Skip to content

Instantly share code, notes, and snippets.

@AndnixSH
Last active November 30, 2023 19:52
Show Gist options
  • Save AndnixSH/d974b28a3882372be51bd1d693ea48cc to your computer and use it in GitHub Desktop.
Save AndnixSH/d974b28a3882372be51bd1d693ea48cc to your computer and use it in GitHub Desktop.
[armeabi-v7a] Compile++ arm : ab <= SymbolFinder.cpp
fatal error: error in backend: Do not know how to promote this operator's operand!
PLEASE submit a bug report to https://github.com/llvm/llvm-project/issues/ and include the crash backtrace, preprocessed source, and associated run script.
Stack dump:
0. Program arguments: D:/AndroidSDK/ndk/26.1.10909125/build/../toolchains/llvm/prebuilt/windows-x86_64/bin/clang++.exe -MMD -MP -MF F:\\Mobile-Modding\\AMain-Android-Hooking-Project\\/obj/local/armeabi-v7a/objs/ab/Substrate/SymbolFinder.o.d -target armv7-none-linux-androideabi22 -fdata-sections -ffunction-sections -fstack-protector-strong -funwind-tables -no-canonical-prefixes --sysroot D:/AndroidSDK/ndk/26.1.10909125/build/../toolchains/llvm/prebuilt/windows-x86_64/sysroot -g -Wno-invalid-command-line-argument -Wno-unused-command-line-argument -D_FORTIFY_SOURCE=2 -fno-exceptions -fno-rtti -fpic -O2 -DNDEBUG -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/JNI -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/libzip -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/include -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/source/InterceptRouting/Routing/FunctionInlineReplace -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/source/InterceptRouting/Routing/FunctionInlineHook -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/source -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/source/dobby -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/source/include -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/xnucxx/xnucxx -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/external/logging -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/external/misc-helper -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/external -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/source/Backend/UserMode/ -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/builtin-plugin -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/dobby/builtin-plugin/SymbolResolver -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/Nino/ -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/Includes/ -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/Substrate -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni -DANDROID -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/libs/curl/armeabi-v7a/include -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/libs/openssl/armeabi-v7a/include -IF:/Mobile-Modding/AMain-Android-Hooking-Project//jni/libs/openssl/armeabi-v7a/include -w -std=c17 -fexceptions -ffunction-sections -fdata-sections -fvisibility-inlines-hidden -fvisibility=hidden -frtti -fpermissive -fms-extensions -mllvm -sub -mllvm -fla -mllvm -split -mllvm -bcf -mllvm -sobf -Wformat -Werror=format-security -frtti -fexceptions -mllvm -sub -mllvm -fla -mllvm -split -mllvm -bcf -mllvm -sobf -std=c++17 -w -fexceptions -ffunction-sections -fdata-sections -fvisibility-inlines-hidden -fvisibility=hidden -frtti -fpermissive -fms-extensions -c F:/Mobile-Modding/AMain-Android-Hooking-Project//jni/Substrate/SymbolFinder.cpp -o F:\\Mobile-Modding\\AMain-Android-Hooking-Project\\/obj/local/armeabi-v7a/objs/ab/Substrate/SymbolFinder.o
1. <eof> parser at end of file
2. Code generation
3. Running pass 'Function Pass Manager' on module 'F:/Mobile-Modding/AMain-Android-Hooking-Project//jni/Substrate/SymbolFinder.cpp'.
