | 02:16:26
 clang-s390x-linux-multistage | 02:12:58
 sanitizer-x86_64-linux-android   | 02:08:51
 clang-ppc64le-linux-lnt  | 02:06:58
 clang-ppc64be-linux-multistage   | 02:06:24
 clang-with-thin-lto-windows  | 02:00:44
 clang-cmake-x86_64-avx2-linux-perf   | 01:39:52
 libcxx-libcxxabi-libunwind-armv8-linux   | 01:36:00
 clang-cmake-aarch64-quick| 01:23:20
 clang-x86_64-debian-fast | 01:17:55
 lldb-x86_64-ubuntu-14.04-buildserver | 01:15:42
 sanitizer-x86_64-linux-autoconf  | 01:13:34
 lld-perf-testsuite   | 01:03:27
 lldb-windows7-android| 01:03:17
 lldb-x86_64-darwin-13.4  | 00:54:33
 polly-arm-linux  | 00:49:27
 lldb-x86-windows-msvc2015| 00:37:23
 lldb-x86_64-ubuntu-14.04-cmake   | 00:37:07
 clang-cmake-armv8-lnt| 00:35:40
 lld-x86_64-freebsd   

Re: [clang-tools-extra] r332363 - [clangd] Populate #include insertions as additional edits in completion items.

2018-05-16 Thread Galina Kistanova via cfe-commits
Hello Eric,

This commit broke one of our builders:
http://lab.llvm.org:8011/builders/clang-x86_64-linux-abi-test/builds/26399

. . .
387.403 [725/64/4163] Building CXX object
tools/clang/tools/extra/clangd/CMakeFiles/clangDaemon.dir/CodeComplete.cpp.o
FAILED:
tools/clang/tools/extra/clangd/CMakeFiles/clangDaemon.dir/CodeComplete.cpp.o

/usr/bin/c++   -DGTEST_HAS_RTTI=0 -D_DEBUG -D_GNU_SOURCE
-D__STDC_CONSTANT_MACROS -D__STDC_FORMAT_MACROS -D__STDC_LIMIT_MACROS
-Itools/clang/tools/extra/clangd
-I/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/tools/extra/clangd
-I/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/include
-Itools/clang/include -Iinclude
-I/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/include
-fPIC -fvisibility-inlines-hidden -std=c++11 -Wall -W -Wno-unused-parameter
-Wwrite-strings -Wcast-qual -Wno-missing-field-initializers -pedantic
-Wno-long-long -Wno-maybe-uninitialized -Wdelete-non-virtual-dtor
-Wno-comment -ffunction-sections -fdata-sections -fno-common
-Woverloaded-virtual -fno-strict-aliasing -O3-UNDEBUG  -fno-exceptions
-fno-rtti -MD -MT
tools/clang/tools/extra/clangd/CMakeFiles/clangDaemon.dir/CodeComplete.cpp.o
-MF
tools/clang/tools/extra/clangd/CMakeFiles/clangDaemon.dir/CodeComplete.cpp.o.d
-o
tools/clang/tools/extra/clangd/CMakeFiles/clangDaemon.dir/CodeComplete.cpp.o
-c
/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/tools/extra/clangd/CodeComplete.cpp
/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/tools/extra/clangd/CodeComplete.cpp:
In function ‘clang::clangd::SignatureHelp
clang::clangd::signatureHelp(clang::clangd::PathRef, const
clang::tooling::CompileCommand&, const clang::PrecompiledPreamble*,
llvm::StringRef, clang::clangd::Position,
llvm::IntrusiveRefCntPtr,
std::shared_ptr)’:
/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/tools/extra/clangd/CodeComplete.cpp:1127:37:
error: invalid initialization of reference of type ‘const
clang::clangd::{anonymous}::SemaCompleteInput&’ from expression of type
‘’
 std::move(PCHs)});
 ^
/home/buildslave/buildslave1a/clang-x86_64-linux-abi-test/llvm/tools/clang/tools/extra/clangd/CodeComplete.cpp:710:6:
error: in passing argument 3 of ‘bool
clang::clangd::{anonymous}::semaCodeComplete(std::unique_ptr,
const clang::CodeCompleteOptions&, const
clang::clangd::{anonymous}::SemaCompleteInput&,
std::unique_ptr*)’
 bool semaCodeComplete(std::unique_ptr Consumer,
  ^
. . .

Please have a look?

It is not good idea to keep the bot red for too long. This hides new
problem which later hard to track down.

Thanks

Galina



On Tue, May 15, 2018 at 8:29 AM, Eric Liu via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: ioeric
> Date: Tue May 15 08:29:32 2018
> New Revision: 332363
>
> URL: http://llvm.org/viewvc/llvm-project?rev=332363&view=rev
> Log:
> [clangd] Populate #include insertions as additional edits in completion
> items.
>
> Summary:
> o Remove IncludeInsertion LSP command.
> o Populate include insertion edits synchromously in completion items.
> o Share the code completion compiler instance and precompiled preamble to
> get existing inclusions in main file.
> o Include insertion logic lives only in CodeComplete now.
> o Use tooling::HeaderIncludes for inserting new includes.
> o Refactored tests.
>
> Reviewers: sammccall
>
> Reviewed By: sammccall
>
> Subscribers: klimek, ilya-biryukov, MaskRay, jkorous, cfe-commits
>
> Differential Revision: https://reviews.llvm.org/D46497
>
> Modified:
> clang-tools-extra/trunk/clangd/ClangdServer.cpp
> clang-tools-extra/trunk/clangd/CodeComplete.cpp
> clang-tools-extra/trunk/clangd/CodeComplete.h
> clang-tools-extra/trunk/clangd/Headers.cpp
> clang-tools-extra/trunk/clangd/Headers.h
> clang-tools-extra/trunk/clangd/Protocol.h
> clang-tools-extra/trunk/unittests/clangd/CodeCompleteTests.cpp
> clang-tools-extra/trunk/unittests/clangd/HeadersTests.cpp
>
> Modified: clang-tools-extra/trunk/clangd/ClangdServer.cpp
> URL: http://llvm.org/viewvc/llvm-project/clang-tools-extra/
> trunk/clangd/ClangdServer.cpp?rev=332363&r1=332362&r2=332363&view=diff
> 
> ==
> --- clang-tools-extra/trunk/clangd/ClangdServer.cpp (original)
> +++ clang-tools-extra/trunk/clangd/ClangdServer.cpp Tue May 15 08:29:32
> 2018
> @@ -161,6 +161,7 @@ void ClangdServer::codeComplete(PathRef
>  // both the old and the new version in case only one of them matches.
>  CompletionList Result = clangd::codeComplete(
>  File, IP->Command, PreambleData ? &PreambleData->Preamble :
> nullptr,
> +PreambleData ? PreambleData->Inclusions :
> std::vector(),
>  IP->Contents, Pos, FS, PCHs, CodeCompleteOpts);
>  CB(std::move(Result));
>};
>
> Modified: clang-tools-extra/trunk/clangd/Co

Re: r332458 - [AST] Added a helper to extract a user-friendly text of a comment.

2018-05-16 Thread Galina Kistanova via cfe-commits
Hello Ilya,

This commit broke build step for couple of our builders:

http://lab.llvm.org:8011/builders/clang-with-lto-ubuntu/builds/8541
http://lab.llvm.org:8011/builders/clang-with-thin-lto-ubuntu

. . .
FAILED:
tools/clang/unittests/AST/CMakeFiles/ASTTests.dir/CommentTextTest.cpp.o
/usr/bin/c++   -DGTEST_HAS_RTTI=0 -DGTEST_HAS_TR1_TUPLE=0
-DGTEST_LANG_CXX11=1 -D_GNU_SOURCE -D__STDC_CONSTANT_MACROS
-D__STDC_FORMAT_MACROS -D__STDC_LIMIT_MACROS -Itools/clang/unittests/AST
-I/home/buildslave/buildslave1a/clang-with-lto-ubuntu/llvm.src/tools/clang/unittests/AST
-I/home/buildslave/buildslave1a/clang-with-lto-ubuntu/llvm.src/tools/clang/include
-Itools/clang/include -Iinclude
-I/home/buildslave/buildslave1a/clang-with-lto-ubuntu/llvm.src/include
-I/home/buildslave/buildslave1a/clang-with-lto-ubuntu/llvm.src/utils/unittest/googletest/include
-I/home/buildslave/buildslave1a/clang-with-lto-ubuntu/llvm.src/utils/unittest/googlemock/include
-fPIC -fvisibility-inlines-hidden -std=c++11 -Wall -W -Wno-unused-parameter
-Wwrite-strings -Wcast-qual -Wno-missing-field-initializers -pedantic
-Wno-long-long -Wno-maybe-uninitialized -Wdelete-non-virtual-dtor
-Wno-comment -ffunction-sections -fdata-sections -fno-common
-Woverloaded-virtual -fno-strict-aliasing -O3 -DNDEBUG
-Wno-variadic-macros -fno-exceptions -fno-rtti -MD -MT
tools/clang/unittests/AST/CMakeFiles/ASTTests.dir/CommentTextTest.cpp.o -MF
tools/clang/unittests/AST/CMakeFiles/ASTTests.dir/CommentTextTest.cpp.o.d
-o tools/clang/unittests/AST/CMakeFiles/ASTTests.dir/CommentTextTest.cpp.o
-c
/home/buildslave/buildslave1a/clang-with-lto-ubuntu/llvm.src/tools/clang/unittests/AST/CommentTextTest.cpp
/home/buildslave/buildslave1a/clang-with-lto-ubuntu/llvm.src/tools/clang/unittests/AST/CommentTextTest.cpp:62:1:
error: unterminated raw string
 R"cpp(
 ^
. . .

Please have a look?

The builder was already red and did not send notifications.

Thanks

Galina



On Wed, May 16, 2018 at 5:30 AM, Ilya Biryukov via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: ibiryukov
> Date: Wed May 16 05:30:09 2018
> New Revision: 332458
>
> URL: http://llvm.org/viewvc/llvm-project?rev=332458&view=rev
> Log:
> [AST] Added a helper to extract a user-friendly text of a comment.
>
> Summary:
> The helper is used in clangd for documentation shown in code completion
> and storing the docs in the symbols. See D45999.
>
> This patch reuses the code of the Doxygen comment lexer, disabling the
> bits that do command and html tag parsing.
> The new helper works on all comments, including non-doxygen comments.
> However, it does not understand or transform any doxygen directives,
> i.e. cannot extract brief text, etc.
>
> Reviewers: sammccall, hokein, ioeric
>
> Reviewed By: ioeric
>
> Subscribers: mgorny, cfe-commits
>
> Differential Revision: https://reviews.llvm.org/D46000
>
> Added:
> cfe/trunk/unittests/AST/CommentTextTest.cpp
> Modified:
> cfe/trunk/include/clang/AST/CommentLexer.h
> cfe/trunk/include/clang/AST/RawCommentList.h
> cfe/trunk/lib/AST/CommentLexer.cpp
> cfe/trunk/lib/AST/RawCommentList.cpp
> cfe/trunk/unittests/AST/CMakeLists.txt
>
> Modified: cfe/trunk/include/clang/AST/CommentLexer.h
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/include/
> clang/AST/CommentLexer.h?rev=332458&r1=332457&r2=332458&view=diff
> 
> ==
> --- cfe/trunk/include/clang/AST/CommentLexer.h (original)
> +++ cfe/trunk/include/clang/AST/CommentLexer.h Wed May 16 05:30:09 2018
> @@ -281,6 +281,11 @@ private:
>/// command, including command marker.
>SmallString<16> VerbatimBlockEndCommandName;
>
> +  /// If true, the commands, html tags, etc will be parsed and reported as
> +  /// separate tokens inside the comment body. If false, the comment text
> will
> +  /// be parsed into text and newline tokens.
> +  bool ParseCommands;
> +
>/// Given a character reference name (e.g., "lt"), return the character
> that
>/// it stands for (e.g., "<").
>StringRef resolveHTMLNamedCharacterReference(StringRef Name) const;
> @@ -315,12 +320,11 @@ private:
>/// Eat string matching regexp \code \s*\* \endcode.
>void skipLineStartingDecorations();
>
> -  /// Lex stuff inside comments.  CommentEnd should be set correctly.
> +  /// Lex comment text, including commands if ParseCommands is set to
> true.
>void lexCommentText(Token &T);
>
> -  void setupAndLexVerbatimBlock(Token &T,
> -const char *TextBegin,
> -char Marker, const CommandInfo *Info);
> +  void setupAndLexVerbatimBlock(Token &T, const char *TextBegin, char
> Marker,
> +const CommandInfo *Info);
>
>void lexVerbatimBlockFirstLine(Token &T);
>
> @@ -343,14 +347,13 @@ private:
>
>  public:
>Lexer(llvm::BumpPtrAllocator &Allocator, DiagnosticsEngine &Diags,
> -const CommandTraits &Traits,
> -SourceLocation Fil

Re: r332458 - [AST] Added a helper to extract a user-friendly text of a comment.

2018-05-16 Thread Galina Kistanova via cfe-commits
Also few other builders are affected:

http://lab.llvm.org:8011/builders/clang-x86_64-linux-abi-test
http://lab.llvm.org:8011/builders/clang-lld-x86_64-2stage
http://lab.llvm.org:8011/builders/clang-with-lto-ubuntu


Thanks

Galina

On Wed, May 16, 2018 at 12:58 PM, Galina Kistanova 
wrote:

> Hello Ilya,
>
> This commit broke build step for couple of our builders:
>
> http://lab.llvm.org:8011/builders/clang-with-lto-ubuntu/builds/8541
> http://lab.llvm.org:8011/builders/clang-with-thin-lto-ubuntu
>
> . . .
> FAILED: 
> tools/clang/unittests/AST/CMakeFiles/ASTTests.dir/CommentTextTest.cpp.o
>
> /usr/bin/c++   -DGTEST_HAS_RTTI=0 -DGTEST_HAS_TR1_TUPLE=0
> -DGTEST_LANG_CXX11=1 -D_GNU_SOURCE -D__STDC_CONSTANT_MACROS
> -D__STDC_FORMAT_MACROS -D__STDC_LIMIT_MACROS -Itools/clang/unittests/AST
> -I/home/buildslave/buildslave1a/clang-with-lto-
> ubuntu/llvm.src/tools/clang/unittests/AST -I/home/buildslave/
> buildslave1a/clang-with-lto-ubuntu/llvm.src/tools/clang/include
> -Itools/clang/include -Iinclude -I/home/buildslave/
> buildslave1a/clang-with-lto-ubuntu/llvm.src/include -I/home/buildslave/
> buildslave1a/clang-with-lto-ubuntu/llvm.src/utils/unittest/googletest/include
> -I/home/buildslave/buildslave1a/clang-with-lto-ubuntu/llvm.src/utils/unittest/googlemock/include
> -fPIC -fvisibility-inlines-hidden -std=c++11 -Wall -W -Wno-unused-parameter
> -Wwrite-strings -Wcast-qual -Wno-missing-field-initializers -pedantic
> -Wno-long-long -Wno-maybe-uninitialized -Wdelete-non-virtual-dtor
> -Wno-comment -ffunction-sections -fdata-sections -fno-common
> -Woverloaded-virtual -fno-strict-aliasing -O3 -DNDEBUG
> -Wno-variadic-macros -fno-exceptions -fno-rtti -MD -MT
> tools/clang/unittests/AST/CMakeFiles/ASTTests.dir/CommentTextTest.cpp.o
> -MF tools/clang/unittests/AST/CMakeFiles/ASTTests.dir/CommentTextTest.cpp.o.d
> -o tools/clang/unittests/AST/CMakeFiles/ASTTests.dir/CommentTextTest.cpp.o
> -c /home/buildslave/buildslave1a/clang-with-lto-ubuntu/llvm.
> src/tools/clang/unittests/AST/CommentTextTest.cpp
> /home/buildslave/buildslave1a/clang-with-lto-ubuntu/llvm.
> src/tools/clang/unittests/AST/CommentTextTest.cpp:62:1: error:
> unterminated raw string
>  R"cpp(
>  ^
> . . .
>
> Please have a look?
>
> The builder was already red and did not send notifications.
>
> Thanks
>
> Galina
>
>
>
> On Wed, May 16, 2018 at 5:30 AM, Ilya Biryukov via cfe-commits <
> cfe-commits@lists.llvm.org> wrote:
>
>> Author: ibiryukov
>> Date: Wed May 16 05:30:09 2018
>> New Revision: 332458
>>
>> URL: http://llvm.org/viewvc/llvm-project?rev=332458&view=rev
>> Log:
>> [AST] Added a helper to extract a user-friendly text of a comment.
>>
>> Summary:
>> The helper is used in clangd for documentation shown in code completion
>> and storing the docs in the symbols. See D45999.
>>
>> This patch reuses the code of the Doxygen comment lexer, disabling the
>> bits that do command and html tag parsing.
>> The new helper works on all comments, including non-doxygen comments.
>> However, it does not understand or transform any doxygen directives,
>> i.e. cannot extract brief text, etc.
>>
>> Reviewers: sammccall, hokein, ioeric
>>
>> Reviewed By: ioeric
>>
>> Subscribers: mgorny, cfe-commits
>>
>> Differential Revision: https://reviews.llvm.org/D46000
>>
>> Added:
>> cfe/trunk/unittests/AST/CommentTextTest.cpp
>> Modified:
>> cfe/trunk/include/clang/AST/CommentLexer.h
>> cfe/trunk/include/clang/AST/RawCommentList.h
>> cfe/trunk/lib/AST/CommentLexer.cpp
>> cfe/trunk/lib/AST/RawCommentList.cpp
>> cfe/trunk/unittests/AST/CMakeLists.txt
>>
>> Modified: cfe/trunk/include/clang/AST/CommentLexer.h
>> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/include/clang/
>> AST/CommentLexer.h?rev=332458&r1=332457&r2=332458&view=diff
>> 
>> ==
>> --- cfe/trunk/include/clang/AST/CommentLexer.h (original)
>> +++ cfe/trunk/include/clang/AST/CommentLexer.h Wed May 16 05:30:09 2018
>> @@ -281,6 +281,11 @@ private:
>>/// command, including command marker.
>>SmallString<16> VerbatimBlockEndCommandName;
>>
>> +  /// If true, the commands, html tags, etc will be parsed and reported
>> as
>> +  /// separate tokens inside the comment body. If false, the comment
>> text will
>> +  /// be parsed into text and newline tokens.
>> +  bool ParseCommands;
>> +
>>/// Given a character reference name (e.g., "lt"), return the
>> character that
>>/// it stands for (e.g., "<").
>>StringRef resolveHTMLNamedCharacterReference(StringRef Name) const;
>> @@ -315,12 +320,11 @@ private:
>>/// Eat string matching regexp \code \s*\* \endcode.
>>void skipLineStartingDecorations();
>>
>> -  /// Lex stuff inside comments.  CommentEnd should be set correctly.
>> +  /// Lex comment text, including commands if ParseCommands is set to
>> true.
>>void lexCommentText(Token &T);
>>
>> -  void setupAndLexVerbatimBlock(Token &T,
>> -const char *Text

Buildbot numbers for the week of 5/13/2018 - 5/19/2018

2018-05-29 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the week of 5/13/2018 - 5/19/2018.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:
   buildername| was_red
--+-
 aosp-O3-polly-before-vectorizer-unprofitable | 96:20:38
 clang-x64-ninja-win7 | 91:00:52
 clang-cmake-x86_64-avx2-linux-perf   | 65:10:57
 clang-sphinx-docs| 62:01:06
 lldb-windows7-android| 57:13:19
 clang-x86_64-linux-abi-test  | 39:06:31
 clang-with-lto-ubuntu| 31:07:33
 clang-hexagon-elf| 30:03:02
 clang-cmake-armv8-global-isel| 28:45:16
 clang-cmake-armv8-full   | 28:34:08
 clang-cmake-armv7-selfhost   | 28:28:58
 clang-cmake-armv7-selfhost-neon  | 28:27:16
 clang-cmake-armv8-quick  | 28:22:10
 clang-cmake-armv7-quick  | 28:14:45
 clang-cmake-armv7-global-isel| 27:35:57
 llvm-clang-x86_64-expensive-checks-win   | 27:28:16
 clang-cmake-armv8-selfhost-neon  | 27:15:05
 clang-cmake-thumbv7-full-sh  | 25:41:41
 clang-lld-x86_64-2stage  | 23:31:47
 lld-x86_64-darwin13  | 22:57:07
 clang-cmake-armv7-full   | 22:40:27
 clang-with-thin-lto-ubuntu   | 22:40:21
 clang-ppc64le-linux-multistage   | 22:05:03
 clang-cmake-aarch64-lld  | 21:47:54
 clang-cmake-aarch64-quick| 21:45:53
 clang-cmake-aarch64-global-isel  | 21:38:41
 clang-ppc64be-linux-lnt  | 19:01:10
 clang-ppc64le-linux-lnt  | 18:40:50
 clang-with-thin-lto-windows  | 16:35:53
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast | 15:55:02
 clang-cmake-x86_64-avx2-linux| 15:17:30
 clang-bpf-build  | 09:40:20
 reverse-iteration| 09:31:09
 clang-x86-windows-msvc2015   | 09:28:39
 polly-amd64-linux| 09:09:23
 clang-cuda-build | 09:02:35
 sanitizer-x86_64-linux-fast  | 09:01:02
 clang-ppc64be-linux  | 08:53:50
 sanitizer-x86_64-linux-bootstrap | 08:53:37
 clang-ppc64be-linux-multistage   | 08:42:39
 sanitizer-x86_64-linux-bootstrap-ubsan   | 08:36:00
 clang-ppc64le-linux  | 08:26:13
 clang-s390x-linux| 08:25:55
 clang-s390x-linux-lnt| 08:22:08
 sanitizer-x86_64-linux-bootstrap-msan| 08:15:08
 clang-s390x-linux-multistage | 07:22:16
 clang-x86_64-debian-fast | 07:16:20
 clang-cmake-aarch64-full | 06:46:56
 polly-arm-linux  | 05:28:20
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast   | 05:27:39
 sanitizer-x86_64-linux   | 05:02:02
 lldb-x86_64-darwin-13.4  | 03:21:04
 libcxx-libcxxabi-x86_64-linux-ubuntu-tsan| 03:09:12
 sanitizer-ppc64le-linux  | 02:55:30
 libcxx-libcxxabi-x86_64-linux-ubuntu-32bit   | 02:36:10
 sanitizer-ppc64be-linux  | 02:05:00
 lldb-amd64-ninja-netbsd8 | 01:54:12
 lld-perf-testsuite   | 01:44:08
 lldb-x86_64-ubuntu-14.04-android | 01:40:19
 lldb-x86_64-ubuntu-14.04-buildserver | 01:37:43
 sanitizer-x86_64-linux-autoconf  | 01:36:33
 lldb-x86_64-ubuntu-14.04-cmake   | 01:07:43
 llvm-sphinx-docs | 01:02:08
 llvm-hexagon-elf | 00:56:46
 lldb-x86-windows-msvc2015| 00:45:33
 sanitizer-x86_64-linux-fuzzer| 00:39:04
 sanitizer-x86_64-linux-android   | 00:38:12
 sanitizer-windows| 00:28:37
 lld-x86_64-freebsd   | 00:28:19
 lldb-amd64-ninja-freebsd11

Buildbot numbers for the week of 5/6/2018 - 5/12/2018

2018-05-29 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the week of 5/6/2018 - 5/12/2018.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:
   buildername| was_red
--+-
 lldb-x86_64-ubuntu-14.04-android | 55:37:38
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx17   | 34:11:32
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx2a   | 33:59:13
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx11   | 33:58:46
 libcxx-libcxxabi-x86_64-linux-ubuntu-32bit   | 33:55:55
 libcxx-libcxxabi-libunwind-x86_64-linux-ubuntu   | 33:48:37
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx14   | 33:39:48
 libcxx-libcxxabi-x86_64-linux-ubuntu-tsan| 33:17:07
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx03   | 32:32:48
 clang-with-lto-ubuntu| 31:04:23
 polly-arm-linux  | 28:04:17
 reverse-iteration| 27:41:09
 polly-amd64-linux| 25:54:37
 clang-cmake-thumbv7-full-sh  | 22:37:58
 clang-s390x-linux-multistage | 18:51:29
 clang-cmake-aarch64-full | 17:33:43
 clang-cmake-armv7-full   | 15:46:51
 clang-cmake-armv8-full   | 15:14:20
 clang-cmake-armv8-selfhost-neon  | 14:46:53
 sanitizer-ppc64le-linux  | 14:18:30
 clang-ppc64le-linux-multistage   | 14:16:59
 clang-cmake-aarch64-lld  | 14:08:35
 clang-s390x-linux-lnt| 14:07:43
 clang-s390x-linux| 14:06:59
 clang-ppc64be-linux  | 13:31:52
 clang-ppc64le-linux  | 13:30:58
 clang-ppc64be-linux-lnt  | 13:27:15
 clang-ppc64be-linux-multistage   | 13:18:01
 clang-ppc64le-linux-lnt  | 13:09:01
 sanitizer-x86_64-linux-bootstrap-ubsan   | 13:01:12
 sanitizer-x86_64-linux-bootstrap-msan| 12:40:56
 sanitizer-ppc64be-linux  | 12:28:09
 sanitizer-x86_64-linux-fast  | 11:59:31
 llvm-clang-x86_64-expensive-checks-win   | 11:46:40
 lld-x86_64-darwin13  | 11:23:38
 lld-x86_64-freebsd   | 11:23:34
 clang-with-thin-lto-windows  | 11:19:51
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast | 10:54:58
 clang-lld-x86_64-2stage  | 10:41:47
 sanitizer-x86_64-linux-bootstrap | 10:18:18
 clang-cmake-armv8-global-isel| 09:57:08
 clang-cmake-armv7-global-isel| 09:55:02
 clang-cmake-armv8-quick  | 09:52:07
 clang-cmake-aarch64-quick| 09:47:06
 clang-with-thin-lto-ubuntu   | 09:46:49
 clang-cmake-aarch64-global-isel  | 09:36:54
 clang-cmake-armv7-quick  | 09:28:31
 clang-x86-windows-msvc2015   | 07:28:19
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast   | 07:25:59
 sanitizer-x86_64-linux-fuzzer| 06:33:59
 sanitizer-x86_64-linux-autoconf  | 06:06:25
 clang-x64-ninja-win7 | 05:30:24
 libcxx-libcxxabi-x86_64-linux-ubuntu-asan| 05:28:19
 clang-cmake-armv7-selfhost   | 05:18:47
 clang-cmake-armv7-selfhost-neon  | 05:18:38
 llvm-hexagon-elf | 04:58:55
 clang-bpf-build  | 04:40:12
 clang-hexagon-elf| 03:16:12
 libcxx-libcxxabi-x86_64-linux-ubuntu-gcc49-cxx11 | 03:09:09
 lldb-x86_64-ubuntu-14.04-cmake   | 03:06:11
 lldb-x86_64-darwin-13.4  | 02:34:36
 lldb-amd64-ninja-netbsd8 | 01:36:37
 sanitizer-x86_64-linux   | 01:30:34
 lld-perf-testsuite   | 01:18:09
 lldb-x86_64-ubuntu-14.04-buildserver | 00:50:49
 lldb-x86-windows-msvc2015| 00:49:02
 clang-cmake-x86_64-avx2-linux| 00:45:52
 sanitizer-x86_64-linux-android   | 00:28:41
 clang-cuda-build | 00:23:56
 clang-x86_64-linux-abi-test

Buildbot numbers for the week of 5/20/2018 - 5/26/2018

2018-05-29 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the last week of 5/20/2018 - 5/26/2018.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:
   buildername   | was_red
-+-
 lldb-windows7-android   | 88:18:35
 sanitizer-x86_64-linux-bootstrap| 42:19:42
 sanitizer-x86_64-linux-bootstrap-ubsan  | 40:11:15
 sanitizer-x86_64-linux-bootstrap-msan   | 37:01:18
 sanitizer-x86_64-linux-fuzzer   | 36:31:37
 sanitizer-x86_64-linux  | 35:39:35
 sanitizer-x86_64-linux-autoconf | 34:33:59
 clang-cmake-aarch64-full| 30:32:57
 clang-x64-ninja-win7| 21:45:19
 clang-x86-windows-msvc2015  | 21:36:08
 clang-with-lto-ubuntu   | 20:30:52
 clang-with-thin-lto-windows | 19:12:19
 clang-cuda-build| 18:11:05
 llvm-clang-x86_64-expensive-checks-win  | 14:44:02
 libcxx-libcxxabi-x86_64-linux-ubuntu-gcc-tot-latest-std | 14:20:06
 clang-lld-x86_64-2stage | 12:46:27
 clang-with-thin-lto-ubuntu  | 12:24:16
 clang-cmake-armv7-full  | 09:16:42
 clang-cmake-armv8-selfhost-neon | 08:00:50
 clang-cmake-x86_64-avx2-linux   | 07:23:53
 clang-cmake-aarch64-lld | 06:29:20
 clang-cmake-thumbv7-full-sh | 06:24:29
 clang-ppc64be-linux-lnt | 05:53:46
 clang-cmake-armv7-selfhost  | 05:45:06
 clang-cmake-armv7-selfhost-neon | 05:44:49
 clang-s390x-linux-lnt   | 05:44:03
 clang-ppc64le-linux-lnt | 05:42:16
 clang-ppc64le-linux-multistage  | 05:20:55
 clang-cmake-x86_64-avx2-linux-perf  | 04:56:05
 clang-s390x-linux-multistage| 04:45:24
 clang-s390x-linux   | 04:15:50
 clang-cmake-armv7-quick | 04:12:40
 clang-bpf-build | 04:03:49
 clang-cmake-armv8-full  | 03:58:15
 clang-cmake-aarch64-global-isel | 03:55:28
 clang-cmake-aarch64-quick   | 03:43:07
 clang-cmake-armv8-global-isel   | 03:34:07
 clang-x86_64-debian-fast| 03:21:57
 clang-hexagon-elf   | 03:18:37
 sanitizer-ppc64le-linux | 03:18:32
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast| 03:14:10
 lldb-amd64-ninja-netbsd8| 03:12:52
 sanitizer-ppc64be-linux | 03:07:52
 clang-ppc64le-linux | 03:07:00
 clang-ppc64be-linux-multistage  | 03:02:41
 reverse-iteration   | 03:01:56
 clang-cmake-armv7-global-isel   | 03:01:26
 polly-amd64-linux   | 02:52:55
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast  | 02:52:38
 clang-ppc64be-linux | 02:52:21
 polly-arm-linux | 02:50:35
 clang-cmake-armv8-quick | 02:46:57
 lldb-x86_64-ubuntu-14.04-buildserver| 02:46:02
 clang-cmake-armv8-lnt   | 02:44:20
 sanitizer-x86_64-linux-fast | 02:37:46
 lldb-x86_64-ubuntu-14.04-cmake  | 02:28:33
 lldb-x86-windows-msvc2015   | 02:27:26
 sanitizer-windows   | 02:18:54
 clang-x86_64-linux-abi-test | 02:16:23
 clang-cmake-armv7-lnt   | 01:55:49
 lld-x86_64-win7 | 01:48:35
 lldb-x86_64-darwin-13.4 | 01:38:46
 sanitizer-x86_64

Buildbot numbers for the week of 09/03/2017 - 09/09/2017

2017-09-29 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the week of 09/03/2017 - 09/09/2017.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:

 buildername | was_red
-+-
 clang-s390x-linux-lnt   | 96:22:57
 llvm-mips-linux | 87:07:26
 clang-ppc64be-linux-multistage  | 86:13:04
 clang-ppc64be-linux-lnt | 85:19:29
 clang-ppc64be-linux | 85:17:30
 clang-s390x-linux   | 85:09:14
 reverse-iteration   | 72:01:21
 perf-x86_64-penryn-O3-polly-fast| 59:07:55
 perf-x86_64-penryn-O3-polly | 58:04:43
 sanitizer-x86_64-linux-fast | 40:08:18
 sanitizer-x86_64-linux-bootstrap| 39:36:59
 ubuntu-gcc7.1-werror| 26:34:15
 libcxx-libcxxabi-singlethreaded-x86_64-linux-debian | 24:51:06
 libcxx-libcxxabi-x86_64-linux-debian-noexceptions   | 24:32:30
 libcxx-libcxxabi-libunwind-x86_64-linux-debian  | 24:14:11
 libcxx-libcxxabi-x86_64-linux-debian| 23:58:11
 llvm-clang-x86_64-expensive-checks-win  | 17:18:19
 clang-x86-windows-msvc2015  | 16:40:52
 clang-x64-ninja-win7| 16:37:36
 clang-with-thin-lto-windows | 16:24:57
 clang-cmake-aarch64-full| 12:37:44
 clang-cmake-aarch64-quick   | 08:38:36
 clang-lld-x86_64-2stage | 06:01:58
 polly-amd64-linux   | 05:29:44
 clang-cmake-armv7-a15-selfhost  | 05:00:13
 clang-x86_64-debian-fast| 04:19:21
 clang-ppc64le-linux-multistage  | 03:37:01
 clang-cmake-aarch64-global-isel | 03:33:00
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast| 03:10:27
 clang-cmake-aarch64-lld | 03:07:39
 sanitizer-x86_64-linux-autoconf | 03:01:08
 libcxx-libcxxabi-libunwind-arm-linux| 02:59:25
 sanitizer-ppc64le-linux | 02:45:58
 clang-ppc64le-linux-lnt | 02:44:36
 clang-x86_64-linux-abi-test | 02:39:32
 lldb-x86_64-darwin-13.4 | 02:13:20
 sanitizer-ppc64be-linux | 02:12:57
 clang-with-lto-ubuntu   | 02:06:39
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx03  | 01:56:50
 clang-with-thin-lto-ubuntu  | 01:51:03
 clang-cmake-x86_64-avx2-linux   | 01:49:23
 clang-x86_64-linux-selfhost-modules | 01:46:33
 clang-x86_64-linux-selfhost-modules-2   | 01:43:53
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx1z-32bit| 01:39:55
 clang-cuda-build| 01:37:11
 clang-ppc64le-linux | 01:35:39
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast  | 01:35:21
 clang-atom-d525-fedora-rel  | 01:35:12
 sanitizer-x86_64-linux  | 01:33:19
 clang-native-arm-lnt| 01:33:01
 clang-cmake-x86_64-sde-avx512-linux | 01:31:53
 clang-cmake-thumbv7-a15 | 01:20:51
 sanitizer-x86_64-linux-android  | 01:16:15
 lldb-amd64-ninja-netbsd8| 01:13:56
 clang-cmake-x86_64-avx2-linux-perf  | 01:11:23
 clang-hexagon-elf   | 01:11:23
 clang-cmake-armv7-a15-full  | 01:09:21
 lldb-x86_64-ubuntu-14.04-buildserver| 01:08:55
 lld-x86_64-darwin13 | 01:07:27
 lldb-x86_64-ubuntu-14.04-cmake  | 01:05:45
 sanitizer-x86_64-linux-fuzzer   | 00:55:59
 lldb-x86_64-ubuntu-14.04-android| 00:54:55
 clang-cmake-armv7-a15   | 00:32:13
 libcxx-libcxxabi-x86_64-linux-ubuntu-asan   | 00:31:16
 lldb-amd64-ninja-freebsd11  | 00:23:03
 lld-x86_64-freebsd  | 00:13:46
 sanitizer-windows 

Buildbot numbers for the week of 09/10/2017 - 09/16/2017

2017-09-29 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the week of 09/10/2017 - 09/16/2017.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:

buildername| was_red
---+-
 lld-x86_64-freebsd| 77:38:11
 clang-cuda-build  | 72:56:52
 lldb-windows7-android | 66:57:22
 clang-with-lto-ubuntu | 65:59:18
 clang-ppc64le-linux-lnt   | 64:29:58
 llvm-clang-lld-x86_64-debian-fast | 63:49:23
 clang-x64-ninja-win7  | 52:11:20
 clang-ppc64be-linux-lnt   | 49:14:32
 llvm-mips-linux   | 48:10:18
 clang-ppc64be-linux   | 47:06:24
 clang-ppc64be-linux-multistage| 45:46:21
 clang-with-thin-lto-ubuntu| 42:11:36
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast| 31:35:29
 sanitizer-x86_64-linux-fast   | 25:01:14
 reverse-iteration | 24:10:32
 lldb-amd64-ninja-netbsd8  | 22:55:55
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast  | 21:46:04
 libcxx-libcxxabi-x86_64-linux-debian  | 20:27:42
 libcxx-libcxxabi-libunwind-x86_64-linux-debian| 20:18:42
 sanitizer-x86_64-linux-bootstrap  | 16:25:47
 perf-x86_64-penryn-O3-polly-detect-only   | 14:34:58
 perf-x86_64-penryn-O3 | 14:14:57
 clang-x86_64-linux-selfhost-modules-2 | 13:36:45
 perf-x86_64-penryn-O3-polly   | 13:19:43
 clang-cmake-x86_64-sde-avx512-linux   | 13:17:40
 clang-x86-windows-msvc2015| 13:13:48
 llvm-clang-x86_64-expensive-checks-win| 13:04:58
 clang-cmake-x86_64-avx2-linux | 12:58:45
 clang-cmake-x86_64-avx2-linux-perf| 12:57:46
 clang-cmake-armv7-a15-selfhost-neon   | 11:51:13
 libcxx-libcxxabi-x86_64-linux-debian-noexceptions | 11:26:49
 sanitizer-ppc64be-linux   | 11:10:28
 sanitizer-x86_64-linux| 10:15:05
 sanitizer-x86_64-linux-android| 09:44:37
 clang-cmake-armv7-a15-selfhost| 09:31:35
 clang-lld-x86_64-2stage   | 08:20:55
 perf-x86_64-penryn-O3-polly-fast  | 07:39:33
 sanitizer-x86_64-linux-autoconf   | 06:32:19
 libcxx-libcxxabi-libunwind-arm-linux-noexceptions | 05:55:01
 clang-x86_64-linux-selfhost-modules   | 05:20:30
 ubuntu-gcc7.1-werror  | 05:17:58
 libcxx-libcxxabi-libunwind-aarch64-linux  | 05:09:02
 clang-x86_64-linux-abi-test   | 05:04:51
 clang-cmake-aarch64-lld   | 04:59:45
 clang-cmake-aarch64-global-isel   | 04:41:28
 clang-with-thin-lto-windows   | 04:41:03
 clang-cmake-aarch64-full  | 04:00:30
 clang-x86_64-debian-fast  | 03:59:45
 sanitizer-windows | 03:40:31
 clang-ppc64le-linux-multistage| 03:25:12
 lldb-x86_64-ubuntu-14.04-cmake| 03:18:36
 lldb-x86_64-darwin-13.4   | 03:13:30
 clang-cmake-aarch64-quick | 03:03:39
 clang-native-arm-lnt  | 02:52:10
 lldb-x86_64-ubuntu-14.04-android  | 02:18:02
 clang-ppc64le-linux   | 02:06:17
 polly-amd64-linux | 02:00:44
 clang-s390x-linux | 01:54:43
 clang-atom-d525-fedora-rel| 01:52:21
 clang-s390x-linux-lnt | 01:47:11
 clang-cmake-armv7-a15 | 01:36:24
 clang-cmake-thumbv7-a15   | 01:36:19
 lldb-x86-windows-msvc2015 | 01:31:21
 clang-hexagon-elf | 01:09:53
 lldb-x86_64-ubuntu-14.04-buildserver  | 01:08:20
 sanitizer-x86_64-linux-fuzzer | 01:06:33
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx03| 01:01:59
 llvm-hexagon-elf  | 01:00:17
 lld-x86_64-darwin13   

Buildbot numbers for the week of 09/17/2017 - 09/23/2017

2017-09-29 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the last week of 09/17/2017 -
09/23/2017.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:

  buildername  | was_red
---+-
 clang-s390x-linux-multistage  | 65:09:50
 clang-cmake-aarch64-global-isel   | 43:46:11
 clang-x86-windows-msvc2015| 42:27:37
 clang-cmake-armv7-a15-selfhost| 41:20:55
 clang-cuda-build  | 40:55:08
 clang-cmake-armv7-a15-selfhost-neon   | 37:36:22
 clang-ppc64le-linux-multistage| 37:19:48
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast| 36:01:53
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast  | 35:56:46
 clang-ppc64le-linux-lnt   | 35:31:01
 clang-atom-d525-fedora-rel| 34:51:34
 clang-cmake-x86_64-sde-avx512-linux   | 34:41:42
 sanitizer-windows | 34:39:52
 clang-x86_64-linux-selfhost-modules-2 | 34:39:01
 clang-ppc64le-linux   | 33:28:48
 clang-ppc64be-linux   | 32:04:32
 clang-s390x-linux | 27:40:10
 lldb-x86_64-darwin-13.4   | 27:33:10
 lldb-windows7-android | 27:15:05
 clang-ppc64be-linux-lnt   | 27:02:19
 lldb-x86_64-ubuntu-14.04-android  | 26:37:13
 llvm-mips-linux   | 26:34:19
 clang-s390x-linux-lnt | 26:23:34
 clang-with-lto-ubuntu | 25:31:49
 clang-ppc64be-linux-multistage| 25:17:55
 libcxx-libcxxabi-x86_64-linux-ubuntu-asan | 25:03:31
 libcxx-libcxxabi-libunwind-aarch64-linux  | 18:19:23
 ubuntu-gcc7.1-werror  | 17:42:44
 lldb-x86_64-ubuntu-14.04-cmake| 15:50:29
 sanitizer-ppc64be-linux   | 14:46:46
 sanitizer-x86_64-linux| 13:58:07
 clang-with-thin-lto-ubuntu| 13:39:30
 clang-x86_64-linux-selfhost-modules   | 13:10:13
 clang-lld-x86_64-2stage   | 12:01:51
 clang-cmake-aarch64-lld   | 11:12:46
 sanitizer-x86_64-linux-bootstrap  | 11:11:32
 sanitizer-x86_64-linux-fast   | 09:51:43
 llvm-clang-lld-x86_64-debian-fast | 07:33:04
 clang-cmake-armv7-a15 | 07:17:37
 clang-cmake-thumbv7-a15   | 07:17:34
 polly-amd64-linux | 07:11:53
 clang-cmake-x86_64-avx2-linux | 06:50:06
 perf-x86_64-penryn-O3-polly-detect-only   | 06:48:48
 llvm-clang-x86_64-expensive-checks-win| 06:47:03
 llvm-hexagon-elf  | 06:46:59
 clang-x86_64-debian-fast  | 06:46:59
 clang-x64-ninja-win7  | 06:45:57
 clang-hexagon-elf | 06:45:07
 clang-native-arm-lnt  | 06:42:10
 clang-cmake-aarch64-full  | 06:42:09
 clang-with-thin-lto-windows   | 06:29:55
 polly-arm-linux   | 06:29:54
 clang-cmake-x86_64-avx2-linux-perf| 06:04:57
 clang-cmake-aarch64-quick | 05:28:48
 libcxx-libcxxabi-libunwind-x86_64-linux-debian| 05:03:54
 sanitizer-x86_64-linux-autoconf   | 04:39:58
 lld-x86_64-darwin13   | 04:05:16
 lldb-x86_64-ubuntu-14.04-buildserver  | 02:15:56
 libcxx-libcxxabi-x86_64-linux-ubuntu-ubsan| 01:35:39
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx11| 01:27:11
 clang-x86_64-linux-abi-test   | 01:25:16
 lldb-x86-windows-msvc2015 | 01:23:50
 libcxx-libcxxabi-libunwind-arm-linux-noexceptions | 01:23:12
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx14| 01:22:22
 lldb-amd6

LLVM buildmaster will be updated and restarted tonight

2017-10-02 Thread Galina Kistanova via cfe-commits
Hello everyone,

LLVM buildmaster will be updated and restarted after 7 PM Pacific time.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Re: r315194 - Make SourceLocation, QualType and friends have constexpr constructors.

