chicken-janitors
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Chicken-janitors] #975: Segmentation fault when accessing/setting m


From: Chicken Trac
Subject: Re: [Chicken-janitors] #975: Segmentation fault when accessing/setting moderately large SRFI-4 vectors
Date: Tue, 05 Feb 2013 01:20:50 -0000

#975: Segmentation fault when accessing/setting moderately large SRFI-4 vectors
-----------------------+----------------------------------------------------
  Reporter:  iraikov   |       Owner:       
      Type:  defect    |      Status:  new  
  Priority:  critical  |   Milestone:  4.9.0
 Component:  compiler  |     Version:  4.8.x
Resolution:            |    Keywords:       
-----------------------+----------------------------------------------------

Comment(by iraikov):

 Running the program under gdb reveals that the segmentation fault is
 caused by stack overflow.
 It appears that if gcc is passed option -O2 or -O3, the program terminates
 normally, regardless of csc optimization flags. Is it possible that
 Chicken-generated code relies on tail-call elimination performed by gcc?

-- 
Ticket URL: <http://bugs.call-cc.org/ticket/975#comment:3>
Chicken Scheme <http://www.call-with-current-continuation.org/>
Chicken Scheme is a compiler for the Scheme programming language.

reply via email to

[Prev in Thread] Current Thread [Next in Thread]