GNU bug report logs -
#79483
Segmentation fault: set-car! in compiled code
Previous Next
To reply to this bug, email your comments to 79483 AT debbugs.gnu.org.
Toggle the display of automated, internal messages from the tracker.
Report forwarded
to
bug-guile <at> gnu.org
:
bug#79483
; Package
guile
.
(Sun, 21 Sep 2025 21:52:02 GMT)
Full text and
rfc822 format available.
Acknowledgement sent
to
Владимир ВНИИАЭС <var-vniiaes <at> mail.ru>
:
New bug report received and forwarded. Copy sent to
bug-guile <at> gnu.org
.
(Sun, 21 Sep 2025 21:52:02 GMT)
Full text and
rfc822 format available.
Message #5 received at submit <at> debbugs.gnu.org (full text, mbox):
[Message part 1 (text/plain, inline)]
Hello,
Execution of (set-car! '(0) 1) *in compiled code* leads to segfault:
amaya <at> AM4:~$ guile-3.0 --version
guile (GNU Guile) 3.0.10
Packaged by Debian (3.0.10+really3.0.10-4)
Copyright (C) 2024 Free Software Foundation, Inc.
License LGPLv3+: GNU LGPL 3 or later <http://gnu.org/licenses/lgpl.html>.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
amaya <at> AM4:~$ echo "(set-car! '(0) 1)" > /tmp/t.scm && guile /tmp/t.scm
;;; note: source file /tmp/t.scm
;;; newer than compiled /home/amaya/.cache/guile/ccache/3.0-LE-8-4.7/tmp/t.scm.go
;;; note: auto-compilation is enabled, set GUILE_AUTO_COMPILE=0
;;; or pass the --no-auto-compile argument to disable.
;;; compiling /tmp/t.scm
;;; compiled /home/amaya/.cache/guile/ccache/3.0-LE-8-4.7/tmp/t.scm.go
Segmentation fault (core dumped)
[Message part 2 (text/html, inline)]
Information forwarded
to
bug-guile <at> gnu.org
:
bug#79483
; Package
guile
.
(Mon, 22 Sep 2025 04:36:02 GMT)
Full text and
rfc822 format available.
Message #8 received at 79483 <at> debbugs.gnu.org (full text, mbox):
[Message part 1 (text/plain, inline)]
On Mon, Sep 22, 2025 at 12:50:57AM +0300, var-vniiaes--- via Bug reports for GUILE, GNU's Ubiquitous Extension Language wrote:
>
> Hello,
>
> Execution of (set-car! '(0) 1) *in compiled code* leads to segfault:
First of all: you shouldn't be doing that :)
You are mutating a constant. I don't know what the Scheme specification says
to it (if at all).
The other question is whether Guile should/could catch that and signal an
error instead.
Cheers
--
t
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to
bug-guile <at> gnu.org
:
bug#79483
; Package
guile
.
(Mon, 22 Sep 2025 19:29:01 GMT)
Full text and
rfc822 format available.
Message #11 received at 79483 <at> debbugs.gnu.org (full text, mbox):
[Message part 1 (text/plain, inline)]
<tomas <at> tuxteam.de> writes:
> On Mon, Sep 22, 2025 at 12:50:57AM +0300, var-vniiaes--- via Bug reports for GUILE, GNU's Ubiquitous Extension Language wrote:
>>
>> Hello,
>>
>> Execution of (set-car! '(0) 1) *in compiled code* leads to segfault:
>
> First of all: you shouldn't be doing that :)
>
> You are mutating a constant. I don't know what the Scheme specification says
> to it (if at all).
--8<---------------cut here---------------start------------->8---
As noted in section 3.4, it is an error to attempt to alter
a constant (i.e. the value of a literal expression) using a
mutation procedure like set-car! or string-set!
--8<---------------cut here---------------end--------------->8---
> The other question is whether Guile should/could catch that and signal an
> error instead.
I believe it should not. Memory-safe languages (and, Guile is supposed
to be one) should never segfault but instead terminate with a sensible
error. I realize that 1.3.2 allows to "fail catastrophically", which
segfault probably qualifies as, but I believe we should do better.
Tomas
--
There are only two hard things in Computer Science:
cache invalidation, naming things and off-by-one errors.
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to
bug-guile <at> gnu.org
:
bug#79483
; Package
guile
.
(Tue, 23 Sep 2025 04:23:01 GMT)
Full text and
rfc822 format available.
Message #14 received at 79483 <at> debbugs.gnu.org (full text, mbox):
[Message part 1 (text/plain, inline)]
On Mon, Sep 22, 2025 at 09:27:54PM +0200, Tomas Volf wrote:
> <tomas <at> tuxteam.de> writes:
>
> > On Mon, Sep 22, 2025 at 12:50:57AM +0300, var-vniiaes--- via Bug reports for GUILE, GNU's Ubiquitous Extension Language wrote:
> >>
> >> Hello,
> >>
> >> Execution of (set-car! '(0) 1) *in compiled code* leads to segfault:
> >
> > First of all: you shouldn't be doing that :)
> >
> > You are mutating a constant. I don't know what the Scheme specification says
> > to it (if at all).
>
> --8<---------------cut here---------------start------------->8---
> As noted in section 3.4, it is an error to attempt to alter
> a constant (i.e. the value of a literal expression) using a
> mutation procedure like set-car! or string-set!
> --8<---------------cut here---------------end--------------->8---
>
> > The other question is whether Guile should/could catch that and signal an
> > error instead.
>
> I believe it should not.
This is ambiguous, but from the context below I think you mean Guile
should catch it. I agree :-)
> Memory-safe languages (and, Guile is supposed
> to be one) should never segfault but instead terminate with a sensible
> error. I realize that 1.3.2 allows to "fail catastrophically", which
> segfault probably qualifies as, but I believe we should do better.
Definitely -- the question is whether Guile wants to rely on the
OS/runtime to catch an out-of-bounds access (or more probably here
an access to a region marked read-onls) or catch it itself.
Cheers
--
tomás
[signature.asc (application/pgp-signature, inline)]
This bug report was last modified today.
Previous Next
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.