Help with debug

Phil Lodwick Phil.Lodwick at EFI.COM
Thu Mar 15 00:32:18 CDT 2007


Hi,

I have been debugging a problem today and am running low on batteries.  I am
hoping somebody can look at the attached snippet of log and point me in the
right direction.

>From what I can tell, there is a DLL called snoopy.dll that does a whole
bunch of allocs and reallocs and then tries to reference a NULL pointer which
causes an unhandled exception.  The code goes through a loop and does not
always crash on the same iteration, but it always seems to crash at the same
address.

This code does not crash on Windows.  Just getting lucky?

Unfortunately I do not have the sources to this code, so it makes life a
little more difficult.  

Any good ideas for my next step in debugging?

Thanks,
Phil
-------------- next part --------------

000e:Call ntdll.RtlAllocateHeap(41210000,00000000,00000030) ret=7c3416b3
000e:trace:heap:RtlAllocateHeap (0x41210000,00000002,00000030): returning 0x46927938
000e:Ret  ntdll.RtlAllocateHeap() retval=46927938 ret=7c3416b3
000e:Call ntdll.RtlReAllocateHeap(41210000,00000000,4692a240,00000238) ret=7c3527e9
000e:trace:heap:RtlReAllocateHeap (0x41210000,00000002,0x4692a240,00000238): returning 0x46927970
000e:Ret  ntdll.RtlReAllocateHeap() retval=46927970 ret=7c3527e9
000e:trace:seh:__regs_RtlRaiseException code=c0000005 flags=0 addr=0x1133572a
000e:trace:seh:__regs_RtlRaiseException  info[0]=00000000
000e:trace:seh:__regs_RtlRaiseException  info[1]=00000000
000e:trace:seh:__regs_RtlRaiseException  eax=00000001 ebx=00000000 ecx=00000000 edx=00000000 esi=456b68b8 edi=46929d50
000e:trace:seh:__regs_RtlRaiseException  ebp=456b6880 esp=456b6598 cs=0073 ds=007b es=007b fs=003b gs=0033 flags=00010246
000e:Call ntdll.RtlEnterCriticalSection(4148f460) ret=41440765
000e:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=41440765
000e:Call ntdll.RtlLeaveCriticalSection(4148f460) ret=414407a6
000e:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=414407a6
000e:trace:seh:EXC_CallHandler calling handler at 0x113f6cae code=c0000005 flags=0

...

Unhandled exception: page fault on read access to 0x00000000 in 32-bit code (0x1133572a).


Backtrace:
=>1 0x1133572a in snoopy (+0x18572a) (0x456b6880)
  2 0x11337e52 in snoopy (+0x187e52) (0x00000000)

0x1133572a: movl   0x0(%ebx),%ecx

Modules:
Module	Address			Debug info	Name (140 modules)
PE	0x111b0000-1149b000	Export          snoopy 

Threads:
process  tid      prio (all id:s are in hex)
	00000016    0
	00000015    0
	00000014    0
	00000012    0
	00000010    0
	0000000f    0
	0000000e    0 <==
	0000000d    0
	0000000c    0
	0000000b    0
	0000000a    0
	00000009    0


More information about the wine-devel mailing list