Mailing-List: contact cygwin-help AT cygwin DOT com; run by ezmlm List-Subscribe: List-Archive: List-Post: List-Help: , Sender: cygwin-owner AT cygwin DOT com Mail-Followup-To: cygwin AT cygwin DOT com Delivered-To: mailing list cygwin AT cygwin DOT com Date: Wed, 1 Dec 2004 14:53:23 -0800 From: David Hinds To: Cygwin List Subject: Re: A vexing installation problem Message-ID: <20041201225323.GA3821@sonic.net> References: <6 DOT 2 DOT 0 DOT 14 DOT 0 DOT 20041129151309 DOT 046bfba0 AT pop DOT prospeed DOT net> <20041129215220 DOT GA15085 AT sonic DOT net> <6 DOT 2 DOT 0 DOT 14 DOT 0 DOT 20041129171109 DOT 046d1728 AT pop DOT prospeed DOT net> <20041129231740 DOT GA32760 AT sonic DOT net> <6 DOT 2 DOT 0 DOT 14 DOT 0 DOT 20041129181904 DOT 046bf960 AT pop DOT prospeed DOT net> <20041130011421 DOT GA20359 AT sonic DOT net> <20041130170757 DOT GA3861 AT sonic DOT net> <20041130192952 DOT GA2722 AT sonic DOT net> <20041201184434 DOT GA7909 AT sonic DOT net> <20041201185404 DOT GA10032 AT sonic DOT net> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="fdj2RfSjLxBAspz7" Content-Disposition: inline In-Reply-To: <20041201185404.GA10032@sonic.net> User-Agent: Mutt/1.4.2i --fdj2RfSjLxBAspz7 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Wed, Dec 01, 2004, Gerrit P. Haase wrote: > have you already tried to run the crashing application with > dependency walker? http://www.dependencywalker.com/ No, I was not familiar with this tool. I've attached the profile output for an invocation of "readlink.exe". -- Dave --fdj2RfSjLxBAspz7 Content-Type: text/plain; charset=us-ascii Content-Disposition: attachment; filename="profile.out" -------------------------------------------------------------------------------- Starting profile on 12/1/2004 at 2:26:43 PM Operating System: Microsoft Windows XP Professional (32-bit), version 5.01.2600 Service Pack 2 Program Executable: c:\local\cygwin\bin\READLINK.EXE Program Arguments: Starting Directory: C:\local\cygwin\bin\ Search Path: c:\program files\graphicsmagick-1.1.3-q8;C:\oracle\ora9i\bin;C:\Program Files\Oracle\jre\1.3.1\bin;C:\Program Files\Oracle\jre\1.1.8\bin;C:\WINDOWS\SYSTEM32;C:\WINDOWS;C:\WINDOWS\SYSTEM32\WBEM;C:\PROGRAM FILES\COMMON FILES\ADAPTEC SHARED\SYSTEM;C:\DMI\WIN32\BIN;C:\Tcl\bin Options Selected: Simulate ShellExecute by inserting any App Paths directories into the PATH environment variable. Log DllMain calls for process attach and process detach messages. Log DllMain calls for all other messages, including thread attach and thread detach. Hook the process to gather more detailed dependency information. Log LoadLibrary function calls. Log GetProcAddress function calls. Log thread information. Use simple thread numbers instead of actual thread IDs. Log first chance exceptions. Log debug output messages. Automatically open and profile child processes. -------------------------------------------------------------------------------- Started "READLINK.EXE" (process 0x5C0) at address 0x00400000 by thread 1. Successfully hooked module. Loaded "NTDLL.DLL" at address 0x7C900000 by thread 1. Successfully hooked module. Loaded "KERNEL32.DLL" at address 0x7C800000 by thread 1. Successfully hooked module. DllMain(0x7C900000, DLL_PROCESS_ATTACH, 0x00000000) in "NTDLL.DLL" called by thread 1. DllMain(0x7C900000, DLL_PROCESS_ATTACH, 0x00000000) in "NTDLL.DLL" returned 1 (0x1) by thread 1. DllMain(0x7C800000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNEL32.DLL" called by thread 1. DllMain(0x7C800000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNEL32.DLL" returned 1 (0x1) by thread 1. Injected "DEPENDS.DLL" at address 0x08370000 by thread 1. DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "DEPENDS.DLL" called by thread 1. DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "DEPENDS.DLL" returned 1 (0x1) by thread 1. Loaded "CYGWIN1.DLL" at address 0x61000000 by thread 1. Successfully hooked module. Loaded "ADVAPI32.DLL" at address 0x77DD0000 by thread 1. Successfully hooked module. Loaded "RPCRT4.DLL" at address 0x77E70000 by thread 1. Successfully hooked