On Wed, Dec 01, 2004, Gerrit P. Haase wrote:

> have you already tried to run the crashing application with
> dependency walker?  http://www.dependencywalker.com/

No, I was not familiar with this tool.  I've attached the profile
output for an invocation of "readlink.exe".

-- Dave


--------------------------------------------------------------------------------
Starting profile on 12/1/2004 at 2:26:43 PM

Operating System: Microsoft Windows XP Professional (32-bit), version 5.01.2600 
Service Pack 2
Program Executable: c:\local\cygwin\bin\READLINK.EXE
Program Arguments: 
Starting Directory: C:\local\cygwin\bin\
Search Path: c:\program 
files\graphicsmagick-1.1.3-q8;C:\oracle\ora9i\bin;C:\Program 
Files\Oracle\jre\1.3.1\bin;C:\Program 
Files\Oracle\jre\1.1.8\bin;C:\WINDOWS\SYSTEM32;C:\WINDOWS;C:\WINDOWS\SYSTEM32\WBEM;C:\PROGRAM
 FILES\COMMON FILES\ADAPTEC SHARED\SYSTEM;C:\DMI\WIN32\BIN;C:\Tcl\bin

Options Selected:
     Simulate ShellExecute by inserting any App Paths directories into the PATH 
environment variable.
     Log DllMain calls for process attach and process detach messages.
     Log DllMain calls for all other messages, including thread attach and 
thread detach.
     Hook the process to gather more detailed dependency information.
     Log LoadLibrary function calls.
     Log GetProcAddress function calls.
     Log thread information.
     Use simple thread numbers instead of actual thread IDs.
     Log first chance exceptions.
     Log debug output messages.
     Automatically open and profile child processes.
--------------------------------------------------------------------------------

Started "READLINK.EXE" (process 0x5C0) at address 0x00400000 by thread 1.  
Successfully hooked module.
Loaded "NTDLL.DLL" at address 0x7C900000 by thread 1.  Successfully hooked 
module.
Loaded "KERNEL32.DLL" at address 0x7C800000 by thread 1.  Successfully hooked 
module.
DllMain(0x7C900000, DLL_PROCESS_ATTACH, 0x00000000) in "NTDLL.DLL" called by 
thread 1.
DllMain(0x7C900000, DLL_PROCESS_ATTACH, 0x00000000) in "NTDLL.DLL" returned 1 
(0x1) by thread 1.
DllMain(0x7C800000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNEL32.DLL" called by 
thread 1.
DllMain(0x7C800000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNEL32.DLL" returned 
1 (0x1) by thread 1.
Injected "DEPENDS.DLL" at address 0x08370000 by thread 1.
DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "DEPENDS.DLL" called by 
thread 1.
DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "DEPENDS.DLL" returned 1 
(0x1) by thread 1.
Loaded "CYGWIN1.DLL" at address 0x61000000 by thread 1.  Successfully hooked 
module.
Loaded "ADVAPI32.DLL" at address 0x77DD0000 by thread 1.  Successfully hooked 
module.
Loaded "RPCRT4.DLL" at address 0x77E70000 by thread 1.  Successfully hooked 
module.
DllMain(0x77E70000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "RPCRT4.DLL" called by 
thread 1.
DllMain(0x77E70000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "RPCRT4.DLL" returned 1 
(0x1) by thread 1.
DllMain(0x77DD0000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "ADVAPI32.DLL" called by 
thread 1.
DllMain(0x77DD0000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "ADVAPI32.DLL" returned 
1 (0x1) by thread 1.
DllMain(0x61000000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "CYGWIN1.DLL" called by 
thread 1.
Thread 2 started in "KERNEL32.DLL" at address 0x7C810856.
LoadLibraryA("advapi32") called from "CYGWIN1.DLL" at address 0x610012B9 by 
thread 1.
LoadLibraryA("advapi32") returned 0x77DD0000 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "InitializeSecurityDescriptor") 
called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD778E by 
thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "SetSecurityDescriptorDacl") called 
from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD77B3 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "LookupPrivilegeValueA") called from 
"CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD11B by thread 1.
LoadLibraryW("rpcrt4.dll") called from "RPCRT4.DLL" at address 0x77E9FAF5 by 
thread 1.
LoadLibraryW("rpcrt4.dll") returned 0x77E70000 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "OpenProcessToken") called from 
"CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7753 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "AdjustTokenPrivileges") called from 
"CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFC534 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetUserNameA") called from 
"CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD4C9 by thread 1.
LoadLibraryA("Secur32.dll") called from "ADVAPI32.DLL" at address 0x77DF97AE by 
thread 1.
Loaded "SECUR32.DLL" at address 0x77FE0000 by thread 1.  Successfully hooked 
module.
DllMain(0x77FE0000, DLL_PROCESS_ATTACH, 0x00000000) in "SECUR32.DLL" called by 
thread 1.
DllMain(0x77FE0000, DLL_PROCESS_ATTACH, 0x00000000) in "SECUR32.DLL" returned 1 
(0x1) by thread 1.
LoadLibraryA("Secur32.dll") returned 0x77FE0000 by thread 1.
GetProcAddress(0x77FE0000 [SECUR32.DLL], "GetUserNameExA") called from 
"ADVAPI32.DLL" at address 0x77DF9803 and returned 0x77FE1DD4 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetTokenInformation") called from 
"CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7B76 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "SetTokenInformation") called from 
"CYGWIN1.DLL" at address 0x6100122E and returned 0x77E0C80F by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "InitializeAcl") called from 
"CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7AD1 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "AddAccessAllowedAce") called from 
"CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7AF9 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "FindFirstFreeAce") called from 
"CYGWIN1.DLL" at address 0x6100122E and returned 0x77E0D13C by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSecurityDescriptorDacl") called 
from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7C58 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "SetKernelObjectSecurity") called 
from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD1BD by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "RegCreateKeyExA") called from 
"CYGWIN1.DLL" at address 0x6100122E and returned 0x77DDEAF4 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "RegQueryValueExA") called from 
"CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7883 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSidIdentifierAuthority") called 
from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD4B0 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSidSubAuthorityCount") called 
from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DF986B by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSidSubAuthority") called from 
"CYGWIN1.DLL" at address 0x6100122E and returned 0x77DF9839 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "RegEnumKeyExA") called from 
"CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFC8C1 by thread 1.
DllMain(0x61000000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "CYGWIN1.DLL" returned 1 
(0x1) by thread 1.
DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" called by 
thread 2.
DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" returned 1 
(0x1) by thread 2.
DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" called by 
thread 2.
DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" returned 1 
(0x1) by thread 2.
DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" called by 
thread 2.
DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" returned 1 
(0x1) by thread 2.
DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" called by 
thread 2.
DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" returned 
6683649 (0x65FC01) by thread 2.
DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" called by 
thread 2.
DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" returned 
4294967041 (0xFFFFFF01) by thread 2.
DllMain(0x61000000, DLL_THREAD_DETACH, 0x00000000) in "CYGWIN1.DLL" called by 
thread 2.
DllMain(0x61000000, DLL_THREAD_DETACH, 0x00000000) in "CYGWIN1.DLL" returned 1 
(0x1) by thread 2.
DllMain(0x77DD0000, DLL_THREAD_DETACH, 0x00000000) in "ADVAPI32.DLL" called by 
thread 2.
DllMain(0x77DD0000, DLL_THREAD_DETACH, 0x00000000) in "ADVAPI32.DLL" returned 1 
(0x1) by thread 2.
DllMain(0x77E70000, DLL_THREAD_DETACH, 0x00000000) in "RPCRT4.DLL" called by 
thread 2.
DllMain(0x77E70000, DLL_THREAD_DETACH, 0x00000000) in "RPCRT4.DLL" returned 
2147344385 (0x7FFDE001) by thread 2.
DllMain(0x7C800000, DLL_THREAD_DETACH, 0x00000000) in "KERNEL32.DLL" called by 
thread 2.
DllMain(0x7C800000, DLL_THREAD_DETACH, 0x00000000) in "KERNEL32.DLL" returned 
2147344385 (0x7FFDE001) by thread 2.
DllMain(0x7C900000, DLL_THREAD_DETACH, 0x00000000) in "NTDLL.DLL" called by 
thread 2.
DllMain(0x7C900000, DLL_THREAD_DETACH, 0x00000000) in "NTDLL.DLL" returned 1 
(0x1) by thread 2.
Thread 2 exited with code 0 (0x0).
LoadLibraryA("kernel32") called from "CYGWIN1.DLL" at address 0x610012B9 by 
thread 1.
LoadLibraryA("kernel32") returned 0x7C800000 by thread 1.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "IsDebuggerPresent") called from 
"CYGWIN1.DLL" at address 0x6100122E and returned 0x7C812E03 by thread 1.
cYgFFFFFFFF 610F7C24
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "CopySid") called from "CYGWIN1.DLL" 
at address 0x6100122E and returned 0x77DFC304 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "InitializeSid") called from 
"CYGWIN1.DLL" at address 0x6100122E and returned 0x77DF8CBB by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "EqualSid") called from "CYGWIN1.DLL" 
at address 0x6100122E and returned 0x77DD7EE4 by thread 1.
Thread 3 started in "KERNEL32.DLL" at address 0x7C810856.
DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" called by 
thread 3.
DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" returned 1 
(0x1) by thread 3.
DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" called by 
thread 3.
DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" returned 1 
(0x1) by thread 3.
DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" called by 
thread 3.
DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" returned 1 
(0x1) by thread 3.
DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" called by 
thread 3.
DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" returned 
6683649 (0x65FC01) by thread 3.
DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" called by 
thread 3.
DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" returned 
4294967041 (0xFFFFFF01) by thread 3.
First chance exception 0xC0000005 (Access Violation) occurred in "NTDLL.DLL" at 
address 0x7C928E22 by thread 3.
Second chance exception 0xC0000005 (Access Violation) occurred in "NTDLL.DLL" 
at address 0x7C928E22 by thread 3.
Thread 3 exited with code -1073741819 (0xC0000005).
Exited "READLINK.EXE" (process 0x5C0) with code -1073741819 (0xC0000005) by 
thread 1.
Entrypoint reached. All implicit modules have been loaded.

--
Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple
Problem reports:       http://cygwin.com/problems.html
Documentation:         http://cygwin.com/docs.html
FAQ:                   http://cygwin.com/faq/

Reply via email to