delorie.com/archives/browse.cgi   search  
Mail Archives: cygwin/2004/12/01/17:56:09

Mailing-List: contact cygwin-help AT cygwin DOT com; run by ezmlm
List-Subscribe: <mailto:cygwin-subscribe AT cygwin DOT com>
List-Archive: <http://sourceware.org/ml/cygwin/>
List-Post: <mailto:cygwin AT cygwin DOT com>
List-Help: <mailto:cygwin-help AT cygwin DOT com>, <http://sourceware.org/ml/#faqs>
Sender: cygwin-owner AT cygwin DOT com
Mail-Followup-To: cygwin AT cygwin DOT com
Delivered-To: mailing list cygwin AT cygwin DOT com
Date: Wed, 1 Dec 2004 14:53:23 -0800
From: David Hinds <dhinds AT sonic DOT net>
To: Cygwin List <cygwin AT cygwin DOT com>
Subject: Re: A vexing installation problem
Message-ID: <20041201225323.GA3821@sonic.net>
References: <6 DOT 2 DOT 0 DOT 14 DOT 0 DOT 20041129151309 DOT 046bfba0 AT pop DOT prospeed DOT net> <20041129215220 DOT GA15085 AT sonic DOT net> <6 DOT 2 DOT 0 DOT 14 DOT 0 DOT 20041129171109 DOT 046d1728 AT pop DOT prospeed DOT net> <20041129231740 DOT GA32760 AT sonic DOT net> <6 DOT 2 DOT 0 DOT 14 DOT 0 DOT 20041129181904 DOT 046bf960 AT pop DOT prospeed DOT net> <20041130011421 DOT GA20359 AT sonic DOT net> <20041130170757 DOT GA3861 AT sonic DOT net> <20041130192952 DOT GA2722 AT sonic DOT net> <20041201184434 DOT GA7909 AT sonic DOT net> <20041201185404 DOT GA10032 AT sonic DOT net>
Mime-Version: 1.0
In-Reply-To: <20041201185404.GA10032@sonic.net>
User-Agent: Mutt/1.4.2i

--fdj2RfSjLxBAspz7
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

On Wed, Dec 01, 2004, Gerrit P. Haase wrote:

> have you already tried to run the crashing application with
> dependency walker?  http://www.dependencywalker.com/

No, I was not familiar with this tool.  I've attached the profile
output for an invocation of "readlink.exe".

-- Dave



--fdj2RfSjLxBAspz7
Content-Type: text/plain; charset=us-ascii
Content-Disposition: attachment; filename="profile.out"

--------------------------------------------------------------------------------
Starting profile on 12/1/2004 at 2:26:43 PM

Operating System: Microsoft Windows XP Professional (32-bit), version 5.01.2600 Service Pack 2
Program Executable: c:\local\cygwin\bin\READLINK.EXE
Program Arguments: 
Starting Directory: C:\local\cygwin\bin\
Search Path: c:\program files\graphicsmagick-1.1.3-q8;C:\oracle\ora9i\bin;C:\Program Files\Oracle\jre\1.3.1\bin;C:\Program Files\Oracle\jre\1.1.8\bin;C:\WINDOWS\SYSTEM32;C:\WINDOWS;C:\WINDOWS\SYSTEM32\WBEM;C:\PROGRAM FILES\COMMON FILES\ADAPTEC SHARED\SYSTEM;C:\DMI\WIN32\BIN;C:\Tcl\bin

Options Selected:
     Simulate ShellExecute by inserting any App Paths directories into the PATH environment variable.
     Log DllMain calls for process attach and process detach messages.
     Log DllMain calls for all other messages, including thread attach and thread detach.
     Hook the process to gather more detailed dependency information.
     Log LoadLibrary function calls.
     Log GetProcAddress function calls.
     Log thread information.
     Use simple thread numbers instead of actual thread IDs.
     Log first chance exceptions.
     Log debug output messages.
     Automatically open and profile child processes.
--------------------------------------------------------------------------------

