[llvm-bugs] [Bug 46702] New: Illegal fragment fill size when using current address in size computation

via llvm-bugs llvm-bugs at lists.llvm.org
Mon Jul 13 02:43:39 PDT 2020


https://bugs.llvm.org/show_bug.cgi?id=46702

            Bug ID: 46702
           Summary: Illegal fragment fill size when using current address
                    in size computation
           Product: libraries
           Version: trunk
          Hardware: PC
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P
         Component: MC
          Assignee: unassignedbugs at nondot.org
          Reporter: jean-michel.gorius at ens-rennes.fr
                CC: llvm-bugs at lists.llvm.org

Created attachment 23723
  --> https://bugs.llvm.org/attachment.cgi?id=23723&action=edit
Backtrace

When trying to compile the following assembly code with clang, an assertion
triggers in the assembler:

> foo:
>    jmp .
> .fill 1024 - (. - foo), 0
produces

> clang-11: /mnt/llvm-dev/github-llvm-project/llvm/lib/MC/MCAssembler.cpp:585: void writeFragment(llvm::raw_ostream &, const llvm::MCAssembler &, const llvm::MCAsmLayout &, const llvm::MCFragment &): Assertion `0 < VSize && VSize <= MaxChunkSize && "Illegal fragment fill size"' failed.

gcc 10.1.0 compile foos.s without complaining. The complete backtrace is
attached to this message.

Note: Substituting .space for .fill makes the code compile with clang.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20200713/72c28f8c/attachment.html>


More information about the llvm-bugs mailing list