Eryk Sun <eryk...@gmail.com> added the comment:
I tried to get more information for you by installing 2.7.11 (64-bit because of the given fault) and unassembling python27.dll at the fault offset. But it doesn't help. Whatever the bug is, it ended up jumping to an address that's in the middle of an instruction. This final bit of nonsense is what killed the process with an access violation, but it's not directly related to the problem. Here's the address that triggered the access violation: 0:000> ? python27 + a4f81 Evaluate expression: 1368149889 = 00000000`518c4f81 The nearest function is rawiobase_readall(): 0:000> ln python27 + a4f81 (00000000`518c4f10) python27!rawiobase_readall+0x71 | (00000000`518c51a0) python27!resize_buffer But 0x518c4f81 isn't the address of an instruction in this function: 0:000> u python27!rawiobase_readall python27!rawiobase_readall+80 python27!rawiobase_readall: [...] 00000000`518c4f7f 48894318 mov qword ptr [rbx+18h],rax 00000000`518c4f83 48894310 mov qword ptr [rbx+10h],rax 00000000`518c4f87 48894320 mov qword ptr [rbx+20h],rax 00000000`518c4f8b 48837f10fe cmp qword ptr [rdi+10h],0FFFFFFFFFFFFFFFEh 00000000`518c4f90 4c89642440 mov qword ptr [rsp+40h],r12 It's inside of the first MOV instruction. ---------- nosy: +eryksun _______________________________________ Python tracker <rep...@bugs.python.org> <https://bugs.python.org/issue46839> _______________________________________ _______________________________________________ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com