> But you should get a better stacktrace ?

I got the exact same stacktrace.

$ ldd
venv3/lib/python3.5/site-packages/JCC-3.0-py3.5-linux-x86_64.egg/libjcc3.so
        linux-vdso.so.1 (0x00007ffcf4eb8000)
        libjava.so =>
/usr/lib/jvm/java-1.8.0-openjdk-amd64/jre/lib/amd64/libjava.so
(0x00007f412227f000)
        libjvm.so =>
/usr/lib/jvm/java-1.8.0-openjdk-amd64/jre/lib/amd64/server/libjvm.so
(0x00007f412133d000)
        libpython3.5m.so.1.0 =>
/usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0 (0x00007f4120c3a000)
        libstdc++.so.6 => /usr/lib/x86_64-linux-gnu/libstdc++.so.6
(0x00007f41208b8000)
        libm.so.6 => /lib/x86_64-linux-gnu/libm.so.6 (0x00007f41205b4000)
        libgcc_s.so.1 => /lib/x86_64-linux-gnu/libgcc_s.so.1
(0x00007f412039b000)
        libpthread.so.0 => /lib/x86_64-linux-gnu/libpthread.so.0
(0x00007f412017e000)
        libc.so.6 => /lib/x86_64-linux-gnu/libc.so.6 (0x00007f411fddf000)
        libverify.so =>
/usr/lib/jvm/java-1.8.0-openjdk-amd64/jre/lib/amd64/libverify.so
(0x00007f411fbce000)
        libdl.so.2 => /lib/x86_64-linux-gnu/libdl.so.2 (0x00007f411f9ca000)
        libexpat.so.1 => /lib/x86_64-linux-gnu/libexpat.so.1
(0x00007f411f7a0000)
        libz.so.1 => /lib/x86_64-linux-gnu/libz.so.1 (0x00007f411f584000)
        libutil.so.1 => /lib/x86_64-linux-gnu/libutil.so.1
(0x00007f411f381000)
        /lib64/ld-linux-x86-64.so.2 (0x000055857b9dd000)

I did verify it's compiling with -g

x86_64-linux-gnu-gcc -pthread -DNDEBUG -g -fwrapv -O2 -Wall
-Wstrict-prototypes -g
-fdebug-prefix-map=/build/python3.5-MLq5fN/python3.5-3.5.3=.
-fstack-protector-strong -Wformat -Werror=format-security -Wdate-time
-D_FORTIFY_SOURCE=2 -fPIC -g -D_java_generics -DJCC_VER="3.0"
-I/usr/lib/jvm/java-1.8.0-openjdk-amd64/include
-I/usr/lib/jvm/java-1.8.0-openjdk-amd64/include/linux -I_jcc3
-Ijcc3/sources -I/usr/include/python3.5m
-I/home/joshua/unnaturalcode/venv3/include/python3.5m -c
_jcc3/java/lang/String.cpp -o
build/temp.linux-x86_64-3.5/_jcc3/java/lang/String.o -DPYTHON
-fno-strict-aliasing -Wno-write-strings -O0 -g -DDEBUG

But it's still producing

Program received signal SIGSEGV, Segmentation fault.
0x00007fffe47eb2b4 in ?? ()
(gdb) bt
#0  0x00007fffe47eb2b4 in ?? ()
#1  0x0000000000000246 in ?? ()
#2  0x00007fffe47eb160 in ?? ()
#3  0x00007fffffffc840 in ?? ()
#4  0x00007fffffffc7e0 in ?? ()
#5  0x00007ffff6006075 in VM_Version::get_processor_features() ()
   from /usr/lib/jvm/java-1.8.0-openjdk-amd64/jre/lib/amd64/server/libjvm.so
Backtrace stopped: previous frame inner to this frame (corrupt stack?)
On Wed, Jul 5, 2017 at 11:38 AM, Andi Vajda <[EMAIL PROTECTED]> wrote:
Joshua Charles Campbell
Ph.D. Student and Research Assistant
Department of Computing Science
University of Alberta
[EMAIL PROTECTED]
NEW: Monitor These Apps!
elasticsearch, apache solr, apache hbase, hadoop, redis, casssandra, amazon cloudwatch, mysql, memcached, apache kafka, apache zookeeper, apache storm, ubuntu, centOS, red hat, debian, puppet labs, java, senseiDB