-
-
Notifications
You must be signed in to change notification settings - Fork 5.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Segmentation fault while buiilding sysimage #27007
Comments
Note that this only occurs when calling this function in the sysimage and not when starting Julia without a sysimage and executing it then. |
Looks like the ccall here is corrupting the stack, causing the callee save area to be overwritten with a null pointer. Taking a look. |
Specifically this is where it's being corrupted. Not really sure why it thinks it has so much stack to play with. |
Quoth the ABI document:
|
On most platforms this doesn't make a difference, but the PowerPC ABI uses the signature to decide whether or not to allocate a parameter save area. Without this, the caller does not, but the callee assumes it's there causing the callee to overwrite critical parts of the caller stack. Fixes #27007
Whoo, excellent sleuthing! |
On most platforms this doesn't make a difference, but the PowerPC ABI uses the signature to decide whether or not to allocate a parameter save area. Without this, the caller does not, but the callee assumes it's there causing the callee to overwrite critical parts of the caller stack. Fixes #27007
On most platforms this doesn't make a difference, but the PowerPC ABI uses the signature to decide whether or not to allocate a parameter save area. Without this, the caller does not, but the callee assumes it's there causing the callee to overwrite critical parts of the caller stack. Fixes #27007
On most platforms this doesn't make a difference, but the PowerPC ABI uses the signature to decide whether or not to allocate a parameter save area. Without this, the caller does not, but the callee assumes it's there causing the callee to overwrite critical parts of the caller stack. Fixes #27007 (cherry picked from commit 8fa0645)
From my investigations this is a null-pointer dereference, but not a usercode one.
I also observed other weird compilations that all included a
ccall
.The text was updated successfully, but these errors were encountered: