Karsten Hilbert <karsten.hilb...@gmx.net> writes:
> ...
> So here's the final console output of that:
> ...
>       Debug memory block at address p=0x717b7c: API ''
>           0 bytes originally requested
>           The 3 pad bytes at p-3 are not all FORBIDDENBYTE (0xfb):
>               at p-3: 0x03 *** OUCH
>               at p-2: 0x4e *** OUCH
>               at p-1: 0x00 *** OUCH
>           Because memory is corrupted at the start, the count of bytes 
> requested
>              may be bogus, and checking the trailing pad bytes may segfault.
>           The 4 pad bytes at tail=0x717b7c are not all FORBIDDENBYTE (0xfb):
>               at tail+0: 0x00 *** OUCH
>               at tail+1: 0x00 *** OUCH
>               at tail+2: 0x00 *** OUCH
>               at tail+3: 0x00 *** OUCH
>           The block was made by call #0 to debug malloc/realloc.
>       Fatal Python error: bad ID: Allocated using API '', verified using API 
> 'o'
> ...
> Can anyone give more guidance on what the above python debug
> output might vaguely point to ?

It points to a memory corruption.

I would approach the problem by means of debugging: put a write
breakpoint at the corrupted address "0x717b7c" and check what part
of the system accesses it (this assumes you are using a CPU
supporting write breakpoints).
It may be very tedious as the address might be accessed very often
legally before it gets corrupted.

Another approach may be to use a tool designed for memory debugging,
e.g. "valgrind".

-- 
https://mail.python.org/mailman/listinfo/python-list

Reply via email to