Eryk Sun <eryk...@gmail.com> added the comment:

I tried to get more information for you by installing 2.7.11 (64-bit because of 
the given fault) and unassembling python27.dll at the fault offset. But it 
doesn't help. Whatever the bug is, it ended up jumping to an address that's in 
the middle of an instruction. This final bit of nonsense is what killed the 
process with an access violation, but it's not directly related to the problem.

Here's the address that triggered the access violation:

    0:000> ? python27 + a4f81
    Evaluate expression: 1368149889 = 00000000`518c4f81

The nearest function is rawiobase_readall():

    0:000> ln python27 + a4f81
    (00000000`518c4f10)   python27!rawiobase_readall+0x71   |
    (00000000`518c51a0)   python27!resize_buffer

But 0x518c4f81 isn't the address of an instruction in this function:

    0:000> u python27!rawiobase_readall python27!rawiobase_readall+80
    python27!rawiobase_readall:
    [...]
    00000000`518c4f7f 48894318        mov     qword ptr [rbx+18h],rax
    00000000`518c4f83 48894310        mov     qword ptr [rbx+10h],rax
    00000000`518c4f87 48894320        mov     qword ptr [rbx+20h],rax
    00000000`518c4f8b 48837f10fe      cmp     qword ptr 
[rdi+10h],0FFFFFFFFFFFFFFFEh
    00000000`518c4f90 4c89642440      mov     qword ptr [rsp+40h],r12

It's inside of the first MOV instruction.

----------
nosy: +eryksun

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue46839>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to