-
-
Notifications
You must be signed in to change notification settings - Fork 33k
Open
Labels
3.14bugs and security fixesbugs and security fixesinterpreter-core(Objects, Python, Grammar, and Parser dirs)(Objects, Python, Grammar, and Parser dirs)
Description
Python 3.14 introduced a new stack overflow detection mecanism: InternalDocs/stack_protection.md.
The KiCad application uses C++ Boost make_fcontext()
coroutines which runs coroutine in their own stack.
Code example from fcontext doc:
// context-function
void f(intptr);
// creates a new stack
std::size_t size = 8192;
void* sp(std::malloc(size));
// context fc uses f() as context function
// fcontext_t is placed on top of context stack
// a pointer to fcontext_t is returned
fcontext_t fc(make_fcontext(sp,size,f));
_Py_InitializeRecursionLimits()
is called in the main thread, whereas _Py_CheckRecursiveCall()
is called for the first time in a coroutine (make_fcontext()
).
Problem: Python detects a stack overflow because it's not aware that the stack base address and size changed when make_fcontext()
was called.
pthread
functions such as pthread_attr_getguardsize()
are incompatible with make_fcontext()
.
cc @markshannon
Linked PRs
efimov-mikhail
Metadata
Metadata
Assignees
Labels
3.14bugs and security fixesbugs and security fixesinterpreter-core(Objects, Python, Grammar, and Parser dirs)(Objects, Python, Grammar, and Parser dirs)
Projects
Status
Todo