> -----Original Message-----
> From: Tom Lane [mailto:tgl@sss.pgh.pa.us]
> Sent: 21 June 2006 16:32
> To: Dave Page
> Cc: Peter Eisentraut; pgsql-hackers@postgresql.org
> Subject: Re: [HACKERS] CVS HEAD busted on Windows?
>
> "Dave Page" <dpage@vale-housing.co.uk> writes:
> >> Well, that's pretty clearly a null pointer dereference.
> Any chance of
> >> mapping the instruction address back to something useful?
>
> > Not sure how I would do that. Any hints?
>
> gdb might produce something useful, with something like
>
> x/32i 0xNNNN - 16
Not useful - it's all in ntdll.dll.
> Failing that, see if you can get the linker to spit out a
> link map when
> it builds psql.
Attached. With a little poking in the VS debugger, it would appear that
the address shown is in fact in ntdll.dll. It shows the following call
stack:
> ntdll.dll!7c8396d0()
[Frames below may be incorrect and/or missing, no symbols loaded
for ntdll.dll]
psql.exe!0040a269()
ntdll.dll!7c839620()
psql.exe!00404532()
psql.exe!00404983()
ntdll.dll!7c82fb23()
psql.exe!0040a269()
psql.exe!0040a32b()
psql.exe!004099d2()
ntdll.dll!7c82f9dd()
msvcrt.dll!77bbcef6()
msvcrt.dll!77bcc077()
psql.exe!004011e7()
psql.exe!00401238()
kernel32.dll!77e523cd()
If I'm reading it (and understanding) correctly, that suggests the
caller might be GetVariable().
Regards, Dave.