2017-10-09 Thread Galina Kistanova via cfe-commits
Hello Benjamin,

I look s like this commit broke build on one of our builders:

http://lab.llvm.org:8011/builders/llvm-clang-x86_64-expensive-checks-win/builds/5327

. . .
FAILED:
tools/clang/lib/Serialization/CMakeFiles/clangSerialization.dir/ASTReader.cpp.obj

C:\PROGRA~2\MICROS~1.0\VC\bin\amd64\cl.exe  /nologo /TP -DEXPENSIVE_CHECKS
-DGTEST_HAS_RTTI=0 -DUNICODE -D_CRT_NONSTDC_NO_DEPRECATE
-D_CRT_NONSTDC_NO_WARNINGS -D_CRT_SECURE_NO_DEPRECATE
-D_CRT_SECURE_NO_WARNINGS -D_GLIBCXX_DEBUG -D_GNU_SOURCE
-D_HAS_EXCEPTIONS=0 -D_SCL_SECURE_NO_DEPRECATE -D_SCL_SECURE_NO_WARNINGS
-D_UNICODE -D__STDC_CONSTANT_MACROS -D__STDC_FORMAT_MACROS
-D__STDC_LIMIT_MACROS -Itools\clang\lib\Serialization
-IC:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\tools\clang\lib\Serialization
-IC:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\tools\clang\include
-Itools\clang\include -Iinclude
-IC:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\include
/DWIN32 /D_WINDOWS   /WX /Zc:inline /Zc:strictStrings /Oi /Zc:rvalueCast
/W4 -wd4141 -wd4146 -wd4180 -wd4244 -wd4258 -wd4267 -wd4291 -wd4345 -wd4351
-wd4355 -wd4456 -wd4457 -wd4458 -wd4459 -wd4503 -wd4624 -wd4722 -wd4800
-wd4100 -wd4127 -wd4512 -wd4505 -wd4610 -wd4510 -wd4702 -wd4245 -wd4706
-wd4310 -wd4701 -wd4703 -wd4389 -wd4611 -wd4805 -wd4204 -wd4577 -wd4091
-wd4592 -wd4319 -wd4324 -w14062 -we4238 /MDd /Zi /Ob0 /Od /RTC1/EHs-c-
/GR- /showIncludes
/Fotools\clang\lib\Serialization\CMakeFiles\clangSerialization.dir\ASTReader.cpp.obj
/Fdtools\clang\lib\Serialization\CMakeFiles\clangSerialization.dir\clangSerialization.pdb
/FS -c
C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\tools\clang\lib\Serialization\ASTReader.cpp
C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\tools\clang\lib\Serialization\ASTReader.cpp(5731):
error C2220: warning treated as error - no 'object' file generated
C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\tools\clang\lib\Serialization\ASTReader.cpp(5731):
warning C4709: comma operator within array index expression

Please have a look?

Thanks

Galina

On Sun, Oct 8, 2017 at 1:53 PM, Benjamin Kramer via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: d0k
> Date: Sun Oct  8 13:53:36 2017
> New Revision: 315194
>
> URL: http://llvm.org/viewvc/llvm-project?rev=315194&view=rev
> Log:
> Make SourceLocation, QualType and friends have constexpr constructors.
>
> No functionality change intended.
>
> Modified:
> cfe/trunk/include/clang/AST/CharUnits.h
> cfe/trunk/include/clang/AST/Type.h
> cfe/trunk/include/clang/Basic/SourceLocation.h
>
> Modified: cfe/trunk/include/clang/AST/CharUnits.h
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/include/
> clang/AST/CharUnits.h?rev=315194&r1=315193&r2=315194&view=diff
> 
> ==
> --- cfe/trunk/include/clang/AST/CharUnits.h (original)
> +++ cfe/trunk/include/clang/AST/CharUnits.h Sun Oct  8 13:53:36 2017
> @@ -40,14 +40,14 @@ namespace clang {
>typedef int64_t QuantityType;
>
>  private:
> -  QuantityType Quantity;
> +  QuantityType Quantity = 0;
>
>explicit CharUnits(QuantityType C) : Quantity(C) {}
>
>  public:
>
>/// CharUnits - A default constructor.
> -  CharUnits() : Quantity(0) {}
> +  CharUnits() = default;
>
>/// Zero - Construct a CharUnits quantity of zero.
>static CharUnits Zero() {
>
> Modified: cfe/trunk/include/clang/AST/Type.h
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/include/
> clang/AST/Type.h?rev=315194&r1=315193&r2=315194&view=diff
> 
> ==
> --- cfe/trunk/include/clang/AST/Type.h (original)
> +++ cfe/trunk/include/clang/AST/Type.h Sun Oct  8 13:53:36 2017
> @@ -162,8 +162,6 @@ public:
>  FastMask = (1 << FastWidth) - 1
>};
>
> -  Qualifiers() : Mask(0) {}
> -
>/// Returns the common set of qualifiers while removing them from
>/// the given sets.
>static Qualifiers removeCommonQualifiers(Qualifiers &L, Qualifiers &R)
> {
> @@ -539,7 +537,7 @@ private:
>
>// bits: |0 1 2|3|4 .. 5|6  ..  8|9   ...   31|
>//   |C R V|U|GCAttr|Lifetime|AddressSpace|
> -  uint32_t Mask;
> +  uint32_t Mask = 0;
>
>static const uint32_t UMask = 0x8;
>static const uint32_t UShift = 3;
> @@ -634,7 +632,7 @@ class QualType {
>
>friend class QualifierCollector;
>  public:
> -  QualType() {}
> +  QualType() = default;
>
>QualType(const Type *Ptr, unsigned Quals)
>  : Value(Ptr, Quals) {}
>
> Modified: cfe/trunk/include/clang/Basic/SourceLocation.h
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/include/
> clang/Basic/SourceLocation.h?rev=315194&r1=315193&r2=315194&view=diff
> 
> ==
> --- cfe/trunk/include/clang/Basic/SourceLocation.h (original)
> +++ cfe/trunk/include/

Re: [clang-tools-extra] r315210 - [clangd] Added move-only function helpers.

2017-10-09 Thread Galina Kistanova via cfe-commits
Hello Ilya,

This commit broke build on one of our builders:

http://lab.llvm.org:8011/builders/clang-x86_64-linux-abi-test/builds/16435

Please have a look?

Thanks

Galina


On Mon, Oct 9, 2017 at 9:26 AM, Ilya Biryukov via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: ibiryukov
> Date: Mon Oct  9 09:26:26 2017
> New Revision: 315210
>
> URL: http://llvm.org/viewvc/llvm-project?rev=315210&view=rev
> Log:
> [clangd] Added move-only function helpers.
>
> Summary:
> They are now used in ClangdScheduler instead of deferred std::async
> computations.
> The results of `std::async` are much less effective and do not provide
> a good abstraction for similar purposes, i.e. for storing additional
> callbacks
> to clangd async tasks. The actual callback API will follow a bit later.
>
> Reviewers: klimek, bkramer, sammccall, krasimir
>
> Reviewed By: sammccall
>
> Subscribers: cfe-commits
>
> Differential Revision: https://reviews.llvm.org/D38627
>
> Added:
> clang-tools-extra/trunk/clangd/Function.h
> Modified:
> clang-tools-extra/trunk/clangd/ClangdServer.cpp
> clang-tools-extra/trunk/clangd/ClangdServer.h
>
> Modified: clang-tools-extra/trunk/clangd/ClangdServer.cpp
> URL: http://llvm.org/viewvc/llvm-project/clang-tools-extra/
> trunk/clangd/ClangdServer.cpp?rev=315210&r1=315209&r2=315210&view=diff
> 
> ==
> --- clang-tools-extra/trunk/clangd/ClangdServer.cpp (original)
> +++ clang-tools-extra/trunk/clangd/ClangdServer.cpp Mon Oct  9 09:26:26
> 2017
> @@ -99,7 +99,7 @@ ClangdScheduler::ClangdScheduler(unsigne
>for (unsigned I = 0; I < AsyncThreadsCount; ++I) {
>  Workers.push_back(std::thread([this]() {
>while (true) {
> -std::future Request;
> +UniqueFunction Request;
>
>  // Pick request from the queue
>  {
> @@ -120,7 +120,7 @@ ClangdScheduler::ClangdScheduler(unsigne
>RequestQueue.pop_front();
>  } // unlock Mutex
>
> -Request.get();
> +Request();
>}
>  }));
>}
>
> Modified: clang-tools-extra/trunk/clangd/ClangdServer.h
> URL: http://llvm.org/viewvc/llvm-project/clang-tools-extra/
> trunk/clangd/ClangdServer.h?rev=315210&r1=315209&r2=315210&view=diff
> 
> ==
> --- clang-tools-extra/trunk/clangd/ClangdServer.h (original)
> +++ clang-tools-extra/trunk/clangd/ClangdServer.h Mon Oct  9 09:26:26 2017
> @@ -20,6 +20,7 @@
>  #include "llvm/ADT/StringRef.h"
>
>  #include "ClangdUnit.h"
> +#include "Function.h"
>  #include "Protocol.h"
>
>  #include 
> @@ -132,9 +133,8 @@ public:
>
>  {
>std::lock_guard Lock(Mutex);
> -  RequestQueue.push_front(std::async(std::launch::deferred,
> - std::forward(F),
> - std::forward(As)...));
> +  RequestQueue.push_front(
> +  BindWithForward(std::forward(F),
> std::forward(As)...));
>  }
>  RequestCV.notify_one();
>}
> @@ -149,9 +149,8 @@ public:
>
>  {
>std::lock_guard Lock(Mutex);
> -  RequestQueue.push_back(std::async(std::launch::deferred,
> -std::forward(F),
> -std::forward(As)...));
> +  RequestQueue.push_back(
> +  BindWithForward(std::forward(F),
> std::forward(As)...));
>  }
>  RequestCV.notify_one();
>}
> @@ -167,7 +166,7 @@ private:
>bool Done = false;
>/// A queue of requests. Elements of this vector are async computations
> (i.e.
>/// results of calling std::async(std::launch::deferred, ...)).
> -  std::deque> RequestQueue;
> +  std::deque> RequestQueue;
>/// Condition variable to wake up worker threads.
>std::condition_variable RequestCV;
>  };
>
> Added: clang-tools-extra/trunk/clangd/Function.h
> URL: http://llvm.org/viewvc/llvm-project/clang-tools-extra/
> trunk/clangd/Function.h?rev=315210&view=auto
> 
> ==
> --- clang-tools-extra/trunk/clangd/Function.h (added)
> +++ clang-tools-extra/trunk/clangd/Function.h Mon Oct  9 09:26:26 2017
> @@ -0,0 +1,136 @@
> +//===--- Function.h - Utility callable wrappers  -*-
> C++-*-===//
> +//
> +// The LLVM Compiler Infrastructure
> +//
> +// This file is distributed under the University of Illinois Open Source
> +// License. See LICENSE.TXT for details.
> +//
> +//===--
> ===//
> +//
> +// This file provides an analogue to std::function that supports move
> semantics.
> +//
> +//===--
> ===//
> +
> +#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANGD_FUNCTION_H
> +#define LLVM_CLANG_TOOLS_EXTRA_CLANGD_FUNCTION_H
> +
> +#include 
> +#include 
> +#include 
> +
> +namespace cl

Buildbot numbers for the week of 09/24/2017 - 09/30/2017

2017-10-11 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the week of 09/24/2017 - 09/30/2017.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:

  buildername  |  was_red
---+--
 clang-cmake-mipsel| 118:41:58
 lldb-windows7-android | 113:06:23
 llvm-clang-x86_64-expensive-checks-win| 111:13:05
 clang-cmake-thumbv7-a15-full-sh   | 88:17:13
 clang-cmake-armv7-a15-full| 85:32:13
 libcxx-libcxxabi-libunwind-aarch64-linux-noexceptions | 43:27:02
 clang-x64-ninja-win7  | 25:28:49
 ubuntu-gcc7.1-werror  | 21:44:21
 clang-with-thin-lto-ubuntu| 13:50:57
 sanitizer-x86_64-linux-bootstrap  | 13:42:38
 sanitizer-x86_64-linux| 13:09:18
 clang-x86_64-linux-abi-test   | 12:47:56
 clang-lld-x86_64-2stage   | 12:38:40
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast  | 12:00:36
 polly-amd64-linux | 11:50:34
 clang-x86-windows-msvc2015| 11:40:45
 clang-ppc64le-linux-multistage| 11:32:27
 sanitizer-x86_64-linux-fast   | 11:17:27
 polly-arm-linux   | 10:29:45
 libcxx-libcxxabi-libunwind-aarch64-linux  | 09:46:05
 lldb-x86_64-ubuntu-14.04-cmake| 09:20:13
 sanitizer-x86_64-linux-autoconf   | 08:38:21
 clang-with-lto-ubuntu | 08:20:55
 clang-atom-d525-fedora-rel| 08:04:52
 clang-x86_64-linux-selfhost-modules   | 07:48:15
 lldb-x86-windows-msvc2015 | 07:42:51
 clang-x86_64-linux-selfhost-modules-2 | 07:32:46
 lldb-x86_64-ubuntu-14.04-buildserver  | 07:31:06
 lldb-amd64-ninja-netbsd8  | 07:26:02
 sanitizer-x86_64-linux-fuzzer | 07:25:18
 clang-cuda-build  | 07:21:59
 llvm-clang-lld-x86_64-debian-fast | 07:16:39
 lldb-amd64-ninja-freebsd11| 07:06:53
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast| 07:06:15
 clang-cmake-armv7-a15-selfhost| 06:55:20
 sanitizer-ppc64be-linux   | 05:47:20
 clang-cmake-armv7-a15-selfhost-neon   | 05:41:54
 clang-cmake-aarch64-full  | 04:33:11
 clang-s390x-linux-multistage  | 04:33:10
 sanitizer-x86_64-linux-android| 04:30:42
 clang-ppc64be-linux-multistage| 03:59:02
 clang-x86_64-debian-fast  | 03:46:40
 clang-cmake-aarch64-lld   | 03:20:36
 clang-cmake-aarch64-global-isel   | 03:16:37
 clang-ppc64be-linux-lnt   | 03:15:28
 clang-ppc64be-linux   | 03:06:10
 clang-cmake-x86_64-avx2-linux | 03:01:35
 clang-cmake-armv7-a15 | 02:55:51
 clang-cmake-thumbv7-a15   | 02:55:30
 lld-x86_64-darwin13   | 02:50:47
 clang-ppc64le-linux-lnt   | 02:50:12
 clang-with-thin-lto-windows   | 02:48:35
 clang-ppc64le-linux   | 02:48:02
 clang-native-arm-lnt  | 02:43:56
 clang-s390x-linux-lnt | 02:38:37
 clang-s390x-linux | 02:30:33
 clang-hexagon-elf | 02:19:10
 clang-cmake-x86_64-sde-avx512-linux   | 02:15:00
 sanitizer-windows | 01:34:52
 clang-cmake-x86_64-avx2-linux-perf| 01:31:02
 lld-x86_64-freebsd| 01:25:51
 clang-cmake-aarch64-quick | 01:18:44
 lld-x86_64-win7   | 00:36:33
 lldb-x86_64-ubuntu-14.04-android  | 00:30:49
(64 rows)

Buildbot numbers for the last week of 10/1/2017 - 10/7/2017

2017-10-11 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the last week of 10/1/2017 - 10/7/2017.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:

  buildername  | was_red
---+-
 sanitizer-x86_64-linux-bootstrap  | 78:03:54
 lld-x86_64-win7   | 69:09:59
 clang-cmake-armv7-a15-selfhost-neon   | 65:44:08
 sanitizer-x86_64-linux| 25:13:47
 clang-with-thin-lto-windows   | 24:59:05
 clang-with-thin-lto-ubuntu| 24:44:08
 libcxx-libcxxabi-libunwind-aarch64-linux-noexceptions | 22:13:47
 sanitizer-windows | 21:25:59
 sanitizer-x86_64-linux-fast   | 21:20:26
 aosp-O3-polly-before-vectorizer-unprofitable  | 20:57:27
 lldb-windows7-android | 20:28:12
 lldb-x86_64-darwin-13.4   | 20:27:12
 clang-cmake-aarch64-global-isel   | 18:09:29
 clang-cmake-aarch64-quick | 18:05:17
 libcxx-libcxxabi-x86_64-linux-debian-noexceptions | 17:57:43
 clang-cmake-aarch64-full  | 16:48:25
 clang-x86-windows-msvc2015| 16:17:39
 clang-cmake-aarch64-lld   | 16:03:10
 llvm-clang-x86_64-expensive-checks-win| 09:54:55
 clang-x64-ninja-win7  | 09:13:33
 polly-amd64-linux | 07:54:18
 clang-cmake-thumbv7-a15-full-sh   | 07:53:35
 clang-with-lto-ubuntu | 07:33:01
 lld-x86_64-darwin13   | 07:27:15
 lld-x86_64-freebsd| 07:26:10
 clang-hexagon-elf | 07:00:34
 sanitizer-ppc64be-linux   | 06:22:26
 clang-ppc64be-linux-multistage| 06:06:20
 clang-x86_64-linux-abi-test   | 05:59:22
 clang-cuda-build  | 05:53:47
 clang-cmake-thumbv7-a15   | 05:44:44
 clang-cmake-armv7-a15 | 05:44:10
 clang-ppc64le-linux-lnt   | 05:37:15
 clang-cmake-armv7-a15-full| 05:35:23
 lldb-x86_64-ubuntu-14.04-cmake| 05:33:30
 clang-ppc64le-linux-multistage| 05:30:27
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast  | 05:23:50
 clang-ppc64le-linux   | 05:22:18
 clang-cmake-armv7-a15-selfhost| 05:16:07
 llvm-clang-lld-x86_64-debian-fast | 05:05:30
 clang-native-arm-lnt  | 04:51:41
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast| 04:46:18
 clang-cmake-x86_64-sde-avx512-linux   | 04:18:33
 llvm-hexagon-elf  | 04:00:23
 llvm-mips-linux   | 03:51:35
 clang-cmake-x86_64-avx2-linux | 03:51:09
 clang-x86_64-linux-selfhost-modules-2 | 03:46:35
 clang-s390x-linux-lnt | 03:44:31
 clang-s390x-linux-multistage  | 03:43:19
 clang-s390x-linux | 03:33:10
 clang-ppc64be-linux-lnt   | 03:32:53
 clang-x86_64-debian-fast  | 03:23:13
 clang-ppc64be-linux   | 03:22:15
 lldb-x86-windows-msvc2015 | 03:15:31
 clang-x86_64-linux-selfhost-modules   | 03:14:30
 ubuntu-gcc7.1-werror  | 02:40:31
 clang-cmake-x86_64-avx2-linux-perf| 02:24:35
 sanitizer-x86_64-linux-android| 02:11:09
 sanitizer-x86_64-linux-autoconf   | 01:59:25
 clang-atom-d525-fedora-rel| 01:49:06
 lldb-amd64-ninja-netbsd8  | 01:25:40
 lldb-x86_64-ubuntu-14.04-buildserver  | 01:03:47
 libcxx-libcxxabi-libunwind-aarch64-linux  | 00:57:23
 lldb-x86_64-ubuntu-14.04-android  | 00:32:28
 sanitizer-x

Re: r315856 - Add -f[no-]double-square-bracket-attributes as new driver options to control use of [[]] attributes in all language modes. This is the initial implementation of WG14 N2165, which is a pr

2017-10-17 Thread Galina Kistanova via cfe-commits
Hello Aaron,

This commit broke one our builders:

http://lab.llvm.org:8011/builders/ubuntu-gcc7.1-werror/builds/2272

. . .
FAILED: /usr/local/gcc-7.1/bin/g++-7.1   -DGTEST_HAS_RTTI=0 -D_DEBUG
-D_GNU_SOURCE -D__STDC_CONSTANT_MACROS -D__STDC_FORMAT_MACROS
-D__STDC_LIMIT_MACROS -Itools/clang/lib/Basic
-I/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/tools/clang/lib/Basic
-I/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/tools/clang/include
-Itools/clang/include -Iinclude
-I/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/include
-Wno-noexcept-type -fPIC -fvisibility-inlines-hidden -Werror
-Werror=date-time -std=c++11 -Wall -W -Wno-unused-parameter -Wwrite-strings
-Wcast-qual -Wno-missing-field-initializers -pedantic -Wno-long-long
-Wno-maybe-uninitialized -Wdelete-non-virtual-dtor -Wno-comment
-ffunction-sections -fdata-sections -fno-common -Woverloaded-virtual
-fno-strict-aliasing -O3  -fPIC   -UNDEBUG  -fno-exceptions -fno-rtti -MD
-MT tools/clang/lib/Basic/CMakeFiles/clangBasic.dir/Attributes.cpp.o -MF
tools/clang/lib/Basic/CMakeFiles/clangBasic.dir/Attributes.cpp.o.d -o
tools/clang/lib/Basic/CMakeFiles/clangBasic.dir/Attributes.cpp.o -c
/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/tools/clang/lib/Basic/Attributes.cpp
In file included from
/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/tools/clang/lib/Basic/Attributes.cpp:15:0:
tools/clang/include/clang/Basic/AttrHasAttributeImpl.inc: In function ‘int
clang::hasAttribute(clang::AttrSyntax, const clang::IdentifierInfo*, const
clang::IdentifierInfo*, const clang::TargetInfo&, const
clang::LangOptions&)’:
tools/clang/include/clang/Basic/AttrHasAttributeImpl.inc:526:8: error: this
statement may fall through [-Werror=implicit-fallthrough=]
 } else if (Scope->getName() == "gsl") {
^~
tools/clang/include/clang/Basic/AttrHasAttributeImpl.inc:532:1: note: here
 case AttrSyntax::C: {
 ^~~~
cc1plus: all warnings being treated as errors

Please have a look?

Thanks

Galina

On Sun, Oct 15, 2017 at 8:01 AM, Aaron Ballman via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: aaronballman
> Date: Sun Oct 15 08:01:42 2017
> New Revision: 315856
>
> URL: http://llvm.org/viewvc/llvm-project?rev=315856&view=rev
> Log:
> Add -f[no-]double-square-bracket-attributes as new driver options to
> control use of [[]] attributes in all language modes. This is the initial
> implementation of WG14 N2165, which is a proposal to add [[]] attributes to
> C2x, but also allows you to enable these attributes in C++98, or disable
> them in C++11 or later.
>
> Added:
> cfe/trunk/test/Misc/ast-dump-c-attr.c
> cfe/trunk/test/Parser/c2x-attributes.c
> cfe/trunk/test/Parser/c2x-attributes.m
> cfe/trunk/test/Sema/attr-deprecated-c2x.c
> Modified:
> cfe/trunk/include/clang/Basic/Attr.td
> cfe/trunk/include/clang/Basic/Attributes.h
> cfe/trunk/include/clang/Basic/LangOptions.def
> cfe/trunk/include/clang/Driver/Options.td
> cfe/trunk/include/clang/Parse/Parser.h
> cfe/trunk/include/clang/Sema/AttributeList.h
> cfe/trunk/lib/Frontend/CompilerInvocation.cpp
> cfe/trunk/lib/Lex/Lexer.cpp
> cfe/trunk/lib/Parse/ParseDecl.cpp
> cfe/trunk/lib/Parse/ParseDeclCXX.cpp
> cfe/trunk/lib/Sema/AttributeList.cpp
> cfe/trunk/utils/TableGen/ClangAttrEmitter.cpp
>
> Modified: cfe/trunk/include/clang/Basic/Attr.td
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/include/
> clang/Basic/Attr.td?rev=315856&r1=315855&r2=315856&view=diff
> 
> ==
> --- cfe/trunk/include/clang/Basic/Attr.td (original)
> +++ cfe/trunk/include/clang/Basic/Attr.td Sun Oct 15 08:01:42 2017
> @@ -210,6 +210,10 @@ class CXX11string Namespace = namespace;
>int Version = version;
>  }
> +class C2x : Spelling {
> +  string Namespace = namespace;
> +}
> +
>  class Keyword : Spelling;
>  class Pragma : Spelling {
>string Namespace = namespace;
> @@ -958,7 +962,7 @@ def RenderScriptKernel : Attr {
>
>  def Deprecated : InheritableAttr {
>let Spellings = [GCC<"deprecated">, Declspec<"deprecated">,
> -   CXX11<"","deprecated", 201309>];
> +   CXX11<"","deprecated", 201309>, C2x<"", "deprecated">];
>let Args = [StringArgument<"Message", 1>,
>// An optional string argument that enables us to provide a
>// Fix-It.
>
> Modified: cfe/trunk/include/clang/Basic/Attributes.h
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/include/
> clang/Basic/Attributes.h?rev=315856&r1=315855&r2=315856&view=diff
> 
> ==
> --- cfe/trunk/include/clang/Basic/Attributes.h (original)
> +++ cfe/trunk/include/clang/Basic/Attributes.h Sun Oct 15 08:01:42 2017
> @@ -26,6 +26,8 @@ enum class AttrSyntax {
>Microsoft,
>// Is the identifier known as a C++-style attribute?
>CXX,
> +  // Is the identifier known as a C-style attribu

Re: r315856 - Add -f[no-]double-square-bracket-attributes as new driver options to control use of [[]] attributes in all language modes. This is the initial implementation of WG14 N2165, which is a pr

2017-10-18 Thread Galina Kistanova via cfe-commits
Thank you!

On Wed, Oct 18, 2017 at 7:38 AM, Aaron Ballman 
wrote:

> Thanks for pointing the breakage out -- it should be fixed with r316075.
>
> ~Aaron
>
> On Wed, Oct 18, 2017 at 7:50 AM, Aaron Ballman 
> wrote:
> > I'll take a look, thank you for pointing it out (and sorry for the
> trouble)!
> >
> > ~Aaron
> >
> > On Tue, Oct 17, 2017 at 9:56 PM, Galina Kistanova 
> wrote:
> >> Hello Aaron,
> >>
> >> This commit broke one our builders:
> >>
> >> http://lab.llvm.org:8011/builders/ubuntu-gcc7.1-werror/builds/2272
> >>
> >> . . .
> >> FAILED: /usr/local/gcc-7.1/bin/g++-7.1   -DGTEST_HAS_RTTI=0 -D_DEBUG
> >> -D_GNU_SOURCE -D__STDC_CONSTANT_MACROS -D__STDC_FORMAT_MACROS
> >> -D__STDC_LIMIT_MACROS -Itools/clang/lib/Basic
> >> -I/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/
> tools/clang/lib/Basic
> >> -I/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/
> tools/clang/include
> >> -Itools/clang/include -Iinclude
> >> -I/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/include
> >> -Wno-noexcept-type -fPIC -fvisibility-inlines-hidden -Werror
> >> -Werror=date-time -std=c++11 -Wall -W -Wno-unused-parameter
> -Wwrite-strings
> >> -Wcast-qual -Wno-missing-field-initializers -pedantic -Wno-long-long
> >> -Wno-maybe-uninitialized -Wdelete-non-virtual-dtor -Wno-comment
> >> -ffunction-sections -fdata-sections -fno-common -Woverloaded-virtual
> >> -fno-strict-aliasing -O3  -fPIC   -UNDEBUG  -fno-exceptions -fno-rtti
> -MD
> >> -MT tools/clang/lib/Basic/CMakeFiles/clangBasic.dir/Attributes.cpp.o
> -MF
> >> tools/clang/lib/Basic/CMakeFiles/clangBasic.dir/Attributes.cpp.o.d -o
> >> tools/clang/lib/Basic/CMakeFiles/clangBasic.dir/Attributes.cpp.o -c
> >> /home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/
> tools/clang/lib/Basic/Attributes.cpp
> >> In file included from
> >> /home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/
> tools/clang/lib/Basic/Attributes.cpp:15:0:
> >> tools/clang/include/clang/Basic/AttrHasAttributeImpl.inc: In function
> ‘int
> >> clang::hasAttribute(clang::AttrSyntax, const clang::IdentifierInfo*,
> const
> >> clang::IdentifierInfo*, const clang::TargetInfo&, const
> >> clang::LangOptions&)’:
> >> tools/clang/include/clang/Basic/AttrHasAttributeImpl.inc:526:8: error:
> this
> >> statement may fall through [-Werror=implicit-fallthrough=]
> >>  } else if (Scope->getName() == "gsl") {
> >> ^~
> >> tools/clang/include/clang/Basic/AttrHasAttributeImpl.inc:532:1: note:
> here
> >>  case AttrSyntax::C: {
> >>  ^~~~
> >> cc1plus: all warnings being treated as errors
> >>
> >> Please have a look?
> >>
> >> Thanks
> >>
> >> Galina
> >>
> >> On Sun, Oct 15, 2017 at 8:01 AM, Aaron Ballman via cfe-commits
> >>  wrote:
> >>>
> >>> Author: aaronballman
> >>> Date: Sun Oct 15 08:01:42 2017
> >>> New Revision: 315856
> >>>
> >>> URL: http://llvm.org/viewvc/llvm-project?rev=315856&view=rev
> >>> Log:
> >>> Add -f[no-]double-square-bracket-attributes as new driver options to
> >>> control use of [[]] attributes in all language modes. This is the
> initial
> >>> implementation of WG14 N2165, which is a proposal to add [[]]
> attributes to
> >>> C2x, but also allows you to enable these attributes in C++98, or
> disable
> >>> them in C++11 or later.
> >>>
> >>> Added:
> >>> cfe/trunk/test/Misc/ast-dump-c-attr.c
> >>> cfe/trunk/test/Parser/c2x-attributes.c
> >>> cfe/trunk/test/Parser/c2x-attributes.m
> >>> cfe/trunk/test/Sema/attr-deprecated-c2x.c
> >>> Modified:
> >>> cfe/trunk/include/clang/Basic/Attr.td
> >>> cfe/trunk/include/clang/Basic/Attributes.h
> >>> cfe/trunk/include/clang/Basic/LangOptions.def
> >>> cfe/trunk/include/clang/Driver/Options.td
> >>> cfe/trunk/include/clang/Parse/Parser.h
> >>> cfe/trunk/include/clang/Sema/AttributeList.h
> >>> cfe/trunk/lib/Frontend/CompilerInvocation.cpp
> >>> cfe/trunk/lib/Lex/Lexer.cpp
> >>> cfe/trunk/lib/Parse/ParseDecl.cpp
> >>> cfe/trunk/lib/Parse/ParseDeclCXX.cpp
> >>> cfe/trunk/lib/Sema/AttributeList.cpp
> >>> cfe/trunk/utils/TableGen/ClangAttrEmitter.cpp
> >>>
> >>> Modified: cfe/trunk/include/clang/Basic/Attr.td
> >>> URL:
> >>> http://llvm.org/viewvc/llvm-project/cfe/trunk/include/
> clang/Basic/Attr.td?rev=315856&r1=315855&r2=315856&view=diff
> >>>
> >>> 
> ==
> >>> --- cfe/trunk/include/clang/Basic/Attr.td (original)
> >>> +++ cfe/trunk/include/clang/Basic/Attr.td Sun Oct 15 08:01:42 2017
> >>> @@ -210,6 +210,10 @@ class CXX11 >>>string Namespace = namespace;
> >>>int Version = version;
> >>>  }
> >>> +class C2x : Spelling {
> >>> +  string Namespace = namespace;
> >>> +}
> >>> +
> >>>  class Keyword : Spelling;
> >>>  class Pragma : Spelling "Pragma"> {
> >>>string Namespace = namespace;
> >>> @@ -958,7 +962,7 @@ def RenderScriptKernel : Attr {
> >>>
> >>>  def Deprecated : InheritableAttr {
> >>>let Spellings = [GCC<"deprecated">, Declspec<"deprecated">,
> >>> -   C

LLVM buildmaster will be updated and restarted tonight

2017-10-20 Thread Galina Kistanova via cfe-commits
Hello everyone,

LLVM buildmaster will be updated and restarted after 7 PM Pacific time.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


LLVM buildmaster will be restarted tonight

2018-08-29 Thread Galina Kistanova via cfe-commits
 Hello everyone,

LLVM buildmaster will be updated and restarted after 6PM Pacific time today.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Buildbot numbers for the week of 8/12/2018 - 8/18/2018