4. Running pass 'ARM Instruction Selection' on function '@.datadiv_decode4181894872295926397'
Exception Code: 0xE0000046
#0 0x00007ffd8263565c (C:\Windows\System32\KERNELBASE.dll+0x6565c)
#1 0x00007ff64d07319a llvm::CrashRecoveryContext::HandleExit(int) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x56319a)
#2 0x00007ff64d09f3f9 llvm::sys::Process::Exit(int, bool) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x58f3f9)
#3 0x00007ff64cb17b17 LLVMErrorHandler(void*, char const*, bool) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x7b17)
#4 0x00007ff64d0748fc llvm::report_fatal_error(llvm::Twine const&, bool) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x5648fc)
#5 0x00007ff64d074795 llvm::report_fatal_error(char const*, bool) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x564795)
#6 0x00007ff6514eb72d llvm::DAGTypeLegalizer::PromoteIntegerOperand(llvm::SDNode*, unsigned int) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x49db72d)
#7 0x00007ff6504ef7fe llvm::DAGTypeLegalizer::run() (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x39df7fe)
#8 0x00007ff6504f44d8 llvm::SelectionDAG::LegalizeTypes() (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x39e44d8)
#9 0x00007ff64e94e39b llvm::SelectionDAGISel::CodeGenAndEmitDAG() (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x1e3e39b)
#10 0x00007ff64e94e1f0 llvm::SelectionDAGISel::SelectBasicBlock(llvm::ilist_iterator<llvm::ilist_detail::node_options<llvm::Instruction, false, false, void>, false, true>, llvm::ilist_iterator<llvm::ilist_detail::node_options<llvm::Instruction, false, false, void>, false, true>, bool&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x1e3e1f0)
#11 0x00007ff64e94d968 llvm::SelectionDAGISel::SelectAllBasicBlocks(llvm::Function const&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x1e3d968)
#12 0x00007ff64e94b6b9 llvm::SelectionDAGISel::runOnMachineFunction(llvm::MachineFunction&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x1e3b6b9)
#13 0x00007ff64d7c9784 (anonymous namespace)::ARMDAGToDAGISel::runOnMachineFunction(llvm::MachineFunction&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0xcb9784)
#14 0x00007ff64d283a36 llvm::MachineFunctionPass::runOnFunction(llvm::Function&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x773a36)
#15 0x00007ff64cee3558 llvm::FPPassManager::runOnFunction(llvm::Function&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x3d3558)
#16 0x00007ff64ceeac53 llvm::FPPassManager::runOnModule(llvm::Module&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x3dac53)
#17 0x00007ff64cee41e9 llvm::legacy::PassManagerImpl::run(llvm::Module&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x3d41e9)
#18 0x00007ff64e28bffd clang::EmitBackendOutput(clang::DiagnosticsEngine&, clang::HeaderSearchOptions const&, clang::CodeGenOptions const&, clang::TargetOptions const&, clang::LangOptions const&, llvm::StringRef, llvm::Module*, clang::BackendAction, llvm::IntrusiveRefCntPtr<llvm::vfs::FileSystem>, std::__1::unique_ptr<llvm::raw_pwrite_stream, std::__1::default_delete<llvm::raw_pwrite_stream>>) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x177bffd)
#19 0x00007ff64e664e63 clang::BackendConsumer::HandleTranslationUnit(clang::ASTContext&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x1b54e63)
#20 0x00007ff6501bcc04 clang::ParseAST(clang::Sema&, bool, bool) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x36acc04)
#21 0x00007ff64e5cef74 clang::FrontendAction::Execute() (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x1abef74)
#22 0x00007ff64d156b44 clang::CompilerInstance::ExecuteAction(clang::FrontendAction&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x646b44)
#23 0x00007ff64d1ede3f clang::ExecuteCompilerInvocation(clang::CompilerInstance*) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x6dde3f)
#24 0x00007ff64cb1733d cc1_main(llvm::ArrayRef<char const*>, char const*, void*) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x733d)
#25 0x00007ff64cb15095 ExecuteCC1Tool(llvm::SmallVectorImpl<char const*>&, llvm::ToolContext const&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x5095)
#26 0x00007ff64e380dfd void llvm::function_ref<void ()>::callback_fn<clang::driver::CC1Command::Execute(llvm::ArrayRef<std::__1::optional<llvm::StringRef>>, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>*, bool*) const::$_0>(long long) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x1870dfd)
#27 0x00007ff64d07316c llvm::CrashRecoveryContext::RunSafely(llvm::function_ref<void ()>) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x56316c)