module. DllMain(0x77E70000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "RPCRT4.DLL" called by thread 1. DllMain(0x77E70000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "RPCRT4.DLL" returned 1 (0x1) by thread 1. DllMain(0x77DD0000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "ADVAPI32.DLL" called by thread 1. DllMain(0x77DD0000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "ADVAPI32.DLL" returned 1 (0x1) by thread 1. DllMain(0x61000000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "CYGWIN1.DLL" called by thread 1. Thread 2 started in "KERNEL32.DLL" at address 0x7C810856. LoadLibraryA("advapi32") called from "CYGWIN1.DLL" at address 0x610012B9 by thread 1. LoadLibraryA("advapi32") returned 0x77DD0000 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "InitializeSecurityDescriptor") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD778E by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "SetSecurityDescriptorDacl") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD77B3 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "LookupPrivilegeValueA") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD11B by thread 1. LoadLibraryW("rpcrt4.dll") called from "RPCRT4.DLL" at address 0x77E9FAF5 by thread 1. LoadLibraryW("rpcrt4.dll") returned 0x77E70000 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "OpenProcessToken") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7753 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "AdjustTokenPrivileges") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFC534 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetUserNameA") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD4C9 by thread 1. LoadLibraryA("Secur32.dll") called from "ADVAPI32.DLL" at address 0x77DF97AE by thread 1. Loaded "SECUR32.DLL" at address 0x77FE0000 by thread 1. Successfully hooked module. DllMain(0x77FE0000, DLL_PROCESS_ATTACH, 0x00000000) in "SECUR32.DLL" called by thread 1. DllMain(0x77FE0000, DLL_PROCESS_ATTACH, 0x00000000) in "SECUR32.DLL" returned 1 (0x1) by thread 1. LoadLibraryA("Secur32.dll") returned 0x77FE0000 by thread 1. GetProcAddress(0x77FE0000 [SECUR32.DLL], "GetUserNameExA") called from "ADVAPI32.DLL" at address 0x77DF9803 and returned 0x77FE1DD4 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetTokenInformation") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7B76 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "SetTokenInformation") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77E0C80F by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "InitializeAcl") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7AD1 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "AddAccessAllowedAce") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7AF9 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "FindFirstFreeAce") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77E0D13C by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSecurityDescriptorDacl") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7C58 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "SetKernelObjectSecurity") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD1BD by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "RegCreateKeyExA") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DDEAF4 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "RegQueryValueExA") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7883 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSidIdentifierAuthority") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFD4B0 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSidSubAuthorityCount") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DF986B by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "GetSidSubAuthority") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DF9839 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "RegEnumKeyExA") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFC8C1 by thread 1. DllMain(0x61000000, DLL_PROCESS_ATTACH, 0x0022FD1C) in "CYGWIN1.DLL" returned 1 (0x1) by thread 1. DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" called