2018-08-29 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the week of 8/12/2018 - 8/18/2018.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:
   buildername   | was_red
-+-
 clang-cmake-aarch64-lld | 87:39:15
 clang-cmake-armv7-full  | 62:31:05
 clang-x64-ninja-win7| 61:38:17
 clang-x86-windows-msvc2015  | 61:24:41
 clang-cmake-armv8-quick | 60:39:46
 clang-cmake-aarch64-global-isel | 60:25:12
 clang-cmake-armv8-full  | 60:16:05
 clang-cmake-armv8-global-isel   | 60:09:44
 clang-cmake-aarch64-quick   | 58:05:47
 lldb-amd64-ninja-netbsd8| 52:52:42
 clang-cmake-armv7-quick | 52:35:33
 clang-cmake-armv7-global-isel   | 51:53:59
 clang-x86_64-linux-abi-test | 50:10:12
 llvm-clang-x86_64-expensive-checks-win  | 34:21:28
 clang-lld-x86_64-2stage | 32:01:48
 sanitizer-x86_64-linux-bootstrap-ubsan  | 25:18:42
 clang-cuda-build| 25:17:38
 clang-x86_64-linux-selfhost-modules | 20:54:18
 clang-with-thin-lto-ubuntu  | 20:45:47
 clang-ppc64be-linux-multistage  | 20:40:01
 clang-hexagon-elf   | 20:31:08
 clang-with-lto-ubuntu   | 20:20:38
 clang-ppc64be-linux-lnt | 20:06:39
 clang-ppc64be-linux | 19:59:02
 clang-ppc64le-linux-lnt | 19:51:05
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast  | 19:48:49
 clang-cmake-x86_64-avx2-linux   | 19:47:22
 clang-cmake-x86_64-sde-avx512-linux | 19:42:36
 clang-cmake-aarch64-full| 19:29:54
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast| 19:27:21
 clang-cmake-thumbv8-full-sh | 19:25:18
 clang-ppc64le-linux | 19:15:21
 reverse-iteration   | 18:36:07
 clang-cmake-armv8-selfhost-neon | 18:33:46
 clang-ppc64le-linux-multistage  | 18:07:47
 clang-cmake-thumbv7-full-sh | 17:01:50
 clang-cmake-armv7-selfhost  | 14:58:56
 clang-cmake-armv7-selfhost-neon | 14:35:12
 libcxx-libcxxabi-libunwind-aarch64-linux-noexceptions   | 12:32:40
 sanitizer-x86_64-linux-fast | 11:56:48
 libcxx-libcxxabi-libunwind-armv8-linux  | 11:02:31
 sanitizer-x86_64-linux-bootstrap| 11:02:17
 libcxx-libcxxabi-libunwind-aarch64-linux| 11:01:52
 libcxx-libcxxabi-libunwind-armv8-linux-noexceptions | 11:01:00
 libcxx-libcxxabi-libunwind-armv7-linux  | 10:55:10
 libcxx-libcxxabi-libunwind-armv7-linux-noexceptions | 10:52:17
 libcxx-libcxxabi-x86_64-linux-ubuntu-asan   | 10:48:03
 libcxx-libcxxabi-x86_64-linux-ubuntu-msan   | 10:47:32
 libcxx-libcxxabi-libunwind-x86_64-linux-ubuntu  | 10:46:28
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx2a  | 10:46:07
 libcxx-libcxxabi-x86_64-linux-ubuntu-tsan   | 10:45:59
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx17  | 10:45:33
 lldb-x86_64-ubuntu-14.04-cmake  | 07:10:00
 sanitizer-ppc64le-linux | 05:32:03
 sanitizer-x86_64-linux-bootstrap-msan   | 04:37:05
 clang-tools-sphinx-docs | 04:32:56
 clang-cmake-x86_64-avx2-linux-perf  | 03:59:49
 clang-cmake-armv8-lnt   | 03:45:30
 sanitizer-ppc64be-linux | 03:40:56
 lldb-windows7-android   | 03:25:35
 libcxx-libcxxabi-x86_64-linux-ubuntu-gcc-tot-latest-std | 03:24:55
 sanitizer-x86_64-linux  | 03:16:35
 clang-cmake-armv7-lnt

Buildbot numbers for the week of 8/19/2018 - 8/25/2018

2018-08-29 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the last week of 8/19/2018 - 8/25/2018.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:
buildername|  was_red
---+--
 clang-hexagon-elf | 101:56:59
 llvm-hexagon-elf  | 99:32:47
 aosp-O3-polly-before-vectorizer-unprofitable  | 96:47:48
 clang-cmake-aarch64-quick | 48:49:28
 clang-lld-x86_64-2stage   | 36:16:20
 clang-with-lto-ubuntu | 34:35:38
 sanitizer-x86_64-linux-bootstrap  | 32:52:44
 sanitizer-x86_64-linux-bootstrap-ubsan| 32:06:51
 clang-with-thin-lto-ubuntu| 32:05:53
 llvm-clang-x86_64-expensive-checks-win| 28:03:52
 clang-x86-windows-msvc2015| 27:42:25
 libcxx-libcxxabi-x86_64-linux-debian-noexceptions | 27:03:45
 libcxx-libcxxabi-libunwind-x86_64-linux-debian| 27:02:27
 sanitizer-x86_64-linux-bootstrap-msan | 26:54:06
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast  | 23:51:40
 clang-cmake-aarch64-lld   | 21:30:44
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx2a| 20:51:44
 clang-x86_64-linux-selfhost-modules   | 18:28:13
 clang-ppc64le-linux-lnt   | 16:04:38
 sanitizer-x86_64-linux-fuzzer | 15:09:20
 sanitizer-x86_64-linux| 15:05:41
 clang-cmake-thumbv8-full-sh   | 14:48:39
 clang-cmake-armv8-selfhost-neon   | 12:47:43
 clang-cmake-armv7-selfhost-neon   | 12:39:37
 clang-cmake-armv7-selfhost| 12:39:31
 sanitizer-x86_64-linux-fast   | 12:22:32
 clang-ppc64le-linux-multistage| 10:56:35
 clang-cmake-aarch64-global-isel   | 09:32:55
 clang-ppc64be-linux-lnt   | 09:29:06
 clang-ppc64be-linux   | 09:27:13
 clang-cmake-armv8-quick   | 09:26:18
 clang-ppc64be-linux-multistage| 09:23:55
 lldb-amd64-ninja-netbsd8  | 09:18:53
 clang-cmake-armv8-full| 09:15:46
 clang-ppc64le-linux   | 09:13:56
 clang-cmake-armv7-global-isel | 09:00:32
 clang-cmake-armv7-quick   | 08:42:05
 clang-cmake-armv8-global-isel | 08:41:53
 clang-x86_64-debian-fast  | 08:18:34
 clang-cmake-aarch64-full  | 07:55:32
 clang-cmake-armv7-full| 07:24:20
 reverse-iteration | 06:51:23
 clang-cuda-build  | 06:50:09
 clang-cmake-thumbv7-full-sh   | 06:27:45
 clang-x64-ninja-win7  | 04:45:20
 sanitizer-ppc64le-linux   | 03:58:07
 sanitizer-windows | 03:54:52
 lldb-windows7-android | 02:57:38
 sanitizer-ppc64be-linux   | 02:46:12
 lldb-x86-windows-msvc2015 | 02:37:22
 sanitizer-x86_64-linux-autoconf   | 02:12:00
 clang-cmake-armv7-lnt | 02:04:57
 lld-x86_64-darwin13   | 01:55:06
 clang-cmake-x86_64-avx2-linux-perf| 01:37:41
 clang-cmake-armv8-lnt | 01:19:55
 lld-x86_64-freebsd| 01:19:11
 lldb-x86_64-ubuntu-14.04-buildserver  | 01:12:28
 lld-perf-testsuite| 01:07:51
 clang-cmake-x86_64-avx2-linux | 01:04:07
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast| 01:04:01
 clang-cmake-x86_64-sde-avx512-linux   | 00:51:17
 clang-sphinx-docs | 00:36:17
 clang-aarch64-linux-build-cache   | 00:27:38
 polly-arm-linux   | 00:26:35
 clang-armv7-linux-build-cache | 00:25:47
 polly-amd64-linux | 00:24:26
 sanitizer-x86_64-linux-android| 00:23:16
 clang-x86_64-linux-abi-test   | 00:20:28
 lldb-amd64-ninja-freebsd1

Re: r341117 - [MS ABI] Fix mangling issue with dynamic initializer stubs.

2018-08-31 Thread Galina Kistanova via cfe-commits
Hello Zachary,

It looks like this commit added broken tests on one of our builders:
http://lab.llvm.org:8011/builders/llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast/builds/19508

. . .
Failing Tests (2):
LLVM-Unit :: ADT/./ADTTests.exe/HashingTest.HashCombineRangeGoldenTest
Clang :: CodeGenCXX/catch-undef-behavior.cpp

Please have a look?
The builder was already red and did not send notifications on this.

Thanks

Galina

On Thu, Aug 30, 2018 at 1:54 PM Zachary Turner via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: zturner
> Date: Thu Aug 30 13:53:11 2018
> New Revision: 341117
>
> URL: http://llvm.org/viewvc/llvm-project?rev=341117&view=rev
> Log:
> [MS ABI] Fix mangling issue with dynamic initializer stubs.
>
> There are two types of dynamic initializer stubs.  There's
>
>   `dynamic initializer for 'x''(void)
>
> and
>
>   `dynamic initializer for `static Foo::Bar StaticDataMember''(void)
>
> The second case is disambiguated from the first by the presence of
> a ? after the operator code.  So the first will appear something like
> ?__E while the second will appear something like ?__E?.
> clang-cl was mangling these both the same though.  This patch
> matches behavior with cl.
>
> Differential Revision: https://reviews.llvm.org/D51500
>
> Modified:
> cfe/trunk/lib/AST/MicrosoftMangle.cpp
> cfe/trunk/test/CodeGenCXX/microsoft-abi-static-initializers.cpp
> cfe/trunk/test/CodeGenCXX/pragma-init_seg.cpp
>
> Modified: cfe/trunk/lib/AST/MicrosoftMangle.cpp
> URL:
> http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/AST/MicrosoftMangle.cpp?rev=341117&r1=341116&r2=341117&view=diff
>
> ==
> --- cfe/trunk/lib/AST/MicrosoftMangle.cpp (original)
> +++ cfe/trunk/lib/AST/MicrosoftMangle.cpp Thu Aug 30 13:53:11 2018
> @@ -3217,10 +3217,13 @@ void MicrosoftMangleContextImpl::mangleI
>msvc_hashing_ostream MHO(Out);
>MicrosoftCXXNameMangler Mangler(*this, MHO);
>Mangler.getStream() << "??__" << CharCode;
> -  Mangler.mangleName(D);
>if (D->isStaticDataMember()) {
> +Mangler.getStream() << '?';
> +Mangler.mangleName(D);
>  Mangler.mangleVariableEncoding(D);
> -Mangler.getStream() << '@';
> +Mangler.getStream() << "@@";
> +  } else {
> +Mangler.mangleName(D);
>}
>// This is the function class mangling.  These stubs are global,
> non-variadic,
>// cdecl functions that return void and take no args.
>
> Modified: cfe/trunk/test/CodeGenCXX/microsoft-abi-static-initializers.cpp
> URL:
> http://llvm.org/viewvc/llvm-project/cfe/trunk/test/CodeGenCXX/microsoft-abi-static-initializers.cpp?rev=341117&r1=341116&r2=341117&view=diff
>
> ==
> --- cfe/trunk/test/CodeGenCXX/microsoft-abi-static-initializers.cpp
> (original)
> +++ cfe/trunk/test/CodeGenCXX/microsoft-abi-static-initializers.cpp Thu
> Aug 30 13:53:11 2018
> @@ -3,8 +3,8 @@
>  // CHECK: @llvm.global_ctors = appending global [5 x { i32, void ()*, i8*
> }] [
>  // CHECK: { i32, void ()*, i8* } { i32 65535, void ()* 
> @"??__Eselectany1@@YAXXZ",
> i8* getelementptr inbounds (%struct.S, %struct.S* @"?selectany1@@3US@@A",
> i32 0, i32 0) },
>  // CHECK: { i32, void ()*, i8* } { i32 65535, void ()* 
> @"??__Eselectany2@@YAXXZ",
> i8* getelementptr inbounds (%struct.S, %struct.S* @"?selectany2@@3US@@A",
> i32 0, i32 0) },
> -// CHECK: { i32, void ()*, i8* } { i32 65535, void ()* @"??__Es@
> ?$ExportedTemplate@H@@2US@@A@YAXXZ", i8* getelementptr inbounds
> (%struct.S, %struct.S* @"?s@?$ExportedTemplate@H@@2US@@A", i32 0, i32 0)
> },
> -// CHECK: { i32, void ()*, i8* } { i32 65535, void ()* @"??__Efoo@?$B@H
> @@2VA@@A@YAXXZ", i8* bitcast (%class.A* @"?foo@?$B@H@@2VA@@A" to i8*) },
> +// CHECK: { i32, void ()*, i8* } { i32 65535, void ()* @"??__E?s@
> ?$ExportedTemplate@H@@2US@@A@@YAXXZ", i8* getelementptr inbounds
> (%struct.S, %struct.S* @"?s@?$ExportedTemplate@H@@2US@@A", i32 0, i32 0)
> },
> +// CHECK: { i32, void ()*, i8* } { i32 65535, void ()* @"??__E?foo@?$B@H
> @@2VA@@A@@YAXXZ", i8* bitcast (%class.A* @"?foo@?$B@H@@2VA@@A" to i8*) },
>  // CHECK: { i32, void ()*, i8* } { i32 65535, void ()*
> @_GLOBAL__sub_I_microsoft_abi_static_initializers.cpp, i8* null }
>  // CHECK: ]
>
> @@ -231,18 +231,18 @@ void force_usage() {
>DynamicDLLImportInitVSMangling::switch_test3();
>  }
>
> -// CHECK: define linkonce_odr dso_local void @"??__Efoo@?$B@H@@2VA@
> @A@YAXXZ"() {{.*}} comdat
> +// CHECK: define linkonce_odr dso_local void 
> @"??__E?foo@?$B@H@@2VA@@A@@YAXXZ"()
> {{.*}} comdat
>  // CHECK-NOT: and
>  // CHECK-NOT: ?_Bfoo@
>  // CHECK: call x86_thiscallcc %class.A* @"??0A@@QAE@XZ"
> -// CHECK: call i32 @atexit(void ()* @"??__Ffoo@?$B@H@@2VA@@A@YAXXZ")
> +// CHECK: call i32 @atexit(void ()* @"??__F?foo@?$B@H@@2VA@@A@@YAXXZ")
>  // CHECK: ret void
>
>  // CHECK: define linkonce_odr dso_local x86_thiscallcc %class.A* @"??0A@
> @QAE@XZ"({{.*}}) {{

Re: r341117 - [MS ABI] Fix mangling issue with dynamic initializer stubs.

2018-08-31 Thread Galina Kistanova via cfe-commits
The builder is just fixed, so I am wrong. Sorry to bother you.

Thanks

Galina

On Fri, Aug 31, 2018 at 1:08 PM Zachary Turner  wrote:

> Are we sure it was my commit?  Because this seems like a very unusual
> failure given the nature of the commit.  I'll try to reproduce it locally
> and report back.
>
> On Fri, Aug 31, 2018 at 11:49 AM Galina Kistanova 
> wrote:
>
>> Hello Zachary,
>>
>> It looks like this commit added broken tests on one of our builders:
>>
>> http://lab.llvm.org:8011/builders/llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast/builds/19508
>>
>> . . .
>> Failing Tests (2):
>> LLVM-Unit :: ADT/./ADTTests.exe/HashingTest.HashCombineRangeGoldenTest
>> Clang :: CodeGenCXX/catch-undef-behavior.cpp
>>
>> Please have a look?
>> The builder was already red and did not send notifications on this.
>>
>> Thanks
>>
>> Galina
>>
>> On Thu, Aug 30, 2018 at 1:54 PM Zachary Turner via cfe-commits <
>> cfe-commits@lists.llvm.org> wrote:
>>
>>> Author: zturner
>>> Date: Thu Aug 30 13:53:11 2018
>>> New Revision: 341117
>>>
>>> URL: http://llvm.org/viewvc/llvm-project?rev=341117&view=rev
>>> Log:
>>> [MS ABI] Fix mangling issue with dynamic initializer stubs.
>>>
>>> There are two types of dynamic initializer stubs.  There's
>>>
>>>   `dynamic initializer for 'x''(void)
>>>
>>> and
>>>
>>>   `dynamic initializer for `static Foo::Bar StaticDataMember''(void)
>>>
>>> The second case is disambiguated from the first by the presence of
>>> a ? after the operator code.  So the first will appear something like
>>> ?__E while the second will appear something like ?__E?.
>>> clang-cl was mangling these both the same though.  This patch
>>> matches behavior with cl.
>>>
>>> Differential Revision: https://reviews.llvm.org/D51500
>>>
>>> Modified:
>>> cfe/trunk/lib/AST/MicrosoftMangle.cpp
>>> cfe/trunk/test/CodeGenCXX/microsoft-abi-static-initializers.cpp
>>> cfe/trunk/test/CodeGenCXX/pragma-init_seg.cpp
>>>
>>> Modified: cfe/trunk/lib/AST/MicrosoftMangle.cpp
>>> URL:
>>> http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/AST/MicrosoftMangle.cpp?rev=341117&r1=341116&r2=341117&view=diff
>>>
>>> ==
>>> --- cfe/trunk/lib/AST/MicrosoftMangle.cpp (original)
>>> +++ cfe/trunk/lib/AST/MicrosoftMangle.cpp Thu Aug 30 13:53:11 2018
>>> @@ -3217,10 +3217,13 @@ void MicrosoftMangleContextImpl::mangleI
>>>msvc_hashing_ostream MHO(Out);
>>>MicrosoftCXXNameMangler Mangler(*this, MHO);
>>>Mangler.getStream() << "??__" << CharCode;
>>> -  Mangler.mangleName(D);
>>>if (D->isStaticDataMember()) {
>>> +Mangler.getStream() << '?';
>>> +Mangler.mangleName(D);
>>>  Mangler.mangleVariableEncoding(D);
>>> -Mangler.getStream() << '@';
>>> +Mangler.getStream() << "@@";
>>> +  } else {
>>> +Mangler.mangleName(D);
>>>}
>>>// This is the function class mangling.  These stubs are global,
>>> non-variadic,
>>>// cdecl functions that return void and take no args.
>>>
>>> Modified: cfe/trunk/test/CodeGenCXX/microsoft-abi-static-initializers.cpp
>>> URL:
>>> http://llvm.org/viewvc/llvm-project/cfe/trunk/test/CodeGenCXX/microsoft-abi-static-initializers.cpp?rev=341117&r1=341116&r2=341117&view=diff
>>>
>>> ==
>>> --- cfe/trunk/test/CodeGenCXX/microsoft-abi-static-initializers.cpp
>>> (original)
>>> +++ cfe/trunk/test/CodeGenCXX/microsoft-abi-static-initializers.cpp Thu
>>> Aug 30 13:53:11 2018
>>> @@ -3,8 +3,8 @@
>>>  // CHECK: @llvm.global_ctors = appending global [5 x { i32, void ()*,
>>> i8* }] [
>>>  // CHECK: { i32, void ()*, i8* } { i32 65535, void ()*
>>> @"??__Eselectany1@@YAXXZ", i8* getelementptr inbounds (%struct.S,
>>> %struct.S* @"?selectany1@@3US@@A", i32 0, i32 0) },
>>>  // CHECK: { i32, void ()*, i8* } { i32 65535, void ()*
>>> @"??__Eselectany2@@YAXXZ", i8* getelementptr inbounds (%struct.S,
>>> %struct.S* @"?selectany2@@3US@@A", i32 0, i32 0) },
>>> -// CHECK: { i32, void ()*, i8* } { i32 65535, void ()* @"??__Es@
>>> ?$ExportedTemplate@H@@2US@@A@YAXXZ", i8* getelementptr inbounds
>>> (%struct.S, %struct.S* @"?s@?$ExportedTemplate@H@@2US@@A", i32 0, i32
>>> 0) },
>>> -// CHECK: { i32, void ()*, i8* } { i32 65535, void ()* @"??__Efoo@?$B@H
>>> @@2VA@@A@YAXXZ", i8* bitcast (%class.A* @"?foo@?$B@H@@2VA@@A" to i8*) },
>>> +// CHECK: { i32, void ()*, i8* } { i32 65535, void ()* @"??__E?s@
>>> ?$ExportedTemplate@H@@2US@@A@@YAXXZ", i8* getelementptr inbounds
>>> (%struct.S, %struct.S* @"?s@?$ExportedTemplate@H@@2US@@A", i32 0, i32
>>> 0) },
>>> +// CHECK: { i32, void ()*, i8* } { i32 65535, void ()* @"??__E?foo@
>>> ?$B@H@@2VA@@A@@YAXXZ", i8* bitcast (%class.A* @"?foo@?$B@H@@2VA@@A" to
>>> i8*) },
>>>  // CHECK: { i32, void ()*, i8* } { i32 65535, void ()*
>>> @_GLOBAL__sub_I_microsoft_abi_static_initializers.cpp, i8* null }
>>>  // CHECK: ]
>>>
>>> @@ -231,18 +231,18 @@ void force_usage() {
>>>DynamicDLLImportInitVSMang

Re: r341421 - [ODRHash] Extend hash to support all Type's.

2018-09-05 Thread Galina Kistanova via cfe-commits
Hello Richard,

This commit added broken test to one of our builders:
http://lab.llvm.org:8011/builders/llvm-clang-x86_64-expensive-checks-win/builds/12240

. . .
Failing Tests (3):
Clang :: Modules/odr_hash.cpp
LLVM :: CodeGen/AMDGPU/mubuf-legalize-operands.ll
LLVM :: CodeGen/AMDGPU/mubuf-legalize-operands.mir

Please have a look?
The builder was already red and did not send notifications on this.

Thanks

Galina

On Tue, Sep 4, 2018 at 3:54 PM Richard Trieu via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: rtrieu
> Date: Tue Sep  4 15:53:19 2018
> New Revision: 341421
>
> URL: http://llvm.org/viewvc/llvm-project?rev=341421&view=rev
> Log:
> [ODRHash] Extend hash to support all Type's.
>
> Added:
> cfe/trunk/test/Modules/odr_hash-gnu.cpp
> cfe/trunk/test/Modules/odr_hash-vector.cpp
> cfe/trunk/test/Modules/odr_hash.cl
> Modified:
> cfe/trunk/include/clang/AST/ODRHash.h
> cfe/trunk/lib/AST/ODRHash.cpp
> cfe/trunk/lib/AST/StmtProfile.cpp
> cfe/trunk/test/Modules/odr_hash-blocks.cpp
> cfe/trunk/test/Modules/odr_hash.cpp
> cfe/trunk/test/Modules/odr_hash.mm
>
> Modified: cfe/trunk/include/clang/AST/ODRHash.h
> URL:
> http://llvm.org/viewvc/llvm-project/cfe/trunk/include/clang/AST/ODRHash.h?rev=341421&r1=341420&r2=341421&view=diff
>
> ==
> --- cfe/trunk/include/clang/AST/ODRHash.h (original)
> +++ cfe/trunk/include/clang/AST/ODRHash.h Tue Sep  4 15:53:19 2018
> @@ -83,7 +83,7 @@ public:
>void AddIdentifierInfo(const IdentifierInfo *II);
>void AddNestedNameSpecifier(const NestedNameSpecifier *NNS);
>void AddTemplateName(TemplateName Name);
> -  void AddDeclarationName(DeclarationName Name);
> +  void AddDeclarationName(DeclarationName Name, bool TreatAsDecl = false);
>void AddTemplateArgument(TemplateArgument TA);
>void AddTemplateParameterList(const TemplateParameterList *TPL);
>
>
> Modified: cfe/trunk/lib/AST/ODRHash.cpp
> URL:
> http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/AST/ODRHash.cpp?rev=341421&r1=341420&r2=341421&view=diff
>
> ==
> --- cfe/trunk/lib/AST/ODRHash.cpp (original)
> +++ cfe/trunk/lib/AST/ODRHash.cpp Tue Sep  4 15:53:19 2018
> @@ -32,7 +32,10 @@ void ODRHash::AddIdentifierInfo(const Id
>ID.AddString(II->getName());
>  }
>
> -void ODRHash::AddDeclarationName(DeclarationName Name) {
> +void ODRHash::AddDeclarationName(DeclarationName Name, bool TreatAsDecl) {
> +  if (TreatAsDecl)
> +AddBoolean(true);
> +
>// Index all DeclarationName and use index numbers to refer to them.
>auto Result = DeclNameMap.insert(std::make_pair(Name,
> DeclNameMap.size()));
>ID.AddInteger(Result.first->second);
> @@ -88,6 +91,9 @@ void ODRHash::AddDeclarationName(Declara
>  }
>}
>}
> +
> +  if (TreatAsDecl)
> +AddBoolean(false);
>  }
>
>  void ODRHash::AddNestedNameSpecifier(const NestedNameSpecifier *NNS) {
> @@ -405,6 +411,7 @@ public:
>
>void VisitFunctionTemplateDecl(const FunctionTemplateDecl *D) {
>  AddDecl(D->getTemplatedDecl());
> +ID.AddInteger(D->getTemplatedDecl()->getODRHash());
>  Inherited::VisitFunctionTemplateDecl(D);
>}
>
> @@ -552,11 +559,27 @@ void ODRHash::AddFunctionDecl(const Func
> !Function->isDefaulted() && !Function->isDeleted()
> &&
> !Function->isLateTemplateParsed();
>AddBoolean(HasBody);
> -  if (HasBody) {
> -auto *Body = Function->getBody();
> -AddBoolean(Body);
> -if (Body)
> -  AddStmt(Body);
> +  if (!HasBody) {
> +return;
> +  }
> +
> +  auto *Body = Function->getBody();
> +  AddBoolean(Body);
> +  if (Body)
> +AddStmt(Body);
> +
> +  // Filter out sub-Decls which will not be processed in order to get an
> +  // accurate count of Decl's.
> +  llvm::SmallVector Decls;
> +  for (Decl *SubDecl : Function->decls()) {
> +if (isWhitelistedDecl(SubDecl, Function)) {
> +  Decls.push_back(SubDecl);
> +}
> +  }
> +
> +  ID.AddInteger(Decls.size());
> +  for (auto SubDecl : Decls) {
> +AddSubDecl(SubDecl);
>}
>  }
>
> @@ -592,13 +615,24 @@ void ODRHash::AddDecl(const Decl *D) {
>assert(D && "Expecting non-null pointer.");
>D = D->getCanonicalDecl();
>
> -  if (const NamedDecl *ND = dyn_cast(D)) {
> -AddDeclarationName(ND->getDeclName());
> +  const NamedDecl *ND = dyn_cast(D);
> +  AddBoolean(ND);
> +  if (!ND) {
> +ID.AddInteger(D->getKind());
>  return;
>}
>
> -  ID.AddInteger(D->getKind());
> -  // TODO: Handle non-NamedDecl here.
> +  AddDeclarationName(ND->getDeclName());
> +
> +  const auto *Specialization =
> +dyn_cast(D);
> +  AddBoolean(Specialization);
> +  if (Specialization) {
> +const TemplateArgumentList &List = Specialization->getTemplateArgs();
> +ID.AddInteger(List.size());
> +for (const TemplateArgument &TA : List.asArray())
> +  AddTemp

Re: r341475 - Fix arm_neon.h and arm_fp16.h generation for compiling with std=c89

2018-09-05 Thread Galina Kistanova via cfe-commits
Hello Diogo,

This commit added couple of broken tests to one of our builders:
http://lab.llvm.org:8011/builders/llvm-clang-x86_64-expensive-checks-win

. . .
Failing Tests (5):
Clang :: Headers/arm-fp16-header.c
Clang :: Headers/arm-neon-header.c
. . .

Please have a look?
The builder was already red and did not send notifications on this.

Thanks

Galina

On Wed, Sep 5, 2018 at 7:59 AM Diogo N. Sampaio via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: dnsampaio
> Date: Wed Sep  5 07:56:21 2018
> New Revision: 341475
>
> URL: http://llvm.org/viewvc/llvm-project?rev=341475&view=rev
> Log:
> Fix arm_neon.h and arm_fp16.h generation for compiling with std=c89
>
>
> Summary:
> The inline attribute is not valid for C standard 89. Replace the argument
> in the generation of header files with __inline, as well adding tests for
> both header files.
>
> Reviewers: pbarrio, SjoerdMeijer, javed.absar, t.p.northover
>
> Subscribers: t.p.northover, kristof.beyls, chrib, cfe-commits
>
> Differential Revision: https://reviews.llvm.org/D51683
>
> test/Headers/arm-fp16-header.c
> test/Headers/arm-neon-header.c
> utils/TableGen/NeonEmitter.cpp
>
> Added:
> cfe/trunk/test/Headers/arm-fp16-header.c
> Modified:
> cfe/trunk/test/Headers/arm-neon-header.c
> cfe/trunk/utils/TableGen/NeonEmitter.cpp
>
> Added: cfe/trunk/test/Headers/arm-fp16-header.c
> URL:
> http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Headers/arm-fp16-header.c?rev=341475&view=auto
>
> ==
> --- cfe/trunk/test/Headers/arm-fp16-header.c (added)
> +++ cfe/trunk/test/Headers/arm-fp16-header.c Wed Sep  5 07:56:21 2018
> @@ -0,0 +1,19 @@
> +// RUN: %clang -fsyntax-only  -ffreestanding
> --target=aarch64-arm-none-eabi -march=armv8.2-a+fp16 -std=c89 -xc %s
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreestanding
> --target=aarch64-arm-none-eabi -march=armv8.2-a+fp16 -std=c99 -xc %s
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreestanding
> --target=aarch64-arm-none-eabi -march=armv8.2-a+fp16 -std=c11 -xc %s
> +
> +// RUN: %clang -fsyntax-only -ffreestanding
> --target=aarch64-armeb-none-eabi -march=armv8.2-a+fp16 -std=c89 -xc %s
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreestanding
> --target=aarch64-armeb-none-eabi -march=armv8.2-a+fp16 -std=c99 -xc %s
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreestanding
> --target=aarch64-armeb-none-eabi -march=armv8.2-a+fp16 -std=c11 -xc %s
> +
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreestanding
> --target=aarch64-arm-none-eabi -march=armv8.2-a+fp16 -std=c++98 -xc++ %s
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreestanding
> --target=aarch64-arm-none-eabi -march=armv8.2-a+fp16 -std=c++11 -xc++ %s
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreestanding
> --target=aarch64-arm-none-eabi -march=armv8.2-a+fp16 -std=c++14 -xc++ %s
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreestanding
> --target=aarch64-arm-none-eabi -march=armv8.2-a+fp16 -std=c++17 -xc++ %s
> +
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreestanding
> --target=aarch64-armeb-none-eabi -march=armv8.2-a+fp16 -std=c++98 -xc++ %s
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreestanding
> --target=aarch64-armeb-none-eabi -march=armv8.2-a+fp16 -std=c++11 -xc++ %s
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreestanding
> --target=aarch64-armeb-none-eabi -march=armv8.2-a+fp16 -std=c++14 -xc++ %s
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreestanding
> --target=aarch64-armeb-none-eabi -march=armv8.2-a+fp16 -std=c++17 -xc++ %s
> +
> +#include 
>
> Modified: cfe/trunk/test/Headers/arm-neon-header.c
> URL:
> http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Headers/arm-neon-header.c?rev=341475&r1=341474&r2=341475&view=diff
>
> ==
> --- cfe/trunk/test/Headers/arm-neon-header.c (original)
> +++ cfe/trunk/test/Headers/arm-neon-header.c Wed Sep  5 07:56:21 2018
> @@ -2,4 +2,23 @@
>  // RUN: %clang_cc1 -triple thumbv7-apple-darwin10 -target-cpu cortex-a8
> -fsyntax-only -fno-lax-vector-conversions -ffreestanding %s
>  // RUN: %clang_cc1 -x c++ -triple thumbv7-apple-darwin10 -target-cpu
> cortex-a8 -fsyntax-only -Wvector-conversions -ffreestanding %s
>
> +// RUN: %clang -fsyntax-only -ffreestanding
> --target=aarch64-arm-none-eabi -march=armv8.2-a+fp16 -std=c89 -xc %s
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreestanding
> --target=aarch64-arm-none-eabi -march=armv8.2-a+fp16 -std=c99 -xc %s
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreestanding
> --target=aarch64-arm-none-eabi -march=armv8.2-a+fp16 -std=c11 -xc %s
> +
> +// RUN: %clang -fsyntax-only -ffreestanding
> --target=aarch64-armeb-none-eabi -march=armv8.2-a+fp16 -std=c89 -xc %s
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreestanding
> --target=aarch64-armeb-none-eabi -march=armv8.2-a+fp16 -std=c99 -xc %s
> +// RUN: %clang -fsyntax-only -Wall -Werror -ffreest

Buildbot numbers for the week of 8/26/2018 - 9/01/2018

2018-09-12 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the week of 8/26/2018 - 9/01/2018.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:
   buildername|  was_red
--+--
 clang-cmake-aarch64-full | 112:55:51
 sanitizer-windows| 63:06:16
 clang-x64-ninja-win7 | 50:38:04
 clang-x86-windows-msvc2015   | 49:38:52
 clang-ppc64be-linux  | 45:13:08
 clang-ppc64be-linux-multistage   | 45:06:44
 clang-ppc64be-linux-lnt  | 45:03:13
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast | 36:51:20
 llvm-clang-x86_64-expensive-checks-win   | 35:05:44
 clang-cmake-armv8-selfhost-neon  | 31:36:21
 clang-x86_64-linux-selfhost-modules  | 30:50:52
 aosp-O3-polly-before-vectorizer-unprofitable | 25:00:10
 sanitizer-x86_64-linux-bootstrap-ubsan   | 23:40:58
 clang-cmake-thumbv8-full-sh  | 23:00:45
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx11   | 22:15:31
 clang-cmake-thumbv7-full-sh  | 21:12:30
 sanitizer-x86_64-linux-bootstrap | 21:10:18
 clang-cmake-armv8-quick  | 20:46:40
 clang-cmake-armv8-global-isel| 20:23:57
 clang-cmake-armv8-full   | 20:15:53
 sanitizer-x86_64-linux-bootstrap-msan| 18:17:42
 openmp-gcc-x86_64-linux-debian   | 17:47:03
 clang-x86_64-debian-fast | 16:53:14
 libcxx-libcxxabi-x86_64-linux-ubuntu-msan| 15:50:31
 clang-cmake-armv7-full   | 14:58:23
 clang-with-thin-lto-ubuntu   | 14:26:41
 clang-with-lto-ubuntu| 14:12:05
 clang-ppc64le-linux  | 13:22:48
 clang-cuda-build | 13:17:24
 clang-cmake-armv7-selfhost   | 13:17:14
 clang-cmake-armv7-selfhost-neon  | 13:15:09
 sanitizer-x86_64-linux-fast  | 13:14:52
 reverse-iteration| 13:09:34
 clang-ppc64le-linux-lnt  | 12:52:13
 sanitizer-x86_64-linux   | 12:10:31
 clang-ppc64le-linux-multistage   | 11:59:17
 clang-lld-x86_64-2stage  | 11:06:13
 sanitizer-ppc64le-linux  | 09:28:37
 sanitizer-ppc64be-linux  | 08:08:50
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast   | 07:46:07
 clang-cmake-aarch64-global-isel  | 07:34:49
 clang-cmake-aarch64-quick| 07:33:02
 clang-cmake-armv7-global-isel| 06:56:18
 clang-cmake-armv7-quick  | 06:50:09
 sanitizer-x86_64-linux-fuzzer| 06:38:44
 sanitizer-x86_64-linux-autoconf  | 06:36:30
 clang-cmake-x86_64-avx2-linux-perf   | 06:21:26
 lld-perf-testsuite   | 05:34:01
 sanitizer-x86_64-linux-android   | 05:19:19
 lldb-amd64-ninja-netbsd8 | 04:53:26
 libcxx-libcxxabi-x86_64-linux-ubuntu-tsan| 04:50:20
 lldb-x86_64-ubuntu-14.04-buildserver | 03:51:54
 clang-hexagon-elf| 03:32:55
 llvm-hexagon-elf | 03:19:23
 lldb-x86-windows-msvc2015| 03:16:11
 lld-x86_64-freebsd   | 03:14:17
 lldb-amd64-ninja-freebsd11   | 03:05:23
 clang-cmake-x86_64-avx2-linux| 02:27:40
 clang-cmake-x86_64-sde-avx512-linux  | 02:21:38
 lld-x86_64-darwin13  | 02:18:05
 clang-cmake-armv7-lnt| 02:16:13
 clang-x86_64-linux-abi-test  | 01:41:31
 clang-aarch64-linux-build-cache  | 01:36:19
 polly-arm-linux  | 01:36:00
 clang-cmake-armv8-lnt| 01:33:08
 clang-armv7-linux-build-cache| 01:30:37
 polly-amd64-linux| 00:42:37
(67 rows)


"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green):
  

Buildbot numbers for the week of 9/02/2018 - 9/08/2018

2018-09-12 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the last week of 9/02/2018 - 9/08/2018.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:
buildername| was_red
---+-
 lldb-windows7-android | 81:46:56
 clang-cuda-build  | 62:46:39
 sanitizer-x86_64-linux-autoconf   | 55:59:35
 llvm-clang-x86_64-expensive-checks-win| 54:02:42
 clang-x64-ninja-win7  | 41:30:42
 libcxx-libcxxabi-x86_64-linux-debian-noexceptions | 39:52:39
 clang-cmake-thumbv7-full-sh   | 30:29:51
 clang-x86-windows-msvc2015| 30:16:35
 libcxx-libcxxabi-x86_64-linux-debian  | 28:14:15
 clang-x86_64-linux-selfhost-modules   | 27:19:10
 clang-cmake-aarch64-full  | 25:32:32
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast  | 24:55:18
 clang-cmake-armv8-selfhost-neon   | 24:03:13
 clang-ppc64le-linux-multistage| 23:01:27
 clang-ppc64be-linux-multistage| 22:30:52
 clang-ppc64be-linux-lnt   | 22:22:35
 clang-ppc64be-linux   | 22:11:32
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast| 21:58:54
 clang-cmake-aarch64-quick | 21:34:32
 clang-cmake-armv8-lnt | 21:21:51
 clang-x86_64-linux-abi-test   | 21:19:44
 clang-lld-x86_64-2stage   | 20:29:20
 clang-cmake-aarch64-global-isel   | 20:08:01
 clang-with-lto-ubuntu | 18:28:34
 clang-cmake-armv7-lnt | 17:39:14
 clang-with-thin-lto-ubuntu| 17:24:50
 clang-cmake-armv8-full| 17:14:16
 clang-ppc64le-linux   | 16:15:58
 clang-cmake-thumbv8-full-sh   | 16:10:56
 clang-cmake-armv7-full| 16:06:58
 clang-cmake-armv8-quick   | 15:37:27
 clang-cmake-armv8-global-isel | 15:15:41
 sanitizer-x86_64-linux-bootstrap-msan | 13:50:25
 sanitizer-x86_64-linux-bootstrap  | 13:48:13
 sanitizer-x86_64-linux-bootstrap-ubsan| 13:41:54
 lld-x86_64-darwin13   | 09:55:46
 clang-cmake-x86_64-avx2-linux-perf| 07:09:52
 clang-x86_64-debian-fast  | 07:08:10
 clang-cmake-x86_64-sde-avx512-linux   | 07:00:15
 sanitizer-x86_64-linux-android| 06:45:22
 clang-cmake-x86_64-avx2-linux | 06:31:21
 llvm-hexagon-elf  | 06:12:49
 sanitizer-x86_64-linux| 06:02:07
 sanitizer-ppc64le-linux   | 05:45:30
 lldb-amd64-ninja-netbsd8  | 05:23:04
 polly-amd64-linux | 04:47:56
 lldb-x86-windows-msvc2015 | 04:32:44
 clang-hexagon-elf | 04:06:13
 sanitizer-ppc64be-linux   | 03:42:08
 sanitizer-x86_64-linux-fast   | 03:41:19
 lldb-x86_64-ubuntu-14.04-buildserver  | 01:57:12
 sanitizer-x86_64-linux-fuzzer | 01:42:39
 reverse-iteration | 01:35:23
 polly-arm-linux   | 01:23:28
 lld-x86_64-freebsd| 01:16:54
 clang-aarch64-linux-build-cache   | 01:14:55
 clang-armv7-linux-build-cache | 01:12:02
 lld-perf-testsuite| 01:00:36
 clang-ppc64le-linux-lnt   | 00:57:47
 sanitizer-windows | 00:55:24
 libcxx-sphinx-docs| 00:20:51
 lldb-amd64-ninja-freebsd11| 00:15:41
(62 rows)


"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green):
   buildername   | builds | changes
| status_change_ratio
-++-+
 libcxx-libcxxabi-x86_64-linux-debian|   

LLVM buildmaster will be restarted tonight

2018-09-14 Thread Galina Kistanova via cfe-commits
 Hello everyone,

LLVM buildmaster will be updated and restarted after 6PM Pacific time today.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


LLVM buildmaster will be restarted tonight

2018-07-24 Thread Galina Kistanova via cfe-commits
 Hello everyone,

LLVM buildmaster will be updated and restarted after 6PM Pacific time today.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Re: r338165 - [Sema] Use a TreeTransform to extract deduction guide parameter types

2018-07-27 Thread Galina Kistanova via cfe-commits
Hello Erik,

This commit broke build step on one of our builders:
http://lab.llvm.org:8011/builders/llvm-clang-x86_64-expensive-checks-win/builds/11300

. . .
FAILED: tools/clang/lib/Sema/CMakeFiles/clangSema.dir/SemaTemplate.cpp.obj
C:\PROGRA~2\MICROS~1.0\VC\bin\amd64\cl.exe  /nologo /TP -DEXPENSIVE_CHECKS
-DGTEST_HAS_RTTI=0 -DUNICODE -D_CRT_NONSTDC_NO_DEPRECATE
-D_CRT_NONSTDC_NO_WARNINGS -D_CRT_SECURE_NO_DEPRECATE
-D_CRT_SECURE_NO_WARNINGS -D_GLIBCXX_DEBUG -D_GNU_SOURCE
-D_HAS_EXCEPTIONS=0 -D_SCL_SECURE_NO_DEPRECATE -D_SCL_SECURE_NO_WARNINGS
-D_UNICODE -D__STDC_CONSTANT_MACROS -D__STDC_FORMAT_MACROS
-D__STDC_LIMIT_MACROS -Itools\clang\lib\Sema
-IC:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\tools\clang\lib\Sema
-IC:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\tools\clang\include
-Itools\clang\include -Iinclude
-IC:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\include
/DWIN32 /D_WINDOWS   /Zc:inline /Zc:strictStrings /Oi /Zc:rvalueCast /W4
-wd4141 -wd4146 -wd4180 -wd4244 -wd4258 -wd4267 -wd4291 -wd4345 -wd4351
-wd4355 -wd4456 -wd4457 -wd4458 -wd4459 -wd4503 -wd4624 -wd4722 -wd4800
-wd4100 -wd4127 -wd4512 -wd4505 -wd4610 -wd4510 -wd4702 -wd4245 -wd4706
-wd4310 -wd4701 -wd4703 -wd4389 -wd4611 -wd4805 -wd4204 -wd4577 -wd4091
-wd4592 -wd4319 -wd4324 -w14062 -we4238 /MDd /Zi /Ob0 /Od /RTC1/EHs-c-
/GR- /showIncludes
/Fotools\clang\lib\Sema\CMakeFiles\clangSema.dir\SemaTemplate.cpp.obj
/Fdtools\clang\lib\Sema\CMakeFiles\clangSema.dir\clangSema.pdb /FS -c
C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\tools\clang\lib\Sema\SemaTemplate.cpp
C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\tools\clang\lib\Sema\SemaTemplate.cpp
: fatal error C1128: number of sections exceeded object file format limit:
compile with /bigobj
ninja: build stopped: subcommand failed.


