Michael Hudson <mwh at python.net>: > Even more scarily, what SBCL (a Common Lisp implementation) does is > mprotect() a VM page and the end of the stack and deal with overflow > in a SIGSEGV handler. Even that isn't necessarily reliable. What if a C call allocates such a big stack frame that it jumps right over the protected page? Eventually it will try to access the protected area, but other chaos could occur in the meantime. The only completely safe thing I can think of is to eliminate C-level recursion altogether, a la Stackless. Greg Ewing, Computer Science Dept, +--------------------------------------+ University of Canterbury, | A citizen of NewZealandCorp, a | Christchurch, New Zealand | wholly-owned subsidiary of USA Inc. | greg at cosc.canterbury.ac.nz +--------------------------------------+
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4