public inbox for gcc-bugs@sourceware.org help / color / mirror / Atom feed
From: "rguenth at gcc dot gnu.org" <gcc-bugzilla@gcc.gnu.org> To: gcc-bugs@gcc.gnu.org Subject: [Bug lto/106334] [13 Regression] lto -g ICE in dwarf2out_register_external_die at dwarf2out.cc:6072 Date: Mon, 18 Jul 2022 08:26:51 +0000 [thread overview] Message-ID: <bug-106334-4-0mRNt7If4c@http.gcc.gnu.org/bugzilla/> (raw) In-Reply-To: <bug-106334-4@http.gcc.gnu.org/bugzilla/> https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106334 Richard Biener <rguenth at gcc dot gnu.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Ever confirmed|0 |1 Assignee|unassigned at gcc dot gnu.org |rguenth at gcc dot gnu.org Status|UNCONFIRMED |ASSIGNED Last reconfirmed| |2022-07-18 --- Comment #1 from Richard Biener <rguenth at gcc dot gnu.org> --- Confirmed. Do we eventually ggc_free during stream-in?! Breakpoint 5, dwarf2out_register_external_die (decl=<function_decl 0x7ffff66f0f00 listItems>, sym=0x42c6e98 "eval.cc.eec30469", off=478) at /space/rguenther/src/gcc/gcc/dwarf2out.cc:6072 6072 gcc_checking_assert (!external_die_map->get (decl)); (gdb) p sym $4 = 0x42c6e98 "eval.cc.eec30469" (gdb) p off $5 = 478 (gdb) c Continuing. Breakpoint 5, dwarf2out_register_external_die (decl=<function_decl 0x7ffff66f0f00 operator*>, sym=0x42c6e98 "eval.cc.eec30469", off=455) at /space/rguenther/src/gcc/gcc/dwarf2out.cc:6072 6072 gcc_checking_assert (!external_die_map->get (decl)); (gdb) p sym $6 = 0x42c6e98 "eval.cc.eec30469" (gdb) p off $7 = 455 so we have the "same" decl (address) but with different decls. Hmm. #0 free_node (node=<ggc_freed 0x7ffff66f0f00>) at /space/rguenther/src/gcc/gcc/tree.cc:1342 #1 0x0000000000b78e43 in unify_scc (data_in=0x42b3840, from=240, len=4, scc_entry_len=1, scc_hash=852538354) at /space/rguenther/src/gcc/gcc/lto/lto-common.cc:1769 #2 0x0000000000b79590 in lto_read_decls (decl_data=0x7ffff68cdc60, data=0x42c66b0, resolutions=...) at /space/rguenther/src/gcc/gcc/lto/lto-common.cc:1930 and #0 dwarf2out_register_external_die ( decl=<function_decl 0x7ffff66f0f00 listItems>, sym=0x42c6e98 "eval.cc.eec30469", off=478) at /space/rguenther/src/gcc/gcc/dwarf2out.cc:6072 #1 0x00000000010ec851 in lto_input_tree (ib=0x7fffffffd770, data_in=0x42b3840) at /space/rguenther/src/gcc/gcc/lto-streamer-in.cc:1911 #2 0x00000000010ec141 in lto_read_tree_1 (ib=0x7fffffffd770, data_in=0x42b3840, expr=<type_decl 0x7ffff66ef7b8 ListIterable>) at /space/rguenther/src/gcc/gcc/lto-streamer-in.cc:1706 #3 0x00000000010ec3ef in lto_input_scc (ib=0x7fffffffd770, data_in=0x42b3840, len=0x7fffffffd72c, entry_len=0x7fffffffd728, shared_scc=true) at /space/rguenther/src/gcc/gcc/lto-streamer-in.cc:1798 #4 0x0000000000b7945f in lto_read_decls (decl_data=0x7ffff68cdc60, data=0x42c66b0, resolutions=...) at /space/rguenther/src/gcc/gcc/lto/lto-common.cc:1904 note the dwarf2out registering during WPA is just using its hashtable as temporary storage, overwriting an existing entry should be fine there. An alternative would be to delay registering until we know the node is needed or providing a hook to unregister entries when we do free_node. The issue is probably latent everywhere - interesting that it didn't pop up yet. The "cheapest solution" is to short-cut the assert when flag_wpa (it's off with release checking anyway).
next prev parent reply other threads:[~2022-07-18 8:26 UTC|newest] Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top 2022-07-17 17:34 [Bug lto/106334] New: " slyfox at gcc dot gnu.org 2022-07-17 18:48 ` [Bug lto/106334] " pinskia at gcc dot gnu.org 2022-07-18 8:26 ` rguenth at gcc dot gnu.org [this message] 2022-07-18 9:02 ` marxin at gcc dot gnu.org 2022-07-19 9:17 ` cvs-commit at gcc dot gnu.org 2022-07-19 9:18 ` rguenth at gcc dot gnu.org 2022-07-31 7:36 ` slyfox at gcc dot gnu.org 2022-08-01 8:05 ` rguenth at gcc dot gnu.org 2022-08-02 6:35 ` cvs-commit at gcc dot gnu.org 2022-08-02 6:36 ` rguenth at gcc dot gnu.org 2022-08-08 9:13 ` cvs-commit at gcc dot gnu.org 2022-08-10 14:30 ` cvs-commit at gcc dot gnu.org 2022-10-11 13:04 ` cvs-commit at gcc dot gnu.org 2022-10-14 10:47 ` cvs-commit at gcc dot gnu.org
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=bug-106334-4-0mRNt7If4c@http.gcc.gnu.org/bugzilla/ \ --to=gcc-bugzilla@gcc.gnu.org \ --cc=gcc-bugs@gcc.gnu.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).