Please have a look?
The builder was already red and did not sent notifications.

Thanks

Galina

On Fri, Jul 27, 2018 at 2:23 PM, Erik Pilkington via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: epilk
> Date: Fri Jul 27 14:23:48 2018
> New Revision: 338165
>
> URL: http://llvm.org/viewvc/llvm-project?rev=338165&view=rev
> Log:
> [Sema] Use a TreeTransform to extract deduction guide parameter types
>
> Previously, we just canonicalized the type, but this lead to crashes with
> parameter types that referred to ParmVarDecls of the constructor. There
> may be
> more cases that this TreeTransform needs to handle though, such as a
> constructor
> parameter type referring to a member in an unevaluated context.
> Canonicalization
> doesn't address these cases either though, so we can address them
> as-needed in
> follow-up commits.
>
> rdar://41330135
>
> Differential revision: https://reviews.llvm.org/D49439
>
> Modified:
> cfe/trunk/lib/Sema/SemaTemplate.cpp
> cfe/trunk/test/SemaCXX/cxx1z-class-template-argument-deduction.cpp
>
> Modified: cfe/trunk/lib/Sema/SemaTemplate.cpp
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Sema/
> SemaTemplate.cpp?rev=338165&r1=338164&r2=338165&view=diff
> 
> ==
> --- cfe/trunk/lib/Sema/SemaTemplate.cpp (original)
> +++ cfe/trunk/lib/Sema/SemaTemplate.cpp Fri Jul 27 14:23:48 2018
> @@ -1659,6 +1659,23 @@ DeclResult Sema::CheckClassTemplate(
>  }
>
>  namespace {
> +/// Tree transform to "extract" a transformed type from a class template's
> +/// constructor to a deduction guide.
> +class ExtractTypeForDeductionGuide
> +  : public TreeTransform {
> +public:
> +  typedef TreeTransform Base;
> +  ExtractTypeForDeductionGuide(Sema &SemaRef) : Base(SemaRef) {}
> +
> +  TypeSourceInfo *transform(TypeSourceInfo *TSI) { return
> TransformType(TSI); }
> +
> +  QualType TransformTypedefType(TypeLocBuilder &TLB, TypedefTypeLoc TL) {
> +return TransformType(
> +TLB,
> +TL.getTypedefNameDecl()->getTypeSourceInfo()->getTypeLoc());
> +  }
> +};
> +
>  /// Transform to convert portions of a constructor declaration into the
>  /// corresponding deduction guide, per C++1z [over.match.class.deduct]p1.
>  struct ConvertConstructorToDeductionGuideTransform {
> @@ -1880,9 +1897,7 @@ private:
>   MultiLevelTemplateArgumentList &Args) {
>  TypeSourceInfo *OldDI = OldParam->getTypeSourceInfo();
>  TypeSourceInfo *NewDI;
> -if (!Args.getNumLevels())
> -  NewDI = OldDI;
> -else if (auto PackTL = OldDI->getTypeLoc().getAs())
> {
> +if (auto PackTL = OldDI->getTypeLoc().getAs())
> {
>// Expand out the one and only element in each inner pack.
>Sema::ArgumentPackSubstitutionIndexRAII SubstIndex(SemaRef, 0);
>NewDI =
> @@ -1898,23 +1913,17 @@ private:
>  if (!NewDI)
>return nullptr;
>
> -// Canonicalize the type. This (for instance) replaces references to
> -// typedef members of the current instantiations with the definitions
> of
> -// those typedefs, avoi

Re: r338165 - [Sema] Use a TreeTransform to extract deduction guide parameter types

2018-07-27 Thread Galina Kistanova via cfe-commits
Thank you Erik!

Thanks

Galina

On Fri, Jul 27, 2018 at 7:35 PM, Erik Pilkington 
wrote:

> Okay, the bot can now compile this file, but it looks like somebody else
> broke it again in the meantime...
>
>
> FAIL: LLVM :: CodeGen/AArch64/arm64-opt-remarks-lazy-bfi.ll (17518 of 39837)
>  TEST 'LLVM :: 
> CodeGen/AArch64/arm64-opt-remarks-lazy-bfi.ll' FAILED 
> Script:
> --
> : 'RUN: at line 1';   
> C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\build\bin\llc.EXE < 
> C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\test\CodeGen\AArch64\arm64-opt-remarks-lazy-bfi.ll
>  -mtriple=arm64-apple-ios7.0 -pass-remarks-analysis=asm-printer
> -pass-remarks-with-hotness=1 -asm-verbose=0
> -debug-only=lazy-machine-block-freq,block-freq-debug-pass=Executions 
> 2>&1 | 
> C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\build\bin\FileCheck.EXE
>  
> C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\test\CodeGen\AArch64\arm64-opt-remarks-lazy-bfi.ll
>  -check-prefix=HOTNESS
> : 'RUN: at line 6';   
> C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\build\bin\llc.EXE < 
> C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\test\CodeGen\AArch64\arm64-opt-remarks-lazy-bfi.ll
>  -mtriple=arm64-apple-ios7.0 -pass-remarks-analysis=asm-printer
> -pass-remarks-with-hotness=0 -asm-verbose=0
> -debug-only=lazy-machine-block-freq,block-freq-debug-pass=Executions 
> 2>&1 | 
> C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\build\bin\FileCheck.EXE
>  
> C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\test\CodeGen\AArch64\arm64-opt-remarks-lazy-bfi.ll
>  -check-prefix=NO_HOTNESS
> --
> Exit Code: 1
>
> Command Output (stdout):
> --
> $ ":" "RUN: at line 1"
> $ 
> "C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\build\bin\llc.EXE" 
> "-mtriple=arm64-apple-ios7.0" "-pass-remarks-analysis=asm-printer" 
> "-pass-remarks-with-hotness=1" "-asm-verbose=0" 
> "-debug-only=lazy-machine-block-freq,block-freq" "-debug-pass=Executions"
> $ 
> "C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\build\bin\FileCheck.EXE"
>  
> "C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\test\CodeGen\AArch64\arm64-opt-remarks-lazy-bfi.ll"
>  "-check-prefix=HOTNESS"
> # command stderr:
> C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\llvm\test\CodeGen\AArch64\arm64-opt-remarks-lazy-bfi.ll:31:17:
>  error: HOTNESS-NEXT: is not on the line after the previous match
>
> ; HOTNESS-NEXT: Executing Pass 'Lazy Machine Block Frequency Analysis'
>
> ^
>
> :698:47: note: 'next' match was here
>
> [2018-07-27 19:10:50.080587200] 0x1d4105a1760 Executing Pass 'Lazy Machine 
> Block Frequency Analysis' on Function 'empty_func'...
>
>   ^
>
> :695:85: note: previous match ended here
>
> [2018-07-27 19:10:50.079779100] 0x1d410527f90 Executing Pass 'Function Pass 
> Manager' on Module ''...
>
>   
>   ^
>
> :696:1: note: non-matching line after previous match is here
>
> [2018-07-27 19:10:50.079879300] 0x1d4105a1760 Executing Pass 'Verify 
> generated machine code' on Function 'empty_func'...
>
> ^
>
>
> error: command failed with exit status: 1
>
> --
>
>
> On 2018-07-27 6:30 PM, Erik Pilkington wrote:
>
> This should be fixed by r338186. I'll keep an eye on this bot to make sure
> that this is the case.
> Thanks!
> Erik
>
> On 2018-07-27 5:46 PM, Galina Kistanova wrote:
>
> C:\ps4-buildslave2\llvm-clang-x86_64-expensive-checks-win\
> llvm\tools\clang\lib\Sema\SemaTemplate.cpp : fatal error C1128: number of
> sections exceeded object file format limit: compile with /bigobj
>
>
>
>
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Buildbot numbers for the week of 7/15/2018 - 7/21/2018

2018-08-02 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the week of 7/15/2018 - 7/21/2018.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:
   buildername   |  was_red
-+--
 clang-with-thin-lto-windows | 136:18:41
 clang-x86_64-linux-selfhost-modules | 126:55:22
 lldb-x86_64-ubuntu-14.04-cmake  | 31:21:36
 lldb-x86_64-ubuntu-14.04-buildserver| 30:25:10
 clang-cmake-armv7-full  | 28:07:27
 clang-cmake-thumbv8-full-sh | 24:37:00
 clang-cmake-armv8-selfhost-neon | 23:04:35
 clang-cmake-armv8-full  | 23:01:12
 clang-hexagon-elf   | 22:58:04
 clang-cmake-armv8-quick | 22:52:05
 clang-cmake-armv7-quick | 22:32:24
 clang-cmake-armv7-selfhost  | 22:16:53
 clang-cmake-armv7-selfhost-neon | 22:11:34
 clang-cmake-armv7-global-isel   | 21:01:21
 clang-cmake-armv8-global-isel   | 20:50:05
 clang-cmake-thumbv7-full-sh | 19:13:23
 clang-x64-ninja-win7| 19:10:34
 llvm-clang-x86_64-expensive-checks-win  | 11:08:11
 lldb-x86-windows-msvc2015   | 09:24:46
 sanitizer-windows   | 09:16:25
 clang-cmake-armv8-lnt   | 09:12:46
 clang-cmake-armv7-lnt   | 09:12:10
 clang-armv7-linux-build-cache   | 09:11:16
 clang-lld-x86_64-2stage | 09:09:18
 lldb-amd64-ninja-netbsd8| 08:09:02
 clang-ppc64be-linux-lnt | 06:16:52
 clang-ppc64be-linux-multistage  | 06:13:55
 clang-ppc64le-linux-multistage  | 06:02:01
 clang-cmake-aarch64-full| 06:00:38
 clang-ppc64le-linux-lnt | 05:36:42
 clang-s390x-linux-multistage| 05:09:14
 clang-with-lto-ubuntu   | 05:04:45
 sanitizer-x86_64-linux  | 05:01:46
 polly-arm-linux | 04:40:04
 clang-ppc64be-linux | 04:38:16
 sanitizer-x86_64-linux-bootstrap-msan   | 03:46:17
 sanitizer-x86_64-linux-bootstrap-ubsan  | 03:41:51
 polly-amd64-linux   | 03:39:35
 clang-ppc64le-linux | 03:39:34
 clang-cmake-x86_64-avx2-linux-perf  | 03:18:59
 clang-with-thin-lto-ubuntu  | 03:07:28
 sanitizer-ppc64le-linux | 03:03:53
 clang-x86_64-linux-abi-test | 02:59:25
 clang-cuda-build| 02:50:04
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast  | 02:48:05
 sanitizer-x86_64-linux-fast | 02:35:13
 sanitizer-x86_64-linux-fuzzer   | 02:30:57
 sanitizer-ppc64be-linux | 02:30:03
 clang-s390x-linux   | 02:22:35
 reverse-iteration   | 02:22:24
 clang-s390x-linux-lnt   | 02:18:12
 sanitizer-x86_64-linux-bootstrap| 02:08:43
 clang-x86-windows-msvc2015  | 02:08:38
 sanitizer-x86_64-linux-android  | 01:57:27
 llvm-hexagon-elf| 01:50:59
 clang-cmake-x86_64-sde-avx512-linux | 01:48:09
 clang-cmake-x86_64-avx2-linux   | 01:45:38
 libcxx-libcxxabi-x86_64-linux-ubuntu-asan   | 01:44:35
 libcxx-libcxxabi-x86_64-linux-ubuntu-gcc49-cxx11| 01:44:19
 libcxx-libcxxabi-libunwind-x86_64-linux-ubuntu  | 01:38:58
 libcxx-libcxxabi-libunwind-armv8-linux  | 01:38:33
 libcxx-libcxxabi-libunwind-aarch64-linux| 01:38:02
 libcxx-libcxxabi-

Buildbot numbers for the week of 7/22/2018 - 7/28/2018

2018-08-02 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the last week of 7/22/2018 - 7/28/2018.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:
   buildername   | was_red
-+-
 clang-x64-ninja-win7| 96:19:19
 sanitizer-ppc64le-linux | 64:07:30
 clang-cmake-aarch64-full| 52:11:17
 sanitizer-x86_64-linux  | 52:07:12
 sanitizer-ppc64be-linux | 50:03:15
 llvm-clang-x86_64-expensive-checks-win  | 41:54:57
 sanitizer-x86_64-linux-bootstrap| 40:39:49
 clang-lld-x86_64-2stage | 29:47:39
 clang-with-lto-ubuntu   | 28:26:24
 clang-cmake-armv8-selfhost-neon | 27:43:17
 clang-cmake-thumbv7-full-sh | 27:34:26
 clang-with-thin-lto-ubuntu  | 26:45:10
 clang-cmake-thumbv8-full-sh | 24:05:52
 sanitizer-x86_64-linux-fast | 22:18:18
 clang-cmake-armv7-selfhost  | 21:16:44
 clang-cmake-armv7-selfhost-neon | 21:16:06
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast| 20:13:23
 lldb-amd64-ninja-netbsd8| 17:54:15
 sanitizer-x86_64-linux-bootstrap-msan   | 15:24:52
 clang-with-thin-lto-windows | 15:08:23
 clang-x86-windows-msvc2015  | 14:45:44
 clang-ppc64be-linux-lnt | 08:19:45
 clang-x86_64-linux-abi-test | 08:00:48
 clang-x86_64-linux-selfhost-modules | 07:55:01
 clang-ppc64le-linux-multistage  | 06:13:47
 clang-s390x-linux-multistage| 06:12:48
 sanitizer-x86_64-linux-autoconf | 05:34:52
 clang-cmake-armv7-quick | 05:26:43
 clang-cuda-build| 05:17:09
 clang-s390x-linux-lnt   | 05:10:51
 clang-ppc64le-linux | 04:55:38
 clang-s390x-linux   | 04:44:49
 clang-ppc64le-linux-lnt | 04:38:49
 clang-ppc64be-linux-multistage  | 04:35:16
 clang-ppc64be-linux | 04:32:53
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast  | 04:31:17
 lldb-windows7-android   | 04:29:47
 reverse-iteration   | 04:25:41
 libcxx-libcxxabi-x86_64-linux-ubuntu-ubsan  | 04:21:36
 libcxx-libcxxabi-libunwind-armv8-linux-noexceptions | 04:17:55
 clang-cmake-aarch64-global-isel | 04:16:34
 sanitizer-x86_64-linux-bootstrap-ubsan  | 04:14:23
 clang-cmake-armv8-quick | 04:05:41
 clang-cmake-armv8-global-isel   | 04:00:34
 clang-cmake-x86_64-sde-avx512-linux | 03:55:37
 clang-cmake-armv8-full  | 03:46:45
 llvm-hexagon-elf| 03:41:39
 clang-cmake-aarch64-quick   | 03:32:49
 libcxx-libcxxabi-x86_64-linux-ubuntu-gcc49-cxx11| 03:31:36
 lld-sphinx-docs | 03:25:58
 libcxx-libcxxabi-x86_64-linux-ubuntu-gcc-tot-latest-std | 03:23:26
 clang-cmake-x86_64-avx2-linux   | 03:10:34
 clang-hexagon-elf   | 03:09:57
 clang-cmake-x86_64-avx2-linux-perf  | 02:32:26
 clang-cmake-armv7-global-isel   | 02:29:00
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx14  | 02:22:45
 clang-cmake-armv7-full  | 02:18:48
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx11  | 02:18:26
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx17  | 02:11:20
 libcxx-libcxxabi-x86_64-linux-ubuntu-msan   | 02:03:10
 libcxx-libcxxabi-x86_64-linux-ubuntu-tsan   | 01:58:58
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx03  | 01:42:58
 libcxx-libcxxabi

Buildbot numbers for the week of 1/21/2018 - 1/27/2018

2018-02-09 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the week of 1/21/2018 - 1/27/2018.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:

  buildername  | was_red
---+-
 sanitizer-ppc64be-linux   | 47:40:10
 clang-ppc64be-linux-multistage| 47:30:29
 clang-ppc64be-linux   | 44:45:44
 clang-s390x-linux-multistage  | 35:42:00
 lldb-windows7-android | 30:15:21
 clang-ppc64le-linux-multistage| 27:49:42
 lldb-x86_64-ubuntu-14.04-android  | 25:51:31
 lldb-x86_64-ubuntu-14.04-cmake| 25:22:41
 clang-x86_64-linux-selfhost-modules   | 23:58:46
 clang-x86_64-linux-selfhost-modules-2 | 23:49:12
 libcxx-libcxxabi-singlethreaded-x86_64-linux-debian   | 22:09:49
 libcxx-libcxxabi-x86_64-linux-debian  | 21:53:34
 libcxx-libcxxabi-x86_64-linux-debian-noexceptions | 21:36:00
 libcxx-libcxxabi-libunwind-x86_64-linux-debian| 21:20:43
 clang-cmake-armv7-a15-selfhost-neon   | 20:34:59
 clang-cmake-armv7-a15-selfhost| 19:45:46
 clang-x86-windows-msvc2015| 16:27:26
 clang-cmake-thumbv7-a15-full-sh   | 13:18:15
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast  | 11:36:24
 llvm-clang-x86_64-expensive-checks-win| 11:34:43
 clang-x64-ninja-win7  | 11:17:06
 clang-cmake-aarch64-full  | 10:59:57
 clang-cmake-armv7-a15-full| 10:59:52
 ubuntu-gcc7.1-werror  | 10:06:17
 clang-lld-x86_64-2stage   | 10:05:08
 clang-bpf-build   | 08:31:13
 clang-native-arm-lnt  | 07:59:14
 clang-cmake-armv7-a15 | 07:26:23
 clang-cmake-thumbv7-a15   | 07:26:10
 lldb-x86_64-ubuntu-14.04-buildserver  | 06:26:47
 lldb-x86-windows-msvc2015 | 06:14:00
 sanitizer-ppc64le-linux   | 06:09:49
 libcxx-libcxxabi-x86_64-linux-ubuntu-ubsan| 05:55:30
 sanitizer-windows | 05:54:45
 libcxx-libcxxabi-x86_64-linux-ubuntu-msan | 05:53:38
 clang-s390x-linux-lnt | 04:41:26
 clang-s390x-linux | 04:38:37
 clang-with-thin-lto-ubuntu| 04:30:25
 clang-x86_64-debian-fast  | 04:23:07
 polly-amd64-linux | 04:06:42
 clang-with-lto-ubuntu | 04:01:10
 llvm-mips-linux   | 03:57:51
 clang-ppc64le-linux-lnt   | 03:37:08
 clang-cmake-x86_64-avx2-linux | 03:24:47
 sanitizer-x86_64-linux| 03:17:49
 libcxx-libcxxabi-x86_64-linux-ubuntu-tsan | 03:06:34
 libcxx-libcxxabi-libunwind-x86_64-linux-ubuntu| 03:06:30
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx2a| 03:06:19
 sanitizer-x86_64-linux-bootstrap  | 03:00:13
 libcxx-libcxxabi-x86_64-linux-ubuntu-asan | 03:00:01
 libcxx-libcxxabi-x86_64-linux-ubuntu-32bit| 02:59:11
 clang-atom-d525-fedora-rel| 02:59:07
 clang-cmake-aarch64-lld   | 02:57:57
 libcxx-libcxxabi-libunwind-aarch64-linux  | 02:46:28
 clang-cmake-aarch64-global-isel   | 02:45:52
 clang-cmake-aarch64-quick | 02:45:36
 clang-ppc64le-linux   | 02:42:17
 sanitizer-x86_64-linux-fuzzer | 02:33:33
 sanitizer-x86_64-linux-bootstrap-msan | 02:32:08
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast| 02:29:46
 clang-cuda-build  | 02:27:17
 clang-x86_64-linux-abi-test   | 02:24:48
 lldb-amd64-ninja-netbsd8  | 02:18:11
 libcxx-libcxxabi-libunwind-arm-linux  | 02:07:25
 libcxx-libcxxabi

Buildbot numbers for the last week of 1/28/2018 - 2/03/2018

2018-02-09 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the last week of 1/28/2018 - 2/03/2018.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:

   buildername   |  was_red
-+--
 libcxx-libcxxabi-x86_64-linux-ubuntu-gcc-tot-latest-std | 100:05:51
 llvm-clang-x86_64-expensive-checks-win  | 83:50:21
 clang-cmake-mipsel  | 68:34:42
 lldb-windows7-android   | 46:54:46
 libcxx-libcxxabi-libunwind-aarch64-linux| 45:47:19
 clang-x64-ninja-win7| 25:14:36
 libcxx-libcxxabi-x86_64-linux-debian| 22:33:58
 libcxx-libcxxabi-libunwind-x86_64-linux-debian  | 22:28:52
 polly-arm-linux | 22:09:11
 polly-amd64-linux   | 21:03:58
 clang-x86_64-linux-selfhost-modules | 21:03:53
 clang-ppc64le-linux-multistage  | 20:24:26
 clang-x86_64-debian-fast| 16:59:07
 clang-cmake-thumbv7-a15-full-sh | 15:45:45
 clang-cuda-build| 15:17:58
 clang-hexagon-elf   | 15:00:42
 clang-cmake-aarch64-global-isel | 14:51:20
 clang-cmake-aarch64-full| 14:50:17
 clang-cmake-aarch64-quick   | 14:47:46
 clang-cmake-thumbv7-a15 | 14:39:51
 clang-cmake-armv7-a15   | 14:38:39
 llvm-hexagon-elf| 14:26:22
 clang-cmake-armv7-a15-selfhost-neon | 14:05:47
 clang-cmake-armv7-a15-full  | 13:50:03
 clang-cmake-armv7-a15-selfhost  | 13:40:56
 lldb-x86_64-darwin-13.4 | 11:34:13
 sanitizer-x86_64-linux-android  | 10:26:18
 lldb-x86_64-ubuntu-14.04-cmake  | 09:54:45
 lldb-x86_64-ubuntu-14.04-android| 09:52:02
 clang-lld-x86_64-2stage | 08:12:04
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast| 07:26:30
 sanitizer-ppc64le-linux | 07:17:23
 clang-with-lto-ubuntu   | 06:58:42
 clang-x86_64-linux-selfhost-modules-2   | 06:42:02
 clang-with-thin-lto-ubuntu  | 06:20:30
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast  | 06:19:56
 clang-s390x-linux-lnt   | 06:05:57
 clang-s390x-linux-multistage| 05:47:15
 clang-ppc64be-linux-multistage  | 05:22:04
 clang-ppc64le-linux | 05:20:23
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx2a  | 05:19:14
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx17  | 05:19:00
 clang-ppc64be-linux | 05:11:49
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx14  | 05:06:57
 clang-ppc64le-linux-lnt | 05:03:44
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx11  | 04:54:00
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx03  | 04:53:42
 clang-s390x-linux   | 03:27:58
 clang-atom-d525-fedora-rel  | 03:26:16
 llvm-mips-linux | 03:20:18
 ubuntu-gcc7.1-werror| 03:07:37
 clang-bpf-build | 03:04:25
 sanitizer-x86_64-linux-bootstrap| 02:56:55
 clang-cmake-aarch64-lld | 02:53:43
 lld-x86_64-win7 | 02:45:34
 sanitizer-windows   | 02:43:22
 lldb-x86-windows-msvc2015   | 02:40:54
 sanitizer-ppc64be-linux | 02:26:18
 sanitizer-x86_64-linux-bootstrap-ubsan  | 02:10:06
 reverse-iteration   | 01:50:21
 sanitizer-x86_64-linux-fast | 01:49:41
 sanitizer-x86_64-linux-bootstrap-msan   | 01:34:37
 clang-cmake-

LLVM buildmaster will be updated and restarted soon

2018-02-12 Thread Galina Kistanova via cfe-commits
Hello everyone,

LLVM buildmaster will be updated and restarted after 8PM Pacific time today.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Re: r325175 - [Debug] Annotate compiler generated range-for loop variables.

2018-02-15 Thread Galina Kistanova via cfe-commits
Hello Matt,

This commit broke tests on one of our builders:
http://lab.llvm.org:8011/builders/llvm-clang-x86_64-expensive-checks-win/builds/7920
. . .
Failing Tests (1):
Clang :: CodeGenCXX/debug-info-range-for-var-names.cpp

Please have a look?

Thanks

Galina

On Wed, Feb 14, 2018 at 1:22 PM, Matt Davis via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: mattd
> Date: Wed Feb 14 13:22:11 2018
> New Revision: 325175
>
> URL: http://llvm.org/viewvc/llvm-project?rev=325175&view=rev
> Log:
> [Debug] Annotate compiler generated range-for loop variables.
>
> Summary:
> This change aims to simplify debugging by annotating the range-for loop
> artificial variables (range, begin, end) with the scope depth.
>
>
> Reviewers: rsmith, dblaikie
>
> Reviewed By: dblaikie
>
> Subscribers: dblaikie, cfe-commits
>
> Tags: #debug-info
>
> Differential Revision: https://reviews.llvm.org/D42813
>
> Added:
> cfe/trunk/test/CodeGenCXX/debug-info-range-for-var-names.cpp
> Modified:
> cfe/trunk/include/clang/Sema/Scope.h
> cfe/trunk/lib/Sema/SemaStmt.cpp
> cfe/trunk/test/CodeGenCXX/debug-info-scope.cpp
> cfe/trunk/test/CodeGenCXX/vla.cpp
>
> Modified: cfe/trunk/include/clang/Sema/Scope.h
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/include/
> clang/Sema/Scope.h?rev=325175&r1=325174&r2=325175&view=diff
> 
> ==
> --- cfe/trunk/include/clang/Sema/Scope.h (original)
> +++ cfe/trunk/include/clang/Sema/Scope.h Wed Feb 14 13:22:11 2018
> @@ -259,6 +259,9 @@ public:
>Scope *getTemplateParamParent() { return TemplateParamParent; }
>const Scope *getTemplateParamParent() const { return
> TemplateParamParent; }
>
> +  /// Returns the depth of this scope. The translation-unit has scope
> depth 0.
> +  unsigned getDepth() const { return Depth; }
> +
>/// Returns the number of function prototype scopes in this scope
>/// chain.
>unsigned getFunctionPrototypeDepth() const {
>
> Modified: cfe/trunk/lib/Sema/SemaStmt.cpp
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Sema/
> SemaStmt.cpp?rev=325175&r1=325174&r2=325175&view=diff
> 
> ==
> --- cfe/trunk/lib/Sema/SemaStmt.cpp (original)
> +++ cfe/trunk/lib/Sema/SemaStmt.cpp Wed Feb 14 13:22:11 2018
> @@ -2025,7 +2025,7 @@ void NoteForRangeBeginEndFunction(Sema &
>
>  /// Build a variable declaration for a for-range statement.
>  VarDecl *BuildForRangeVarDecl(Sema &SemaRef, SourceLocation Loc,
> -  QualType Type, const char *Name) {
> +  QualType Type, StringRef Name) {
>DeclContext *DC = SemaRef.CurContext;
>IdentifierInfo *II = &SemaRef.PP.getIdentifierTable().get(Name);
>TypeSourceInfo *TInfo = SemaRef.Context.getTrivialTypeSourceInfo(Type,
> Loc);
> @@ -2094,10 +2094,12 @@ StmtResult Sema::ActOnCXXForRangeStmt(Sc
>}
>
>// Build  auto && __range = range-init
> +  // Divide by 2, since the variables are in the inner scope (loop body).
> +  const auto DepthStr = std::to_string(S->getDepth() / 2);
>SourceLocation RangeLoc = Range->getLocStart();
>VarDecl *RangeVar = BuildForRangeVarDecl(*this, RangeLoc,
> Context.getAutoRRefDeductType(
> ),
> -   "__range");
> +   std::string("__range") +
> DepthStr);
>if (FinishForRangeVarDecl(*this, RangeVar, Range, RangeLoc,
>  diag::err_for_range_deduction_failure)) {
>  LoopVar->setInvalidDecl();
> @@ -2340,10 +2342,12 @@ Sema::BuildCXXForRangeStmt(SourceLocatio
>return StmtError();
>
>  // Build auto __begin = begin-expr, __end = end-expr.
> +// Divide by 2, since the variables are in the inner scope (loop
> body).
> +const auto DepthStr = std::to_string(S->getDepth() / 2);
>  VarDecl *BeginVar = BuildForRangeVarDecl(*this, ColonLoc, AutoType,
> - "__begin");
> + std::string("__begin") +
> DepthStr);
>  VarDecl *EndVar = BuildForRangeVarDecl(*this, ColonLoc, AutoType,
> -   "__end");
> +   std::string("__end") +
> DepthStr);
>
>  // Build begin-expr and end-expr and attach to __begin and __end
> variables.
>  ExprResult BeginExpr, EndExpr;
>
> Added: cfe/trunk/test/CodeGenCXX/debug-info-range-for-var-names.cpp
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/
> CodeGenCXX/debug-info-range-for-var-names.cpp?rev=325175&view=auto
> 
> ==
> --- cfe/trunk/test/CodeGenCXX/debug-info-range-for-var-names.cpp (added)
> +++ cfe/trunk/test/CodeGenCXX/debug-info-range-for-var-names.cpp Wed Feb
> 14 13:22:11 2018
> @@ -0,0 +1,36

New LLD performance builder

2018-02-15 Thread Galina Kistanova via cfe-commits
Hello everyone,

I have added a new public LLD performance builder at
http://lab.llvm.org:8011/builders/lld-perf-testsuite.
It builds LLVM and LLD by the latest releaed Clang and runs a set of
perfromance tests.

The builder is reliable. Please pay attention on the failures.

The performance statistics are here:
http://lnt.llvm.org/db_default/v4/link/recent_activity

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Re: r325475 - [cxx_dr_status] Tests for CWG issues 641-687.

2018-02-19 Thread Galina Kistanova via cfe-commits
Hello Richard,

One of modified tests broke the next builder:
http://lab.llvm.org:8011/builders/llvm-clang-x86_64-expensive-checks-win/builds/8006

Failing Tests (1):
Clang :: CXX/drs/dr6xx.cpp

Please have a look?

Thanks

Galina



On Mon, Feb 19, 2018 at 1:05 AM, Richard Smith via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: rsmith
> Date: Mon Feb 19 01:05:48 2018
> New Revision: 325475
>
> URL: http://llvm.org/viewvc/llvm-project?rev=325475&view=rev
> Log:
> [cxx_dr_status] Tests for CWG issues 641-687.
>
> Modified:
> cfe/trunk/test/CXX/drs/dr6xx.cpp
> cfe/trunk/www/cxx_dr_status.html
>
> Modified: cfe/trunk/test/CXX/drs/dr6xx.cpp
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/CXX/
> drs/dr6xx.cpp?rev=325475&r1=325474&r2=325475&view=diff
> 
> ==
> --- cfe/trunk/test/CXX/drs/dr6xx.cpp (original)
> +++ cfe/trunk/test/CXX/drs/dr6xx.cpp Mon Feb 19 01:05:48 2018
> @@ -1,7 +1,8 @@
> -// RUN: %clang_cc1 -std=c++98 %s -verify -fexceptions -fcxx-exceptions
> -pedantic-errors
> -// RUN: %clang_cc1 -std=c++11 %s -verify -fexceptions -fcxx-exceptions
> -pedantic-errors
> -// RUN: %clang_cc1 -std=c++14 %s -verify -fexceptions -fcxx-exceptions
> -pedantic-errors
> -// RUN: %clang_cc1 -std=c++1z %s -verify -fexceptions -fcxx-exceptions
> -pedantic-errors
> +// RUN: %clang_cc1 -std=c++98 %s -verify -fexceptions -fcxx-exceptions
> -pedantic-errors -fno-spell-checking
> +// RUN: %clang_cc1 -std=c++11 %s -verify -fexceptions -fcxx-exceptions
> -pedantic-errors -fno-spell-checking
> +// RUN: %clang_cc1 -std=c++14 %s -verify -fexceptions -fcxx-exceptions
> -pedantic-errors -fno-spell-checking
> +// RUN: %clang_cc1 -std=c++17 %s -verify -fexceptions -fcxx-exceptions
> -pedantic-errors -fno-spell-checking
> +// RUN: %clang_cc1 -std=c++2a %s -verify -fexceptions -fcxx-exceptions
> -pedantic-errors -fno-spell-checking
>
>  namespace std { struct type_info {}; }
>
> @@ -354,6 +355,672 @@ namespace dr639 { // dr639: yes
>}
>  }
>
> +namespace dr641 { // dr641: yes
> +  namespace std_example {
> +struct abc;
> +
> +struct xyz {
> +  xyz(); // expected-note 0-1{{candidate}}
> +  xyz(xyz &); // expected-note 0-1{{candidate}}
> +
> +  operator xyz &() = delete; // expected-error 0-1{{extension}}
> expected-warning {{will never be used}}
> +  operator abc &() = delete; // expected-error 0-1{{extension}}
> +};
> +
> +struct abc : xyz {};
> +
> +template
> +void use(T &); // expected-note {{expects an l-value}}
> +void test() {
> +  use(xyz()); // expected-error {{no match}}
> +  use(xyz());
> +#if __cplusplus < 201103L
> +  // expected-error-re@-2 {{no viable constructor copying parameter
> of type '{{.*}}xyz'}}
> +#endif
> +}
> +  }
> +
> +  template struct error { typedef typename T::error type; };
> +
> +  struct A {
> +template::type = 0> operator T() const;
> // expected-error 0-1{{extension}}
> +  };
> +  A a;
> +  void f(A&); // expected-note 2{{candidate}}
> +  void g(const A ca) {
> +f(A()); // expected-error {{no match}}
> +f(ca); // expected-error {{no match}}
> +(void)A();
> +(void)ca;
> +  }
> +}
> +
> +namespace dr642 { // dr642: yes
> +  void f() {
> +const int i = 2;
> +{
> +  char i[i];
> +  _Static_assert(sizeof(i) == 2, ""); // expected-error {{C11}}
> +}
> +  }
> +
> +  struct s { int a; };
> +  void g(int s) {
> +struct s *p = new struct s;
> +p->a = s;
> +  }
> +}
> +
> +#if __cplusplus >= 201103L
> +namespace dr643 { // dr643: yes
> +  struct A {
> +int x;
> +auto f() -> decltype(this->x);
> +auto f(A &a) -> decltype(a.x);
> +auto g() -> decltype(x);
> +auto h() -> decltype(this->y); // expected-error {{no member named
> 'y'}}
> +auto h(A &a) -> decltype(a.y); // expected-error {{no member named
> 'y'}}
> +auto i() -> decltype(y); // expected-error {{undeclared identifier
> 'y'}}
> +int y;
> +  };
> +}
> +#endif
> +
> +#if __cplusplus >= 201103L
> +namespace dr644 { // dr644: partial
> +  struct A {
> +A() = default;
> +int x, y;
> +  };
> +  static_assert(__is_literal_type(A), "");
> +
> +  struct B : A {};
> +  static_assert(__is_literal_type(B), "");
> +
> +  struct C : virtual A {};
> +  static_assert(!__is_literal_type(C), "");
> +
> +  struct D { C c; };
> +  static_assert(!__is_literal_type(D), "");
> +
> +  // FIXME: According to DR644, E is a literal type despite having
> virtual
> +  // base classes. This appears to be a wording defect.
> +  template
> +  struct E : T {
> +constexpr E() = default;
> +  };
> +  static_assert(!__is_literal_type(E), "");
> +}
> +#endif
> +
> +// dr645 increases permission to optimize; it's not clear that it's
> possible to
> +// test for this.
> +// dr645: na
> +
> +#if __cplusplus >= 201103L
> +namespace dr646 { // dr646: sup 981
> +  struct A {
> +constexpr A(const A&) = default; // ok
> +  };
> +
> 

LLVM buildmaster will be updated and restarted tonight

2018-02-23 Thread Galina Kistanova via cfe-commits
 Hello everyone,

LLVM buildmaster will be updated and restarted after 6PM Pacific time today.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Re: r303873 - Don't defer to the GCC driver for linking arm-baremetal

2017-05-25 Thread Galina Kistanova via cfe-commits
Hello Jonathan,

This commit broke one of our builders:

http://lab.llvm.org:8011/builders/llvm-clang-x86_64-expensive-checks-win/builds/2608/steps/build-unified-tree/logs/stdio

Please have a look at this?

