[Zope-dev] recipe for trapping SIGSEGV and SIGILL signals on solaris

Florent Guillaume fg@nuxeo.com
12 Dec 2001 14:29:12 GMT


> (gdb) print *((PyObject *) gc)->ob_type
> $1 = {ob_refcnt = 18213696, ob_type = 0x2d70b0, ob_size = 0, 
>   tp_name = 0x1 "T", tp_basicsize = 1328272, tp_itemsize = 4156348, 
>   tp_dealloc = 0x125865c, tp_print = 0x3c1b04, tp_getattr = 0,
> tp_setattr = 0, 
>   tp_compare = 0x29, tp_repr = 0x3adeb0, tp_as_number = 0xf66198, 
>   tp_as_sequence = 0xdf3fa0, tp_as_mapping = 0x0, tp_hash = 0x1, 
>   tp_call = 0x144490 <PyMethod_Type>, tp_str = 0x3f0a1c, 
>   tp_getattro = 0x125865c, tp_setattro = 0x3c1b04, tp_as_buffer = 0x0,
> 
>   tp_flags = 158561192, tp_doc = 0x29 "", tp_traverse = 0x4c4f4144, 
>   tp_clear = 0xd908c0, tp_richcompare = 0x1151300, tp_weaklistoffset =
> 0}
[...]
> gdb) x 0x4c4f4144
> 0x4c4f4144:     Cannot access memory at address 0x4c4f4144.


0x4c4f4144 is big-endian ascii for "LOAD". Things were corrupted
before...


Florent
-- 
Florent Guillaume, Nuxeo (Paris, France)
+33 1 40 33 79 10  http://nuxeo.com  mailto:fg@nuxeo.com