Bugs item #1686497, was opened at 2007-03-22 23:25
Message generated for change (Comment added) made by datallah
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=100235&aid=1686497&group_id=235

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: win32
Group: 2.0.0 beta 6
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Brant Gurganus (brantgurga)
Assigned to: Daniel Atallah (datallah)
Summary: First chance access violation for current stack trace.

Initial Comment:
GTK+ 2.10.11
Glib 2.12.11
Gaim 2.00beta6

1. Run Application Verifier (free from Microsoft).
2. Add Gaim.exe.
3. Press Save. (some of the basic checks should be enabled by default).
4. Start gaim.

Gaim will crash at startup and looking at the Application Verifier log, the 
cause was a first chance access violation for current stack trace. Log with 
stack trace follows. The help file gives the following information about this 
verification:


Application Verifier break message
First chance access violation for current stack trace.

Probable cause
This is the most common application verifier stop. Typically it is caused by a 
buffer overrun error. The heap verifier places a non-accessible page at the end 
of a heap allocation and a buffer overrun will cause an exception by touching 
this page. There are several other causes for this stop. For example, accessing 
a heap block after being freed. The same debugger command will be useful for 
this case too.

Information displayed by Application Verifier
Parameter1 - Invalid address causing the exception

Parameter2 - Code address executing the invalid access

Parameter3 - Exception record. Context Record

Parameter4 - Context record

Description - First chance access violation for current stack trace

Additional information
Verifier Stop code 0013. 

To debug this stop identify the access address that caused the exception and 
then use the following debugger command:

!heap -p -a ACCESS_ADDRESS This command will give details about the nature of 
the error and what heap block is overrun. It will also give the stack trace for 
the block allocation.
Copyright © 2006 by Microsoft Corporation. All rights reserved. 

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<avrf:logfile xmlns:avrf="Application Verifier">
        <avrf:logSession TimeStarted="2007-03-23 : 00:07:21" PID="3096" 
Version="2">
                <avrf:logEntry Time="2007-03-23 : 00:07:30" LayerName="Heaps" 
StopCode="0x13" Severity="Error">
                        <avrf:message>First chance access violation for current 
stack trace.</avrf:message>
                        <avrf:parameter1>7dc4fac - Invalid address causing the 
exception.</avrf:parameter1>
                        <avrf:parameter2>70525c52 - Code address executing the 
invalid access.</avrf:parameter2>
                        <avrf:parameter3>8f7f858 - Exception 
record.</avrf:parameter3>
                        <avrf:parameter4>8f7f8a8 - Context 
record.</avrf:parameter4>
                        <avrf:stackTrace>
                                
<avrf:trace>vrfcore!VfCoreRedirectedStopMessage+81</avrf:trace>
                                
<avrf:trace>vfbasics!VfBasicsStopMessage+1c9</avrf:trace>
                                
<avrf:trace>vfbasics!AVrfpCheckFirstChanceException+139</avrf:trace>
                                
<avrf:trace>vfbasics!AVrfpVectoredExceptionHandler+18</avrf:trace>
                                
<avrf:trace>ntdll!RtlInitializeCriticalSectionAndSpinCount+93f</avrf:trace>
                                
<avrf:trace>ntdll!RtlCaptureContext+10f</avrf:trace>
                                <avrf:trace>ntdll!RtlUnwind+15c</avrf:trace>
                                
<avrf:trace>ntdll!KiUserExceptionDispatcher+f</avrf:trace>
                                
<avrf:trace>vfbasics!AVrfpRtlLeaveCriticalSection+6c</avrf:trace>
                                
<avrf:trace>libgaim!gaim_whiteboard_set_brush+31a</avrf:trace>
                                <avrf:trace>msvcrt!atof_l+447</avrf:trace>
                                <avrf:trace>msvcrt!beginthreadex+c9</avrf:trace>
                                
<avrf:trace>vfbasics!AVrfpStandardThreadFunction+6f</avrf:trace>
                                
<avrf:trace>kernel32!BaseThreadInitThunk+e</avrf:trace>
                                
<avrf:trace>ntdll!RtlCreateUserProcess+8c</avrf:trace>
                        </avrf:stackTrace>
                </avrf:logEntry>
        </avrf:logSession>
</avrf:logfile>

----------------------------------------------------------------------

>Comment By: Daniel Atallah (datallah)
Date: 2007-04-01 01:08

Message:
Logged In: YES 
user_id=325843
Originator: NO

The stacktrace doesn't appear to be accurate (I've seen that pretty
frequently when using windbg with files containing debug symbols in a
non-native format), however I was able to get a better backtrace using the
mingw gdb.  I'm testing a fix, if it works out, I'll include it in the next
release.

----------------------------------------------------------------------

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=100235&aid=1686497&group_id=235

-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys-and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Gaim-bugs mailing list
Gaim-bugs@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/gaim-bugs

Reply via email to