Thanks

Galina

On Thu, May 25, 2017 at 8:42 AM, Jonathan Roelofs via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: jroelofs
> Date: Thu May 25 10:42:13 2017
> New Revision: 303873
>
> URL: http://llvm.org/viewvc/llvm-project?rev=303873&view=rev
> Log:
> Don't defer to the GCC driver for linking arm-baremetal
>
> Also comes with a cmake cache for building the runtime bits:
>
>  $ cmake  \
>-DBAREMETAL_ARMV6M_SYSROOT=/path/to/sysroot \
>-DBAREMETAL_ARMV7M_SYSROOT=/path/to/sysroot \
>-DBAREMETAL_ARMV7EM_SYSROOT=/path/to/sysroot \
>-C /path/to/clang/cmake/caches/BaremetalARM.cmake \
>/path/to/llvm
>
> https://reviews.llvm.org/D33259
>
> Added:
> cfe/trunk/cmake/caches/BaremetalARM.cmake
> cfe/trunk/lib/Driver/ToolChains/BareMetal.cpp
> cfe/trunk/lib/Driver/ToolChains/BareMetal.h
> cfe/trunk/test/Driver/Inputs/baremetal_arm/
> cfe/trunk/test/Driver/Inputs/baremetal_arm/include/
> cfe/trunk/test/Driver/Inputs/baremetal_arm/include/c++/
> cfe/trunk/test/Driver/Inputs/baremetal_arm/include/c++/5.0.0/
> cfe/trunk/test/Driver/Inputs/baremetal_arm/include/c++/5.0.0/.keep
> cfe/trunk/test/Driver/Inputs/baremetal_arm/include/c++/6.0.0/
> cfe/trunk/test/Driver/Inputs/baremetal_arm/include/c++/6.0.0/.keep
> cfe/trunk/test/Driver/Inputs/baremetal_arm/include/c++/v1/
> cfe/trunk/test/Driver/Inputs/baremetal_arm/include/c++/v1/.keep
> cfe/trunk/test/Driver/baremetal.cpp
> Modified:
> cfe/trunk/lib/Driver/CMakeLists.txt
> cfe/trunk/lib/Driver/Driver.cpp
> cfe/trunk/lib/Driver/ToolChains/Gnu.cpp
> cfe/trunk/lib/Driver/ToolChains/Linux.cpp
> cfe/trunk/test/Frontend/gnu-mcount.c
>
> Added: cfe/trunk/cmake/caches/BaremetalARM.cmake
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/cmake/
> caches/BaremetalARM.cmake?rev=303873&view=auto
> 
> ==
> --- cfe/trunk/cmake/caches/BaremetalARM.cmake (added)
> +++ cfe/trunk/cmake/caches/BaremetalARM.cmake Thu May 25 10:42:13 2017
> @@ -0,0 +1,50 @@
> +set(LLVM_TARGETS_TO_BUILD ARM;X86 CACHE STRING "")
> +
> +# Builtins
> +set(LLVM_BUILTIN_TARGETS 
> "armv7m-none-eabi;armv6m-none-eabi;armv7em-none-eabi"
> CACHE STRING "Builtin Targets")
> +
> +set(BUILTINS_armv6m-none-eabi_CMAKE_SYSROOT ${BAREMETAL_ARMV6M_SYSROOT}
> CACHE STRING "armv6m-none-eabi Sysroot")
> +set(BUILTINS_armv6m-none-eabi_CMAKE_SYSTEM_NAME Generic CACHE STRING
> "armv6m-none-eabi System Name")
> +set(BUILTINS_armv6m-none-eabi_COMPILER_RT_BAREMETAL_BUILD ON CACHE BOOL
> "armv6m-none-eabi Baremetal build")
> +set(BUILTINS_armv6m-none-eabi_COMPILER_RT_OS_DIR "baremetal" CACHE
> STRING "armv6m-none-eabi os dir")
> +
> +set(BUILTINS_armv7m-none-eabi_CMAKE_SYSROOT ${BAREMETAL_ARMV7M_SYSROOT}
> CACHE STRING "armv7m-none-eabi Sysroot")
> +set(BUILTINS_armv7m-none-eabi_CMAKE_SYSTEM_NAME Generic CACHE STRING
> "armv7m-none-eabi System Name")
> +set(BUILTINS_armv7m-none-eabi_COMPILER_RT_BAREMETAL_BUILD ON CACHE BOOL
> "armv7m-none-eabi Baremetal build")
> +set(BUILTINS_armv7m-none-eabi_CMAKE_C_FLAGS "-mfpu=fp-armv8" CACHE
> STRING "armv7m-none-eabi C Flags")
> +set(BUILTINS_armv7m-none-eabi_CMAKE_ASM_FLAGS "-mfpu=fp-armv8" CACHE
> STRING "armv7m-none-eabi ASM Flags")
> +set(BUILTINS_armv7m-none-eabi_COMPILER_RT_OS_DIR "baremetal" CACHE
> STRING "armv7m-none-eabi os dir")
> +
> +set(BUILTINS_armv7em-none-eabi_CMAKE_SYSROOT
> ${BAREMETAL_ARMV7EM_SYSROOT} CACHE STRING "armv7em-none-eabi Sysroot")
> +set(BUILTINS_armv7em-none-eabi_CMAKE_SYSTEM_NAME Generic CACHE STRING
> "armv7em-none-eabi System Name")
> +set(BUILTINS_armv7em-none-eabi_COMPILER_RT_BAREMETAL_BUILD ON CACHE BOOL
> "armv7em-none-eabi Baremetal build")
> +set(BUILTINS_armv7em-none-eabi_CMAKE_C_FLAGS "-mfpu=fp-armv8" CACHE
> STRING "armv7em-none-eabi C Flags")
> +set(BUILTINS_armv7em-none-eabi_CMAKE_ASM_FLAGS "-mfpu=fp-armv8" CACHE
> STRING "armv7em-none-eabi ASM Flags")
> +set(BUILTINS_armv7em-none-eabi_COMPILER_RT_OS_DIR "baremetal" CACHE
> STRING "armv7em-none-eabi os dir")
> +
> +set(LLVM_INSTALL_TOOLCHAIN_ONLY ON CACHE BOOL "")
> +set(LLVM_TOOLCHAIN_TOOLS
> +  llc
> +  llvm-ar
> +  llvm-cxxfilt
> +  llvm-dwarfdump
> +  llvm-dsymutil
> +  llvm-nm
> +  llvm-objdump
> +  llvm-ranlib
> +  llvm-readobj
> +  llvm-size
> +  llvm-symbolizer
> +  opt
> +  CACHE STRING "")
> +
> +set(LLVM_DISTRIBUTION_COMPONENTS
> +  clang
> +  lld
> +  clang-headers
> +  builtins-armv6m-none-eabi
> +  builtins-armv7m-none-eabi
> +  builtins-armv7em-none-eabi
> +  runtimes
> +  ${LLVM_TOOLCHAIN_TOOLS}
> +  CACHE STRING "")
>
> Modified: cfe/trunk/lib/Driver/CMakeLists.txt
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Driver/
> CMakeLists.txt?rev=303873&r1=303872&r2=303873&view=diff
> ===

Re: r304190 - Diagnose attempts to build a preprocessed module that defines an unavailable submodule.

2017-05-30 Thread Galina Kistanova via cfe-commits
Hello Richard,

This commit broke a test on few of our builders:

Failing Tests (1):
Clang :: Modules/preprocess-unavailable.cpp

http://lab.llvm.org:8011/builders/llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast/builds/11935
http://lab.llvm.org:8011/builders/llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast/builds/10137

Please have a look at this?

Thanks

Galina



On Mon, May 29, 2017 at 10:22 PM, Richard Smith via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: rsmith
> Date: Tue May 30 00:22:59 2017
> New Revision: 304190
>
> URL: http://llvm.org/viewvc/llvm-project?rev=304190&view=rev
> Log:
> Diagnose attempts to build a preprocessed module that defines an
> unavailable submodule.
>
> The errors we would otherwise get are incomprehensible, as we would enter
> the
> module but not make its contents visible to itself.
>
> Added:
> cfe/trunk/test/Modules/preprocess-unavailable.cpp
> Modified:
> cfe/trunk/include/clang/Basic/DiagnosticLexKinds.td
> cfe/trunk/lib/Lex/Pragma.cpp
>
> Modified: cfe/trunk/include/clang/Basic/DiagnosticLexKinds.td
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/include/clang/Basic/
> DiagnosticLexKinds.td?rev=304190&r1=304189&r2=304190&view=diff
> 
> ==
> --- cfe/trunk/include/clang/Basic/DiagnosticLexKinds.td (original)
> +++ cfe/trunk/include/clang/Basic/DiagnosticLexKinds.td Tue May 30
> 00:22:59 2017
> @@ -525,6 +525,8 @@ def err_pp_module_begin_without_module_e
>  def err_pp_module_end_without_module_begin : Error<
>"no matching '#pragma clang module begin' for this "
>"'#pragma clang module end'">;
> +def note_pp_module_begin_here : Note<
> +  "entering module '%0' due to this pragma">;
>
>  def err_defined_macro_name : Error<"'defined' cannot be used as a macro
> name">;
>  def err_paste_at_start : Error<
>
> Modified: cfe/trunk/lib/Lex/Pragma.cpp
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Lex/
> Pragma.cpp?rev=304190&r1=304189&r2=304190&view=diff
> 
> ==
> --- cfe/trunk/lib/Lex/Pragma.cpp (original)
> +++ cfe/trunk/lib/Lex/Pragma.cpp Tue May 30 00:22:59 2017
> @@ -1407,6 +1407,24 @@ struct PragmaModuleBeginHandler : public
>M = NewM;
>  }
>
> +// If the module isn't available, it doesn't make sense to enter it.
> +if (!M->isAvailable()) {
> +  Module::Requirement Requirement;
> +  Module::UnresolvedHeaderDirective MissingHeader;
> +  (void)M->isAvailable(PP.getLangOpts(), PP.getTargetInfo(),
> +   Requirement, MissingHeader);
> +  if (MissingHeader.FileNameLoc.isValid()) {
> +PP.Diag(MissingHeader.FileNameLoc, diag::err_module_header_
> missing)
> +  << MissingHeader.IsUmbrella << MissingHeader.FileName;
> +  } else {
> +PP.Diag(M->DefinitionLoc, diag::err_module_unavailable)
> +  << M->getFullModuleName() << Requirement.second <<
> Requirement.first;
> +  }
> +  PP.Diag(BeginLoc, diag::note_pp_module_begin_here)
> +<< M->getTopLevelModuleName();
> +  return;
> +}
> +
>  // Enter the scope of the submodule.
>  PP.EnterSubmodule(M, BeginLoc, /*ForPragma*/true);
>  PP.EnterAnnotationToken(SourceRange(BeginLoc,
> ModuleName.back().second),
>
> Added: cfe/trunk/test/Modules/preprocess-unavailable.cpp
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/
> Modules/preprocess-unavailable.cpp?rev=304190&view=auto
> 
> ==
> --- cfe/trunk/test/Modules/preprocess-unavailable.cpp (added)
> +++ cfe/trunk/test/Modules/preprocess-unavailable.cpp Tue May 30 00:22:59
> 2017
> @@ -0,0 +1,12 @@
> +// RUN: %clang_cc1 -x c++-module-map %s -fmodule-name=a -verify
> +module a {
> +  module b {
> +requires cplusplus11
> +  }
> +}
> +#pragma clang module contents
> +// expected-error@3 {{module 'a.b' requires feature 'cplusplus11'}}
> +#pragma clang module begin a.b // expected-note {{entering module 'a' due
> to this pragma}}
> +int f();
> +int g() { f(); }
> +#pragma clang module end // expected-error {{no matching '#pragma clang
> module begin'}}
>
>
> ___
> cfe-commits mailing list
> cfe-commits@lists.llvm.org
> http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
>
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Re: r304190 - Diagnose attempts to build a preprocessed module that defines an unavailable submodule.

2017-05-30 Thread Galina Kistanova via cfe-commits
Thank you!

> (I did not receive any email about this from the buildbots. Is that
expected?)
No, looks wrong. I will keep an eye on this.

Thanks

Galina


On Tue, May 30, 2017 at 1:14 PM, Richard Smith 
wrote:

> On 30 May 2017 at 13:08, Galina Kistanova  wrote:
>
>> Hello Richard,
>>
>> This commit broke a test on few of our builders:
>>
>> Failing Tests (1):
>> Clang :: Modules/preprocess-unavailable.cpp
>>
>> http://lab.llvm.org:8011/builders/llvm-clang-lld-x86_64-
>> scei-ps4-ubuntu-fast/builds/11935
>> http://lab.llvm.org:8011/builders/llvm-clang-lld-x86_64-
>> scei-ps4-windows10pro-fast/builds/10137
>>
>> Please have a look at this?
>>
>
> Should be fixed by r304237, thanks for letting me know. (I did not receive
> any email about this from the buildbots. Is that expected?)
>
>
>> Thanks
>>
>> Galina
>>
>>
>>
>> On Mon, May 29, 2017 at 10:22 PM, Richard Smith via cfe-commits <
>> cfe-commits@lists.llvm.org> wrote:
>>
>>> Author: rsmith
>>> Date: Tue May 30 00:22:59 2017
>>> New Revision: 304190
>>>
>>> URL: http://llvm.org/viewvc/llvm-project?rev=304190&view=rev
>>> Log:
>>> Diagnose attempts to build a preprocessed module that defines an
>>> unavailable submodule.
>>>
>>> The errors we would otherwise get are incomprehensible, as we would
>>> enter the
>>> module but not make its contents visible to itself.
>>>
>>> Added:
>>> cfe/trunk/test/Modules/preprocess-unavailable.cpp
>>> Modified:
>>> cfe/trunk/include/clang/Basic/DiagnosticLexKinds.td
>>> cfe/trunk/lib/Lex/Pragma.cpp
>>>
>>> Modified: cfe/trunk/include/clang/Basic/DiagnosticLexKinds.td
>>> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/include/clang/
>>> Basic/DiagnosticLexKinds.td?rev=304190&r1=304189&r2=304190&view=diff
>>> 
>>> ==
>>> --- cfe/trunk/include/clang/Basic/DiagnosticLexKinds.td (original)
>>> +++ cfe/trunk/include/clang/Basic/DiagnosticLexKinds.td Tue May 30
>>> 00:22:59 2017
>>> @@ -525,6 +525,8 @@ def err_pp_module_begin_without_module_e
>>>  def err_pp_module_end_without_module_begin : Error<
>>>"no matching '#pragma clang module begin' for this "
>>>"'#pragma clang module end'">;
>>> +def note_pp_module_begin_here : Note<
>>> +  "entering module '%0' due to this pragma">;
>>>
>>>  def err_defined_macro_name : Error<"'defined' cannot be used as a macro
>>> name">;
>>>  def err_paste_at_start : Error<
>>>
>>> Modified: cfe/trunk/lib/Lex/Pragma.cpp
>>> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Lex/Pragma
>>> .cpp?rev=304190&r1=304189&r2=304190&view=diff
>>> 
>>> ==
>>> --- cfe/trunk/lib/Lex/Pragma.cpp (original)
>>> +++ cfe/trunk/lib/Lex/Pragma.cpp Tue May 30 00:22:59 2017
>>> @@ -1407,6 +1407,24 @@ struct PragmaModuleBeginHandler : public
>>>M = NewM;
>>>  }
>>>
>>> +// If the module isn't available, it doesn't make sense to enter it.
>>> +if (!M->isAvailable()) {
>>> +  Module::Requirement Requirement;
>>> +  Module::UnresolvedHeaderDirective MissingHeader;
>>> +  (void)M->isAvailable(PP.getLangOpts(), PP.getTargetInfo(),
>>> +   Requirement, MissingHeader);
>>> +  if (MissingHeader.FileNameLoc.isValid()) {
>>> +PP.Diag(MissingHeader.FileNameLoc,
>>> diag::err_module_header_missing)
>>> +  << MissingHeader.IsUmbrella << MissingHeader.FileName;
>>> +  } else {
>>> +PP.Diag(M->DefinitionLoc, diag::err_module_unavailable)
>>> +  << M->getFullModuleName() << Requirement.second <<
>>> Requirement.first;
>>> +  }
>>> +  PP.Diag(BeginLoc, diag::note_pp_module_begin_here)
>>> +<< M->getTopLevelModuleName();
>>> +  return;
>>> +}
>>> +
>>>  // Enter the scope of the submodule.
>>>  PP.EnterSubmodule(M, BeginLoc, /*ForPragma*/true);
>>>  PP.EnterAnnotationToken(SourceRange(BeginLoc,
>>> ModuleName.back().second),
>>>
>>> Added: cfe/trunk/test/Modules/preprocess-unavailable.cpp
>>> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Modules/p
>>> reprocess-unavailable.cpp?rev=304190&view=auto
>>> 
>>> ==
>>> --- cfe/trunk/test/Modules/preprocess-unavailable.cpp (added)
>>> +++ cfe/trunk/test/Modules/preprocess-unavailable.cpp Tue May 30
>>> 00:22:59 2017
>>> @@ -0,0 +1,12 @@
>>> +// RUN: %clang_cc1 -x c++-module-map %s -fmodule-name=a -verify
>>> +module a {
>>> +  module b {
>>> +requires cplusplus11
>>> +  }
>>> +}
>>> +#pragma clang module contents
>>> +// expected-error@3 {{module 'a.b' requires feature 'cplusplus11'}}
>>> +#pragma clang module begin a.b // expected-note {{entering module 'a'
>>> due to this pragma}}
>>> +int f();
>>> +int g() { f(); }
>>> +#pragma clang module end // expected-error {{no matching '#pragma clang
>>> module begin'}}
>>>
>>>
>>> ___
>>> cfe-commits maili

LLVM buildmaster will be updated and restarted tonight

2017-05-30 Thread Galina Kistanova via cfe-commits
Hello everyone,

LLVM buildmaster will be updated and restarted after 7 PM Pacific time
today.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Re: r304346 - [modules] When compiling a preprocessed module map, look for headers relative

2017-06-01 Thread Galina Kistanova via cfe-commits
Hello Richard,

This commit broke tests on few of our builders:

Failing Tests (2):
Clang :: Modules/preprocess-module.cpp
Clang :: Modules/preprocess-nested.cpp

http://lab.llvm.org:8011/builders/llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast/builds/10199
and
http://lab.llvm.org:8011/builders/llvm-clang-x86_64-expensive-checks-win/builds/2819

Please have a look at this?

Also I see that email notifications on these failures were sent.

Thanks

Galina


On Wed, May 31, 2017 at 1:56 PM, Richard Smith via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: rsmith
> Date: Wed May 31 15:56:55 2017
> New Revision: 304346
>
> URL: http://llvm.org/viewvc/llvm-project?rev=304346&view=rev
> Log:
> [modules] When compiling a preprocessed module map, look for headers
> relative
> to the original module map.
>
> Also use the path and name of the original module map when emitting that
> information into the .pcm file. The upshot of this is that the produced
> .pcm
> file will track information for headers in their original locations (where
> the
> module was preprocessed), not relative to whatever directory the
> preprocessed
> module map was in when it was built.
>
> Modified:
> cfe/trunk/include/clang/Basic/Module.h
> cfe/trunk/include/clang/Lex/HeaderSearch.h
> cfe/trunk/lib/Frontend/FrontendAction.cpp
> cfe/trunk/lib/Lex/HeaderSearch.cpp
> cfe/trunk/lib/Serialization/ASTWriter.cpp
> cfe/trunk/test/Modules/preprocess-module.cpp
> cfe/trunk/test/Modules/preprocess-nested.cpp
>
> Modified: cfe/trunk/include/clang/Basic/Module.h
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/include/
> clang/Basic/Module.h?rev=304346&r1=304345&r2=304346&view=diff
> 
> ==
> --- cfe/trunk/include/clang/Basic/Module.h (original)
> +++ cfe/trunk/include/clang/Basic/Module.h Wed May 31 15:56:55 2017
> @@ -83,6 +83,10 @@ public:
>/// are found.
>const DirectoryEntry *Directory;
>
> +  /// \brief The presumed file name for the module map defining this
> module.
> +  /// Only non-empty when building from preprocessed source.
> +  std::string PresumedModuleMapFile;
> +
>/// \brief The umbrella header or directory.
>llvm::PointerUnion Umbrella;
>
>
> Modified: cfe/trunk/include/clang/Lex/HeaderSearch.h
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/include/
> clang/Lex/HeaderSearch.h?rev=304346&r1=304345&r2=304346&view=diff
> 
> ==
> --- cfe/trunk/include/clang/Lex/HeaderSearch.h (original)
> +++ cfe/trunk/include/clang/Lex/HeaderSearch.h Wed May 31 15:56:55 2017
> @@ -543,10 +543,13 @@ public:
>/// \param Offset [inout] An offset within ID to start parsing. On exit,
>///filled by the end of the parsed contents (either EOF or the
>///location of an end-of-module-map pragma).
> -  ///
> +  /// \param OriginalModuleMapFile The original path to the module map
> file,
> +  ///used to resolve paths within the module (this is required
> when
> +  ///building the module from preprocessed source).
>/// \returns true if an error occurred, false otherwise.
>bool loadModuleMapFile(const FileEntry *File, bool IsSystem,
> - FileID ID = FileID(), unsigned *Offset =
> nullptr);
> + FileID ID = FileID(), unsigned *Offset = nullptr,
> + StringRef OriginalModuleMapFile = StringRef());
>
>/// \brief Collect the set of all known, top-level modules.
>///
>
> Modified: cfe/trunk/lib/Frontend/FrontendAction.cpp
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/
> Frontend/FrontendAction.cpp?rev=304346&r1=304345&r2=304346&view=diff
> 
> ==
> --- cfe/trunk/lib/Frontend/FrontendAction.cpp (original)
> +++ cfe/trunk/lib/Frontend/FrontendAction.cpp Wed May 31 15:56:55 2017
> @@ -373,10 +373,11 @@ collectModuleHeaderIncludes(const LangOp
>return std::error_code();
>  }
>
> -static bool
> -loadModuleMapForModuleBuild(CompilerInstance &CI, StringRef Filename,
> -bool IsSystem, bool IsPreprocessed,
> -unsigned &Offset) {
> +static bool loadModuleMapForModuleBuild(CompilerInstance &CI,
> +StringRef Filename, bool IsSystem,
> +bool IsPreprocessed,
> +std::string
> &PresumedModuleMapFile,
> +unsigned &Offset) {
>auto &SrcMgr = CI.getSourceManager();
>HeaderSearch &HS = CI.getPreprocessor().getHeaderSearchInfo();
>
> @@ -388,16 +389,15 @@ loadModuleMapForModuleBuild(CompilerInst
>// line directives are not part of the module map syntax in general.
>Offset = 0;
>if (IsPreprocessed) {
> -std::string PresumedMo

r304472 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-01 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Thu Jun  1 16:15:34 2017
New Revision: 304472

URL: http://llvm.org/viewvc/llvm-project?rev=304472&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Parse/ParseDecl.cpp

Modified: cfe/trunk/lib/Parse/ParseDecl.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Parse/ParseDecl.cpp?rev=304472&r1=304471&r2=304472&view=diff
==
--- cfe/trunk/lib/Parse/ParseDecl.cpp (original)
+++ cfe/trunk/lib/Parse/ParseDecl.cpp Thu Jun  1 16:15:34 2017
@@ -2552,6 +2552,7 @@ bool Parser::ParseImplicitInt(DeclSpec &
 }
   }
   // Fall through.
+  LLVM_FALLTHROUGH;
 }
 case tok::comma:
 case tok::equal:
@@ -3678,6 +3679,7 @@ void Parser::ParseDeclarationSpecifiers(
 isInvalid = true;
 break;
   };
+  LLVM_FALLTHROUGH;
 case tok::kw___private:
 case tok::kw___global:
 case tok::kw___local:
@@ -5045,6 +5047,7 @@ void Parser::ParseTypeQualifierListOpt(
 if (TryKeywordIdentFallback(false))
   continue;
   }
+  LLVM_FALLTHROUGH;
 case tok::kw___sptr:
 case tok::kw___w64:
 case tok::kw___ptr64:
@@ -5094,6 +5097,7 @@ void Parser::ParseTypeQualifierListOpt(
 continue; // do *not* consume the next token!
   }
   // otherwise, FALL THROUGH!
+  LLVM_FALLTHROUGH;
 default:
   DoneWithTypeQuals:
   // If this is not a type-qualifier token, we're done reading type


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304473 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-01 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Thu Jun  1 16:19:06 2017
New Revision: 304473

URL: http://llvm.org/viewvc/llvm-project?rev=304473&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Parse/ParseDeclCXX.cpp

Modified: cfe/trunk/lib/Parse/ParseDeclCXX.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Parse/ParseDeclCXX.cpp?rev=304473&r1=304472&r2=304473&view=diff
==
--- cfe/trunk/lib/Parse/ParseDeclCXX.cpp (original)
+++ cfe/trunk/lib/Parse/ParseDeclCXX.cpp Thu Jun  1 16:19:06 2017
@@ -4215,6 +4215,7 @@ void Parser::ParseMicrosoftIfExistsClass
 Diag(Result.KeywordLoc, diag::warn_microsoft_dependent_exists)
   << Result.IsIfExists;
 // Fall through to skip.
+LLVM_FALLTHROUGH;
   
   case IEB_Skip:
 Braces.skipToEnd();


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304475 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-01 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Thu Jun  1 16:21:49 2017
New Revision: 304475

URL: http://llvm.org/viewvc/llvm-project?rev=304475&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Parse/ParseExpr.cpp

Modified: cfe/trunk/lib/Parse/ParseExpr.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Parse/ParseExpr.cpp?rev=304475&r1=304474&r2=304475&view=diff
==
--- cfe/trunk/lib/Parse/ParseExpr.cpp (original)
+++ cfe/trunk/lib/Parse/ParseExpr.cpp Thu Jun  1 16:21:49 2017
@@ -1314,6 +1314,7 @@ ExprResult Parser::ParseCastExpression(b
 }
 
 // Fall through to treat the template-id as an id-expression.
+LLVM_FALLTHROUGH;
   }
 
   case tok::kw_operator: // [C++] id-expression: 
operator/conversion-function-id
@@ -1484,9 +1485,9 @@ Parser::ParsePostfixExpressionSuffix(Exp
  nullptr, LHS.get());
 break;
   }
-
   // Fall through; this isn't a message send.
-
+  LLVM_FALLTHROUGH;
+
 default:  // Not a postfix-expression suffix.
   return LHS;
 case tok::l_square: {  // postfix-expression: p-e '[' expression ']'


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304477 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-01 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Thu Jun  1 16:23:52 2017
New Revision: 304477

URL: http://llvm.org/viewvc/llvm-project?rev=304477&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Parse/ParseInit.cpp

Modified: cfe/trunk/lib/Parse/ParseInit.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Parse/ParseInit.cpp?rev=304477&r1=304476&r2=304477&view=diff
==
--- cfe/trunk/lib/Parse/ParseInit.cpp (original)
+++ cfe/trunk/lib/Parse/ParseInit.cpp Thu Jun  1 16:23:52 2017
@@ -501,7 +501,8 @@ bool Parser::ParseMicrosoftIfExistsBrace
 Diag(Result.KeywordLoc, diag::warn_microsoft_dependent_exists)
   << Result.IsIfExists;
 // Fall through to skip.
-  
+LLVM_FALLTHROUGH;
+
   case IEB_Skip:
 Braces.skipToEnd();
 return false;


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304478 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-01 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Thu Jun  1 16:26:38 2017
New Revision: 304478

URL: http://llvm.org/viewvc/llvm-project?rev=304478&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Parse/ParseOpenMP.cpp

Modified: cfe/trunk/lib/Parse/ParseOpenMP.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Parse/ParseOpenMP.cpp?rev=304478&r1=304477&r2=304478&view=diff
==
--- cfe/trunk/lib/Parse/ParseOpenMP.cpp (original)
+++ cfe/trunk/lib/Parse/ParseOpenMP.cpp Thu Jun  1 16:26:38 2017
@@ -192,6 +192,7 @@ static DeclarationName parseOpenMPReduct
   case tok::identifier: // identifier
 if (!WithOperator)
   break;
+LLVM_FALLTHROUGH;
   default:
 P.Diag(Tok.getLocation(), diag::err_omp_expected_reduction_identifier);
 P.SkipUntil(tok::colon, tok::r_paren, tok::annot_pragma_openmp_end,
@@ -869,6 +870,7 @@ StmtResult Parser::ParseOpenMPDeclarativ
   // pseudo-clause OMPFlushClause.
   PP.EnterToken(Tok);
 }
+LLVM_FALLTHROUGH;
   case OMPD_taskyield:
   case OMPD_barrier:
   case OMPD_taskwait:
@@ -883,6 +885,7 @@ StmtResult Parser::ParseOpenMPDeclarativ
 }
 HasAssociatedStatement = false;
 // Fall through for further analysis.
+LLVM_FALLTHROUGH;
   case OMPD_parallel:
   case OMPD_simd:
   case OMPD_for:
@@ -1184,6 +1187,7 @@ OMPClause *Parser::ParseOpenMPClause(Ope
   << getOpenMPDirectiveName(DKind) << getOpenMPClauseName(CKind) << 0;
   ErrorFound = true;
 }
+LLVM_FALLTHROUGH;
 
   case OMPC_if:
 Clause = ParseOpenMPSingleExprWithArgClause(CKind);


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304479 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-01 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Thu Jun  1 16:28:26 2017
New Revision: 304479

URL: http://llvm.org/viewvc/llvm-project?rev=304479&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Parse/ParseStmt.cpp

Modified: cfe/trunk/lib/Parse/ParseStmt.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Parse/ParseStmt.cpp?rev=304479&r1=304478&r2=304479&view=diff
==
--- cfe/trunk/lib/Parse/ParseStmt.cpp (original)
+++ cfe/trunk/lib/Parse/ParseStmt.cpp Thu Jun  1 16:28:26 2017
@@ -203,6 +203,7 @@ Retry:
 }
 
 // Fall through
+LLVM_FALLTHROUGH;
   }
 
   default: {


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304481 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-01 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Thu Jun  1 16:29:45 2017
New Revision: 304481

URL: http://llvm.org/viewvc/llvm-project?rev=304481&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Parse/ParseTentative.cpp

Modified: cfe/trunk/lib/Parse/ParseTentative.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Parse/ParseTentative.cpp?rev=304481&r1=304480&r2=304481&view=diff
==
--- cfe/trunk/lib/Parse/ParseTentative.cpp (original)
+++ cfe/trunk/lib/Parse/ParseTentative.cpp Thu Jun  1 16:29:45 2017
@@ -1450,6 +1450,7 @@ Parser::isCXXDeclarationSpecifier(Parser
   return TPResult::False;
 }
 // If that succeeded, fallthrough into the generic simple-type-id case.
+LLVM_FALLTHROUGH;
 
 // The ambiguity resides in a simple-type-specifier/typename-specifier
 // followed by a '('. The '(' could either be the start of:
@@ -1492,6 +1493,7 @@ Parser::isCXXDeclarationSpecifier(Parser
   
   return TPResult::True;
 }
+LLVM_FALLTHROUGH;
   
   case tok::kw_char:
   case tok::kw_wchar_t:


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Re: r304459 - [ubsan] Add a check for pointer overflow UB

2017-06-01 Thread Galina Kistanova via cfe-commits
Hello Vedant,

This commit broke tests on some of our builders:

Failing Tests (1):
Clang :: CodeGen/ubsan-pointer-overflow.m

http://lab.llvm.org:8011/builders/llvm-clang-x86_64-expensive-checks-win/builds/2865/steps/test-check-all/logs/stdio
http://lab.llvm.org:8011/builders/llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast/builds/10259
http://lab.llvm.org:8011/builders/clang-with-lto-ubuntu/builds/3097
etc

Thanks

Galina

On Thu, Jun 1, 2017 at 12:22 PM, Vedant Kumar via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: vedantk
> Date: Thu Jun  1 14:22:18 2017
> New Revision: 304459
>
> URL: http://llvm.org/viewvc/llvm-project?rev=304459&view=rev
> Log:
> [ubsan] Add a check for pointer overflow UB
>
> Check pointer arithmetic for overflow.
>
> For some more background on this check, see:
>
>   https://wdtz.org/catching-pointer-overflow-bugs.html
>   https://reviews.llvm.org/D20322
>
> Patch by Will Dietz and John Regehr!
>
> This version of the patch is different from the original in a few ways:
>
>   - It introduces the EmitCheckedInBoundsGEP utility which inserts
> checks when the pointer overflow check is enabled.
>
>   - It does some constant-folding to reduce instrumentation overhead.
>
>   - It does not check some GEPs in CGExprCXX. I'm not sure that
> inserting checks here, or in CGClass, would catch many bugs.
>
> Possible future directions for this check:
>
>   - Introduce CGF.EmitCheckedStructGEP, to detect overflows when
> accessing structures.
>
> Testing: Apart from the added lit test, I ran check-llvm and check-clang
> with a stage2, ubsan-instrumented clang. Will and John have also done
> extensive testing on numerous open source projects.
>
> Differential Revision: https://reviews.llvm.org/D33305
>
> Added:
> cfe/trunk/test/CodeGen/ubsan-pointer-overflow.m
> Modified:
> cfe/trunk/docs/UndefinedBehaviorSanitizer.rst
> cfe/trunk/include/clang/Basic/Sanitizers.def
> cfe/trunk/lib/CodeGen/CGExpr.cpp
> cfe/trunk/lib/CodeGen/CGExprScalar.cpp
> cfe/trunk/lib/CodeGen/CodeGenFunction.h
> cfe/trunk/test/Driver/fsanitize.c
>
> Modified: cfe/trunk/docs/UndefinedBehaviorSanitizer.rst
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/
> UndefinedBehaviorSanitizer.rst?rev=304459&r1=304458&r2=304459&view=diff
> 
> ==
> --- cfe/trunk/docs/UndefinedBehaviorSanitizer.rst (original)
> +++ cfe/trunk/docs/UndefinedBehaviorSanitizer.rst Thu Jun  1 14:22:18 2017
> @@ -106,6 +106,8 @@ Available checks are:
>   invalid pointers. These checks are made in terms of
>   ``__builtin_object_size``, and consequently may be able to detect
> more
>   problems at higher optimization levels.
> +  -  ``-fsanitize=pointer-overflow``: Performing pointer arithmetic which
> + overflows.
>-  ``-fsanitize=return``: In C++, reaching the end of a
>   value-returning function without returning a value.
>-  ``-fsanitize=returns-nonnull-attribute``: Returning null pointer
>
> Modified: cfe/trunk/include/clang/Basic/Sanitizers.def
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/include/
> clang/Basic/Sanitizers.def?rev=304459&r1=304458&r2=304459&view=diff
> 
> ==
> --- cfe/trunk/include/clang/Basic/Sanitizers.def (original)
> +++ cfe/trunk/include/clang/Basic/Sanitizers.def Thu Jun  1 14:22:18 2017
> @@ -73,6 +73,7 @@ SANITIZER("nullability-return", Nullabil
>  SANITIZER_GROUP("nullability", Nullability,
>  NullabilityArg | NullabilityAssign | NullabilityReturn)
>  SANITIZER("object-size", ObjectSize)
> +SANITIZER("pointer-overflow", PointerOverflow)
>  SANITIZER("return", Return)
>  SANITIZER("returns-nonnull-attribute", ReturnsNonnullAttribute)
>  SANITIZER("shift-base", ShiftBase)
> @@ -108,9 +109,9 @@ SANITIZER("safe-stack", SafeStack)
>  SANITIZER_GROUP("undefined", Undefined,
>  Alignment | Bool | ArrayBounds | Enum | FloatCastOverflow
> |
>  FloatDivideByZero | IntegerDivideByZero |
> NonnullAttribute |
> -Null | ObjectSize | Return | ReturnsNonnullAttribute |
> -Shift | SignedIntegerOverflow | Unreachable |
> VLABound |
> -Function | Vptr)
> +Null | ObjectSize | PointerOverflow | Return |
> +ReturnsNonnullAttribute | Shift |
> SignedIntegerOverflow |
> +Unreachable | VLABound | Function | Vptr)
>
>  // -fsanitize=undefined-trap is an alias for -fsanitize=undefined.
>  SANITIZER_GROUP("undefined-trap", UndefinedTrap, Undefined)
>
> Modified: cfe/trunk/lib/CodeGen/CGExpr.cpp
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/CodeGen/
> CGExpr.cpp?rev=304459&r1=304458&r2=304459&view=diff
> 
> ==
> --- cfe/trunk/lib/CodeGen/CGExpr.cpp (orig

Buildbot numbers for the week of 05/14/2017 - 05/20/2017

2017-06-02 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the week of 05/14/2017 - 05/20/2017.

