[Zope-dev] recipe for trapping SIGSEGV and SIGILL signals on solaris
Florent Guillaume
fg@nuxeo.com
12 Dec 2001 14:29:12 GMT
> (gdb) print *((PyObject *) gc)->ob_type
> $1 = {ob_refcnt = 18213696, ob_type = 0x2d70b0, ob_size = 0,
> tp_name = 0x1 "T", tp_basicsize = 1328272, tp_itemsize = 4156348,
> tp_dealloc = 0x125865c, tp_print = 0x3c1b04, tp_getattr = 0,
> tp_setattr = 0,
> tp_compare = 0x29, tp_repr = 0x3adeb0, tp_as_number = 0xf66198,
> tp_as_sequence = 0xdf3fa0, tp_as_mapping = 0x0, tp_hash = 0x1,
> tp_call = 0x144490 <PyMethod_Type>, tp_str = 0x3f0a1c,
> tp_getattro = 0x125865c, tp_setattro = 0x3c1b04, tp_as_buffer = 0x0,
>
> tp_flags = 158561192, tp_doc = 0x29 "", tp_traverse = 0x4c4f4144,
> tp_clear = 0xd908c0, tp_richcompare = 0x1151300, tp_weaklistoffset =
> 0}
[...]
> gdb) x 0x4c4f4144
> 0x4c4f4144: Cannot access memory at address 0x4c4f4144.
0x4c4f4144 is big-endian ascii for "LOAD". Things were corrupted
before...
Florent
--
Florent Guillaume, Nuxeo (Paris, France)
+33 1 40 33 79 10 http://nuxeo.com mailto:fg@nuxeo.com