not so bad… that actually means that you are running out of heap, badly :P
and since I see a primitiveNativeCall there, most probably your (athens?) 
program is leaking somewhere. 

Esteban

> On 30 Oct 2015, at 18:01, Johan Fabry <jfa...@dcc.uchile.cl> wrote:
> 
> 
> More bad luck I’m afraid. What can I do next?
> 
> Program received signal SIGSEGV, Segmentation fault.
> 0xb8c0b92d in ?? ()
> (gdb) p (void)printCallStack()
> Cannot access memory at address 0xffffffff
> (gdb) 
> 
>> On Oct 30, 2015, at 08:11, Esteban Lorenzano <esteba...@gmail.com 
>> <mailto:esteba...@gmail.com>> wrote:
>> 
>> you can type 
>> 
>> p (void)printCallStack()
>> 
>> then you will have the active stack when crash happened. Is often a lot more 
>> useful than the trace of the vm.
>> 
>> Esteban
>> 
>>> On 29 Oct 2015, at 19:03, Johan Fabry <jfa...@dcc.uchile.cl 
>>> <mailto:jfa...@dcc.uchile.cl>> wrote:
>>> 
>>> 
>>> OK, back with access to the Ubuntu machine, I reproduced the crash when 
>>> running under gdb (reproducing it is never an issue, finding the minimal 
>>> case is the issue). See below for gdb output. But my vm has no debug 
>>> information compiled, so it is not really useful. Can I download a vm with 
>>> debug info compiled from somewhere? I would prefer to avoid having to 
>>> download the sources and compile et cetera … 
>>> 
>>> Once I have such a VM I will make some time to further investigate, and 
>>> report results.
>>> 
>>> Program received signal SIGSEGV, Segmentation fault.
>>> 0xb8c2bc31 in ?? ()
>>> (gdb) bt
>>> #0  0xb8c2bc31 in ?? ()
>>> #1  0x080fc9f2 in primitiveNativeCall ()
>>> #2  0xb4fba770 in ?? ()
>>> #3  0xb503b05e in ?? ()
>>> #4  0xb503afcb in ?? ()
>>> #5  0xb5011abd in ?? ()
>>> #6  0xb4fba5c0 in ?? ()
>>> (gdb) 
>>> 
> 
> 
> 
> ---> Save our in-boxes! http://emailcharter.org <http://emailcharter.org/> 
> <---
> 
> Johan Fabry   -   http://pleiad.cl/~jfabry <http://pleiad.cl/~jfabry>
> PLEIAD and RyCh labs  -  Computer Science Department (DCC)  -  University of 
> Chile
> 

Reply via email to