by thread 2. DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" returned 1 (0x1) by thread 2. DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" called by thread 2. DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" returned 1 (0x1) by thread 2. DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" called by thread 2. DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" returned 1 (0x1) by thread 2. DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" called by thread 2. DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" returned 6683649 (0x65FC01) by thread 2. DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" called by thread 2. DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" returned 4294967041 (0xFFFFFF01) by thread 2. DllMain(0x61000000, DLL_THREAD_DETACH, 0x00000000) in "CYGWIN1.DLL" called by thread 2. DllMain(0x61000000, DLL_THREAD_DETACH, 0x00000000) in "CYGWIN1.DLL" returned 1 (0x1) by thread 2. DllMain(0x77DD0000, DLL_THREAD_DETACH, 0x00000000) in "ADVAPI32.DLL" called by thread 2. DllMain(0x77DD0000, DLL_THREAD_DETACH, 0x00000000) in "ADVAPI32.DLL" returned 1 (0x1) by thread 2. DllMain(0x77E70000, DLL_THREAD_DETACH, 0x00000000) in "RPCRT4.DLL" called by thread 2. DllMain(0x77E70000, DLL_THREAD_DETACH, 0x00000000) in "RPCRT4.DLL" returned 2147344385 (0x7FFDE001) by thread 2. DllMain(0x7C800000, DLL_THREAD_DETACH, 0x00000000) in "KERNEL32.DLL" called by thread 2. DllMain(0x7C800000, DLL_THREAD_DETACH, 0x00000000) in "KERNEL32.DLL" returned 2147344385 (0x7FFDE001) by thread 2. DllMain(0x7C900000, DLL_THREAD_DETACH, 0x00000000) in "NTDLL.DLL" called by thread 2. DllMain(0x7C900000, DLL_THREAD_DETACH, 0x00000000) in "NTDLL.DLL" returned 1 (0x1) by thread 2. Thread 2 exited with code 0 (0x0). LoadLibraryA("kernel32") called from "CYGWIN1.DLL" at address 0x610012B9 by thread 1. LoadLibraryA("kernel32") returned 0x7C800000 by thread 1. GetProcAddress(0x7C800000 [KERNEL32.DLL], "IsDebuggerPresent") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x7C812E03 by thread 1. cYgFFFFFFFF 610F7C24 GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "CopySid") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DFC304 by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "InitializeSid") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DF8CBB by thread 1. GetProcAddress(0x77DD0000 [ADVAPI32.DLL], "EqualSid") called from "CYGWIN1.DLL" at address 0x6100122E and returned 0x77DD7EE4 by thread 1. Thread 3 started in "KERNEL32.DLL" at address 0x7C810856. DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" called by thread 3. DllMain(0x7C900000, DLL_THREAD_ATTACH, 0x00000000) in "NTDLL.DLL" returned 1 (0x1) by thread 3. DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" called by thread 3. DllMain(0x7C800000, DLL_THREAD_ATTACH, 0x00000000) in "KERNEL32.DLL" returned 1 (0x1) by thread 3. DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" called by thread 3. DllMain(0x61000000, DLL_THREAD_ATTACH, 0x00000000) in "CYGWIN1.DLL" returned 1 (0x1) by thread 3. DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" called by thread 3. DllMain(0x77DD0000, DLL_THREAD_ATTACH, 0x00000000) in "ADVAPI32.DLL" returned 6683649 (0x65FC01) by thread 3. DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" called by thread 3. DllMain(0x77E70000, DLL_THREAD_ATTACH, 0x00000000) in "RPCRT4.DLL" returned 4294967041 (0xFFFFFF01) by thread 3. First chance exception 0xC0000005 (Access Violation) occurred in "NTDLL.DLL" at address 0x7C928E22 by thread 3. Second chance exception 0xC0000005 (Access Violation) occurred in "NTDLL.DLL" at address 0x7C928E22 by thread 3. Thread 3 exited with code -1073741819 (0xC0000005). Exited "READLINK.EXE" (process 0x5C0) with code -1073741819 (0xC0000005) by thread 1. Entrypoint reached. All implicit modules have been loaded. --fdj2RfSjLxBAspz7 Content-Type: text/plain; charset=us-ascii -- Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple Problem reports: http://cygwin.com/problems.html Documentation: http://cygwin.com/docs.html FAQ: http://cygwin.com/faq/ --fdj2RfSjLxBAspz7--