STINNER Victor <vstin...@redhat.com> added the comment:
C traceback in gdb: Program received signal SIGSEGV, Segmentation fault. 0x00000000004812a8 in meth_dealloc ( m=<error reading variable: Cannot access memory at address 0x7fffff7fefd8>) at Objects/methodobject.c:86 86 { (gdb) where #0 0x00000000004812a8 in meth_dealloc ( m=<error reading variable: Cannot access memory at address 0x7fffff7fefd8>) at Objects/methodobject.c:86 #1 0x0000000000488d9f in _Py_Dealloc ( op=<built-in method __dir__ of builtin_function_or_method object at remote 0x7fffe3973490>) at Objects/object.c:1931 #2 0x00000000004813c4 in meth_dealloc (m=0x7fffe3973580) at Objects/methodobject.c:91 #3 0x0000000000488d9f in _Py_Dealloc ( op=<built-in method __dir__ of builtin_function_or_method object at remote 0x7fffe3973508>) at Objects/object.c:1931 #4 0x00000000004813c4 in meth_dealloc (m=0x7fffe39735f8) at Objects/methodobject.c:91 #5 0x0000000000488d9f in _Py_Dealloc ( op=<built-in method __dir__ of builtin_function_or_method object at remote 0x7fffe3973580>) at Objects/object.c:1931 #6 0x00000000004813c4 in meth_dealloc (m=0x7fffe3973670) at Objects/methodobject.c:91 #7 0x0000000000488d9f in _Py_Dealloc ( op=<built-in method __dir__ of builtin_function_or_method object at remote 0x7fffe39735f8>) at Objects/object.c:1931 #8 0x00000000004813c4 in meth_dealloc (m=0x7fffe39736e8) at Objects/methodobject.c:91 (...) ---------- _______________________________________ Python tracker <rep...@bugs.python.org> <https://bugs.python.org/issue33930> _______________________________________ _______________________________________________ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com