From 9a66616b180387beaf9bc626aa94666a04b29604 Mon Sep 17 00:00:00 2001 From: David Carlier Date: Sun, 20 Mar 2022 18:53:52 +0000 Subject: [PATCH] stack_overflow: si_addr access via method on non linux platform to fix with recent libc update. --- library/std/src/sys/unix/stack_overflow.rs | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/library/std/src/sys/unix/stack_overflow.rs b/library/std/src/sys/unix/stack_overflow.rs index 1e8d1137ac8b8..b334561847847 100644 --- a/library/std/src/sys/unix/stack_overflow.rs +++ b/library/std/src/sys/unix/stack_overflow.rs @@ -67,7 +67,7 @@ mod imp { #[cfg(not(any(target_os = "linux", target_os = "android")))] unsafe fn siginfo_si_addr(info: *mut libc::siginfo_t) -> usize { - (*info).si_addr as usize + (*info).si_addr() as usize } // Signal handler for the SIGSEGV and SIGBUS handlers. We've got guard pages