Unfortunately I don't know how to debug using a Dr. Watson dump but I do know of a free memory testing utility called MemTest86 (http://www.memtest86.com/). Sorry if I wasn't too much of a help.
-Pete
On Sat, 2004-01-10 at 17:06, Gunter Sammet wrote:
I have 4.3.5-dev (Build Dec-22-2003) installed on a W2K Dell Inspiron 7500 and I am getting an error which I don't get with 4.1.1 and 4.3.4. Would like to learn how to debug things like that. Here is a dump of Dr. Watson: Application exception occurred: App: (pid=2228) When: 1/10/2004 @ 14:51:33.711 Exception number: c0000005 (access violation) *----> System Information <----* Computer Name: DELL User Name: Administrator Number of Processors: 1 Processor Type: x86 Family 6 Model 8 Stepping 3 Windows 2000 Version: 5.0 Current Build: 2195 Service Pack: 4 Current Type: Uniprocessor Free Registered Organization: SammySolutions.com ltd. Registered Owner: Gunter Sammet *----> Task List <----* 0 Idle.exe 8 System.exe 148 smss.exe 172 csrss.exe 168 winlogon.exe 220 services.exe 232 lsass.exe 384 svchost.exe 436 svchost.exe 488 spoolsv.exe 512 ati2plab.exe 536 ibserver.exe 580 APACHE.exe 708 regsvc.exe 728 MSTask.exe 732 APACHE.exe 968 snmp.exe 1028 stisvc.exe 1060 vsmon.exe 1112 WinMgmt.exe 1136 svchost.exe 1164 svchost.exe 120 Explorer.exe 1460 jusched.exe 1448 interserver.exe 1440 Atiptaxx.exe 1420 EM_EXEC.exe 1392 zapro.exe 640 internat.exe 1512 AirPlus.exe 1520 trillian.exe 1760 mysqld-nt.exe 1796 PostCastServer..exe 1820 gcdnssrv.exe 1860 OUTLOOK.exe 996 IEXPLORE.exe 1916 IEXPLORE.exe 1980 IEXPLORE.exe 2020 IEXPLORE.exe 2060 IEXPLORE.exe 2100 IEXPLORE.exe 2184 PHPEdit.exe 2200 DBGLIS~1.exe 2168 IEXPLORE.exe 2280 IEXPLORE.exe 2192 IEXPLORE.exe 1084 APACHE.exe 1020 APACHE.exe 2228 php.exe 1532 drwtsn32.exe 0 _Total.exe (00400000 - 0040D000) (77F80000 - 77FFB000) (10000000 - 10150000) (7C4E0000 - 7C599000) (77E10000 - 77E75000) (77F40000 - 77F7C000) (75050000 - 75058000) (75030000 - 75044000) (78000000 - 78045000) (7C2D0000 - 7C332000) (77D30000 - 77D9E000) (75020000 - 75028000) (77A50000 - 77B3C000) (779B0000 - 77A4B000) (1F7C0000 - 1F7F4000) (76B30000 - 76B6E000) (63180000 - 631E5000) (71710000 - 71794000) (782F0000 - 78538000) (00CC0000 - 00CD6000) (6E420000 - 6E426000) (75E60000 - 75E7A000) (782C0000 - 782CC000) (77980000 - 779A4000) (77340000 - 77353000) (77520000 - 77525000) (77320000 - 77337000) (75150000 - 7515F000) (75170000 - 751BF000) (7C340000 - 7C34F000) (751C0000 - 751C6000) (77950000 - 7797A000) (773B0000 - 773DF000) (77380000 - 773A3000) (77830000 - 7783E000) (77880000 - 7790E000) (7C0F0000 - 7C152000) (774E0000 - 77513000) (774C0000 - 774D1000) (77530000 - 77552000) (77360000 - 77379000) (777E0000 - 777E8000) (777F0000 - 777F5000) (74FD0000 - 74FEE000) (75010000 - 75017000) State Dump for Thread Id 0x738 eax=00000001 ebx=00000005 ecx=00000098 edx=00794010 esi=0012fd18 edi=00ce0000 eip=77fcc2e2 esp=0012fb0c ebp=0012fca4 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 function: RtlAllocateHeap 77fcc2ca 51 push ecx 77fcc2cb 51 push ecx 77fcc2cc 81ec74010000 sub esp,0x174 77fcc2d2 53 push ebx 77fcc2d3 56 push esi 77fcc2d4 57 push edi 77fcc2d5 8b7d08 mov edi,[ebp+0x8] ss:00bd9b8a=???????? 77fcc2d8 897da4 mov [ebp+0xa4],edi ss:00bd9b8a=???????? 77fcc2db 8065b800 and byte ptr [ebp+0xb8],0x0 ss:00bd9b8a=?? 77fcc2df 8b450c mov eax,[ebp+0xc] ss:00bd9b8a=???????? FAULT ->77fcc2e2 0b4710 or eax,[edi+0x10] ds:01789ee6=???????? 77fcc2e5 89450c mov [ebp+0xc],eax ss:00bd9b8a=???????? 77fcc2e8 a9600f037d test eax,0x7d030f60 77fcc2ed 0f856aeeffff jne _eFSQRT+0xe93 (77fcb15d) 77fcc2f3 817d1000000080 ss:00bd9b8a=???????? cmp dword ptr [ebp+0x10],0x80000000 77fcc2fa 0f835deeffff jnb _eFSQRT+0xe93 (77fcb15d) 77fcc300 837d1000 cmp dword ptr [ebp+0x10],0x0 ss:00bd9b8a=???????? 77fcc304 0f8424f8ffff je RtlSizeHeap+0x228 (77fcbb2e) 77fcc30a 8b4510 mov eax,[ebp+0x10] ss:00bd9b8a=???????? 77fcc30d 83c00f add eax,0xf 77fcc310 24f8 and al,0xf8 77fcc312 8945e0 mov [ebp+0xe0],eax ss:00bd9b8a=???????? *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0012FCA4 100C03A2 00CE0000 00000001 00000098 00000080 ntdll!RtlAllocateHeap 00000081 00000000 00000000 00000000 00000000 00000000 !emalloc *----> Raw Stack Dump <----* 0012fb0c b8 3e 79 00 18 fd 12 00 - 05 00 00 00 80 7d 13 00 .>y..........}.. 0012fb1c 00 00 00 00 c8 fb 12 00 - d7 c8 fc 77 00 00 13 00 ...........w.... 0012fb2c c0 c9 fc 77 08 06 13 00 - 25 c9 fc 77 8c 7d 13 00 ...w....%..w.}.. 0012fb3c e8 b6 b2 77 00 00 00 00 - ce 47 f8 77 28 b3 b2 77 ...w.....G.w(..w 0012fb4c 00 00 00 00 00 00 00 00 - 00 00 00 00 28 ba b2 77 ............(..w 0012fb5c 70 a3 15 00 b0 fa 12 00 - 58 a3 15 00 78 01 13 00 p.......X...x... 0012fb6c 70 d3 15 00 78 01 13 00 - 78 01 13 00 68 d3 15 00 p...x...x...h... 0012fb7c 88 01 13 00 88 01 13 00 - 00 00 00 00 04 00 00 00 ................ 0012fb8c 88 01 13 00 54 57 f9 77 - f8 7b f8 77 90 f1 fc 77 ....TW.w.{.w...w 0012fb9c dd 7b f8 77 18 69 13 00 - f8 68 13 00 38 c1 b2 77 .{.w.i...h..8..w 0012fbac 00 00 00 00 00 00 00 00 - f4 fb 12 00 91 81 f9 77 ...............w 0012fbbc 00 90 00 00 00 00 d2 00 - 04 fc 12 00 74 7c f8 77 ............t|.w 0012fbcc 06 00 00 00 e8 fb 12 00 - 21 cf fc 77 01 00 00 00 ........!..w.... 0012fbdc 00 f0 d5 00 01 00 00 00 - 00 f0 d5 00 00 00 79 00 ..............y. 0012fbec 78 01 79 00 f8 c0 fc 77 - 00 00 79 00 00 f0 d5 00 x.y....w..y..... 0012fbfc 00 30 00 00 00 00 d2 00 - 00 00 37 01 c0 0f 00 00 .0........7..... 0012fc0c f8 01 00 00 28 fc 12 00 - 21 cf fc 77 01 00 00 00 ....(...!..w.... 0012fc1c 00 60 d7 00 01 00 00 00 - 00 60 d7 00 00 00 79 00 .`.......`....y. 0012fc2c 78 01 79 00 f8 c0 fc 77 - 00 00 79 00 00 60 d7 00 x.y....w..y..`.. 0012fc3c 00 00 37 01 90 fc 12 00 - 78 01 79 00 00 00 ce 00 ..7.....x.y..... State Dump for Thread Id 0x560 eax=0113fc9c ebx=00000004 ecx=0113ffdc edx=00000000 esi=77f93233 edi=00000004 eip=77f9323e esp=0113fd24 ebp=0113fd70 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 function: NtWaitForMultipleObjects 77f93233 b8e9000000 mov eax,0xe9 77f93238 8d542404 lea edx,[esp+0x4] ss:01be9c0b=???????? 77f9323c cd2e int 2e 77f9323e c21400 ret 0x14 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0113FD70 7C4FABFB 0113FD48 00000001 00000000 00000000 ntdll!NtWaitForMultipleObjects 0113FFB4 7C4E987C 00000005 000B000A 7C2D02A7 00158B10 kernel32!WaitForMultipleObjects 0113FFEC 00000000 778321FE 00158B10 00000000 000000C8 kernel32!SetThreadExecutionState *----> Raw Stack Dump <----* 0113fd24 d7 bd 4e 7c 04 00 00 00 - 48 fd 13 01 01 00 00 00 ..N|....H....... 0113fd34 00 00 00 00 00 00 00 00 - 01 00 00 00 10 8b 15 00 ................ 0113fd44 01 00 00 00 24 03 00 00 - 20 03 00 00 10 03 00 00 ....$... ....... 0113fd54 a4 02 00 00 ff ff ff ff - d0 fa f9 be 3d 16 45 80 ............=.E. 0113fd64 30 90 74 82 00 00 00 00 - 00 e4 46 80 b4 ff 13 01 0.t.......F..... 0113fd74 fb ab 4f 7c 48 fd 13 01 - 01 00 00 00 00 00 00 00 ..O|H........... 0113fd84 00 00 00 00 00 00 00 00 - b2 22 83 77 04 00 00 00 .........".w.... 0113fd94 b0 fe 13 01 00 00 00 00 - ff ff ff ff 10 8b 15 00 ................ 0113fda4 a7 02 2d 7c 0a 00 0b 00 - 18 90 74 82 68 55 7c 82 ..-|......t.hU|. 0113fdb4 00 00 00 00 00 00 00 00 - 01 00 00 00 38 00 00 00 ............8... 0113fdc4 23 00 00 00 23 00 00 00 - 0a 00 0b 00 a7 02 2d 7c #...#.........-| 0113fdd4 10 8b 15 00 68 02 2d 7c - 4c 00 00 00 fe 21 83 77 ....h.-|L....!.w 0113fde4 f8 eb fd 7f 24 98 4e 7c - 1b 00 00 00 00 02 00 00 ....$.N|........ 0113fdf4 fc ff 13 01 23 00 00 00 - c0 00 00 00 48 de 12 82 ....#.......H... 0113fe04 3f 1a 01 00 e8 95 99 82 - 00 07 00 00 4c d1 44 80 ?...........L.D. 0113fe14 3f 1a 01 00 e8 95 99 82 - 3f 1a 01 00 e8 95 99 82 ?.......?....... 0113fe24 01 c2 fd 7f 37 04 00 00 - f1 da 44 80 37 04 00 00 ....7.....D.7... 0113fe34 30 fa 0d 82 00 c0 fd 7f - fc 07 30 c0 00 00 00 00 0.........0..... 0113fe44 08 7c 74 82 37 04 00 00 - 98 fb f9 be 00 00 00 00 .|t.7........... 0113fe54 01 00 00 00 00 00 00 00 - 00 d0 fd 7f fc 07 30 c0 ..............0. Somebody else out there who had this problem? What's the best way to debug something like that? Any pointers are appreciated. TIA Gunter
-- perl -e 'print pack("H*", "70766572746573406E79632E72722E636F6D0A")' |
signature.asc
Description: This is a digitally signed message part