Kim Gräsman added the comment:

Thanks!

At first I suspected 32 vs 64 bit, but the failing bots cover both...

One thing that stands out to me as risky is the memcmp() against "\\??\\", 
which could overrun a short src_path buffer. But I don't think that would fail 
here.

I must have made some mistake with the REPARSE_DATA_BUFFER, but I can't see 
anything off hand.

What are our debugging options?

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue18314>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to