Corinna Vinschen writes: > The problem is, a stack overflow is correctly handled as SEGV from the > POSIX perspective. > > But there should have been the right info available. If you run this > under strace, you get an exception 0xc00000fd or 0xc0000228, > STATUS_STACK_OVERFLOW or STATUS_STACK_OVERFLOW_READ. > > Can you check? If it's an 0xc0000228, there is a chance we're missing > to handle it in our exception handler.
829 2952008 [main] python2.7 604 mmap64: addr 0x0, len 262144, prot 0x3, flags 0x22, fd -1, off 0x0 35 2952043 [main] python2.7 604 mmap64: 0x6FFFB850000 = mmap() 703 2952746 [main] python2.7 604 mmap64: addr 0x0, len 262144, prot 0x3, flags 0x22, fd -1, off 0x0 34 2952780 [main] python2.7 604 mmap64: 0x6FFFB810000 = mmap() 596 2953376 [main] python2.7 604 mmap64: addr 0x0, len 262144, prot 0x3, flags 0x22, fd -1, off 0x0 37 2953413 [main] python2.7 604 mmap64: 0x6FFFB7D0000 = mmap() 607 2954020 [main] python2.7 604 mmap64: addr 0x0, len 262144, prot 0x3, flags 0x22, fd -1, off 0x0 37 2954057 [main] python2.7 604 mmap64: 0x6FFFB790000 = mmap() 605 2954662 [main] python2.7 604 mmap64: addr 0x0, len 262144, prot 0x3, flags 0x22, fd -1, off 0x0 33 2954695 [main] python2.7 604 mmap64: 0x6FFFB750000 = mmap() 587 2955282 [main] python2.7 604 mmap64: addr 0x0, len 262144, prot 0x3, flags 0x22, fd -1, off 0x0 33 2955315 [main] python2.7 604 mmap64: 0x6FFFB710000 = mmap() --- Process 604, exception c00000fd at 00000003E91E9619 --- Process 604, exception c0000005 at 00000001801C2F96 Segmentation fault Regards, Achim. -- +<[Q+ Matrix-12 WAVE#46+305 Neuron microQkb Andromeda XTk Blofeld]>+ Samples for the Waldorf Blofeld: http://Synth.Stromeko.net/Downloads.html#BlofeldSamplesExtra