Started "READLINK.EXE" (process 0x5C0) at address 0x00400000 by thread 1.  Successfully hooked module.
Loaded "NTDLL.DLL" at address 0x7C900000 by thread 1.  Successfully hooked module.
Loaded "KERNEL32.DLL" at address 0x7C800000 by thread 1.  Successfully hooked module.
DllMain(0x7C900000, DLL_PROCESS_ATTACH, 0x00000000) in "NTDLL.DLL" called by thread 1.
DllMain(0x7C900000, DLL_PROCESS_ATTACH, 0x00000000) in "NTDLL.DLL" returned 1 (0x1) by thread 1.
DllMain(0x7C800000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNEL32.DLL" called by thread 1.
DllMain(0x7C800000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNEL32.DLL" returned 1 (0x1) by thread 1.
Injected "DEPENDS.DLL" at address 0x08370000 by thread 1.
DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "DEPENDS.DLL" called by thread 1.
DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "DEPENDS.DLL" returned 1 (0x1) by thread 1.
Loaded "CYGWIN1.DLL" at address 0x61000000 by thread 1.  Successfully hooked module.
Loaded "ADVAPI32.DLL" at address 0x77DD0000 by thread 1.  Successfully hooked module.
Loaded "RPCRT4.DLL" at address 0x77E70000 by thread 1.  Successfully hooked module.
DllMain(0x77E70000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "RPCRT4.DLL" called by thread 1.
DllMain(0x77E70000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "RPCRT4.DLL" returned 1 (0x1) by thread 1.
DllMain(0x77DD0000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "ADVAPI32.DLL" called by thread 1.
DllMain(0x77DD0000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "ADVAPI32.DLL" returned 1 (0x1) by thread 1.
DllMain(0x61000000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "CYGWIN1.DLL" called by thread 1.
Thread 2 started in "KERNEL32.DLL" at address 0x7C810856.
LoadLibraryA("advapi32") called from "CYGWIN1.DLL" at address 0x610012B9 by thread 1.
LoadLibraryA("advapi32") returned 0x77DD0000 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "InitializeSecurityDescriptor") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD778E by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "SetSecurityDescriptorDacl") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD77B3 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "LookupPrivilegeValueA") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD11B by thread 1.
LoadLibraryW("rpcrt4.dll") called from "RPCRT4.DLL" at address 0x77E9FAF5 by thread 1.
LoadLibraryW("rpcrt4.dll") returned 0x77E70000 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "OpenProcessToken") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7753 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "AdjustTokenPrivileges") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFC534 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetUserNameA") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD4C9 by thread 1.
LoadLibraryA("Secur32.dll") called from "ADVAPI32.DLL" at address 0x77DF97AE by thread 1.
Loaded "SECUR32.DLL" at address 0x77FE0000 by thread 1.  Successfully hooked module.
DllMain(0x77FE0000, DLL_PROCESS_ATTACH, 0x00000000) in "SECUR32.DLL" called by thread 1.
DllMain(0x77FE0000, DLL_PROCESS_ATTACH, 0x00000000) in "SECUR32.DLL" returned 1 (0x1) by thread 1.
LoadLibraryA("Secur32.dll") returned 0x77FE0000 by thread 1.
GetProcAddress(0x77FE0000 [SECUR32.DLL], "GetUserNameExA") called from "ADVAPI32.DLL" at address 0x77DF9803 and returned 0x77FE1DD4 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetTokenInformation") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7B76 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "SetTokenInformation") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77E0C80F by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "InitializeAcl") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7AD1 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "AddAccessAllowedAce") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7AF9 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "FindFirstFreeAce") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77E0D13C by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSecurityDescriptorDacl") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7C58 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "SetKernelObjectSecurity") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD1BD by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "RegCreateKeyExA") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DDEAF4 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "RegQueryValueExA") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7883 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSidIdentifierAuthority") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD4B0 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSidSubAuthorityCount") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DF986B by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSidSubAuthority") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DF9839 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "RegEnumKeyExA") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFC8C1 by thread 1.