#28 0x00007ff64e3805bc clang::driver::CC1Command::Execute(llvm::ArrayRef<std::__1::optional<llvm::StringRef>>, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>*, bool*) const (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x18705bc)
#29 0x00007ff64d10d453 clang::driver::Compilation::ExecuteCommand(clang::driver::Command const&, clang::driver::Command const*&, bool) const (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x5fd453)
#30 0x00007ff64d10d98e clang::driver::Compilation::ExecuteJobs(clang::driver::JobList const&, llvm::SmallVectorImpl<std::__1::pair<int, clang::driver::Command const*>>&, bool) const (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x5fd98e)
#31 0x00007ff64d129a1b clang::driver::Driver::ExecuteCompilation(clang::driver::Compilation&, llvm::SmallVectorImpl<std::__1::pair<int, clang::driver::Command const*>>&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x619a1b)
#32 0x00007ff64cb14545 clang_main(int, char**, llvm::ToolContext const&) (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x4545)
#33 0x00007ff64cb21c37 main (D:\AndroidSDK\ndk\26.1.10909125\toolchains\llvm\prebuilt\windows-x86_64\bin\clang++.exe+0x11c37)
#34 0x00007ff64cb11315 __tmainCRTStartup /home/runner/work/llvm-mingw/llvm-mingw/mingw-w64/mingw-w64-crt/build-x86_64/../crt/crtexe.c:267:13
#35 0x00007ff64cb11366 .l_start /home/runner/work/llvm-mingw/llvm-mingw/mingw-w64/mingw-w64-crt/build-x86_64/../crt/crtexe.c:190:3
#36 0x00007ffd8462257d (C:\Windows\System32\KERNEL32.DLL+0x1257d)
#37 0x00007ffd84c8aa58 (C:\Windows\SYSTEM32\ntdll.dll+0x5aa58)
clang++: error: clang frontend command failed with exit code 70 (use -v to see invocation)
clang version 17.0.2
Target: armv7-none-linux-android22
Thread model: posix
InstalledDir: D:/AndroidSDK/ndk/26.1.10909125/build/../toolchains/llvm/prebuilt/windows-x86_64/bin
clang++: note: diagnostic msg:
********************
PLEASE ATTACH THE FOLLOWING FILES TO THE BUG REPORT:
Preprocessed source(s) and associated run script(s) are located at:
clang++: note: diagnostic msg: C:/Users/username/AppData/Local/Temp/SymbolFinder-f4f118.cpp
clang++: note: diagnostic msg: C:/Users/username/AppData/Local/Temp/SymbolFinder-f4f118.sh
clang++: note: diagnostic msg:
********************
Apply bogus control flow obfuscation for _Z9find_nameiPKcS0_Pm
Apply split obfuscation for _Z9find_nameiPKcS0_Pm
Apply flatten obfuscation for _Z9find_nameiPKcS0_Pm
Apply substitution obfuscation for _Z9find_nameiPKcS0_Pm
Apply substitution obfuscation for _Z9find_nameiPKcS0_Pm
Apply bogus control flow obfuscation for _ZL11load_memmapiP2mmPi
Apply split obfuscation for _ZL11load_memmapiP2mmPi
Apply flatten obfuscation for _ZL11load_memmapiP2mmPi
Apply substitution obfuscation for _ZL11load_memmapiP2mmPi
Apply substitution obfuscation for _ZL11load_memmapiP2mmPi
Apply bogus control flow obfuscation for _ZL12find_libnamePKcPciPmP2mmi
Apply split obfuscation for _ZL12find_libnamePKcPciPmP2mmi
Apply flatten obfuscation for _ZL12find_libnamePKcPciPmP2mmi
Apply substitution obfuscation for _ZL12find_libnamePKcPciPmP2mmi
Apply substitution obfuscation for _ZL12find_libnamePKcPciPmP2mmi
Apply bogus control flow obfuscation for _Z12find_libbaseiPKcPm
Apply split obfuscation for _Z12find_libbaseiPKcPm
Apply flatten obfuscation for _Z12find_libbaseiPKcPm
Apply substitution obfuscation for _Z12find_libbaseiPKcPm
Apply substitution obfuscation for _Z12find_libbaseiPKcPm
Apply bogus control flow obfuscation for _ZL7sprintfPcU17pass_object_size1PKcz
Apply flatten obfuscation for _ZL7sprintfPcU17pass_object_size1PKcz
Apply substitution obfuscation for _ZL7sprintfPcU17pass_object_size1PKcz
Apply substitution obfuscation for _ZL7sprintfPcU17pass_object_size1PKcz
Apply bogus control flow obfuscation for _ZL8get_symsiP10elf32_shdrS0_
Apply split obfuscation for _ZL8get_symsiP10elf32_shdrS0_
Apply flatten obfuscation for _ZL8get_symsiP10elf32_shdrS0_
Apply substitution obfuscation for _ZL8get_symsiP10elf32_shdrS0_
Apply substitution obfuscation for _ZL8get_symsiP10elf32_shdrS0_
Apply flatten obfuscation for .datadiv_decode4181894872295926397
Apply string obfuscation for F:/Mobile-Modding/AMain-Android-Hooking-Project//jni/Substrate/SymbolFinder.cpp
make: *** [D:/AndroidSDK/ndk/26.1.10909125/build/../build/core/build-binary.mk:415: F:\Mobile-Modding\AMain-Android-Hooking-Project\/obj/local/armeabi-v7a/objs/ab/Substrate/SymbolFinder.o] Error 1
PS F:\Mobile-Modding\AMain-Android-Hooking-Project>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment