Re: CVS HEAD busted on Windows? - Mailing list pgsql-hackers

From Dave Page
Subject Re: CVS HEAD busted on Windows?
Date
Msg-id E7F85A1B5FF8D44C8A1AF6885BC9A0E401388AD9@ratbert.vale-housing.co.uk
Whole thread Raw
In response to Re: CVS HEAD busted on Windows?  (Tom Lane <tgl@sss.pgh.pa.us>)
List pgsql-hackers

> -----Original Message-----
> From: Tom Lane [mailto:tgl@sss.pgh.pa.us]
> Sent: 21 June 2006 16:32
> To: Dave Page
> Cc: Peter Eisentraut; pgsql-hackers@postgresql.org
> Subject: Re: [HACKERS] CVS HEAD busted on Windows?
>
> "Dave Page" <dpage@vale-housing.co.uk> writes:
> >> Well, that's pretty clearly a null pointer dereference.
> Any chance of
> >> mapping the instruction address back to something useful?
>
> > Not sure how I would do that. Any hints?
>
> gdb might produce something useful, with something like
>
>         x/32i 0xNNNN - 16

Not useful - it's all in ntdll.dll.

> Failing that, see if you can get the linker to spit out a
> link map when
> it builds psql.

Attached. With a little poking in the VS debugger, it would appear that
the address shown is in fact in ntdll.dll. It shows the following call
stack:

>    ntdll.dll!7c8396d0()
     [Frames below may be incorrect and/or missing, no symbols loaded
for ntdll.dll]
     psql.exe!0040a269()
     ntdll.dll!7c839620()
     psql.exe!00404532()
     psql.exe!00404983()
     ntdll.dll!7c82fb23()
     psql.exe!0040a269()
     psql.exe!0040a32b()
     psql.exe!004099d2()
     ntdll.dll!7c82f9dd()
     msvcrt.dll!77bbcef6()
     msvcrt.dll!77bcc077()
     psql.exe!004011e7()
     psql.exe!00401238()
     kernel32.dll!77e523cd()

If I'm reading it (and understanding) correctly, that suggests the
caller might be GetVariable().

Regards, Dave.


Attachment

pgsql-hackers by date:

Previous
From: Tom Lane
Date:
Subject: Re: CVS HEAD busted on Windows?
Next
From: Tom Lane
Date:
Subject: Re: Overhead for stats_command_string et al, take 2