Started 29 days ago
Took 9 min 25 sec on green-dragon-08

Failed Build #5527 (Oct 13, 2019 3:30:39 AM)

Revisions
  • http://llvm.org/svn/llvm-project/llvm/trunk : 374708
  • http://llvm.org/svn/llvm-project/cfe/trunk : 374688
  • http://llvm.org/svn/llvm-project/compiler-rt/trunk : 374612
  • http://llvm.org/svn/llvm-project/debuginfo-tests/trunk : 364589
  • http://llvm.org/svn/llvm-project/libcxx/trunk : 374684
  • http://llvm.org/svn/llvm-project/clang-tools-extra/trunk : 374712
Changes
  1. [clang-tidy] bugprone-not-null-terminated-result: checker adjustments 2 (detail/ViewSVN)
    by charusso
  2. [clang-tidy] bugprone-not-null-terminated-result: checker adjustments (detail/ViewSVN)
    by charusso
  3. [clang-tidy] bugprone-not-null-terminated-result: Sphinx adjustments 2 (detail/ViewSVN)
    by charusso
  4. [clang-tidy] bugprone-not-null-terminated-result: Sphinx adjustments (detail/ViewSVN)
    by charusso
  5. gn build: Merge r374707 (detail/ViewSVN)
    by gnsyncbot
  6. [clang-tidy] New checker for not null-terminated result caused by strlen(), size() or equal length

    Summary:
    New checker called bugprone-not-null-terminated-result. This checker finds
    function calls where it is possible to cause a not null-terminated result.
    Usually the proper length of a string is `strlen(src) + 1` or equal length
    of this expression, because the null terminator needs an extra space.
    Without the null terminator it can result in undefined behaviour when the
    string is read.

    The following and their respective `wchar_t` based functions are checked:

    `memcpy`, `memcpy_s`, `memchr`, `memmove`, `memmove_s`, `strerror_s`,
    `strncmp`, `strxfrm`

    The following is a real-world example where the programmer forgot to
    increase the passed third argument, which is `size_t length`.
    That is why the length of the allocated memory is not enough to hold the
    null terminator.

    ```
        static char *stringCpy(const std::string &str) {
          char *result = reinterpret_cast<char *>(malloc(str.size()));
          memcpy(result, str.data(), str.size());
          return result;
        }
    ```

    In addition to issuing warnings, fix-it rewrites all the necessary code.
    It also tries to adjust the capacity of the destination array:

    ```
        static char *stringCpy(const std::string &str) {
          char *result = reinterpret_cast<char *>(malloc(str.size() + 1));
          strcpy(result, str.data());
          return result;
        }
    ```

    Note: It cannot guarantee to rewrite every of the path-sensitive memory
    allocations.

    Reviewed By: JonasToth, aaron.ballman, whisperity, alexfh

    Tags: #clang-tools-extra, #clang

    Differential Revision: https://reviews.llvm.org/D45050 (detail/ViewSVN)
    by charusso

Started by upstream project Clang Stage 2: cmake, R -g Tsan, using Stage 1 RA build number 18500
originally caused by:

Started by upstream project Clang Stage 2: cmake, R -g Tsan, using Stage 1 RA build number 18501
originally caused by:

This run spent:

  • 1 hr 28 min waiting;
  • 9 min 25 sec build duration;
  • 1 hr 37 min total from scheduled to completion.

Identified problems

Ninja target failed

Below is a link to the first failed ninja target.
Indication 1

Missing test results

The test result file Jenkins is looking for does not exist after the build.
Indication 2

Compile Error

This build failed because of a compile error. Below is a list of all errors in the build log:
Indication 3