Please see the same data in attached csv files:

The longest time each builder was red during the last week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the last week:

buildername | was_red
+-
 sanitizer-x86_64-linux-fast| 38:43:28
 perf-x86_64-penryn-O3  | 31:17:12
 clang-cmake-thumbv7-a15-full-sh| 30:13:25
 clang-cmake-armv7-a15-selfhost-neon| 28:50:30
 perf-x86_64-penryn-O3-polly-fast   | 28:12:18
 perf-x86_64-penryn-O3-polly-before-vectorizer  | 28:10:31
 perf-x86_64-penryn-O3-polly-before-vectorizer-detect-only  | 28:02:26
 perf-x86_64-penryn-O3-polly-before-vectorizer-unprofitable | 26:54:10
 perf-x86_64-penryn-O3-polly-unprofitable   | 26:52:46
 clang-cmake-armv7-a15-selfhost | 26:34:34
 perf-x86_64-penryn-O3-polly-parallel-fast  | 26:27:47
 perf-x86_64-penryn-O3-polly| 24:09:14
 sanitizer-windows  | 15:47:24
 polly-amd64-linux  | 13:51:37
 polly-arm-linux| 13:16:56
 clang-lld-x86_64-2stage| 10:49:44
 sanitizer-ppc64be-linux| 09:46:02
 clang-with-lto-ubuntu  | 08:34:03
 sanitizer-x86_64-linux-autoconf| 08:26:15
 clang-ppc64be-linux| 07:44:26
 clang-x86_64-linux-selfhost-modules| 07:43:55
 lld-x86_64-darwin13| 07:42:32
 clang-with-thin-lto-ubuntu | 07:35:02
 clang-x86_64-linux-selfhost-modules-2  | 07:32:45
 clang-hexagon-elf  | 07:28:51
 clang-s390x-linux  | 07:28:26
 clang-cmake-aarch64-lld| 07:27:06
 clang-cuda-build   | 07:26:07
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast | 07:21:09
 llvm-hexagon-elf   | 07:08:50
 clang-ppc64le-linux| 07:06:38
 clang-cmake-aarch64-42vma  | 07:06:00
 clang-ppc64le-linux-multistage | 07:02:45
 clang-ppc64be-linux-lnt| 06:57:39
 clang-cmake-aarch64-quick  | 06:54:58
 clang-cmake-aarch64-39vma  | 06:40:23
 sanitizer-ppc64le-linux| 06:17:22
 clang-cmake-thumbv7-a15| 06:11:39
 clang-cmake-armv7-a15  | 06:08:35
 clang-cmake-armv7-a15-full | 05:58:15
 clang-x86_64-debian-fast   | 05:57:36
 clang-cmake-aarch64-full   | 05:55:10
 clang-ppc64be-linux-multistage | 05:51:00
 sanitizer-x86_64-linux | 05:48:32
 clang-x86-windows-msvc2015 | 05:18:47
 clang-bpf-build| 04:23:45
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast   | 03:50:59
 llvm-clang-x86_64-expensive-checks-win | 03:50:58
 clang-x64-ninja-win7   | 03:50:36
 libcxx-libcxxabi-x86_64-linux-ubuntu-asan  | 02:58:40
 lldb-windows7-android  | 02:54:14
 lldb-x86_64-ubuntu-14.04-cmake | 01:40:35
 sanitizer-x86_64-linux-fuzzer  | 01:23:01
 lldb-x86_64-darwin-13.4| 01:19:45
 lldb-x86_64-ubuntu-14.04-buildserver   | 01:19:12
 lld-x86_64-freebsd | 01:05:16
 lldb-amd64-ninja-netbsd8   | 01:01:32
 clang-native-arm-lnt   | 00:50:23
 clang-tools-sphinx-docs| 00:46:14
 lldb-x86_64-ubuntu-14.04-andr

Buildbot numbers for the last week of 05/21/2017 - 05/27/2017

2017-06-02 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the last week of 05/21/2017 -
05/27/2017.

Please see the same data in attached csv files:

The longest time each builder was red during the last week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the last week:

buildername |  was_red
+--
 clang-x64-ninja-win7   | 110:30:16
 clang-with-thin-lto-ubuntu | 74:49:07
 sanitizer-x86_64-linux-bootstrap   | 67:49:22
 sanitizer-ppc64be-linux| 53:25:55
 sanitizer-x86_64-linux-fast| 27:40:22
 perf-x86_64-penryn-O3-polly-before-vectorizer-detect-only  | 27:32:12
 clang-cmake-armv7-a15-full | 26:03:36
 clang-x86-windows-msvc2015 | 25:24:33
 perf-x86_64-penryn-O3-polly-before-vectorizer  | 22:55:33
 clang-ppc64be-linux-multistage | 20:12:56
 perf-x86_64-penryn-O3-polly| 19:20:44
 perf-x86_64-penryn-O3  | 19:11:40
 llvm-clang-x86_64-expensive-checks-win | 15:07:27
 clang-cmake-thumbv7-a15-full-sh| 13:29:45
 lldb-windows7-android  | 12:34:59
 sanitizer-x86_64-linux-fuzzer  | 12:15:42
 libcxx-libcxxabi-x86_64-linux-ubuntu-asan  | 11:19:28
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx14 | 11:07:14
 libcxx-libcxxabi-x86_64-linux-ubuntu-gcc-tot-cxx1z | 11:03:24
 libcxx-libcxxabi-x86_64-linux-ubuntu-msan  | 10:51:20
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx11 | 10:51:00
 libcxx-libcxxabi-x86_64-linux-ubuntu-tsan  | 10:38:35
 perf-x86_64-penryn-O3-polly-fast   | 10:36:41
 clang-ppc64be-linux| 10:33:35
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx1z | 10:32:33
 clang-ppc64be-linux-lnt| 10:25:24
 libcxx-libcxxabi-libunwind-x86_64-linux-ubuntu | 10:15:34
 perf-x86_64-penryn-O3-polly-before-vectorizer-unprofitable | 09:50:32
 clang-cmake-armv7-a15-selfhost-neon| 09:32:30
 clang-lld-x86_64-2stage| 08:58:30
 clang-bpf-build| 08:45:51
 polly-amd64-linux  | 08:21:25
 perf-x86_64-penryn-O3-polly-parallel-fast  | 07:58:51
 lldb-x86_64-ubuntu-14.04-buildserver   | 07:57:02
 clang-cmake-armv7-a15-selfhost | 07:46:54
 clang-x86_64-linux-selfhost-modules-2  | 07:42:43
 clang-cmake-aarch64-lld| 07:41:19
 clang-cmake-aarch64-full   | 07:40:31
 clang-cmake-aarch64-39vma  | 07:33:58
 sanitizer-x86_64-linux | 07:19:23
 clang-with-lto-ubuntu  | 07:17:30
 perf-x86_64-penryn-O3-polly-unprofitable   | 07:13:52
 clang-cuda-build   | 07:09:47
 lldb-x86-windows-msvc2015  | 07:02:31
 libcxx-libcxxabi-x86_64-linux-ubuntu-ubsan | 06:56:43
 clang-ppc64le-linux| 06:53:03
 clang-cmake-aarch64-quick  | 06:40:01
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast | 06:39:07
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast   | 06:37:45
 clang-x86_64-linux-selfhost-modules| 06:35:35
 clang-atom-d525-fedora-rel | 06:29:32
 clang-ppc64le-linux-multistage | 06:29:04
 clang-cmake-aarch64-42vma  | 06:23:52
 clang-s390x-linux  | 06:15:34
 lld-x86_64-darwin13| 06:00:42
 clang-native-arm-lnt   | 06:00:03
 sanitizer-windows  | 05:58:04
 clang-hexagon-elf  | 05:56:35
 polly-arm-linux| 05:52:54
 clang-cmake-armv7-a15

r304640 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-02 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Sat Jun  3 01:23:19 2017
New Revision: 304640

URL: http://llvm.org/viewvc/llvm-project?rev=304640&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/ARCMigrate/TransRetainReleaseDealloc.cpp
cfe/trunk/lib/ARCMigrate/TransformActions.cpp

Modified: cfe/trunk/lib/ARCMigrate/TransRetainReleaseDealloc.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/ARCMigrate/TransRetainReleaseDealloc.cpp?rev=304640&r1=304639&r2=304640&view=diff
==
--- cfe/trunk/lib/ARCMigrate/TransRetainReleaseDealloc.cpp (original)
+++ cfe/trunk/lib/ARCMigrate/TransRetainReleaseDealloc.cpp Sat Jun  3 01:23:19 
2017
@@ -78,6 +78,7 @@ public:
 }
   }
   // Pass through.
+  LLVM_FALLTHROUGH;
 case OMF_retain:
 case OMF_release:
   if (E->getReceiverKind() == ObjCMessageExpr::Instance)

Modified: cfe/trunk/lib/ARCMigrate/TransformActions.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/ARCMigrate/TransformActions.cpp?rev=304640&r1=304639&r2=304640&view=diff
==
--- cfe/trunk/lib/ARCMigrate/TransformActions.cpp (original)
+++ cfe/trunk/lib/ARCMigrate/TransformActions.cpp Sat Jun  3 01:23:19 2017
@@ -539,6 +539,7 @@ void TransformActionsImpl::addRemoval(Ch
   return;
 case Range_Contains:
   RI->End = newRange.End;
+  LLVM_FALLTHROUGH;
 case Range_ExtendsBegin:
   newRange.End = RI->End;
   Removals.erase(RI);


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304641 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-02 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Sat Jun  3 01:23:51 2017
New Revision: 304641

URL: http://llvm.org/viewvc/llvm-project?rev=304641&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Analysis/PrintfFormatString.cpp
cfe/trunk/lib/Analysis/PseudoConstantAnalysis.cpp
cfe/trunk/lib/Analysis/ScanfFormatString.cpp

Modified: cfe/trunk/lib/Analysis/PrintfFormatString.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Analysis/PrintfFormatString.cpp?rev=304641&r1=304640&r2=304641&view=diff
==
--- cfe/trunk/lib/Analysis/PrintfFormatString.cpp (original)
+++ cfe/trunk/lib/Analysis/PrintfFormatString.cpp Sat Jun  3 01:23:51 2017
@@ -441,6 +441,7 @@ ArgType PrintfSpecifier::getArgType(ASTC
   case LengthModifier::AsShort:
 if (Ctx.getTargetInfo().getTriple().isOSMSVCRT())
   return Ctx.IntTy;
+LLVM_FALLTHROUGH;
   default:
 return ArgType::Invalid();
 }

Modified: cfe/trunk/lib/Analysis/PseudoConstantAnalysis.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Analysis/PseudoConstantAnalysis.cpp?rev=304641&r1=304640&r2=304641&view=diff
==
--- cfe/trunk/lib/Analysis/PseudoConstantAnalysis.cpp (original)
+++ cfe/trunk/lib/Analysis/PseudoConstantAnalysis.cpp Sat Jun  3 01:23:51 2017
@@ -109,6 +109,7 @@ void PseudoConstantAnalysis::RunAnalysis
   // Do not visit the children
   continue;
 
+LLVM_FALLTHROUGH;
   }
   case BO_AddAssign:
   case BO_SubAssign:

Modified: cfe/trunk/lib/Analysis/ScanfFormatString.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Analysis/ScanfFormatString.cpp?rev=304641&r1=304640&r2=304641&view=diff
==
--- cfe/trunk/lib/Analysis/ScanfFormatString.cpp (original)
+++ cfe/trunk/lib/Analysis/ScanfFormatString.cpp Sat Jun  3 01:23:51 2017
@@ -341,6 +341,7 @@ ArgType ScanfSpecifier::getArgType(ASTCo
 case LengthModifier::AsShort:
   if (Ctx.getTargetInfo().getTriple().isOSMSVCRT())
 return ArgType::PtrTo(ArgType::AnyCharTy);
+  LLVM_FALLTHROUGH;
 default:
   return ArgType::Invalid();
   }
@@ -357,6 +358,7 @@ ArgType ScanfSpecifier::getArgType(ASTCo
 case LengthModifier::AsShort:
   if (Ctx.getTargetInfo().getTriple().isOSMSVCRT())
 return ArgType::PtrTo(ArgType::AnyCharTy);
+  LLVM_FALLTHROUGH;
 default:
   return ArgType::Invalid();
   }


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304643 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-02 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Sat Jun  3 01:25:47 2017
New Revision: 304643

URL: http://llvm.org/viewvc/llvm-project?rev=304643&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Lex/Lexer.cpp

Modified: cfe/trunk/lib/Lex/Lexer.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Lex/Lexer.cpp?rev=304643&r1=304642&r2=304643&view=diff
==
--- cfe/trunk/lib/Lex/Lexer.cpp (original)
+++ cfe/trunk/lib/Lex/Lexer.cpp Sat Jun  3 01:25:47 2017
@@ -2498,6 +2498,7 @@ void Lexer::ReadToEndOfLine(SmallVectorI
 break;
   }
   // FALL THROUGH.
+  LLVM_FALLTHROUGH;
 case '\r':
 case '\n':
   // Okay, we found the end of the line. First, back up past the \0, \r, 
\n.
@@ -3247,6 +3248,7 @@ LexNextToken:
   return LexCharConstant(Result, ConsumeChar(CurPtr, SizeTmp, Result),
  tok::wide_char_constant);
 // FALL THROUGH, treating L like the start of an identifier.
+LLVM_FALLTHROUGH;
 
   // C99 6.4.2: Identifiers.
   case 'A': case 'B': case 'C': case 'D': case 'E': case 'F': case 'G':


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304642 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through + formatted. NFC.

2017-06-02 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Sat Jun  3 01:25:29 2017
New Revision: 304642

URL: http://llvm.org/viewvc/llvm-project?rev=304642&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through + 
formatted. NFC.

Modified:
cfe/trunk/lib/Lex/LiteralSupport.cpp

Modified: cfe/trunk/lib/Lex/LiteralSupport.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Lex/LiteralSupport.cpp?rev=304642&r1=304641&r2=304642&view=diff
==
--- cfe/trunk/lib/Lex/LiteralSupport.cpp (original)
+++ cfe/trunk/lib/Lex/LiteralSupport.cpp Sat Jun  3 01:25:29 2017
@@ -456,10 +456,17 @@ static void EncodeUCNEscape(const char *
   // Finally, we write the bytes into ResultBuf.
   ResultBuf += bytesToWrite;
   switch (bytesToWrite) { // note: everything falls through.
-  case 4: *--ResultBuf = (UTF8)((UcnVal | byteMark) & byteMask); UcnVal >>= 6;
-  case 3: *--ResultBuf = (UTF8)((UcnVal | byteMark) & byteMask); UcnVal >>= 6;
-  case 2: *--ResultBuf = (UTF8)((UcnVal | byteMark) & byteMask); UcnVal >>= 6;
-  case 1: *--ResultBuf = (UTF8) (UcnVal | firstByteMark[bytesToWrite]);
+  case 4:
+*--ResultBuf = (UTF8)((UcnVal | byteMark) & byteMask); UcnVal >>= 6;
+LLVM_FALLTHROUGH;
+  case 3:
+*--ResultBuf = (UTF8)((UcnVal | byteMark) & byteMask); UcnVal >>= 6;
+LLVM_FALLTHROUGH;
+  case 2:
+*--ResultBuf = (UTF8)((UcnVal | byteMark) & byteMask); UcnVal >>= 6;
+LLVM_FALLTHROUGH;
+  case 1:
+*--ResultBuf = (UTF8) (UcnVal | firstByteMark[bytesToWrite]);
   }
   // Update the buffer.
   ResultBuf += bytesToWrite;


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304644 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-02 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Sat Jun  3 01:26:27 2017
New Revision: 304644

URL: http://llvm.org/viewvc/llvm-project?rev=304644&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/StaticAnalyzer/Checkers/DeadStoresChecker.cpp
cfe/trunk/lib/StaticAnalyzer/Core/ExprEngine.cpp
cfe/trunk/lib/StaticAnalyzer/Core/SValBuilder.cpp
cfe/trunk/lib/StaticAnalyzer/Core/SimpleSValBuilder.cpp

Modified: cfe/trunk/lib/StaticAnalyzer/Checkers/DeadStoresChecker.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/StaticAnalyzer/Checkers/DeadStoresChecker.cpp?rev=304644&r1=304643&r2=304644&view=diff
==
--- cfe/trunk/lib/StaticAnalyzer/Checkers/DeadStoresChecker.cpp (original)
+++ cfe/trunk/lib/StaticAnalyzer/Checkers/DeadStoresChecker.cpp Sat Jun  3 
01:26:27 2017
@@ -189,6 +189,7 @@ public:
 
   case DeadIncrement:
 BugType = "Dead increment";
+LLVM_FALLTHROUGH;
   case Standard:
 if (!BugType) BugType = "Dead assignment";
 os << "Value stored to '" << *V << "' is never read";

Modified: cfe/trunk/lib/StaticAnalyzer/Core/ExprEngine.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/StaticAnalyzer/Core/ExprEngine.cpp?rev=304644&r1=304643&r2=304644&view=diff
==
--- cfe/trunk/lib/StaticAnalyzer/Core/ExprEngine.cpp (original)
+++ cfe/trunk/lib/StaticAnalyzer/Core/ExprEngine.cpp Sat Jun  3 01:26:27 2017
@@ -1176,6 +1176,7 @@ void ExprEngine::Visit(const Stmt *S, Ex
 }
   }
   // FALLTHROUGH
+  LLVM_FALLTHROUGH;
 }
 case Stmt::CallExprClass:
 case Stmt::CXXMemberCallExprClass:

Modified: cfe/trunk/lib/StaticAnalyzer/Core/SValBuilder.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/StaticAnalyzer/Core/SValBuilder.cpp?rev=304644&r1=304643&r2=304644&view=diff
==
--- cfe/trunk/lib/StaticAnalyzer/Core/SValBuilder.cpp (original)
+++ cfe/trunk/lib/StaticAnalyzer/Core/SValBuilder.cpp Sat Jun  3 01:26:27 2017
@@ -325,6 +325,7 @@ Optional SValBuilder::getConstantV
 }
 }
 // FALLTHROUGH
+LLVM_FALLTHROUGH;
   }
 
   // If we don't have a special case, fall back to the AST's constant 
evaluator.

Modified: cfe/trunk/lib/StaticAnalyzer/Core/SimpleSValBuilder.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/StaticAnalyzer/Core/SimpleSValBuilder.cpp?rev=304644&r1=304643&r2=304644&view=diff
==
--- cfe/trunk/lib/StaticAnalyzer/Core/SimpleSValBuilder.cpp (original)
+++ cfe/trunk/lib/StaticAnalyzer/Core/SimpleSValBuilder.cpp Sat Jun  3 01:26:27 
2017
@@ -163,6 +163,7 @@ SVal SimpleSValBuilder::evalCastFromLoc(
   return nonloc::SymbolVal(SymR->getSymbol());
 
 // FALL-THROUGH
+LLVM_FALLTHROUGH;
   }
 
   case loc::GotoLabelKind:


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304645 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-02 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Sat Jun  3 01:27:16 2017
New Revision: 304645

URL: http://llvm.org/viewvc/llvm-project?rev=304645&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Frontend/CompilerInstance.cpp
cfe/trunk/lib/Frontend/InitHeaderSearch.cpp
cfe/trunk/lib/Frontend/SerializedDiagnosticReader.cpp

Modified: cfe/trunk/lib/Frontend/CompilerInstance.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Frontend/CompilerInstance.cpp?rev=304645&r1=304644&r2=304645&view=diff
==
--- cfe/trunk/lib/Frontend/CompilerInstance.cpp (original)
+++ cfe/trunk/lib/Frontend/CompilerInstance.cpp Sat Jun  3 01:27:16 2017
@@ -1727,6 +1727,7 @@ CompilerInstance::loadModule(SourceLocat
 diag::warn_module_config_mismatch)
 << ModuleFileName;
   // Fall through to error out.
+  LLVM_FALLTHROUGH;
 case ASTReader::VersionMismatch:
 case ASTReader::HadErrors:
   ModuleLoader::HadFatalFailure = true;

Modified: cfe/trunk/lib/Frontend/InitHeaderSearch.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Frontend/InitHeaderSearch.cpp?rev=304645&r1=304644&r2=304645&view=diff
==
--- cfe/trunk/lib/Frontend/InitHeaderSearch.cpp (original)
+++ cfe/trunk/lib/Frontend/InitHeaderSearch.cpp Sat Jun  3 01:27:16 2017
@@ -221,6 +221,7 @@ void InitHeaderSearch::AddDefaultCInclud
 case llvm::Triple::Win32:
   if (triple.getEnvironment() != llvm::Triple::Cygnus)
 break;
+  LLVM_FALLTHROUGH;
 default:
   // FIXME: temporary hack: hard-coded paths.
   AddPath("/usr/local/include", System, false);
@@ -343,6 +344,7 @@ void InitHeaderSearch::AddDefaultCInclud
 AddPath(BaseSDKPath + "/target/include", System, false);
 if (triple.isPS4CPU())
   AddPath(BaseSDKPath + "/target/include_common", System, false);
+LLVM_FALLTHROUGH;
   }
   default:
 AddPath("/usr/include", ExternCSystem, false);

Modified: cfe/trunk/lib/Frontend/SerializedDiagnosticReader.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Frontend/SerializedDiagnosticReader.cpp?rev=304645&r1=304644&r2=304645&view=diff
==
--- cfe/trunk/lib/Frontend/SerializedDiagnosticReader.cpp (original)
+++ cfe/trunk/lib/Frontend/SerializedDiagnosticReader.cpp Sat Jun  3 01:27:16 
2017
@@ -125,6 +125,7 @@ SerializedDiagnosticReader::readMetaBloc
 case Cursor::BlockBegin:
   if (Stream.SkipBlock())
 return SDError::MalformedMetadataBlock;
+  LLVM_FALLTHROUGH;
 case Cursor::BlockEnd:
   if (!VersionChecked)
 return SDError::MissingVersion;


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304646 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-02 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Sat Jun  3 01:29:16 2017
New Revision: 304646

URL: http://llvm.org/viewvc/llvm-project?rev=304646&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Parse/Parser.cpp

Modified: cfe/trunk/lib/Parse/Parser.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Parse/Parser.cpp?rev=304646&r1=304645&r2=304646&view=diff
==
--- cfe/trunk/lib/Parse/Parser.cpp (original)
+++ cfe/trunk/lib/Parse/Parser.cpp Sat Jun  3 01:29:16 2017
@@ -763,6 +763,7 @@ Parser::ParseExternalDeclaration(ParsedA
 }
 // This must be 'export template'. Parse it so we can diagnose our lack
 // of support.
+LLVM_FALLTHROUGH;
   case tok::kw_using:
   case tok::kw_namespace:
   case tok::kw_typedef:
@@ -1875,6 +1876,7 @@ bool Parser::isTokenEqualOrEqualTypo() {
 Diag(Tok, diag::err_invalid_token_after_declarator_suggest_equal)
 << Kind
 << FixItHint::CreateReplacement(SourceRange(Tok.getLocation()), "=");
+LLVM_FALLTHROUGH;
   case tok::equal:
 return true;
   }


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304647 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-02 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Sat Jun  3 01:29:40 2017
New Revision: 304647

URL: http://llvm.org/viewvc/llvm-project?rev=304647&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Rewrite/HTMLRewrite.cpp

Modified: cfe/trunk/lib/Rewrite/HTMLRewrite.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Rewrite/HTMLRewrite.cpp?rev=304647&r1=304646&r2=304647&view=diff
==
--- cfe/trunk/lib/Rewrite/HTMLRewrite.cpp (original)
+++ cfe/trunk/lib/Rewrite/HTMLRewrite.cpp Sat Jun  3 01:29:40 2017
@@ -409,6 +409,7 @@ void html::SyntaxHighlight(Rewriter &R,
   ++TokOffs;
   --TokLen;
   // FALL THROUGH to chop the 8
+  LLVM_FALLTHROUGH;
 case tok::wide_string_literal:
 case tok::utf16_string_literal:
 case tok::utf32_string_literal:


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304648 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-02 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Sat Jun  3 01:30:08 2017
New Revision: 304648

URL: http://llvm.org/viewvc/llvm-project?rev=304648&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Edit/RewriteObjCFoundationAPI.cpp

Modified: cfe/trunk/lib/Edit/RewriteObjCFoundationAPI.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Edit/RewriteObjCFoundationAPI.cpp?rev=304648&r1=304647&r2=304648&view=diff
==
--- cfe/trunk/lib/Edit/RewriteObjCFoundationAPI.cpp (original)
+++ cfe/trunk/lib/Edit/RewriteObjCFoundationAPI.cpp Sat Jun  3 01:30:08 2017
@@ -798,24 +798,28 @@ static bool rewriteToNumberLiteral(const
   case NSAPI::NSNumberWithUnsignedInt:
   case NSAPI::NSNumberWithUnsignedInteger:
 CallIsUnsigned = true;
+LLVM_FALLTHROUGH;
   case NSAPI::NSNumberWithInt:
   case NSAPI::NSNumberWithInteger:
 break;
 
   case NSAPI::NSNumberWithUnsignedLong:
 CallIsUnsigned = true;
+LLVM_FALLTHROUGH;
   case NSAPI::NSNumberWithLong:
 CallIsLong = true;
 break;
 
   case NSAPI::NSNumberWithUnsignedLongLong:
 CallIsUnsigned = true;
+LLVM_FALLTHROUGH;
   case NSAPI::NSNumberWithLongLong:
 CallIsLongLong = true;
 break;
 
   case NSAPI::NSNumberWithDouble:
 CallIsDouble = true;
+LLVM_FALLTHROUGH;
   case NSAPI::NSNumberWithFloat:
 CallIsFloating = true;
 break;


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304649 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-02 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Sat Jun  3 01:30:46 2017
New Revision: 304649

URL: http://llvm.org/viewvc/llvm-project?rev=304649&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/CodeGen/CGBuiltin.cpp
cfe/trunk/lib/CodeGen/CGCall.cpp
cfe/trunk/lib/CodeGen/CGCoroutine.cpp
cfe/trunk/lib/CodeGen/CGDebugInfo.cpp
cfe/trunk/lib/CodeGen/CodeGenModule.cpp

Modified: cfe/trunk/lib/CodeGen/CGBuiltin.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/CodeGen/CGBuiltin.cpp?rev=304649&r1=304648&r2=304649&view=diff
==
--- cfe/trunk/lib/CodeGen/CGBuiltin.cpp (original)
+++ cfe/trunk/lib/CodeGen/CGBuiltin.cpp Sat Jun  3 01:30:46 2017
@@ -2659,6 +2659,7 @@ RValue CodeGenFunction::EmitBuiltinExpr(
   Builder.CreateCall(CGM.CreateRuntimeFunction(FTy, Name),
  llvm::ArrayRef(Args)));
 }
+LLVM_FALLTHROUGH;
   }
   // OpenCL v2.0 s6.13.17.6 - Kernel query functions need bitcast of block
   // parameter.
@@ -3813,6 +3814,7 @@ Value *CodeGenFunction::EmitCommonNeonBu
   case NEON::BI__builtin_neon_vcalt_v:
   case NEON::BI__builtin_neon_vcaltq_v:
 std::swap(Ops[0], Ops[1]);
+LLVM_FALLTHROUGH;
   case NEON::BI__builtin_neon_vcage_v:
   case NEON::BI__builtin_neon_vcageq_v:
   case NEON::BI__builtin_neon_vcagt_v:
@@ -5056,6 +5058,7 @@ Value *CodeGenFunction::EmitARMBuiltinEx
   case NEON::BI__builtin_neon_vsri_n_v:
   case NEON::BI__builtin_neon_vsriq_n_v:
 rightShift = true;
+LLVM_FALLTHROUGH;
   case NEON::BI__builtin_neon_vsli_n_v:
   case NEON::BI__builtin_neon_vsliq_n_v:
 Ops[2] = EmitNeonShiftVector(Ops[2], Ty, rightShift);

Modified: cfe/trunk/lib/CodeGen/CGCall.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/CodeGen/CGCall.cpp?rev=304649&r1=304648&r2=304649&view=diff
==
--- cfe/trunk/lib/CodeGen/CGCall.cpp (original)
+++ cfe/trunk/lib/CodeGen/CGCall.cpp Sat Jun  3 01:30:46 2017
@@ -4259,6 +4259,7 @@ RValue CodeGenFunction::EmitCall(const C
 Builder.CreateStore(elt, eltAddr);
   }
   // FALLTHROUGH
+  LLVM_FALLTHROUGH;
 }
 
 case ABIArgInfo::InAlloca:

Modified: cfe/trunk/lib/CodeGen/CGCoroutine.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/CodeGen/CGCoroutine.cpp?rev=304649&r1=304648&r2=304649&view=diff
==
--- cfe/trunk/lib/CodeGen/CGCoroutine.cpp (original)
+++ cfe/trunk/lib/CodeGen/CGCoroutine.cpp Sat Jun  3 01:30:46 2017
@@ -625,6 +625,7 @@ RValue CodeGenFunction::EmitCoroutineInt
 CGM.Error(E->getLocStart(), "this builtin expect that __builtin_coro_id 
has"
 " been used earlier in this function");
 // Fallthrough to the next case to add TokenNone as the first argument.
+LLVM_FALLTHROUGH;
   }
   // @llvm.coro.suspend takes a token parameter. Add token 'none' as the first
   // argument.

Modified: cfe/trunk/lib/CodeGen/CGDebugInfo.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/CodeGen/CGDebugInfo.cpp?rev=304649&r1=304648&r2=304649&view=diff
==
--- cfe/trunk/lib/CodeGen/CGDebugInfo.cpp (original)
+++ cfe/trunk/lib/CodeGen/CGDebugInfo.cpp Sat Jun  3 01:30:46 2017
@@ -2781,6 +2781,7 @@ llvm::DICompositeType *CGDebugInfo::Crea
 // them distinct if they are ODR-uniqued.
 if (FullName.empty())
   break;
+LLVM_FALLTHROUGH;
 
   case llvm::dwarf::DW_TAG_structure_type:
   case llvm::dwarf::DW_TAG_union_type:

Modified: cfe/trunk/lib/CodeGen/CodeGenModule.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/CodeGen/CodeGenModule.cpp?rev=304649&r1=304648&r2=304649&view=diff
==
--- cfe/trunk/lib/CodeGen/CodeGenModule.cpp (original)
+++ cfe/trunk/lib/CodeGen/CodeGenModule.cpp Sat Jun  3 01:30:46 2017
@@ -3841,6 +3841,7 @@ void CodeGenModule::EmitTopLevelDecl(Dec
 // Skip variable templates
 if (cast(D)->getDescribedVarTemplate())
   return;
+LLVM_FALLTHROUGH;
   case Decl::VarTemplateSpecialization:
 EmitGlobal(cast(D));
 if (auto *DD = dyn_cast(D))


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304650 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-02 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Sat Jun  3 01:31:42 2017
New Revision: 304650

URL: http://llvm.org/viewvc/llvm-project?rev=304650&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/AST/ASTContext.cpp
cfe/trunk/lib/AST/ASTDiagnostic.cpp
cfe/trunk/lib/AST/ASTStructuralEquivalence.cpp
cfe/trunk/lib/AST/Expr.cpp
cfe/trunk/lib/AST/ExprConstant.cpp
cfe/trunk/lib/AST/ItaniumMangle.cpp
cfe/trunk/lib/AST/NestedNameSpecifier.cpp

Modified: cfe/trunk/lib/AST/ASTContext.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/AST/ASTContext.cpp?rev=304650&r1=304649&r2=304650&view=diff
==
--- cfe/trunk/lib/AST/ASTContext.cpp (original)
+++ cfe/trunk/lib/AST/ASTContext.cpp Sat Jun  3 01:31:42 2017
@@ -6240,6 +6240,8 @@ void ASTContext::getObjCEncodingForTypeI
   S += "{objc_class=}";
   return;
 }
+// TODO: Double check to make sure this intentially falls through.
+LLVM_FALLTHROUGH;
   }
   
   case Type::ObjCInterface: {

Modified: cfe/trunk/lib/AST/ASTDiagnostic.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/AST/ASTDiagnostic.cpp?rev=304650&r1=304649&r2=304650&view=diff
==
--- cfe/trunk/lib/AST/ASTDiagnostic.cpp (original)
+++ cfe/trunk/lib/AST/ASTDiagnostic.cpp Sat Jun  3 01:31:42 2017
@@ -360,6 +360,7 @@ void clang::FormatASTNodeDiagnosticArgum
   Modifier = StringRef();
   Argument = StringRef();
   // Fall through
+  LLVM_FALLTHROUGH;
 }
 case DiagnosticsEngine::ak_qualtype: {
   assert(Modifier.empty() && Argument.empty() &&

Modified: cfe/trunk/lib/AST/ASTStructuralEquivalence.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/AST/ASTStructuralEquivalence.cpp?rev=304650&r1=304649&r2=304650&view=diff
==
--- cfe/trunk/lib/AST/ASTStructuralEquivalence.cpp (original)
+++ cfe/trunk/lib/AST/ASTStructuralEquivalence.cpp Sat Jun  3 01:31:42 2017
@@ -424,6 +424,7 @@ static bool IsStructurallyEquivalent(Str
   return false;
 
 // Fall through to check the bits common with FunctionNoProtoType.
+LLVM_FALLTHROUGH;
   }
 
   case Type::FunctionNoProto: {

Modified: cfe/trunk/lib/AST/Expr.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/AST/Expr.cpp?rev=304650&r1=304649&r2=304650&view=diff
==
--- cfe/trunk/lib/AST/Expr.cpp (original)
+++ cfe/trunk/lib/AST/Expr.cpp Sat Jun  3 01:31:42 2017
@@ -1576,6 +1576,7 @@ bool CastExpr::CastConsistency() const {
getSubExpr()->getType()->isBlockPointerType());
 assert(getType()->getPointeeType().getAddressSpace() !=
getSubExpr()->getType()->getPointeeType().getAddressSpace());
+LLVM_FALLTHROUGH;
   // These should not have an inheritance path.
   case CK_Dynamic:
   case CK_ToUnion:
@@ -2102,6 +2103,7 @@ bool Expr::isUnusedResultAWarning(const
 }
 
 // Fallthrough for generic call handling.
+LLVM_FALLTHROUGH;
   }
   case CallExprClass:
   case CXXMemberCallExprClass:

Modified: cfe/trunk/lib/AST/ExprConstant.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/AST/ExprConstant.cpp?rev=304650&r1=304649&r2=304650&view=diff
==
--- cfe/trunk/lib/AST/ExprConstant.cpp (original)
+++ cfe/trunk/lib/AST/ExprConstant.cpp Sat Jun  3 01:31:42 2017
@@ -736,6 +736,7 @@ namespace {
 if (!HasFoldFailureDiagnostic)
   break;
 // We've already failed to fold something. Keep that diagnostic.
+LLVM_FALLTHROUGH;
   case EM_ConstantExpression:
   case EM_PotentialConstantExpression:
   case EM_ConstantExpressionUnevaluated:
@@ -10374,6 +10375,7 @@ static ICEDiag CheckICE(const Expr* E, c
 }
 
 // OffsetOf falls through here.
+LLVM_FALLTHROUGH;
   }
   case Expr::OffsetOfExprClass: {
 // Note that per C99, offsetof must be an ICE. And AFAIK, using
@@ -10476,6 +10478,7 @@ static ICEDiag CheckICE(const Expr* E, c
   return Worst(LHSResult, RHSResult);
 }
 }
+LLVM_FALLTHROUGH;
   }
   case Expr::ImplicitCastExprClass:
   case Expr::CStyleCastExprClass:

Modified: cfe/trunk/lib/AST/ItaniumMangle.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/AST/ItaniumMangle.cpp?rev=304650&r1=304649&r2=304650&view=diff
==
--- cfe/trunk/lib/AST/ItaniumMangle.cpp (original)
+++ cfe/trunk/lib/AST/ItaniumMangle.cpp Sat Jun  3 01:31:42 2017
@@ -3785,6 +3785,7 @@ recurse:
 Out << "v1U" << Kind.size() << Kind;
   }
   // Fall through to mangle the cast itself.
+  LLVM_FALLTHROUGH;
   
   case Expr::CStyleCastExprClass:
 mangleCast

r304651 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-02 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Sat Jun  3 01:35:06 2017
New Revision: 304651

URL: http://llvm.org/viewvc/llvm-project?rev=304651&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Sema/SemaCodeComplete.cpp
cfe/trunk/lib/Sema/SemaDecl.cpp
cfe/trunk/lib/Sema/SemaDeclCXX.cpp
cfe/trunk/lib/Sema/SemaExpr.cpp
cfe/trunk/lib/Sema/SemaLambda.cpp
cfe/trunk/lib/Sema/SemaLookup.cpp
cfe/trunk/lib/Sema/SemaStmtAsm.cpp
cfe/trunk/lib/Sema/SemaTemplateDeduction.cpp
cfe/trunk/lib/Sema/SemaType.cpp

Modified: cfe/trunk/lib/Sema/SemaCodeComplete.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Sema/SemaCodeComplete.cpp?rev=304651&r1=304650&r2=304651&view=diff
==
--- cfe/trunk/lib/Sema/SemaCodeComplete.cpp (original)
+++ cfe/trunk/lib/Sema/SemaCodeComplete.cpp Sat Jun  3 01:35:06 2017
@@ -1866,6 +1866,7 @@ static void AddOrdinaryNameResults(Sema:
   case Sema::PCC_Condition:
 AddStorageSpecifiers(CCC, SemaRef.getLangOpts(), Results);
 // Fall through: conditions and statements can have expressions.
+LLVM_FALLTHROUGH;
 
   case Sema::PCC_ParenthesizedExpression:
 if (SemaRef.getLangOpts().ObjCAutoRefCount &&
@@ -1895,6 +1896,7 @@ static void AddOrdinaryNameResults(Sema:
   Results.AddResult(Result(Builder.TakeString()));  
 }
 // Fall through
+LLVM_FALLTHROUGH;
 
   case Sema::PCC_Expression: {
 if (SemaRef.getLangOpts().CPlusPlus) {

Modified: cfe/trunk/lib/Sema/SemaDecl.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Sema/SemaDecl.cpp?rev=304651&r1=304650&r2=304651&view=diff
==
--- cfe/trunk/lib/Sema/SemaDecl.cpp (original)
+++ cfe/trunk/lib/Sema/SemaDecl.cpp Sat Jun  3 01:35:06 2017
@@ -404,6 +404,7 @@ ParsedType Sema::getTypeName(const Ident
   }
 }
 // If typo correction failed or was not performed, fall through
+LLVM_FALLTHROUGH;
   case LookupResult::FoundOverloaded:
   case LookupResult::FoundUnresolvedValue:
 Result.suppressDiagnostics();

Modified: cfe/trunk/lib/Sema/SemaDeclCXX.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Sema/SemaDeclCXX.cpp?rev=304651&r1=304650&r2=304651&view=diff
==
--- cfe/trunk/lib/Sema/SemaDeclCXX.cpp (original)
+++ cfe/trunk/lib/Sema/SemaDeclCXX.cpp Sat Jun  3 01:35:06 2017
@@ -14639,6 +14639,7 @@ bool Sema::checkThisInStaticMemberFuncti
   case EST_ComputedNoexcept:
 if (!Finder.TraverseStmt(Proto->getNoexceptExpr()))
   return true;
+LLVM_FALLTHROUGH;
 
   case EST_Dynamic:
 for (const auto &E : Proto->exceptions()) {

Modified: cfe/trunk/lib/Sema/SemaExpr.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Sema/SemaExpr.cpp?rev=304651&r1=304650&r2=304651&view=diff
==
--- cfe/trunk/lib/Sema/SemaExpr.cpp (original)
+++ cfe/trunk/lib/Sema/SemaExpr.cpp Sat Jun  3 01:35:06 2017
@@ -11462,6 +11462,7 @@ ExprResult Sema::CreateBuiltinBinOp(Sour
 break;
   case BO_And:
 checkObjCPointerIntrospection(*this, LHS, RHS, OpLoc);
+LLVM_FALLTHROUGH;
   case BO_Xor:
   case BO_Or:
 ResultTy = CheckBitwiseOperands(LHS, RHS, OpLoc, Opc);
@@ -11504,6 +11505,7 @@ ExprResult Sema::CreateBuiltinBinOp(Sour
   case BO_AndAssign:
   case BO_OrAssign: // fallthrough
 DiagnoseSelfAssignment(*this, LHS.get(), RHS.get(), OpLoc);
+LLVM_FALLTHROUGH;
   case BO_XorAssign:
 CompResultTy = CheckBitwiseOperands(LHS, RHS, OpLoc, Opc);
 CompLHSTy = CompResultTy;

Modified: cfe/trunk/lib/Sema/SemaLambda.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Sema/SemaLambda.cpp?rev=304651&r1=304650&r2=304651&view=diff
==
--- cfe/trunk/lib/Sema/SemaLambda.cpp (original)
+++ cfe/trunk/lib/Sema/SemaLambda.cpp Sat Jun  3 01:35:06 2017
@@ -337,6 +337,7 @@ Sema::getCurrentMangleNumberContext(cons
   return nullptr;
 }
 // Fall through to get the current context.
+LLVM_FALLTHROUGH;
 
   case DataMember:
 //  -- the in-class initializers of class members

Modified: cfe/trunk/lib/Sema/SemaLookup.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Sema/SemaLookup.cpp?rev=304651&r1=304650&r2=304651&view=diff
==
--- cfe/trunk/lib/Sema/SemaLookup.cpp (original)
+++ cfe/trunk/lib/Sema/SemaLookup.cpp Sat Jun  3 01:35:06 2017
@@ -2594,6 +2594,7 @@ addAssociatedClassesAndNamespaces(Associ
   for (const auto &Arg : Proto->param_types())
 Queue.push_back(Arg.getTypePtr());
   // fallthrough
+  LLVM_FALLTHROUGH;
 }
 case Type::FunctionNoProto: {
   const FunctionType *FnType = cast(T);

r304652 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-02 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Sat Jun  3 01:38:22 2017
New Revision: 304652

URL: http://llvm.org/viewvc/llvm-project?rev=304652&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Basic/TargetInfo.cpp

Modified: cfe/trunk/lib/Basic/TargetInfo.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Basic/TargetInfo.cpp?rev=304652&r1=304651&r2=304652&view=diff
==
--- cfe/trunk/lib/Basic/TargetInfo.cpp (original)
+++ cfe/trunk/lib/Basic/TargetInfo.cpp Sat Jun  3 01:38:22 2017
@@ -143,9 +143,11 @@ const char *TargetInfo::getTypeConstantS
   case UnsignedChar:
 if (getCharWidth() < getIntWidth())
   return "";
+LLVM_FALLTHROUGH;
   case UnsignedShort:
 if (getShortWidth() < getIntWidth())
   return "";
+LLVM_FALLTHROUGH;
   case UnsignedInt:  return "U";
   case UnsignedLong: return "UL";
   case UnsignedLongLong: return "ULL";


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304653 - Added missing break.

