Message217318
Thanks!
At first I suspected 32 vs 64 bit, but the failing bots cover both...
One thing that stands out to me as risky is the memcmp() against "\\??\\", which could overrun a short src_path buffer. But I don't think that would fail here.
I must have made some mistake with the REPARSE_DATA_BUFFER, but I can't see anything off hand.
What are our debugging options? |
|
Date |
User |
Action |
Args |
2014-04-27 21:04:38 | Kim.Gräsman | set | recipients:
+ Kim.Gräsman, tim.peters, terry.reedy, tim.golden, brian.curtin, python-dev |
2014-04-27 21:04:38 | Kim.Gräsman | set | messageid: <1398632678.3.0.286799345311.issue18314@psf.upfronthosting.co.za> |
2014-04-27 21:04:38 | Kim.Gräsman | link | issue18314 messages |
2014-04-27 21:04:37 | Kim.Gräsman | create | |
|