public inbox for gcc-bugs@sourceware.org
help / color / mirror / Atom feed
* [Bug debug/112878] New: ICE: in ctf_add_slice, at ctfc.cc:499 with -std=c23 -gctf1
@ 2023-12-06 10:51 iamanonymous.cs at gmail dot com
  2024-01-19 15:57 ` [Bug c/112878] " zsojka at seznam dot cz
                   ` (5 more replies)
  0 siblings, 6 replies; 7+ messages in thread
From: iamanonymous.cs at gmail dot com @ 2023-12-06 10:51 UTC (permalink / raw)
  To: gcc-bugs

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=112878

            Bug ID: 112878
           Summary: ICE: in ctf_add_slice, at ctfc.cc:499 with -std=c23
                    -gctf1
           Product: gcc
           Version: 14.0
            Status: UNCONFIRMED
          Severity: normal
          Priority: P3
         Component: debug
          Assignee: unassigned at gcc dot gnu.org
          Reporter: iamanonymous.cs at gmail dot com
  Target Milestone: ---

*******************************************************************************
OS and Platform:
$ uname -a:
Linux ubuntu 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023
x86_64 x86_64 x86_64 GNU/Linux
*******************************************************************************
gcc version:
$ gcc -v
Using built-in specs.
COLLECT_GCC=/root/gcc_set/202311291030/bin/gcc
COLLECT_LTO_WRAPPER=/root/gcc_set/202311291030/libexec/gcc/x86_64-pc-linux-gnu/14.0.0/lto-wrapper
Target: x86_64-pc-linux-gnu
Configured with: ../gcc/configure --prefix=/root/gcc_set/202311291030
--with-gmp=/root/build_essential --with-mpfr=/root/build_essential
--with-mpc=/root/build_essential --enable-languages=c,c++ --disable-multilib
--with-sanitizer=address,undefined,thread,leak
Thread model: posix
Supported LTO compression algorithms: zlib
gcc version 14.0.0 20231129 (experimental) (GCC) 

git version: 99fa0bfd63d97825c4221dcd3123940f1d0e6291
*******************************************************************************
Program:
$ cat mutant.c
struct {
  _BitInt(282) a : 280;
} b;

*******************************************************************************
Command Lines:
$ gcc -std=c23 -gctf1 mutant.c
mutant.c:3:1: internal compiler error: in ctf_add_slice, at ctfc.cc:499
    3 | } b;
      | ^
0x8d0e95 ctf_add_slice(ctf_container*, unsigned int, unsigned long, unsigned
int, unsigned int, die_struct*)
        ../../gcc/gcc/ctfc.cc:499
0xb6a770 gen_ctf_sou_type
        ../../gcc/gcc/dwarf2ctf.cc:617
0xb69fb7 gen_ctf_type
        ../../gcc/gcc/dwarf2ctf.cc:892
0xb6aa61 ctf_do_die(die_struct*)
        ../../gcc/gcc/dwarf2ctf.cc:978
0xbbc62b ctf_debug_do_cu
        ../../gcc/gcc/dwarf2out.cc:32985
0xbbc62b ctf_debug_do_cu
        ../../gcc/gcc/dwarf2out.cc:32978
0xbbc62b dwarf2out_early_finish
        ../../gcc/gcc/dwarf2out.cc:33114
0xb2411f symbol_table::finalize_compilation_unit()
        ../../gcc/gcc/cgraphunit.cc:2578
Please submit a full bug report, with preprocessed source (by using
-freport-bug).
Please include the complete backtrace with any bug report.
See <https://gcc.gnu.org/bugs/> for instructions.

Also ICE on trunk, compiler explorer: https://godbolt.org/z/8ozb8MrPr

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2024-04-11  0:32 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-12-06 10:51 [Bug debug/112878] New: ICE: in ctf_add_slice, at ctfc.cc:499 with -std=c23 -gctf1 iamanonymous.cs at gmail dot com
2024-01-19 15:57 ` [Bug c/112878] " zsojka at seznam dot cz
2024-01-20  9:02 ` [Bug debug/112878] " pinskia at gcc dot gnu.org
2024-04-09 18:34 ` [Bug debug/112878] ICE: in ctf_add_slice, at ctfc.cc:499 with _BitInt > 255 in a struct and -gctf1 ibhagat at gcc dot gnu.org
2024-04-09 18:44 ` pinskia at gcc dot gnu.org
2024-04-09 21:18 ` ibhagat at gcc dot gnu.org
2024-04-11  0:32 ` cvs-commit at gcc dot gnu.org

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).