New submission from STINNER Victor: In the issue #4a5b61b0d090, Stefan Krah wrote: "The Blaze test suite segfaults with 4a5b61b0d090". I may be related to compact dict and the issue #28040.
Stefan: Can you please explain what is Blaze? Explain how to reproduce the issue? Try to get the Python traceback? Did you try a debug build? If you use a release build, please set the env var PYTHONMALLOC=debug. """ Blaze is pushing Python's dynamic capabilities to absolute limits, so perhaps this is specific to a few applications only. For Blaze *itself* there is no difference whether this is fixed now or in the next beta. So releasing 3.6.0b1 now and setting this back to blocker afterwards sounds good to me. """ and """ It could still be a stack overflow, but on the surface it does not look like one. It's definitely related to the aforementioned revision: ==3442== Invalid read of size 8 ==3442== at 0x49DBD8: _PyDict_Pop (dictobject.c:1743) ==3442== by 0x4A0BE2: dict_pop (dictobject.c:2732) ==3442== by 0x4AA5F8: _PyCFunction_FastCallDict (methodobject.c:229) ==3442== by 0x4AA70B: _PyCFunction_FastCallKeywords (methodobject.c:267) ==3442== by 0x55FE63: call_function (ceval.c:4794) ==3442== by 0x55AA82: _PyEval_EvalFrameDefault (ceval.c:3267) ==3442== by 0x54D9CC: PyEval_EvalFrameEx (ceval.c:718) ==3442== by 0x560123: _PyFunction_FastCall (ceval.c:4876) ==3442== by 0x56023B: fast_function (ceval.c:4906) ==3442== by 0x55FF91: call_function (ceval.c:4815) ==3442== by 0x55AA82: _PyEval_EvalFrameDefault (ceval.c:3267) ==3442== by 0x54D9CC: PyEval_EvalFrameEx (ceval.c:718) ==3442== Address 0x0 is not stack'd, malloc'd or (recently) free'd ==3442== ==3442== ==3442== Process terminating with default action of signal 11 (SIGSEGV) ==3442== Access not within mapped region at address 0x0 ==3442== at 0x49DBD8: _PyDict_Pop (dictobject.c:1743) ==3442== by 0x4A0BE2: dict_pop (dictobject.c:2732) ==3442== by 0x4AA5F8: _PyCFunction_FastCallDict (methodobject.c:229) ==3442== by 0x4AA70B: _PyCFunction_FastCallKeywords (methodobject.c:267) ==3442== by 0x55FE63: call_function (ceval.c:4794) ==3442== by 0x55AA82: _PyEval_EvalFrameDefault (ceval.c:3267) ==3442== by 0x54D9CC: PyEval_EvalFrameEx (ceval.c:718) ==3442== by 0x560123: _PyFunction_FastCall (ceval.c:4876) ==3442== by 0x56023B: fast_function (ceval.c:4906) ==3442== by 0x55FF91: call_function (ceval.c:4815) ==3442== by 0x55AA82: _PyEval_EvalFrameDefault (ceval.c:3267) ==3442== by 0x54D9CC: PyEval_EvalFrameEx (ceval.c:718) """ ---------- messages: 276204 nosy: haypo, methane, skrah priority: normal severity: normal status: open title: The Blaze test suite segfaults with 4a5b61b0d090 type: crash versions: Python 3.6 _______________________________________ Python tracker <rep...@bugs.python.org> <http://bugs.python.org/issue28120> _______________________________________ _______________________________________________ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com