forwarded message from Niels Hallenberg
Stephen Weeks
MLton@sourcelight.com
Mon, 9 Jul 2001 14:57:10 -0700
Return-Path: <nh@nh.itu.dk>
Received: from localhost (localhost [127.0.0.1])
by eponym.epr.com (8.11.2/8.11.2) with ESMTP id f69LrbJ04496
for <sweeks@localhost>; Mon, 9 Jul 2001 14:53:37 -0700
Received: from exchange.epr.com [198.3.162.249]
by localhost with IMAP (fetchmail-5.7.4)
for sweeks@localhost (single-drop); Mon, 09 Jul 2001 14:53:37 -0700 (PDT)
Received: from maguro.epr.com ([198.3.162.27]) by exchange.epr.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
id NYYCXSSS; Mon, 9 Jul 2001 14:51:00 -0700
Received: from magrathea.epr.com (firewall-user@magrathea.epr.com [198.3.160.1])
by maguro.epr.com (8.9.3/8.9.3) with ESMTP id OAA13687
for <sweeks@intertrust.com>; Mon, 9 Jul 2001 14:52:57 -0700 (PDT)
Received: (from uucp@localhost) by magrathea.epr.com (8.9.3/8.7.3) id OAA18953 for <sweeks@intertrust.com>; Mon, 9 Jul 2001 14:52:56 -0700 (PDT)
Received: from nodnsquery(213.237.71.166) by magrathea.epr.com via smap (V5.5)
id xma018761; Mon, 9 Jul 01 14:52:17 -0700
Received: (from nh@localhost)
by nh.itu.dk (8.11.2/8.11.2) id f69Ln6F01527;
Mon, 9 Jul 2001 23:49:06 +0200
X-Authentication-Warning: nh.itu.dk: nh set sender to nh@it-c.dk using -f
References: <15173.65053.727272.519257@eponym.epr.com>
<lx1ynqv8wi.fsf@nh.itu.dk> <15177.60537.358762.508107@eponym.epr.com>
In-Reply-To: Stephen Weeks's message of "Mon, 9 Jul 2001 10:40:09 -0700"
Message-ID: <lxzoadojsd.fsf@nh.itu.dk>
Lines: 25
User-Agent: Gnus/5.0807 (Gnus v5.8.7) Emacs/20.7
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
From: Niels Hallenberg <nh@it-c.dk>
Sender: nh@nh.itu.dk
To: Stephen Weeks <sweeks@intertrust.com>
CC: nh@it-c.dk, mael@it-c.dk
Subject: Re: seg fault with List.tabulate in 3.9.1
Date: 09 Jul 2001 23:49:06 +0200
Hi Stephen,
> > The cure is to increase the stacksize with the limit and unlimit
> > command:
>
> Thanks Niels. That fixes the problem for me. It would be nice, though, if the
> Kit could report something other than a segfault. SML programmers aren't
> supposed to see such things :-).
sure. We actually discussed it again today. The problem, that we
haven't been able to solve, is that we can't distinguish a stack-size
segmentation fault from a real segmentation fault (i.e., a
segmentation fault due to bug in the ML Kit). A nice solution would be
to raise an STACK_SIZE_TOO_SMALL exception, but this is only possible
if Linux can tell us how the segmentation fault happened.
We are open to any suggestions about this problem.
-- Niels
-------------------------------------------------------
Niels Hallenberg Email: nh@it.edu
The IT University of Copenhagen Tel.: +45-38 16 88 24
Glentevej 67 Fax: +45-38 16 88 99
DK-2400 Copenhagen NV WWW: www.it.edu
-------------------------------------------------------