Eryk Sun <[email protected]> added the comment:
I tried to get more information for you by installing 2.7.11 (64-bit because of
the given fault) and unassembling python27.dll at the fault offset. But it
doesn't help. Whatever the bug is, it ended up jumping to an address that's in
the middle of an instruction. This final bit of nonsense is what killed the
process with an access violation, but it's not directly related to the problem.
Here's the address that triggered the access violation:
0:000> ? python27 + a4f81
Evaluate expression: 1368149889 = 00000000`518c4f81
The nearest function is rawiobase_readall():
0:000> ln python27 + a4f81
(00000000`518c4f10) python27!rawiobase_readall+0x71 |
(00000000`518c51a0) python27!resize_buffer
But 0x518c4f81 isn't the address of an instruction in this function:
0:000> u python27!rawiobase_readall python27!rawiobase_readall+80
python27!rawiobase_readall:
[...]
00000000`518c4f7f 48894318 mov qword ptr [rbx+18h],rax
00000000`518c4f83 48894310 mov qword ptr [rbx+10h],rax
00000000`518c4f87 48894320 mov qword ptr [rbx+20h],rax
00000000`518c4f8b 48837f10fe cmp qword ptr
[rdi+10h],0FFFFFFFFFFFFFFFEh
00000000`518c4f90 4c89642440 mov qword ptr [rsp+40h],r12
It's inside of the first MOV instruction.
----------
nosy: +eryksun
_______________________________________
Python tracker <[email protected]>
<https://bugs.python.org/issue46839>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe:
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com