DllMain(0x61000000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "CYGWIN1.DLL" returned 1 (0x1) by thread 1.
DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" called by thread 2.
DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" returned 1 (0x1) by thread 2.
DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" called by thread 2.
DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" returned 1 (0x1) by thread 2.
DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" called by thread 2.
DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" returned 1 (0x1) by thread 2.
DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" called by thread 2.
DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" returned 6683649 (0x65FC01) by thread 2.
DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" called by thread 2.
DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" returned 4294967041 (0xFFFFFF01) by thread 2.
DllMain(0x61000000, DLL_THREAD_DETACH, 0x00000000) in "CYGWIN1.DLL" called by thread 2.
DllMain(0x61000000, DLL_THREAD_DETACH, 0x00000000) in "CYGWIN1.DLL" returned 1 (0x1) by thread 2.
DllMain(0x77DD0000, DLL_THREAD_DETACH, 0x00000000) in "ADVAPI32.DLL" called by thread 2.
DllMain(0x77DD0000, DLL_THREAD_DETACH, 0x00000000) in "ADVAPI32.DLL" returned 1 (0x1) by thread 2.
DllMain(0x77E70000, DLL_THREAD_DETACH, 0x00000000) in "RPCRT4.DLL" called by thread 2.
DllMain(0x77E70000, DLL_THREAD_DETACH, 0x00000000) in "RPCRT4.DLL" returned 2147344385 (0x7FFDE001) by thread 2.
DllMain(0x7C800000, DLL_THREAD_DETACH, 0x00000000) in "KERNEL32.DLL" called by thread 2.
DllMain(0x7C800000, DLL_THREAD_DETACH, 0x00000000) in "KERNEL32.DLL" returned 2147344385 (0x7FFDE001) by thread 2.
DllMain(0x7C900000, DLL_THREAD_DETACH, 0x00000000) in "NTDLL.DLL" called by thread 2.
DllMain(0x7C900000, DLL_THREAD_DETACH, 0x00000000) in "NTDLL.DLL" returned 1 (0x1) by thread 2.
Thread 2 exited with code 0 (0x0).
LoadLibraryA("kernel32") called from "CYGWIN1.DLL" at address 0x610012B9 by thread 1.
LoadLibraryA("kernel32") returned 0x7C800000 by thread 1.
GetProcAddress(0x7C800000 [KERNEL32.DLL], "IsDebuggerPresent") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x7C812E03 by thread 1.
cYgFFFFFFFF 610F7C24
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "CopySid") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFC304 by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "InitializeSid") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DF8CBB by thread 1.
GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "EqualSid") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7EE4 by thread 1.
Thread 3 started in "KERNEL32.DLL" at address 0x7C810856.
DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" called by thread 3.
DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" returned 1 (0x1) by thread 3.
DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" called by thread 3.
DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" returned 1 (0x1) by thread 3.
DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" called by thread 3.
DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" returned 1 (0x1) by thread 3.
DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" called by thread 3.
DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" returned 6683649 (0x65FC01) by thread 3.
DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" called by thread 3.
DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" returned 4294967041 (0xFFFFFF01) by thread 3.
First chance exception 0xC0000005 (Access Violation) occurred in "NTDLL.DLL" at address 0x7C928E22 by thread 3.
Second chance exception 0xC0000005 (Access Violation) occurred in "NTDLL.DLL" at address 0x7C928E22 by thread 3.
Thread 3 exited with code -1073741819 (0xC0000005).
Exited "READLINK.EXE" (process 0x5C0) with code -1073741819 (0xC0000005) by thread 1.
Entrypoint reached. All implicit modules have been loaded.


--fdj2RfSjLxBAspz7
Content-Type: text/plain; charset=us-ascii

--
Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple
Problem reports:       http://cygwin.com/problems.html
Documentation:         http://cygwin.com/docs.html
FAQ:                   http://cygwin.com/faq/
--fdj2RfSjLxBAspz7--

- Raw text -


  webmaster     delorie software   privacy  
  Copyright © 2019   by DJ Delorie     Updated Jul 2019