On 07/07/2021 11:54 PM, z wrote:
On Wednesday, 7 July 2021 at 10:27:47 UTC, notna wrote:
On Windows:
```
::> dmd curl_get.d
::> .\curl_get.exe

object.Error@(0): Access Violation
----------------
0x0283CA66
0x0041DE8D
0x004023A2
0x00402308
0x00414D33
0x00414CAD
0x00414B48
0x0040D41F
0x00402363
0x74B96359 in BaseThreadInitThunk
0x773887A4 in RtlGetAppContainerNamedObjectPath
0x77388774 in RtlGetAppContainerNamedObjectPath
```

Nice and helpful Error messages is on the top of our desires list, right?

On 64 bits you don't even get a stack trace or description.
Sad, i know.
If you want better i could recommend you to compile with `-g` and hook up a debugger, then just let it run and it should triger a breakpoint on 0xC0000009(access violation).

With ldc you can turn on address sanitizer which will give you that information (and a LOT more!) without a debugger (but you still need -g).

http://johanengelen.github.io/ldc/2017/12/25/LDC-and-AddressSanitizer.html

Reply via email to