STINNER Victor <vstin...@redhat.com> added the comment:

C traceback in gdb:

Program received signal SIGSEGV, Segmentation fault.
0x00000000004812a8 in meth_dealloc (
    m=<error reading variable: Cannot access memory at address 0x7fffff7fefd8>)
    at Objects/methodobject.c:86
86      {
(gdb) where
#0  0x00000000004812a8 in meth_dealloc (
    m=<error reading variable: Cannot access memory at address 0x7fffff7fefd8>)
    at Objects/methodobject.c:86
#1  0x0000000000488d9f in _Py_Dealloc (
    op=<built-in method __dir__ of builtin_function_or_method object at remote 
0x7fffe3973490>) at Objects/object.c:1931
#2  0x00000000004813c4 in meth_dealloc (m=0x7fffe3973580)
    at Objects/methodobject.c:91
#3  0x0000000000488d9f in _Py_Dealloc (
    op=<built-in method __dir__ of builtin_function_or_method object at remote 
0x7fffe3973508>) at Objects/object.c:1931
#4  0x00000000004813c4 in meth_dealloc (m=0x7fffe39735f8)
    at Objects/methodobject.c:91
#5  0x0000000000488d9f in _Py_Dealloc (
    op=<built-in method __dir__ of builtin_function_or_method object at remote 
0x7fffe3973580>) at Objects/object.c:1931
#6  0x00000000004813c4 in meth_dealloc (m=0x7fffe3973670)
    at Objects/methodobject.c:91
#7  0x0000000000488d9f in _Py_Dealloc (
    op=<built-in method __dir__ of builtin_function_or_method object at remote 
0x7fffe39735f8>) at Objects/object.c:1931
#8  0x00000000004813c4 in meth_dealloc (m=0x7fffe39736e8)
    at Objects/methodobject.c:91
(...)

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue33930>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to