On Sat, Oct 21, 2017 at 09:31:54AM +0200, dieter wrote:

> >     Debug memory block at address p=0x717b7c: API ''
> >         0 bytes originally requested
> >         The 3 pad bytes at p-3 are not all FORBIDDENBYTE (0xfb):
> >             at p-3: 0x03 *** OUCH
> >             at p-2: 0x4e *** OUCH
> >             at p-1: 0x00 *** OUCH
> >         Because memory is corrupted at the start, the count of bytes 
> > requested
> >            may be bogus, and checking the trailing pad bytes may segfault.
> >         The 4 pad bytes at tail=0x717b7c are not all FORBIDDENBYTE (0xfb):
> >             at tail+0: 0x00 *** OUCH
> >             at tail+1: 0x00 *** OUCH
> >             at tail+2: 0x00 *** OUCH
> >             at tail+3: 0x00 *** OUCH
> >         The block was made by call #0 to debug malloc/realloc.
> >     Fatal Python error: bad ID: Allocated using API '', verified using API 
> > 'o'
> > ...
> > Can anyone give more guidance on what the above python debug
> > output might vaguely point to ?
> 
> It points to a memory corruption.
> 
> I would approach the problem by means of debugging: put a write
> breakpoint at the corrupted address "0x717b7c" and check what part
> of the system accesses it (this assumes you are using a CPU
> supporting write breakpoints).
> It may be very tedious as the address might be accessed very often
> legally before it gets corrupted.
> 
> Another approach may be to use a tool designed for memory debugging,
> e.g. "valgrind".

Hi Dieter,

thanks for your guidance. I fear this approach is out of my class.

Karsten
-- 
GPG key ID E4071346 @ eu.pool.sks-keyservers.net
E167 67FD A291 2BEA 73BD  4537 78B9 A9F9 E407 1346
-- 
https://mail.python.org/mailman/listinfo/python-list

Reply via email to