Re: CVS HEAD busted on Windows?
От | Dave Page |
---|---|
Тема | Re: CVS HEAD busted on Windows? |
Дата | |
Msg-id | E7F85A1B5FF8D44C8A1AF6885BC9A0E401388AD9@ratbert.vale-housing.co.uk обсуждение исходный текст |
Ответ на | Re: CVS HEAD busted on Windows? (Tom Lane <tgl@sss.pgh.pa.us>) |
Список | pgsql-hackers |
> -----Original Message----- > From: Tom Lane [mailto:tgl@sss.pgh.pa.us] > Sent: 21 June 2006 16:32 > To: Dave Page > Cc: Peter Eisentraut; pgsql-hackers@postgresql.org > Subject: Re: [HACKERS] CVS HEAD busted on Windows? > > "Dave Page" <dpage@vale-housing.co.uk> writes: > >> Well, that's pretty clearly a null pointer dereference. > Any chance of > >> mapping the instruction address back to something useful? > > > Not sure how I would do that. Any hints? > > gdb might produce something useful, with something like > > x/32i 0xNNNN - 16 Not useful - it's all in ntdll.dll. > Failing that, see if you can get the linker to spit out a > link map when > it builds psql. Attached. With a little poking in the VS debugger, it would appear that the address shown is in fact in ntdll.dll. It shows the following call stack: > ntdll.dll!7c8396d0() [Frames below may be incorrect and/or missing, no symbols loaded for ntdll.dll] psql.exe!0040a269() ntdll.dll!7c839620() psql.exe!00404532() psql.exe!00404983() ntdll.dll!7c82fb23() psql.exe!0040a269() psql.exe!0040a32b() psql.exe!004099d2() ntdll.dll!7c82f9dd() msvcrt.dll!77bbcef6() msvcrt.dll!77bcc077() psql.exe!004011e7() psql.exe!00401238() kernel32.dll!77e523cd() If I'm reading it (and understanding) correctly, that suggests the caller might be GetVariable(). Regards, Dave.
Вложения
В списке pgsql-hackers по дате отправления: