delorie.com/archives/browse.cgi   search  
Mail Archives: djgpp/1995/05/30/03:40:10

Date: Tue, 30 May 1995 13:48:05 +0800 (WST)
From: Shri Rai <smr AT cs DOT murdoch DOT edu DOT au>
Subject: Re: DJGPP crashes
To: Eli Zaretskii <eliz AT is DOT elta DOT co DOT il>
Cc: djgpp AT sun DOT soe DOT clarkson DOT edu


On Mon, 29 May 1995, Eli Zaretskii wrote:

> Do I understand correctly that the error message and the stack dump at
> crash are identical both with and without ``2rm 2r1''?  

I didn't check the values of each register. The error messages (when
running gcc) are the same in that the "unsupported in 0x06" is always
there (except cc1). The "invalid opcode at eip=bcc7" is also always there
(except ccc1). 

>If not, can you
> post the messages which you see without the above redirection parameters
> (using one of the methods suggested in the FAQ instead)?
> 

The environment settings and the corefile are shown below. The programs 
run are gcc -v, gcc, cc1, info  - in the order shown.

As shown in the dump for cc1, the error is different - Segmentation
violation in pointer 0x0046e66c at d8:b4cd5. The unsupported int 0x06
error message is not given for cc1. For the other programs run, the
unsupported int 0x06 error message is there. 


Shri

COMSPEC=C:\COMMAND.COM
PROMPT=$p$g
PATH=C:\BAT;C:\BIN;C:\UNIXBIN;C:\DOS;C:\FPROT;C:\DJGPP\BIN;
TEMP=c:\temp
DJGPP=C:/djgpp/djgpp.env
TMPDIR=c:/tmp
GO32TMP=C:/tmp
GO32=EMU C:/djgpp/bin/emu387 topline core corefile

====================
Invalid Opcode at eip=bcc7
eax=2fcb2bbc ebx=7ffffd5c ecx=00000000 edx=7ffff930 esi=7ffff9b8 edi=0000bbbb
ebp=7ffffd38 esp=7ffff99c cs=d8 ds=48 es=48 fs=48 gs=38 ss=48 cr2=0000ed60
Call frame traceback EIPs:
  0x0000bcc7
  0x0000c318
  0x0000c3ab
  0x00004450
  0x000094fe

Contents of stack:
  stack[0x7ffff99c] = 0x00000007	  stack[0x7ffff99e] = 0xfd5c0000
  stack[0x7ffff9a0] = 0x7ffffd5c	  stack[0x7ffff9a2] = 0xb0067fff
  stack[0x7ffff9a4] = 0x0001b006	  stack[0x7ffff9a6] = 0xb0040001
  stack[0x7ffff9a8] = 0x0001b004	  stack[0x7ffff9aa] = 0xb00d0001
  stack[0x7ffff9ac] = 0x0001b00d	  stack[0x7ffff9ae] = 0xf9b40001
  stack[0x7ffff9b0] = 0x7ffff9b4	  stack[0x7ffff9b2] = 0x3a637fff
  stack[0x7ffff9b4] = 0x742f3a63	  stack[0x7ffff9b6] = 0x706d742f
  stack[0x7ffff9b8] = 0x632f706d	  stack[0x7ffff9ba] = 0x3063632f
  stack[0x7ffff9bc] = 0x30303063	  stack[0x7ffff9be] = 0x35303030
  stack[0x7ffff9c0] = 0x00333530	  stack[0x7ffff9c2] = 0x00000033
  stack[0x7ffff9c4] = 0x00000000	  stack[0x7ffff9c6] = 0x00000000
  stack[0x7ffff9c8] = 0x00000000	  stack[0x7ffff9ca] = 0x00000000
  stack[0x7ffff9cc] = 0x00000000	  stack[0x7ffff9ce] = 0x00000000
  stack[0x7ffff9d0] = 0x00000000	  stack[0x7ffff9d2] = 0x00000000
  stack[0x7ffff9d4] = 0x00000000	  stack[0x7ffff9d6] = 0x00000000
  stack[0x7ffff9d8] = 0x00000000	  stack[0x7ffff9da] = 0x00000000
  stack[0x7ffff9dc] = 0x00000000	  stack[0x7ffff9de] = 0x00000000
  stack[0x7ffff9e0] = 0x00000000	  stack[0x7ffff9e2] = 0x00000000
  stack[0x7ffff9e4] = 0x00000000	  stack[0x7ffff9e6] = 0x00000000
  stack[0x7ffff9e8] = 0x00000000	  stack[0x7ffff9ea] = 0x00000000

====================
Invalid Opcode at eip=bcc7
eax=2fcb2bc4 ebx=7ffffd64 ecx=00000000 edx=7ffff938 esi=7ffff9c0 edi=0000bbbb
ebp=7ffffd40 esp=7ffff9a4 cs=d8 ds=48 es=48 fs=48 gs=38 ss=48 cr2=0000ed68
Call frame traceback EIPs:
  0x0000bcc7
  0x0000c318
  0x0000c3ab
  0x00004450
  0x000094fe

Contents of stack:
  stack[0x7ffff9a4] = 0x00000007	  stack[0x7ffff9a6] = 0xfd640000
  stack[0x7ffff9a8] = 0x7ffffd64	  stack[0x7ffff9aa] = 0xb0067fff
  stack[0x7ffff9ac] = 0x0001b006	  stack[0x7ffff9ae] = 0xb0040001
  stack[0x7ffff9b0] = 0x0001b004	  stack[0x7ffff9b2] = 0xb00d0001
  stack[0x7ffff9b4] = 0x0001b00d	  stack[0x7ffff9b6] = 0xf9bc0001
  stack[0x7ffff9b8] = 0x7ffff9bc	  stack[0x7ffff9ba] = 0x3a637fff
  stack[0x7ffff9bc] = 0x742f3a63	  stack[0x7ffff9be] = 0x706d742f
  stack[0x7ffff9c0] = 0x632f706d	  stack[0x7ffff9c2] = 0x3063632f
  stack[0x7ffff9c4] = 0x30303063	  stack[0x7ffff9c6] = 0x35303030
  stack[0x7ffff9c8] = 0x00333530	  stack[0x7ffff9ca] = 0x00000033
  stack[0x7ffff9cc] = 0x00000000	  stack[0x7ffff9ce] = 0x00000000
  stack[0x7ffff9d0] = 0x00000000	  stack[0x7ffff9d2] = 0x00000000
  stack[0x7ffff9d4] = 0x00000000	  stack[0x7ffff9d6] = 0x00000000
  stack[0x7ffff9d8] = 0x00000000	  stack[0x7ffff9da] = 0x00000000
  stack[0x7ffff9dc] = 0x00000000	  stack[0x7ffff9de] = 0x00000000
  stack[0x7ffff9e0] = 0x00000000	  stack[0x7ffff9e2] = 0x00000000
  stack[0x7ffff9e4] = 0x00000000	  stack[0x7ffff9e6] = 0x00000000
  stack[0x7ffff9e8] = 0x00000000	  stack[0x7ffff9ea] = 0x00000000
  stack[0x7ffff9ec] = 0x00000000	  stack[0x7ffff9ee] = 0x00000000
  stack[0x7ffff9f0] = 0x00000000	  stack[0x7ffff9f2] = 0x00000000

====================
NOTE: cc1 program. The error is different - Segmentation violation in 
pointer 0x0046e66c at d8:b4cd5.

eax=0011b98c ebx=0000003c ecx=0011c0e4 edx=0000012c esi=0011c0d4 edi=00000005
ebp=7ffffe54 esp=7ffffe14 cs=d8 ds=48 es=48 fs=48 gs=38 ss=48 cr2=0000e66c
Call frame traceback EIPs:
  0x000b4cd5
  0x0002c623

Contents of stack:
  stack[0x7ffffe14] = 0x7ffffea4	  stack[0x7ffffe16] = 0x00007fff
  stack[0x7ffffe18] = 0x00000000	  stack[0x7ffffe1a] = 0xfecd0000
  stack[0x7ffffe1c] = 0x7ffffecd	  stack[0x7ffffe1e] = 0xc0e47fff
  stack[0x7ffffe20] = 0x0011c0e4	  stack[0x7ffffe22] = 0x03840011
  stack[0x7ffffe24] = 0x00000384	  stack[0x7ffffe26] = 0xc10c0000
  stack[0x7ffffe28] = 0x0011c10c	  stack[0x7ffffe2a] = 0x03840011
  stack[0x7ffffe2c] = 0x00000384	  stack[0x7ffffe2e] = 0x03840000
  stack[0x7ffffe30] = 0x00000384	  stack[0x7ffffe32] = 0xc10c0000
  stack[0x7ffffe34] = 0x0011c10c	  stack[0x7ffffe36] = 0x003c0011
  stack[0x7ffffe38] = 0x0000003c	  stack[0x7ffffe3a] = 0x00010000
  stack[0x7ffffe3c] = 0x00000001	  stack[0x7ffffe3e] = 0xfffc0000
  stack[0x7ffffe40] = 0xfffffffc	  stack[0x7ffffe42] = 0xfe90ffff
  stack[0x7ffffe44] = 0x7ffffe90	  stack[0x7ffffe46] = 0xc4ca7fff
  stack[0x7ffffe48] = 0x0002c4ca	  stack[0x7ffffe4a] = 0x00000002
  stack[0x7ffffe4c] = 0xfffe0000	  stack[0x7ffffe4e] = 0x0001fffe
  stack[0x7ffffe50] = 0x00000001	  stack[0x7ffffe52] = 0xfe900000
  stack[0x7ffffe54] = 0x7ffffe90	  stack[0x7ffffe56] = 0xc6237fff
  stack[0x7ffffe58] = 0x0002c623	  stack[0x7ffffe5a] = 0xfea40002
  stack[0x7ffffe5c] = 0x7ffffea4	  stack[0x7ffffe5e] = 0x00007fff
  stack[0x7ffffe60] = 0x00000000	  stack[0x7ffffe62] = 0x00000000

====================
Invalid Opcode at eip=1739a
eax=7ffffd2d ebx=00007ffe ecx=0001045c edx=0000002d esi=00031005 edi=7ffffd84
ebp=7ffffd4c esp=7ffffb80 cs=d8 ds=48 es=48 fs=48 gs=38 ss=48 cr2=00001000
Call frame traceback EIPs:
  0x0001739a
  0x00016889
  0x0001065a
  0x0000fe67
  0x0000a458
  0x0000a093
  0x00009e07
  0x000060fa

Contents of stack:
  stack[0x7ffffb80] = 0x00031004	  stack[0x7ffffb82] = 0xf0840003
  stack[0x7ffffb84] = 0x0001f084	  stack[0x7ffffb86] = 0x01040001
  stack[0x7ffffb88] = 0x00020104	  stack[0x7ffffb8a] = 0x00000002
  stack[0x7ffffb8c] = 0x00000000	  stack[0x7ffffb8e] = 0x00000000
  stack[0x7ffffb90] = 0x00000000	  stack[0x7ffffb92] = 0x00000000
  stack[0x7ffffb94] = 0x00000000	  stack[0x7ffffb96] = 0x00000000
  stack[0x7ffffb98] = 0x00000000	  stack[0x7ffffb9a] = 0x00000000
  stack[0x7ffffb9c] = 0x00000000	  stack[0x7ffffb9e] = 0x00000000
  stack[0x7ffffba0] = 0x00000000	  stack[0x7ffffba2] = 0x00000000
  stack[0x7ffffba4] = 0x00000000	  stack[0x7ffffba6] = 0x00000000
  stack[0x7ffffba8] = 0x00000000	  stack[0x7ffffbaa] = 0x00000000
  stack[0x7ffffbac] = 0x00000000	  stack[0x7ffffbae] = 0x00000000
  stack[0x7ffffbb0] = 0x00000000	  stack[0x7ffffbb2] = 0x00000000
  stack[0x7ffffbb4] = 0x00000000	  stack[0x7ffffbb6] = 0x00000000
  stack[0x7ffffbb8] = 0x00000000	  stack[0x7ffffbba] = 0x72bb0000
  stack[0x7ffffbbc] = 0x000172bb	  stack[0x7ffffbbe] = 0x00000001
  stack[0x7ffffbc0] = 0x00000000	  stack[0x7ffffbc2] = 0x00000000
  stack[0x7ffffbc4] = 0x00000000	  stack[0x7ffffbc6] = 0x00000000
  stack[0x7ffffbc8] = 0x00000000	  stack[0x7ffffbca] = 0x00000000
  stack[0x7ffffbcc] = 0x00000000	  stack[0x7ffffbce] = 0x00000000


- Raw text -


  webmaster     delorie software   privacy  
  Copyright © 2019   by DJ Delorie     Updated Jul 2019