Okay well my patched tokio (with rubicon, cf. https://crates.io/crates/rubicon) is still causing memory corruption in its intrusive linked list (prev/next pointers are set to values like 0x10000000) so... I may want to enable some sanitizers, like I'm doing C++ or something
https://doc.rust-lang.org/beta/unstable-book/compiler-flags/sanitizer.html
Come to think of it... I'm _fairly sure_ some version of tokio that has different struct layouts is being compiled in.
I can add load-time checks for that most likely
Okay time to add this to tokio, tracing, parking_lot etc.
It might not help but at least it'll be pretty!
@fasterthanlime I smell a negative isize to usize cast
@fasterthanlime actually looking at the hex of the value it could more likely be a pointer to usize cast. it's ~48 bit (12 hex digits) and could plausibly have been some ASLR'd address (most significant hex digit is 5, pretty common for x86_64 ASLR addresses, and bottom 4 bits are clear (aligned to 16 bytes)
ABI issue somewhere?
@omni This whole thing is an ABI hazard lol.
I guess I will just live with the fact that loading those modules immediately fails on Linux!