2017-06-02 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Sat Jun  3 01:40:10 2017
New Revision: 304653

URL: http://llvm.org/viewvc/llvm-project?rev=304653&view=rev
Log:
Added missing break.

Modified:
cfe/trunk/lib/Basic/IdentifierTable.cpp

Modified: cfe/trunk/lib/Basic/IdentifierTable.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Basic/IdentifierTable.cpp?rev=304653&r1=304652&r2=304653&view=diff
==
--- cfe/trunk/lib/Basic/IdentifierTable.cpp (original)
+++ cfe/trunk/lib/Basic/IdentifierTable.cpp Sat Jun  3 01:40:10 2017
@@ -551,6 +551,7 @@ ObjCInstanceTypeFamily Selector::getInst
 case 's':
   if (startsWithWord(name, "shared")) return OIT_ReturnsSelf;
   if (startsWithWord(name, "standard")) return OIT_Singleton;
+  break;
 case 'i':
   if (startsWithWord(name, "init")) return OIT_Init;
 default:


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304663 - Fixed warning: enum constant in boolean context.

2017-06-03 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Sat Jun  3 11:47:06 2017
New Revision: 304663

URL: http://llvm.org/viewvc/llvm-project?rev=304663&view=rev
Log:
Fixed warning: enum constant in boolean context.

Modified:
cfe/trunk/lib/Driver/ToolChains/Linux.cpp

Modified: cfe/trunk/lib/Driver/ToolChains/Linux.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Driver/ToolChains/Linux.cpp?rev=304663&r1=304662&r2=304663&view=diff
==
--- cfe/trunk/lib/Driver/ToolChains/Linux.cpp (original)
+++ cfe/trunk/lib/Driver/ToolChains/Linux.cpp Sat Jun  3 11:47:06 2017
@@ -822,8 +822,9 @@ SanitizerMask Linux::getSupportedSanitiz
   const bool IsAArch64 = getTriple().getArch() == llvm::Triple::aarch64 ||
  getTriple().getArch() == llvm::Triple::aarch64_be;
   const bool IsArmArch = getTriple().getArch() == llvm::Triple::arm ||
- llvm::Triple::thumb || llvm::Triple::armeb ||
- llvm::Triple::thumbeb;
+ getTriple().getArch() == llvm::Triple::thumb ||
+ getTriple().getArch() == llvm::Triple::armeb ||
+ getTriple().getArch() == llvm::Triple::thumbeb;
   SanitizerMask Res = ToolChain::getSupportedSanitizers();
   Res |= SanitizerKind::Address;
   Res |= SanitizerKind::Fuzzer;


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Re: r299921 - [lsan] Enable LSan on arm Linux, clang part

2017-06-05 Thread Galina Kistanova via cfe-commits
The tests from https://reviews.llvm.org/rL299921 are not obviously enough.
Those tests test only positive cases, thus do not catch when some flag is
always true, like the bug we are discussing. There are missing tests that
cover negative cases, when some sanitizer is not specified for a target.

Thanks

Galina


On Mon, Jun 5, 2017 at 10:28 AM, Maxim Ostapenko via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> On 05/06/17 20:16, David Blaikie wrote:
>
>> This change seemed to be buggy (& I assume missing test coverage to
>> demonstrate that). Galina fixed it in http://llvm.org/viewvc/llvm-pr
>> oject?rev=304663&view=rev based on a compiler warning.
>>
>
> Oh, right, I've missed that. Sorry!
>
>
>> Can you add test coverage to this code to exercise these untested
>> codepaths?
>>
>
> But doesn't https://reviews.llvm.org/rL299921 introduce testcases for
> arm, thumb, armeb and thumbeb targets to clang driver? Or perhaps I'm
> missing something?
>
> -Maxim
>
>
>> On Tue, Apr 11, 2017 at 12:34 AM Maxim Ostapenko via cfe-commits <
>> cfe-commits@lists.llvm.org > wrote:
>>
>> Author: chefmax
>> Date: Tue Apr 11 02:22:11 2017
>> New Revision: 299921
>>
>> URL: http://llvm.org/viewvc/llvm-project?rev=299921&view=rev
>> Log:
>> [lsan] Enable LSan on arm Linux, clang part
>>
>> This is a compiler part of https://reviews.llvm.org/D29586. Enable
>> LSan on arm Linux.
>>
>> Differential Revision: https://reviews.llvm.org/D31760
>>
>> Modified:
>> cfe/trunk/lib/Driver/ToolChains/Linux.cpp
>> cfe/trunk/test/Driver/fsanitize.c
>>
>> Modified: cfe/trunk/lib/Driver/ToolChains/Linux.cpp
>> URL:
>> http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Driver/Too
>> lChains/Linux.cpp?rev=299921&r1=299920&r2=299921&view=diff
>> 
>> ==
>> --- cfe/trunk/lib/Driver/ToolChains/Linux.cpp (original)
>> +++ cfe/trunk/lib/Driver/ToolChains/Linux.cpp Tue Apr 11 02:22:11
>> 2017
>> @@ -864,6 +864,9 @@ SanitizerMask Linux::getSupportedSanitiz
>> getTriple().getArch() ==
>> llvm::Triple::ppc64le;
>>const bool IsAArch64 = getTriple().getArch() ==
>> llvm::Triple::aarch64 ||
>>   getTriple().getArch() ==
>> llvm::Triple::aarch64_be;
>> +  const bool IsArmArch = getTriple().getArch() ==
>> llvm::Triple::arm ||
>> + llvm::Triple::thumb ||
>> llvm::Triple::armeb ||
>> + llvm::Triple::thumbeb;
>>SanitizerMask Res = ToolChain::getSupportedSanitizers();
>>Res |= SanitizerKind::Address;
>>Res |= SanitizerKind::KernelAddress;
>> @@ -871,7 +874,7 @@ SanitizerMask Linux::getSupportedSanitiz
>>Res |= SanitizerKind::SafeStack;
>>if (IsX86_64 || IsMIPS64 || IsAArch64)
>>  Res |= SanitizerKind::DataFlow;
>> -  if (IsX86_64 || IsMIPS64 || IsAArch64 || IsX86)
>> +  if (IsX86_64 || IsMIPS64 || IsAArch64 || IsX86 || IsArmArch)
>>  Res |= SanitizerKind::Leak;
>>if (IsX86_64 || IsMIPS64 || IsAArch64 || IsPowerPC64)
>>  Res |= SanitizerKind::Thread;
>>
>> Modified: cfe/trunk/test/Driver/fsanitize.c
>> URL:
>> http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Driver/fs
>> anitize.c?rev=299921&r1=299920&r2=299921&view=diff
>> 
>> ==
>> --- cfe/trunk/test/Driver/fsanitize.c (original)
>> +++ cfe/trunk/test/Driver/fsanitize.c Tue Apr 11 02:22:11 2017
>> @@ -237,6 +237,30 @@
>>  // RUN: %clang -target i686-linux-gnu -fsanitize=address,leak
>> -fno-sanitize=address %s -### 2>&1 | FileCheck %s
>> --check-prefix=CHECK-SANA-SANL-NO-SANA-X86
>>  // CHECK-SANA-SANL-NO-SANA-X86: "-fsanitize=leak"
>>
>> +// RUN: %clang -target arm-linux-gnu -fsanitize=leak %s -### 2>&1
>> | FileCheck %s --check-prefix=CHECK-SANL-ARM
>> +// CHECK-SANL-ARM: "-fsanitize=leak"
>> +
>> +// RUN: %clang -target arm-linux-gnu -fsanitize=address,leak
>> -fno-sanitize=address %s -### 2>&1 | FileCheck %s
>> --check-prefix=CHECK-SANA-SANL-NO-SANA-ARM
>> +// CHECK-SANA-SANL-NO-SANA-ARM: "-fsanitize=leak"
>> +
>> +// RUN: %clang -target thumb-linux -fsanitize=leak %s -### 2>&1 |
>> FileCheck %s --check-prefix=CHECK-SANL-THUMB
>> +// CHECK-SANL-THUMB: "-fsanitize=leak"
>> +
>> +// RUN: %clang -target thumb-linux -fsanitize=address,leak
>> -fno-sanitize=address %s -### 2>&1 | FileCheck %s
>> --check-prefix=CHECK-SANA-SANL-NO-SANA-THUMB
>> +// CHECK-SANA-SANL-NO-SANA-THUMB: "-fsanitize=leak"
>> +
>> +// RUN: %clang -target armeb-linux-gnu -fsanitize=leak %s -###
>> 2>&1 | FileCheck %s --check-prefix=CHECK-SANL-ARMEB
>> +// CHECK-SANL-ARMEB: "-fsanitize=leak"
>> +
>> +// RUN: %cla

r304863 - Fixed warning: 'virtual void clang::ExternalASTSource::CompleteType(clang::ObjCInterfaceDecl*)' was hidden.

2017-06-06 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Tue Jun  6 21:44:42 2017
New Revision: 304863

URL: http://llvm.org/viewvc/llvm-project?rev=304863&view=rev
Log:
Fixed warning: 'virtual void 
clang::ExternalASTSource::CompleteType(clang::ObjCInterfaceDecl*)' was hidden.

Modified:
cfe/trunk/include/clang/AST/ExternalASTMerger.h

Modified: cfe/trunk/include/clang/AST/ExternalASTMerger.h
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/include/clang/AST/ExternalASTMerger.h?rev=304863&r1=304862&r2=304863&view=diff
==
--- cfe/trunk/include/clang/AST/ExternalASTMerger.h (original)
+++ cfe/trunk/include/clang/AST/ExternalASTMerger.h Tue Jun  6 21:44:42 2017
@@ -45,6 +45,8 @@ public:
llvm::function_ref IsKindWeWant,
SmallVectorImpl &Result) override;
 
+   using ExternalASTSource::CompleteType;
+
void CompleteType(TagDecl *Tag) override;
 };
 


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304870 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-06 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Wed Jun  7 01:25:05 2017
New Revision: 304870

URL: http://llvm.org/viewvc/llvm-project?rev=304870&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Sema/SemaTemplate.cpp

Modified: cfe/trunk/lib/Sema/SemaTemplate.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Sema/SemaTemplate.cpp?rev=304870&r1=304869&r2=304870&view=diff
==
--- cfe/trunk/lib/Sema/SemaTemplate.cpp (original)
+++ cfe/trunk/lib/Sema/SemaTemplate.cpp Wed Jun  7 01:25:05 2017
@@ -4020,6 +4020,7 @@ bool Sema::CheckTemplateTypeArgument(Tem
   }
 }
 // fallthrough
+LLVM_FALLTHROUGH;
   }
   default: {
 // We have a template type parameter but the template argument
@@ -7594,6 +7595,7 @@ Sema::CheckSpecializationInstantiationRe
 return false;
   }
   // Fall through
+  LLVM_FALLTHROUGH;
 
 case TSK_ExplicitInstantiationDeclaration:
 case TSK_ExplicitInstantiationDefinition:
@@ -9379,6 +9381,7 @@ Sema::CheckTypenameType(ElaboratedTypeKe
   }
   // Fall through to create a dependent typename type, from which we can 
recover
   // better.
+  LLVM_FALLTHROUGH;
 
   case LookupResult::NotFoundInCurrentInstantiation:
 // Okay, it's a member of an unknown instantiation.


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304872 - Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

2017-06-06 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Wed Jun  7 01:31:55 2017
New Revision: 304872

URL: http://llvm.org/viewvc/llvm-project?rev=304872&view=rev
Log:
Added LLVM_FALLTHROUGH to address warning: this statement may fall through. NFC.

Modified:
cfe/trunk/lib/Sema/SemaCodeComplete.cpp

Modified: cfe/trunk/lib/Sema/SemaCodeComplete.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Sema/SemaCodeComplete.cpp?rev=304872&r1=304871&r2=304872&view=diff
==
--- cfe/trunk/lib/Sema/SemaCodeComplete.cpp (original)
+++ cfe/trunk/lib/Sema/SemaCodeComplete.cpp Wed Jun  7 01:31:55 2017
@@ -1860,6 +1860,7 @@ static void AddOrdinaryNameResults(Sema:
 
 AddStaticAssertResult(Builder, Results, SemaRef.getLangOpts());
   }
+  LLVM_FALLTHROUGH;
 
   // Fall through (for statement expressions).
   case Sema::PCC_ForInit:


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r304997 - Added llvm_unreachable to make sure the switch is always exhaustive.

2017-06-08 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Thu Jun  8 13:20:32 2017
New Revision: 304997

URL: http://llvm.org/viewvc/llvm-project?rev=304997&view=rev
Log:
Added llvm_unreachable to make sure the switch is always exhaustive.

Modified:
cfe/trunk/lib/Sema/SemaTemplate.cpp

Modified: cfe/trunk/lib/Sema/SemaTemplate.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Sema/SemaTemplate.cpp?rev=304997&r1=304996&r2=304997&view=diff
==
--- cfe/trunk/lib/Sema/SemaTemplate.cpp (original)
+++ cfe/trunk/lib/Sema/SemaTemplate.cpp Thu Jun  8 13:20:32 2017
@@ -7622,6 +7622,7 @@ Sema::CheckSpecializationInstantiationRe
 
   return true;
 }
+llvm_unreachable("The switch over PrevTSK must be exhaustive.");
 
   case TSK_ExplicitInstantiationDeclaration:
 switch (PrevTSK) {


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Re: [clang-tools-extra] r304949 - [clang-tidy] When" -fno-exceptions is used", this warning is better to be suppressed.

2017-06-08 Thread Galina Kistanova via cfe-commits
Hello Yan,

This commit broke few of our builders:

Failing Tests (1):
Clang Tools :: clang-tidy/misc-noexcept-move-constructor.cpp

http://lab.llvm.org:8011/builders/llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast/builds/12411
http://lab.llvm.org:8011/builders/llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast

Please have a look at this?

Thanks

Galina


On Wed, Jun 7, 2017 at 3:39 PM, Yan Wang via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: yawanng
> Date: Wed Jun  7 17:39:20 2017
> New Revision: 304949
>
> URL: http://llvm.org/viewvc/llvm-project?rev=304949&view=rev
> Log:
> [clang-tidy] When" -fno-exceptions is used", this warning is better to be
> suppressed.
>
> Summary:  "misc-noexcept-move-constructor" is better not to be issued
> when "-fno-exceptions" is set.
>
> Reviewers: chh, alexfh, aaron.ballman
>
> Reviewed By: aaron.ballman
>
> Subscribers: aaron.ballman, cfe-commits, xazax.hun
>
> Tags: #clang-tools-extra
>
> Differential Revision: https://reviews.llvm.org/D34002
>
> Modified:
> clang-tools-extra/trunk/clang-tidy/misc/NoexceptMoveConstructorCheck.
> cpp
> clang-tools-extra/trunk/test/clang-tidy/misc-noexcept-move-
> constructor.cpp
>
> Modified: clang-tools-extra/trunk/clang-tidy/misc/
> NoexceptMoveConstructorCheck.cpp
> URL: http://llvm.org/viewvc/llvm-project/clang-tools-extra/
> trunk/clang-tidy/misc/NoexceptMoveConstructorCheck.
> cpp?rev=304949&r1=304948&r2=304949&view=diff
> 
> ==
> --- clang-tools-extra/trunk/clang-tidy/misc/NoexceptMoveConstructorCheck.cpp
> (original)
> +++ clang-tools-extra/trunk/clang-tidy/misc/NoexceptMoveConstructorCheck.cpp
> Wed Jun  7 17:39:20 2017
> @@ -20,7 +20,7 @@ namespace misc {
>  void NoexceptMoveConstructorCheck::registerMatchers(MatchFinder *Finder)
> {
>// Only register the matchers for C++11; the functionality currently
> does not
>// provide any benefit to other languages, despite being benign.
> -  if (!getLangOpts().CPlusPlus11)
> +  if (!getLangOpts().CPlusPlus11 || !getLangOpts().CXXExceptions)
>  return;
>
>Finder->addMatcher(
>
> Modified: clang-tools-extra/trunk/test/clang-tidy/misc-noexcept-move-
> constructor.cpp
> URL: http://llvm.org/viewvc/llvm-project/clang-tools-extra/
> trunk/test/clang-tidy/misc-noexcept-move-constructor.cpp?
> rev=304949&r1=304948&r2=304949&view=diff
> 
> ==
> --- clang-tools-extra/trunk/test/clang-tidy/misc-noexcept-move-constructor.cpp
> (original)
> +++ clang-tools-extra/trunk/test/clang-tidy/misc-noexcept-move-constructor.cpp
> Wed Jun  7 17:39:20 2017
> @@ -1,16 +1,25 @@
> -// RUN: %check_clang_tidy %s misc-noexcept-move-constructor %t
> +// RUN: clang-tidy %s -checks="-*,misc-noexcept-move-constructor" --
> -std=c++11 \
> +// RUN:   | FileCheck %s -check-prefix=CHECK-EXCEPTIONS \
> +// RUN:   -implicit-check-not="{{warning|error}}:"
> +// RUN: clang-tidy %s -checks="-*,misc-noexcept-move-constructor" --
> -fno-exceptions -std=c++11 \
> +// RUN:   | FileCheck %s -allow-empty -check-prefix=CHECK-NONEXCEPTIONS \
> +// RUN:   -implicit-check-not="{{warning|error}}:"
> +
>
>  class A {
>A(A &&);
> -  // CHECK-MESSAGES: :[[@LINE-1]]:3: warning: move constructors should be
> marked noexcept [misc-noexcept-move-constructor]
> +  // CHECK-EXCEPTIONS: :[[@LINE-1]]:3: warning: move constructors should
> be marked noexcept [misc-noexcept-move-constructor]
> +  // CHECK-NONEXCEPTIONS-NOT: warning:
>A &operator=(A &&);
> -  // CHECK-MESSAGES: :[[@LINE-1]]:6: warning: move assignment operators
> should
> +  // CHECK-EXCEPTIONS: :[[@LINE-1]]:6: warning: move assignment operators
> should
> +  // CHECK-NONEXCEPTIONS-NOT: warning:
>  };
>
>  struct B {
>static constexpr bool kFalse = false;
>B(B &&) noexcept(kFalse);
> -  // CHECK-MESSAGES: :[[@LINE-1]]:20: warning: noexcept specifier on the
> move constructor evaluates to 'false' [misc-noexcept-move-constructor]
> +  // CHECK-EXCEPTIONS: :[[@LINE-1]]:20: warning: noexcept specifier on
> the move constructor evaluates to 'false' [misc-noexcept-move-constructor]
> +  // CHECK-NONEXCEPTIONS-NOT: warning:
>  };
>
>  class OK {};
>
>
> ___
> cfe-commits mailing list
> cfe-commits@lists.llvm.org
> http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
>
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Re: [clang-tools-extra] r304977 - [clang-tidy] New checker to replace dynamic exception specifications

2017-06-08 Thread Galina Kistanova via cfe-commits
Hello Alexander,

Couple of our builders do not like this commit:

Failing Tests:

Clang Tools :: clang-tidy/modernize-use-noexcept-opt.cpp
Clang Tools :: clang-tidy/modernize-use-noexcept.cpp

http://lab.llvm.org:8011/builders/llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast/builds/12431
http://lab.llvm.org:8011/builders/llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast

Please have a look at this?

Thanks

Galina

On Thu, Jun 8, 2017 at 7:04 AM, Alexander Kornienko via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: alexfh
> Date: Thu Jun  8 09:04:16 2017
> New Revision: 304977
>
> URL: http://llvm.org/viewvc/llvm-project?rev=304977&view=rev
> Log:
> [clang-tidy] New checker to replace dynamic exception specifications
>
> Summary:
> New checker to replace dynamic exception
> specifications
>
> This is an alternative to D18575 which relied on reparsing the decl to
> find the location of dynamic exception specifications, but couldn't
> deal with preprocessor conditionals correctly without reparsing the
> entire file.
>
> This approach uses D20428 to find dynamic exception specification
> locations and handles all cases correctly.
>
> Reviewers: aaron.ballman, alexfh
>
> Reviewed By: aaron.ballman, alexfh
>
> Subscribers: xazax.hun, mgehre, malcolm.parsons, mgorny, JDevlieghere,
> cfe-commits, Eugene.Zelenko, etienneb
>
> Patch by Don Hinton!
>
> Differential Revision: https://reviews.llvm.org/D20693
>
> Added:
> clang-tools-extra/trunk/clang-tidy/modernize/UseNoexceptCheck.cpp
> clang-tools-extra/trunk/clang-tidy/modernize/UseNoexceptCheck.h
> clang-tools-extra/trunk/docs/clang-tidy/checks/modernize-
> use-noexcept.rst
> clang-tools-extra/trunk/test/clang-tidy/modernize-use-
> noexcept-macro.cpp
> clang-tools-extra/trunk/test/clang-tidy/modernize-use-noexcept-opt.cpp
> clang-tools-extra/trunk/test/clang-tidy/modernize-use-noexcept.cpp
> Modified:
> clang-tools-extra/trunk/clang-tidy/modernize/CMakeLists.txt
> clang-tools-extra/trunk/clang-tidy/modernize/ModernizeTidyModule.cpp
> clang-tools-extra/trunk/docs/ReleaseNotes.rst
> clang-tools-extra/trunk/docs/clang-tidy/checks/list.rst
>
> Modified: clang-tools-extra/trunk/clang-tidy/modernize/CMakeLists.txt
> URL: http://llvm.org/viewvc/llvm-project/clang-tools-extra/
> trunk/clang-tidy/modernize/CMakeLists.txt?rev=304977&r1=
> 304976&r2=304977&view=diff
> 
> ==
> --- clang-tools-extra/trunk/clang-tidy/modernize/CMakeLists.txt (original)
> +++ clang-tools-extra/trunk/clang-tidy/modernize/CMakeLists.txt Thu Jun
> 8 09:04:16 2017
> @@ -22,6 +22,7 @@ add_clang_library(clangTidyModernizeModu
>UseEmplaceCheck.cpp
>UseEqualsDefaultCheck.cpp
>UseEqualsDeleteCheck.cpp
> +  UseNoexceptCheck.cpp
>UseNullptrCheck.cpp
>UseOverrideCheck.cpp
>UseTransparentFunctorsCheck.cpp
>
> Modified: clang-tools-extra/trunk/clang-tidy/modernize/
> ModernizeTidyModule.cpp
> URL: http://llvm.org/viewvc/llvm-project/clang-tools-extra/
> trunk/clang-tidy/modernize/ModernizeTidyModule.cpp?rev=
> 304977&r1=304976&r2=304977&view=diff
> 
> ==
> --- clang-tools-extra/trunk/clang-tidy/modernize/ModernizeTidyModule.cpp
> (original)
> +++ clang-tools-extra/trunk/clang-tidy/modernize/ModernizeTidyModule.cpp
> Thu Jun  8 09:04:16 2017
> @@ -28,6 +28,7 @@
>  #include "UseEmplaceCheck.h"
>  #include "UseEqualsDefaultCheck.h"
>  #include "UseEqualsDeleteCheck.h"
> +#include "UseNoexceptCheck.h"
>  #include "UseNullptrCheck.h"
>  #include "UseOverrideCheck.h"
>  #include "UseTransparentFunctorsCheck.h"
> @@ -69,6 +70,7 @@ public:
>  CheckFactories.registerCheck("
> modernize-use-equals-default");
>  CheckFactories.registerCheck(
>  "modernize-use-equals-delete");
> +CheckFactories.registerCheck("modernize-
> use-noexcept");
>  CheckFactories.registerCheck("modernize-
> use-nullptr");
>  CheckFactories.registerCheck("modernize-
> use-override");
>  CheckFactories.registerCheck(
>
> Added: clang-tools-extra/trunk/clang-tidy/modernize/UseNoexceptCheck.cpp
> URL: http://llvm.org/viewvc/llvm-project/clang-tools-extra/
> trunk/clang-tidy/modernize/UseNoexceptCheck.cpp?rev=304977&view=auto
> 
> ==
> --- clang-tools-extra/trunk/clang-tidy/modernize/UseNoexceptCheck.cpp
> (added)
> +++ clang-tools-extra/trunk/clang-tidy/modernize/UseNoexceptCheck.cpp Thu
> Jun  8 09:04:16 2017
> @@ -0,0 +1,114 @@
> +//===--- UseNoexceptCheck.cpp - clang-tidy
> -===//
> +//
> +// The LLVM Compiler Infrastructure
> +//
> +// This file is distributed under the University of Illinois Open Source
> +// License. See LICENSE.TXT for details.
> +//
> +//===--
> ===//
> +
> +#include "UseNo

LLVM buildmaster will be updated and restarted tonight

2017-06-14 Thread Galina Kistanova via cfe-commits
Hello everyone,

LLVM buildmaster will be updated and restarted after 7 PM Pacific time
today.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


r305507 - Added braces to work around gcc warning in googletest: suggest explicit braces to avoid ambiguous 'else'. NFC.

2017-06-15 Thread Galina Kistanova via cfe-commits
Author: gkistanova
Date: Thu Jun 15 16:01:24 2017
New Revision: 305507

URL: http://llvm.org/viewvc/llvm-project?rev=305507&view=rev
Log:
Added braces to work around gcc warning in googletest: suggest explicit braces 
to avoid ambiguous 'else'. NFC.

Modified:
cfe/trunk/unittests/AST/CommentLexer.cpp
cfe/trunk/unittests/ASTMatchers/ASTMatchersTest.h
cfe/trunk/unittests/Basic/VirtualFileSystemTest.cpp
cfe/trunk/unittests/Tooling/LookupTest.cpp

Modified: cfe/trunk/unittests/AST/CommentLexer.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/unittests/AST/CommentLexer.cpp?rev=305507&r1=305506&r2=305507&view=diff
==
--- cfe/trunk/unittests/AST/CommentLexer.cpp (original)
+++ cfe/trunk/unittests/AST/CommentLexer.cpp Thu Jun 15 16:01:24 2017
@@ -320,9 +320,10 @@ TEST_F(CommentLexerTest, DoxygenCommand4
 ASSERT_EQ(array_lengthof(Text), Toks.size());
 
 for (size_t j = 0, e = Toks.size(); j != e; j++) {
-  if(Toks[j].is(tok::text))
+  if(Toks[j].is(tok::text)) {
 ASSERT_EQ(StringRef(Text[j]), Toks[j].getText())
   << "index " << i;
+  }
 }
   }
 }

Modified: cfe/trunk/unittests/ASTMatchers/ASTMatchersTest.h
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/unittests/ASTMatchers/ASTMatchersTest.h?rev=305507&r1=305506&r2=305507&view=diff
==
--- cfe/trunk/unittests/ASTMatchers/ASTMatchersTest.h (original)
+++ cfe/trunk/unittests/ASTMatchers/ASTMatchersTest.h Thu Jun 15 16:01:24 2017
@@ -320,10 +320,12 @@ public:
   ExpectedName(ExpectedName) {}
 
   void onEndOfTranslationUnit() override {
-if (ExpectedCount != -1)
+if (ExpectedCount != -1) {
   EXPECT_EQ(ExpectedCount, Count);
-if (!ExpectedName.empty())
+}
+if (!ExpectedName.empty()) {
   EXPECT_EQ(ExpectedName, Name);
+}
 Count = 0;
 Name.clear();
   }
@@ -346,8 +348,9 @@ public:
   }
   BoundNodes::IDToNodeMap::const_iterator I = M.find(Id);
   EXPECT_NE(M.end(), I);
-  if (I != M.end())
+  if (I != M.end()) {
 EXPECT_EQ(Nodes->getNodeAs(Id), I->second.get());
+  }
   return true;
 }
 EXPECT_TRUE(M.count(Id) == 0 ||

Modified: cfe/trunk/unittests/Basic/VirtualFileSystemTest.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/unittests/Basic/VirtualFileSystemTest.cpp?rev=305507&r1=305506&r2=305507&view=diff
==
--- cfe/trunk/unittests/Basic/VirtualFileSystemTest.cpp (original)
+++ cfe/trunk/unittests/Basic/VirtualFileSystemTest.cpp Thu Jun 15 16:01:24 2017
@@ -300,8 +300,9 @@ struct ScopedDir {
 EXPECT_FALSE(EC);
   }
   ~ScopedDir() {
-if (Path != "")
+if (Path != "") {
   EXPECT_FALSE(llvm::sys::fs::remove(Path.str()));
+}
   }
   operator StringRef() { return Path.str(); }
 };
@@ -316,8 +317,9 @@ struct ScopedLink {
 EXPECT_FALSE(EC);
   }
   ~ScopedLink() {
-if (Path != "")
+if (Path != "") {
   EXPECT_FALSE(llvm::sys::fs::remove(Path.str()));
+}
   }
   operator StringRef() { return Path.str(); }
 };

Modified: cfe/trunk/unittests/Tooling/LookupTest.cpp
URL: 
http://llvm.org/viewvc/llvm-project/cfe/trunk/unittests/Tooling/LookupTest.cpp?rev=305507&r1=305506&r2=305507&view=diff
==
--- cfe/trunk/unittests/Tooling/LookupTest.cpp (original)
+++ cfe/trunk/unittests/Tooling/LookupTest.cpp Thu Jun 15 16:01:24 2017
@@ -143,8 +143,9 @@ TEST(LookupTest, replaceNestedClassName)
   Visitor.OnRecordTypeLoc = [&](RecordTypeLoc Type) {
 // Filter Types by name since there are other `RecordTypeLoc` in the test
 // file.
-if (Type.getDecl()->getQualifiedNameAsString() == "a::b::Foo")
+if (Type.getDecl()->getQualifiedNameAsString() == "a::b::Foo") {
   EXPECT_EQ("x::Bar", replaceRecordTypeLoc(Type, "::a::x::Bar"));
+}
   };
   Visitor.runOver("namespace a { namespace b {\n"
   "class Foo;\n"
@@ -155,8 +156,9 @@ TEST(LookupTest, replaceNestedClassName)
 // Filter Types by name since there are other `RecordTypeLoc` in the test
 // file.
 // `a::b::Foo` in using shadow decl is not `TypeLoc`.
-if (Type.getDecl()->getQualifiedNameAsString() == "a::b::Foo")
+if (Type.getDecl()->getQualifiedNameAsString() == "a::b::Foo") {
   EXPECT_EQ("Bar", replaceRecordTypeLoc(Type, "::a::x::Bar"));
+}
   };
   Visitor.runOver("namespace a { namespace b { class Foo {}; } }\n"
   "namespace c { using a::b::Foo; Foo f();; }\n");


___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Llvm lab resent network issues are resolved

2017-06-16 Thread Galina Kistanova via cfe-commits
Hello everyone,

There were network issues with our provider and LLVM buildmaster was
unavailable recently.

Sorry for inconvenience.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Buildbot numbers for the week of 05/28/2017 - 06/03/2017

2017-06-16 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the week of 05/28/2017 - 06/03/2017.

Please see the same data in attached csv files:

The longest time each builder was red during the last week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the last week:

buildername | was_red
+-
 sanitizer-x86_64-linux-bootstrap   | 84:16:25
 clang-x86_64-linux-selfhost-modules-2  | 82:19:04
 libcxx-libcxxabi-x86_64-linux-ubuntu-ubsan | 75:27:53
 clang-cmake-armv7-a15-selfhost | 53:14:17
 sanitizer-x86_64-linux | 47:33:56
 llvm-clang-x86_64-expensive-checks-win | 44:09:29
 clang-cmake-aarch64-lld| 32:32:09
 clang-x64-ninja-win7   | 25:44:28
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast   | 25:18:39
 clang-x86-windows-msvc2015 | 24:47:17
 clang-s390x-linux-lnt  | 19:26:17
 sanitizer-ppc64le-linux| 15:27:06
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast | 14:49:52
 sanitizer-x86_64-linux-fast| 14:31:15
 perf-x86_64-penryn-O3-polly-before-vectorizer-detect-only  | 14:20:19
 perf-x86_64-penryn-O3-polly-before-vectorizer  | 13:57:47
 sanitizer-x86_64-linux-fuzzer  | 13:35:35
 sanitizer-windows  | 12:54:41
 libcxx-libcxxabi-libunwind-aarch64-linux   | 11:31:46
 clang-cmake-thumbv7-a15| 11:12:50
 libcxx-libcxxabi-x86_64-linux-ubuntu-asan  | 11:03:21
 clang-native-arm-lnt   | 10:57:49
 clang-ppc64be-linux-multistage | 10:57:10
 clang-cmake-aarch64-full   | 10:24:09
 clang-cmake-aarch64-quick  | 10:05:54
 sanitizer-ppc64be-linux| 09:46:16
 clang-ppc64be-linux-lnt| 09:37:43
 clang-with-thin-lto-ubuntu | 08:48:32
 clang-with-lto-ubuntu  | 08:07:48
 clang-ppc64be-linux| 07:53:35
 perf-x86_64-penryn-O3-polly-parallel-fast  | 07:36:58
 perf-x86_64-penryn-O3  | 07:30:41
 perf-x86_64-penryn-O3-polly-fast   | 07:30:25
 clang-x86_64-linux-selfhost-modules| 07:11:06
 clang-ppc64le-linux-multistage | 07:05:49
 clang-lld-x86_64-2stage| 06:56:47
 perf-x86_64-penryn-O3-polly-unprofitable   | 06:50:09
 clang-bpf-build| 06:40:44
 perf-x86_64-penryn-O3-polly| 06:30:04
 perf-x86_64-penryn-O3-polly-before-vectorizer-unprofitable | 06:26:41
 lldb-x86_64-ubuntu-14.04-buildserver   | 06:11:32
 clang-cmake-armv7-a15-selfhost-neon| 05:43:35
 clang-ppc64le-linux| 05:09:28
 sanitizer-x86_64-linux-autoconf| 05:00:28
 clang-cuda-build   | 04:59:43
 clang-s390x-linux  | 04:54:19
 lldb-x86-windows-msvc2015  | 04:52:10
 lld-x86_64-win7| 04:50:23
 lldb-amd64-ninja-freebsd11 | 04:49:06
 clang-x86_64-debian-fast   | 04:48:19
 lldb-windows7-android  | 04:40:41
 llvm-hexagon-elf   | 04:30:02
 clang-hexagon-elf  | 04:27:18
 clang-cmake-armv7-a15  | 03:55:42
 clang-cmake-armv7-a15-full | 03:52:15
 clang-cmake-thumbv7-a15-full-sh| 03:37:14
 lldb-x86_64-ubuntu-14.04-android   | 03:15:59
 lldb-x86_64-ubuntu-14.04-cmake | 02:52:43
 clang-cmake-aarch64-39vma  | 02:30:11
 clang-cmake-aarch64-42vma

Buildbot numbers for the week of 06/04/2017 - 06/10/2017

2017-06-16 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the last week of 06/04/2017 -
06/10/2017.

Please see the same data in attached csv files:

The longest time each builder was red during the last week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the last week:

buildername |  was_red
+--
 llvm-clang-x86_64-expensive-checks-win | 105:44:04
 sanitizer-x86_64-linux-bootstrap   | 65:37:52
 sanitizer-x86_64-linux-fast| 64:43:06
 sanitizer-x86_64-linux-autoconf| 37:27:36
 perf-x86_64-penryn-O3-polly-before-vectorizer-detect-only  | 36:30:01
 lld-x86_64-darwin13| 35:53:14
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast   | 34:43:26
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast | 34:15:00
 perf-x86_64-penryn-O3  | 29:08:58
 clang-ppc64be-linux-lnt| 27:38:03
 clang-cmake-aarch64-full   | 26:19:16
 clang-s390x-linux-lnt  | 26:11:53
 clang-ppc64be-linux-multistage | 26:01:30
 clang-s390x-linux-multistage   | 25:59:17
 clang-ppc64be-linux| 25:50:59
 clang-s390x-linux  | 25:47:42
 perf-x86_64-penryn-O3-polly| 25:45:29
 clang-ppc64le-linux| 25:41:55
 clang-ppc64le-linux-multistage | 25:41:54
 clang-cmake-aarch64-42vma  | 24:35:42
 clang-cmake-aarch64-39vma  | 24:24:17
 clang-cmake-armv7-a15-full | 24:20:57
 sanitizer-ppc64be-linux| 23:46:25
 clang-cmake-thumbv7-a15-full-sh| 23:27:29
 sanitizer-ppc64le-linux| 22:58:19
 lldb-x86_64-darwin-13.4| 20:28:04
 clang-atom-d525-fedora-rel | 17:20:48
 lldb-x86_64-ubuntu-14.04-android   | 17:00:45
 clang-x64-ninja-win7   | 16:59:17
 libcxx-libcxxabi-libunwind-arm-linux   | 16:27:17
 lldb-amd64-ninja-netbsd8   | 15:35:39
 libcxx-libcxxabi-x86_64-linux-ubuntu-asan  | 15:15:07
 perf-x86_64-penryn-O3-polly-before-vectorizer-unprofitable | 14:38:18
 perf-x86_64-penryn-O3-polly-before-vectorizer  | 14:20:13
 sanitizer-x86_64-linux | 14:15:35
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx1z | 14:05:19
 clang-x86-windows-msvc2015 | 13:50:46
 libcxx-libcxxabi-x86_64-linux-ubuntu-tsan  | 13:15:29
 libcxx-libcxxabi-libunwind-x86_64-linux-ubuntu | 12:50:03
 sanitizer-windows  | 11:40:13
 clang-cmake-aarch64-lld| 10:55:39
 clang-cmake-armv7-a15-selfhost | 09:27:42
 clang-with-lto-ubuntu  | 09:27:19
 clang-with-thin-lto-ubuntu | 08:44:19
 clang-lld-x86_64-2stage| 08:28:01
 clang-x86_64-linux-selfhost-modules| 08:25:41
 libcxx-libcxxabi-x86_64-linux-debian-noexceptions  | 08:15:01
 clang-cuda-build   | 07:58:11
 clang-cmake-aarch64-quick  | 07:49:59
 llvm-hexagon-elf   | 07:47:16
 clang-x86_64-linux-selfhost-modules-2  | 07:42:00
 clang-hexagon-elf  | 07:34:36
 clang-cmake-thumbv7-a15| 07:30:39
 clang-cmake-armv7-a15  | 07:20:34
 clang-bpf-build| 07:18:37
 clang-x86_64-debian-fast   | 07:07:21
 clang-cmake-armv7-a15-selfhost-neon| 05:49:06
 llvm-sphinx-docs   | 04:15:09
 lldb-windows7-android  | 02:27:50
 perf-x86_64-penryn-O3

LLVM buildmaster will be updated and restarted tonight

2017-06-16 Thread Galina Kistanova via cfe-commits
Hello everyone,

LLVM buildmaster will be updated and restarted after 7 PM Pacific time
today.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Two builders are off-line for maintenance

2017-06-23 Thread Galina Kistanova via cfe-commits
Hello everyone,

I took builders llvm-clang-x86_64-expensive-checks-win and
llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast off-line for maintenance.

Thank you for understanding.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Buildbot is back to normal work

2017-06-24 Thread Galina Kistanova via cfe-commits
Hello everyone,

Buildbot master is back to usual work after transitional.
Please pay attention to errors.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Buildbot numbers for the week of 11/26/2017 - 12/02/2017

2017-12-13 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the week of 11/26/2017 - 12/02/2017.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:

buildername| was_red
---+-
 clang-cuda-build  | 61:24:16
 libcxx-libcxxabi-x86_64-linux-debian-noexceptions | 41:12:57
 lldb-windows7-android | 32:43:26
 clang-x64-ninja-win7  | 32:06:36
 clang-ppc64be-linux-lnt   | 31:39:03
 clang-ppc64be-linux-multistage| 29:13:55
 clang-ppc64be-linux   | 28:11:58
 clang-with-lto-ubuntu | 28:09:40
 sanitizer-ppc64be-linux   | 27:56:11
 ubuntu-gcc7.1-werror  | 27:07:44
 polly-amd64-linux | 25:26:36
 clang-s390x-linux-multistage  | 23:13:18
 polly-arm-linux   | 21:41:21
 clang-cmake-aarch64-lld   | 20:42:04
 clang-with-thin-lto-ubuntu| 19:25:29
 clang-ppc64le-linux-multistage| 14:20:48
 clang-x86_64-linux-abi-test   | 14:06:45
 clang-s390x-linux | 13:42:18
 sanitizer-x86_64-linux-autoconf   | 13:04:48
 openmp-clang-x86_64-linux-debian  | 12:37:31
 openmp-ompt-clang-x86_64-linux-debian | 12:01:16
 clang-cmake-aarch64-global-isel   | 12:01:07
 openmp-gcc-x86_64-linux-debian| 11:49:14
 sanitizer-x86_64-linux| 11:47:20
 clang-cmake-thumbv7-a15-full-sh   | 10:30:29
 sanitizer-x86_64-linux-android| 10:22:47
 sanitizer-x86_64-linux-bootstrap-msan | 10:20:06
 sanitizer-x86_64-linux-bootstrap-ubsan| 10:18:54
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast  | 10:09:31
 clang-lld-x86_64-2stage   | 10:00:13
 clang-atom-d525-fedora-rel| 09:35:18
 clang-cmake-aarch64-full  | 08:34:44
 sanitizer-x86_64-linux-fast   | 08:26:45
 llvm-mips-linux   | 07:56:36
 llvm-clang-x86_64-expensive-checks-win| 07:40:39
 sanitizer-x86_64-linux-bootstrap  | 07:16:52
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast| 05:29:37
 clang-cmake-x86_64-avx2-linux-perf| 05:20:59
 clang-cmake-x86_64-avx2-linux | 05:19:55
 clang-ppc64le-linux-lnt   | 05:11:45
 clang-cmake-thumbv7-a15   | 05:10:56
 clang-cmake-x86_64-sde-avx512-linux   | 05:04:39
 clang-cmake-aarch64-quick | 04:53:17
 lld-x86_64-win7   | 04:38:20
 clang-native-arm-lnt  | 04:31:43
 clang-s390x-linux-lnt | 04:05:59
 lldb-x86_64-ubuntu-14.04-buildserver  | 04:01:22
 clang-ppc64le-linux   | 04:00:17
 clang-x86_64-linux-selfhost-modules-2 | 03:56:22
 lldb-amd64-ninja-netbsd8  | 03:45:47
 perf-x86_64-penryn-O3-polly-unprofitable  | 03:34:31
 libcxx-libcxxabi-libunwind-arm-linux-noexceptions | 03:26:24
 libcxx-libcxxabi-libunwind-arm-linux  | 03:25:48
 lld-x86_64-darwin13   | 03:24:02
 clang-x86-windows-msvc2015| 02:47:15
 clang-cmake-armv7-a15-full| 02:36:06
 clang-cmake-armv7-a15 | 02:35:01
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx14| 01:57:19
 libcxx-libcxxabi-x86_64-linux-ubuntu-cxx11| 01:56:45
 clang-x86_64-linux-selfhost-modules   | 01:47:50
 lldb-x86_64-ubuntu-14.04-android  | 01:38:09
 clang-with-thin-lto-windows   | 01:37:00
 reverse-iteration | 01:30:16
 clang-hexagon-elf | 01:26:50
 clang-x86_64-debian-fast  | 01:26:02
 lldb-x86_64-darwin-13.4   | 01:25:19
 lldb-x86-windows-msvc2015 | 01:16:03
 perf-x86_64-penryn-O3-polly-parallel-fast | 01:08:41
 libcxx-libcxxabi-x86_64-linux-

Buildbot numbers for the last week of 12/3/2017 - 12/9/2017

2017-12-13 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the last week of 12/3/2017 - 12/9/2017.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:

  buildername  | was_red
---+-
 clang-s390x-linux-multistage  | 77:40:28
 perf-x86_64-penryn-O3-polly-unprofitable  | 58:02:48
 clang-with-thin-lto-windows   | 57:19:47
 clang-x86_64-linux-selfhost-modules-2 | 56:49:12
 clang-x86_64-linux-selfhost-modules   | 56:06:27
 clang-cmake-armv7-a15-full| 33:41:50
 clang-cmake-aarch64-full  | 33:34:05
 clang-cmake-thumbv7-a15-full-sh   | 32:48:17
 clang-x64-ninja-win7  | 31:58:43
 clang-s390x-linux-lnt | 29:33:04
 clang-s390x-linux | 28:24:40
 sanitizer-x86_64-linux-bootstrap-ubsan| 28:11:01
 clang-ppc64be-linux-multistage| 28:07:20
 sanitizer-x86_64-linux-fast   | 27:37:22
 clang-ppc64le-linux   | 27:21:16
 clang-ppc64be-linux   | 27:14:47
 sanitizer-x86_64-linux-bootstrap-msan | 27:12:49
 clang-ppc64le-linux-multistage| 27:12:01
 sanitizer-x86_64-linux-bootstrap  | 27:07:12
 clang-ppc64le-linux-lnt   | 27:02:06
 clang-ppc64be-linux-lnt   | 26:30:54
 openmp-clang-x86_64-linux-debian  | 26:08:14
 clang-x86_64-debian-fast  | 25:41:36
 lld-x86_64-win7   | 22:48:43
 clang-with-lto-ubuntu | 22:45:24
 clang-cmake-aarch64-lld   | 22:08:52
 clang-with-thin-lto-ubuntu| 21:55:03
 clang-cmake-armv7-a15-selfhost-neon   | 21:54:05
 llvm-clang-x86_64-expensive-checks-win| 21:53:32
 clang-lld-x86_64-2stage   | 21:35:04
 clang-cmake-x86_64-avx2-linux | 21:31:56
 clang-cmake-x86_64-avx2-linux-perf| 21:31:31
 clang-cmake-armv7-a15-selfhost| 21:25:25
 sanitizer-x86_64-linux-fuzzer | 21:22:02
 perf-x86_64-penryn-O3-polly-parallel-fast | 20:53:31
 clang-cmake-x86_64-sde-avx512-linux   | 20:50:15
 sanitizer-windows | 19:57:59
 sanitizer-ppc64le-linux   | 17:03:04
 polly-amd64-linux | 16:23:42
 sanitizer-ppc64be-linux   | 16:20:58
 sanitizer-x86_64-linux| 16:06:23
 libcxx-libcxxabi-libunwind-aarch64-linux-noexceptions | 15:49:16
 polly-arm-linux   | 15:29:28
 clang-cmake-aarch64-quick | 14:25:05
 clang-cmake-thumbv7-a15   | 14:23:17
 clang-cmake-armv7-a15 | 14:21:20
 clang-cmake-aarch64-global-isel   | 14:17:21
 clang-bpf-build   | 12:33:12
 sanitizer-x86_64-linux-android| 10:37:46
 lld-x86_64-darwin13   | 05:54:54
 libcxx-libcxxabi-x86_64-linux-debian-noexceptions | 05:26:25
 reverse-iteration | 05:14:53
 clang-cuda-build  | 04:47:30
 clang-atom-d525-fedora-rel| 04:22:35
 lldb-windows7-android | 04:15:37
 ubuntu-gcc7.1-werror  | 03:57:16
 libcxx-libcxxabi-x86_64-linux-debian  | 03:53:19
 lldb-amd64-ninja-netbsd8  | 03:10:33
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast| 02:53:35
 lldb-x86_64-ubuntu-14.04-buildserver  | 02:41:53
 lldb-x86_64-ubuntu-14.04-cmake| 02:31:01
 lld-x86_64-freebsd| 02:17:59
 lldb-x86-windows-msvc2015 | 02:17:19
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast  | 01:57:35
 openmp-clan

Re: r320750 - Fix many -Wsign-compare and -Wtautological-constant-compare warnings.

2017-12-14 Thread Galina Kistanova via cfe-commits
Hello Zachary,

It looks like this commit added an error to one of our builders:
http://lab.llvm.org:8011/builders/ubuntu-gcc7.1-werror/builds/3735

. . .
FAILED: /usr/local/gcc-7.1/bin/g++-7.1   -DGTEST_HAS_RTTI=0 -D_DEBUG
-D_GNU_SOURCE -D__STDC_CONSTANT_MACROS -D__STDC_FORMAT_MACROS
-D__STDC_LIMIT_MACROS -Ilib/Object
-I/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/lib/Object -Iinclude
-I/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/include
-Wno-noexcept-type -fPIC -fvisibility-inlines-hidden -Werror
-Werror=date-time -std=c++11 -Wall -W -Wno-unused-parameter -Wwrite-strings
-Wcast-qual -Wno-missing-field-initializers -pedantic -Wno-long-long
-Wno-maybe-uninitialized -Wdelete-non-virtual-dtor -Wno-comment
-ffunction-sections -fdata-sections -O3  -fPIC   -UNDEBUG  -fno-exceptions
-fno-rtti -MD -MT lib/Object/CMakeFiles/LLVMObject.dir/COFFImportFile.cpp.o
-MF lib/Object/CMakeFiles/LLVMObject.dir/COFFImportFile.cpp.o.d -o
lib/Object/CMakeFiles/LLVMObject.dir/COFFImportFile.cpp.o -c
/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/lib/Object/COFFImportFile.cpp
/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/lib/Object/COFFImportFile.cpp:
In member function ‘llvm::NewArchiveMember
llvm::object::{anonymous}::ObjectFactory::createImportDescriptor(std::vector >&)’:
/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/lib/Object/COFFImportFile.cpp:191:28:
error: enumeral and non-enumeral type in conditional expression
[-Werror=extra]
   u16(is32bit(Machine) ? IMAGE_FILE_32BIT_MACHINE : 0),
   ~^~
/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/lib/Object/COFFImportFile.cpp:
In member function ‘llvm::NewArchiveMember
llvm::object::{anonymous}::ObjectFactory::createNullImportDescriptor(std::vector >&)’:
/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/lib/Object/COFFImportFile.cpp:327:28:
error: enumeral and non-enumeral type in conditional expression
[-Werror=extra]
   u16(is32bit(Machine) ? IMAGE_FILE_32BIT_MACHINE : 0),
   ~^~
/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/lib/Object/COFFImportFile.cpp:
In member function ‘llvm::NewArchiveMember
llvm::object::{anonymous}::ObjectFactory::createNullThunk(std::vector >&)’:
/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/lib/Object/COFFImportFile.cpp:390:28:
error: enumeral and non-enumeral type in conditional expression
[-Werror=extra]
   u16(is32bit(Machine) ? IMAGE_FILE_32BIT_MACHINE : 0),
   ~^~
cc1plus: all warnings being treated as errors

The builder was already red and did not send notifications.
Please have a look?

Thanks

Galina

On Thu, Dec 14, 2017 at 2:07 PM, Zachary Turner via cfe-commits <
cfe-commits@lists.llvm.org> wrote:

> Author: zturner
> Date: Thu Dec 14 14:07:03 2017
> New Revision: 320750
>
> URL: http://llvm.org/viewvc/llvm-project?rev=320750&view=rev
> Log:
> Fix many -Wsign-compare and -Wtautological-constant-compare warnings.
>
> Most of the -Wsign-compare warnings are due to the fact that
> enums are signed by default in the MS ABI, while the
> tautological comparison warnings trigger on x86 builds where
> sizeof(size_t) is 4 bytes, so N > numeric_limits::max()
> is always false.
>
> Differential Revision: https://reviews.llvm.org/D41256
>
> Modified:
> cfe/trunk/lib/CodeGen/CGExpr.cpp
>
> Modified: cfe/trunk/lib/CodeGen/CGExpr.cpp
> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/CodeGen/
> CGExpr.cpp?rev=320750&r1=320749&r2=320750&view=diff
> 
> ==
> --- cfe/trunk/lib/CodeGen/CGExpr.cpp (original)
> +++ cfe/trunk/lib/CodeGen/CGExpr.cpp Thu Dec 14 14:07:03 2017
> @@ -2825,7 +2825,7 @@ void CodeGenFunction::EmitCheck(
>assert(IsSanitizerScope);
>assert(Checked.size() > 0);
>assert(CheckHandler >= 0 &&
> - CheckHandler < sizeof(SanitizerHandlers) /
> sizeof(*SanitizerHandlers));
> + size_t(CheckHandler) < llvm::array_lengthof(SanitizerHandlers));
>const StringRef CheckName = SanitizerHandlers[CheckHandler].Name;
>
>llvm::Value *FatalCond = nullptr;
>
>
> ___
> cfe-commits mailing list
> cfe-commits@lists.llvm.org
> http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
>
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Re: r320750 - Fix many -Wsign-compare and -Wtautological-constant-compare warnings.

2017-12-15 Thread Galina Kistanova via cfe-commits
I fixed this with r320868.

Thanks

Galina

On Thu, Dec 14, 2017 at 5:43 PM, Galina Kistanova 
wrote:

> Hello Zachary,
>
> It looks like this commit added an error to one of our builders:
> http://lab.llvm.org:8011/builders/ubuntu-gcc7.1-werror/builds/3735
>
> . . .
> FAILED: /usr/local/gcc-7.1/bin/g++-7.1   -DGTEST_HAS_RTTI=0 -D_DEBUG
> -D_GNU_SOURCE -D__STDC_CONSTANT_MACROS -D__STDC_FORMAT_MACROS
> -D__STDC_LIMIT_MACROS -Ilib/Object -I/home/buildslave/am1i-slv2/
> ubuntu-gcc7.1-werror/llvm/lib/Object -Iinclude
> -I/home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/include
> -Wno-noexcept-type -fPIC -fvisibility-inlines-hidden -Werror
> -Werror=date-time -std=c++11 -Wall -W -Wno-unused-parameter -Wwrite-strings
> -Wcast-qual -Wno-missing-field-initializers -pedantic -Wno-long-long
> -Wno-maybe-uninitialized -Wdelete-non-virtual-dtor -Wno-comment
> -ffunction-sections -fdata-sections -O3  -fPIC   -UNDEBUG  -fno-exceptions
> -fno-rtti -MD -MT lib/Object/CMakeFiles/LLVMObject.dir/COFFImportFile.cpp.o
> -MF lib/Object/CMakeFiles/LLVMObject.dir/COFFImportFile.cpp.o.d -o
> lib/Object/CMakeFiles/LLVMObject.dir/COFFImportFile.cpp.o -c
> /home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/lib/
> Object/COFFImportFile.cpp
> /home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/lib/Object/COFFImportFile.cpp:
> In member function ‘llvm::NewArchiveMember llvm::object::{anonymous}::
> ObjectFactory::createImportDescriptor(std::vector std::allocator >&)’:
> /home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/lib/
> Object/COFFImportFile.cpp:191:28: error: enumeral and non-enumeral type
> in conditional expression [-Werror=extra]
>u16(is32bit(Machine) ? IMAGE_FILE_32BIT_MACHINE : 0),
>~^~
> /home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/lib/Object/COFFImportFile.cpp:
> In member function ‘llvm::NewArchiveMember llvm::object::{anonymous}::
> ObjectFactory::createNullImportDescriptor(std::vector std::allocator >&)’:
> /home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/lib/
> Object/COFFImportFile.cpp:327:28: error: enumeral and non-enumeral type
> in conditional expression [-Werror=extra]
>u16(is32bit(Machine) ? IMAGE_FILE_32BIT_MACHINE : 0),
>~^~
> /home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/lib/Object/COFFImportFile.cpp:
> In member function ‘llvm::NewArchiveMember llvm::object::{anonymous}::
> ObjectFactory::createNullThunk(std::vector std::allocator >&)’:
> /home/buildslave/am1i-slv2/ubuntu-gcc7.1-werror/llvm/lib/
> Object/COFFImportFile.cpp:390:28: error: enumeral and non-enumeral type
> in conditional expression [-Werror=extra]
>u16(is32bit(Machine) ? IMAGE_FILE_32BIT_MACHINE : 0),
>~^~
> cc1plus: all warnings being treated as errors
>
> The builder was already red and did not send notifications.
> Please have a look?
>
> Thanks
>
> Galina
>
> On Thu, Dec 14, 2017 at 2:07 PM, Zachary Turner via cfe-commits <
> cfe-commits@lists.llvm.org> wrote:
>
>> Author: zturner
>> Date: Thu Dec 14 14:07:03 2017
>> New Revision: 320750
>>
>> URL: http://llvm.org/viewvc/llvm-project?rev=320750&view=rev
>> Log:
>> Fix many -Wsign-compare and -Wtautological-constant-compare warnings.
>>
>> Most of the -Wsign-compare warnings are due to the fact that
>> enums are signed by default in the MS ABI, while the
>> tautological comparison warnings trigger on x86 builds where
>> sizeof(size_t) is 4 bytes, so N > numeric_limits::max()
>> is always false.
>>
>> Differential Revision: https://reviews.llvm.org/D41256
>>
>> Modified:
>> cfe/trunk/lib/CodeGen/CGExpr.cpp
>>
>> Modified: cfe/trunk/lib/CodeGen/CGExpr.cpp
>> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/CodeGen/CG
>> Expr.cpp?rev=320750&r1=320749&r2=320750&view=diff
>> 
>> ==
>> --- cfe/trunk/lib/CodeGen/CGExpr.cpp (original)
>> +++ cfe/trunk/lib/CodeGen/CGExpr.cpp Thu Dec 14 14:07:03 2017
>> @@ -2825,7 +2825,7 @@ void CodeGenFunction::EmitCheck(
>>assert(IsSanitizerScope);
>>assert(Checked.size() > 0);
>>assert(CheckHandler >= 0 &&
>> - CheckHandler < sizeof(SanitizerHandlers) /
>> sizeof(*SanitizerHandlers));
>> + size_t(CheckHandler) < llvm::array_lengthof(Sanitizer
>> Handlers));
>>const StringRef CheckName = SanitizerHandlers[CheckHandler].Name;
>>
>>llvm::Value *FatalCond = nullptr;
>>
>>
>> ___
>> cfe-commits mailing list
>> cfe-commits@lists.llvm.org
>> http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
>>
>
>
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


LLVM buildmaster will be updated and restarted tonight

2017-12-20 Thread Galina Kistanova via cfe-commits
Hello everyone,

LLVM buildmaster will be updated and restarted after 8 PM Pacific time.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


LLVM buildmaster will be updated and restarted tonight

2017-12-28 Thread Galina Kistanova via cfe-commits
Hello everyone,

LLVM buildmaster will be updated and restarted after 5 PM Pacific time.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Buildbot numbers for the week of 12/10/2017 - 12/16/2017

2017-12-28 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the week of 12/10/2017 - 12/16/2017.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:

buildername| was_red
---+-
 llvm-clang-x86_64-expensive-checks-win| 71:23:24
 clang-ppc64le-linux-multistage| 58:28:42
 ubuntu-gcc7.1-werror  | 51:53:30
 sanitizer-x86_64-linux-fuzzer | 39:48:21
 clang-x64-ninja-win7  | 34:31:36
 clang-ppc64be-linux-multistage| 26:10:41
 libcxx-libcxxabi-x86_64-linux-debian  | 21:04:30
 clang-x86_64-linux-selfhost-modules   | 09:52:57
 clang-x86_64-linux-selfhost-modules-2 | 09:04:12
 clang-cmake-thumbv7-a15-full-sh   | 08:05:51
 clang-s390x-linux-multistage  | 07:23:57
 clang-ppc64le-linux-lnt   | 06:45:03
 sanitizer-ppc64le-linux   | 06:23:23
 clang-cmake-armv7-a15-full| 06:21:20
 clang-cmake-armv7-a15-selfhost-neon   | 06:07:52
 lldb-windows7-android | 05:52:17
 clang-lld-x86_64-2stage   | 05:48:48
 clang-cmake-armv7-a15-selfhost| 05:41:38
 libcxx-libcxxabi-libunwind-arm-linux-noexceptions | 05:02:49
 clang-with-lto-ubuntu | 05:02:23
 clang-cmake-aarch64-full  | 04:58:40
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast| 04:29:56
 clang-x86_64-debian-fast  | 04:29:10
 clang-with-thin-lto-ubuntu| 04:24:14
 clang-cmake-aarch64-lld   | 04:20:35
 libcxx-libcxxabi-libunwind-arm-linux  | 04:18:01
 sanitizer-x86_64-linux-bootstrap-msan | 04:10:31
 lldb-x86_64-darwin-13.4   | 03:59:57
 clang-s390x-linux-lnt | 03:41:27
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast  | 03:21:04
 sanitizer-windows | 03:19:02
 lldb-x86-windows-msvc2015 | 03:16:45
 lld-x86_64-win7   | 03:16:19
 lld-x86_64-darwin13   | 03:11:44
 sanitizer-x86_64-linux| 03:11:15
 clang-cuda-build  | 02:54:23
 clang-hexagon-elf | 02:46:24
 clang-cmake-x86_64-sde-avx512-linux   | 02:34:13
 polly-amd64-linux | 02:30:47
 llvm-hexagon-elf  | 02:21:28
 sanitizer-x86_64-linux-bootstrap  | 02:16:05
 clang-ppc64le-linux   | 02:09:57
 sanitizer-x86_64-linux-android| 02:09:24
 sanitizer-x86_64-linux-fast   | 02:06:48
 lldb-amd64-ninja-netbsd8  | 02:03:55
 sanitizer-x86_64-linux-bootstrap-ubsan| 01:52:28
 reverse-iteration | 01:48:52
 sanitizer-ppc64be-linux   | 01:46:55
 lld-x86_64-freebsd| 01:37:59
 lldb-x86_64-ubuntu-14.04-buildserver  | 01:37:43
 clang-atom-d525-fedora-rel| 01:37:40
 clang-cmake-x86_64-avx2-linux | 01:34:07
 clang-s390x-linux | 01:32:46
 clang-cmake-aarch64-quick | 01:29:04
 lldb-x86_64-ubuntu-14.04-cmake| 01:25:17
 polly-arm-linux   | 01:21:49
 clang-cmake-thumbv7-a15   | 01:21:01
 clang-cmake-armv7-a15 | 01:18:18
 clang-cmake-x86_64-avx2-linux-perf| 01:14:32
 clang-x86_64-linux-abi-test   | 01:13:58
 clang-bpf-build   | 01:13:08
 clang-cmake-aarch64-global-isel   | 01:10:36
 clang-ppc64be-linux   | 01:09:47
 clang-ppc64be-linux-lnt   | 01:03:14
 perf-x86_64-penryn-O3-polly-parallel-fast | 00:56:06
 perf-x86_64-penryn-O3-polly-unprofitable  | 00:56:00
 sanitizer-x86_64-linux-autoconf   | 00:39:21
 lldb-x86_64-ubuntu-14.04-android  | 00:36:04
 lldb-amd64-ninja-freebsd11

Buildbot numbers for the week of 12/17/2017 - 12/23/2017

2017-12-28 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the last week of 12/17/2017 -
12/23/2017.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:

   buildername| was_red
--+-
 llvm-mips-linux  | 86:05:19
 openmp-ompt-gcc-x86_64-linux-debian  | 66:55:04
 perf-x86_64-penryn-O3-polly-unprofitable | 65:33:59
 llvm-clang-x86_64-expensive-checks-win   | 62:57:35
 libcxx-libcxxabi-libunwind-x86_64-linux-debian   | 32:45:39
 reverse-iteration| 31:04:41
 sanitizer-ppc64le-linux  | 30:24:22
 clang-lld-x86_64-2stage  | 28:09:44
 ubuntu-gcc7.1-werror | 28:06:31
 clang-with-lto-ubuntu| 26:34:49
 sanitizer-ppc64be-linux  | 26:29:44
 clang-cmake-aarch64-full | 26:10:16
 clang-ppc64le-linux-multistage   | 26:00:40
 clang-ppc64le-linux-lnt  | 25:53:05
 clang-with-thin-lto-ubuntu   | 25:44:08
 clang-ppc64be-linux-multistage   | 25:20:38
 clang-x86_64-linux-selfhost-modules  | 24:50:24
 clang-x86_64-linux-selfhost-modules-2| 24:25:47
 clang-s390x-linux-multistage | 20:29:52
 clang-s390x-linux-lnt| 06:49:34
 clang-s390x-linux| 06:48:12
 lldb-windows7-android| 06:42:05
 clang-bpf-build  | 06:25:36
 clang-atom-d525-fedora-rel   | 04:56:08
 clang-cmake-x86_64-avx2-linux| 04:31:15
 lldb-amd64-ninja-netbsd8 | 04:15:51
 clang-cmake-x86_64-sde-avx512-linux  | 04:09:32
 clang-ppc64be-linux-lnt  | 03:52:55
 sanitizer-x86_64-linux-bootstrap-ubsan   | 03:51:49
 clang-hexagon-elf| 03:47:45
 perf-x86_64-penryn-O3-polly-parallel-fast| 03:42:42
 clang-x86_64-linux-abi-test  | 03:42:23
 clang-cuda-build | 03:34:17
 clang-x86_64-debian-fast | 03:32:14
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast   | 03:30:01
 sanitizer-x86_64-linux-bootstrap-msan| 03:26:41
 clang-cmake-aarch64-lld  | 03:24:50
 clang-cmake-armv7-a15-full   | 03:23:07
 sanitizer-x86_64-linux-fast  | 03:16:42
 sanitizer-x86_64-linux-bootstrap | 03:15:05
 clang-cmake-aarch64-global-isel  | 03:04:14
 clang-ppc64le-linux  | 03:00:02
 clang-ppc64be-linux  | 02:57:59
 llvm-hexagon-elf | 02:47:56
 lldb-x86_64-ubuntu-14.04-android | 02:44:54
 clang-cmake-thumbv7-a15  | 02:38:17
 clang-cmake-armv7-a15| 02:22:38
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast | 02:18:03
 clang-cmake-x86_64-avx2-linux-perf   | 02:14:43
 polly-amd64-linux| 01:49:19
 lldb-x86_64-darwin-13.4  | 01:45:44
 clang-native-arm-lnt | 01:33:05
 sanitizer-x86_64-linux   | 01:22:29
 sanitizer-x86_64-linux-android   | 01:12:38
 sanitizer-x86_64-linux-fuzzer| 01:11:16
 lld-x86_64-freebsd   | 00:59:30
 lld-x86_64-win7  | 00:53:01
 lldb-x86-windows-msvc2015| 00:47:32
 lld-x86_64-darwin13  | 00:44:37
 lldb-x86_64-ubuntu-14.04-cmake   | 00:27:01
 polly-arm-linux  | 00:19:47
 sanitizer-windows| 00:18:45
 lldb-amd64-ninja-freebsd11   | 00:15:35
 clang-tools-sphinx-docs  | 00:10:08
(64 rows)


"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green):

   buildername   | builds | changes
| status_change_ratio
-++-+

LLVM buildmaster will be updated and restarted tonight

2018-01-10 Thread Galina Kistanova via cfe-commits
Hello everyone,

LLVM buildmaster will be updated and restarted after 6 PM Pacific time
today.

Thanks

Galina
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits


Buildbot numbers for the week of 12/24/2017 - 12/30/2017

2018-01-10 Thread Galina Kistanova via cfe-commits
Hello everyone,

Below are some buildbot numbers for the week of 12/24/2017 - 12/30/2017.

Please see the same data in attached csv files:

The longest time each builder was red during the week;
"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green);
Count of commits by project;
Number of completed builds, failed builds and average build time for
successful builds per active builder;
Average waiting time for a revision to get build result per active builder
(response time).

Thanks

Galina


The longest time each builder was red during the week:

  buildername  |  was_red
---+--
 clang-x86-windows-msvc2015| 103:36:40
 clang-cmake-armv7-a15-selfhost-neon   | 95:16:57
 lldb-windows7-android | 93:57:11
 clang-cmake-thumbv7-a15-full-sh   | 92:32:18
 clang-cmake-armv7-a15-selfhost| 55:29:46
 libcxx-libcxxabi-libunwind-aarch64-linux-noexceptions | 14:56:55
 libcxx-libcxxabi-libunwind-aarch64-linux  | 08:58:28
 llvm-clang-lld-x86_64-scei-ps4-ubuntu-fast| 07:20:04
 clang-cmake-armv7-a15-full| 04:29:44
 clang-lld-x86_64-2stage   | 04:16:14
 clang-with-lto-ubuntu | 04:14:12
 clang-cmake-thumbv7-a15   | 03:53:43
 clang-cmake-armv7-a15 | 03:53:27
 sanitizer-x86_64-linux-fuzzer | 03:52:18
 clang-hexagon-elf | 03:42:51
 clang-cmake-aarch64-full  | 03:12:54
 clang-with-thin-lto-ubuntu| 02:46:44
 sanitizer-ppc64le-linux   | 02:22:52
 clang-ppc64le-linux-lnt   | 02:09:42
 lldb-amd64-ninja-netbsd8  | 02:08:35
 clang-ppc64le-linux-multistage| 01:53:50
 clang-cuda-build  | 01:52:26
 lldb-x86_64-ubuntu-14.04-buildserver  | 01:51:14
 llvm-clang-x86_64-expensive-checks-win| 01:50:37
 reverse-iteration | 01:48:03
 sanitizer-x86_64-linux-fast   | 01:47:45
 sanitizer-x86_64-linux-bootstrap-msan | 01:46:53
 clang-x86_64-linux-selfhost-modules-2 | 01:45:11
 clang-ppc64le-linux   | 01:43:18
 clang-ppc64be-linux   | 01:42:10
 clang-atom-d525-fedora-rel| 01:41:27
 clang-ppc64be-linux-lnt   | 01:41:22
 clang-bpf-build   | 01:39:43
 sanitizer-x86_64-linux-bootstrap-ubsan| 01:36:30
 lldb-x86_64-ubuntu-14.04-cmake| 01:33:59
 sanitizer-x86_64-linux-bootstrap  | 01:33:08
 clang-s390x-linux-lnt | 01:31:42
 clang-x86_64-linux-selfhost-modules   | 01:31:11
 clang-cmake-x86_64-avx2-linux | 01:30:19
 clang-ppc64be-linux-multistage| 01:21:14
 lldb-x86-windows-msvc2015 | 01:17:07
 lldb-amd64-ninja-freebsd11| 01:16:12
 clang-s390x-linux | 01:12:29
 libcxx-libcxxabi-libunwind-x86_64-linux-debian| 01:01:21
 clang-cmake-aarch64-lld   | 00:59:42
 lldb-x86_64-ubuntu-14.04-android  | 00:57:04
 sanitizer-x86_64-linux| 00:53:59
 clang-cmake-aarch64-global-isel   | 00:51:29
 clang-cmake-aarch64-quick | 00:51:21
 llvm-clang-lld-x86_64-scei-ps4-windows10pro-fast  | 00:47:55
 lld-x86_64-win7   | 00:23:39
 lld-x86_64-freebsd| 00:23:27
 lld-x86_64-darwin13   | 00:23:27
 clang-cmake-x86_64-sde-avx512-linux   | 00:17:57
(54 rows)


"Status change ratio" by active builder (percent of builds that changed the
builder status from greed to red or from red to green):

   buildername   | builds | changes
| status_change_ratio
-+--
--+-+
 libcxx-libcxxabi-libunwind-aarch64-linux| 10 |   4
|40.0
 libcxx-libcxxabi-libunwind-aarch64-linux-noexceptions   | 10 |   4
|40.0
 clang-with-lto-ubuntu   | 64 |  11
|17.2
 libcxx-libcxxabi-libunwind-x86_64-l

  1   2   3   4   5   6   7   8   >