This is the mail archive of the cygwin mailing list for the Cygwin project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

Re: 1.5.21-1 DLL Loading Problem


On 07/25/2006, Rob Hatcherson wrote:
I've been trying to track this down with gdb, but haven't made much progress. I put the cygwin1.dbg from the src distro into the /bin dir, which at least allowed some level of breakpoint setting, but so far none of the ones I've tried (dlopen, dll::init(), and a few others in that vicnity) have been hit. I'm not too familiar with the cygwin source base, so I may be snooping around in the wrong spot.
Larry Hall responded:
Have you tried putting break points in the DLL init routines for A.dll, B.dll,
or just plain main()?
Had already tried main(). Whatever is happening is upstream of there.

Regarding DLL init routines, I assume you mean any DllMain defined for those DLLs. I didn't have a user-defined DllMain in either DLL. Defining one for each DLL had no apparent effect with 1.5.21-1.

At this point I removed the DllMain's, set gdb aside, and ran the app in the DependencyWalker tool. Here's the tail end of its report, where the problems seem to start (the full report "dwout_withoutDllMain.txt", not too much longer than this, is attached):

<snip>
00:00:00.172: Loaded "c:\workareas\buildoutput-main\zedasoft\c++\windows_x86\zedasoft\lib\LIBZEDASOFTFOUNDATION.DLL" at address 0x10000000 by thread 1. Successfully hooked module.
00:00:00.422: First chance exception 0xC0000005 (Access Violation) occurred in "c:\windows\system32\NTDLL.DLL" at address 0x7C91E183 by thread 1.
00:00:00.422: Unloaded "Unknown" at address 0x004D0000 by thread 1.
00:00:02.250: First chance exception 0xC0000005 (Access Violation) occurred in "c:\windows\system32\NTDLL.DLL" at address 0x7C964ED1 by thread 1.
00:00:02.250: Second chance exception 0xC0000005 (Access Violation) occurred in "c:\windows\system32\NTDLL.DLL" at address 0x7C964ED1 by thread 1.
00:00:02.250: Exited "c:\workareas\prj-main\zedasoft\c++\libs\main\test\util\STRINGTOKENIZERTEST.EXE" (process 0x7DC) with code -1073741819 (0xC0000005) by thread 1.



At first glance one might see the Access Violation and say that this must be the problem. However, seemingly innocuous changes to the "foundation" DLL cause the problem to morph. For example, the attachment "dwout_withDllMain.txt" is from an attempt with the DllMain's put back in, and this one shows some kind of rebasing problem with an Unknown exception.


All this might suggest that there's some kind of memory corruption issue in our code base, but I'm not sure the load is even getting that far. For example, I expected to see a report about my DllMain being called in the dwout_withDllMain.txt log file, but there's no such report. Does anything in the DLL get called prior to DllMain (e.g. global constructors, etc)?


Dave Korn responded:
  Are you using C++ string classes?  Would you like to try recompiling it all
using the new experimental gcc-3.4.4-2 release?  It addresses at least one
known problem with C++ vs. DLLs.

http://cygwin.com/ml/cygwin-announce/2006-07/msg00021.html
There's some string stuff in there, so I could give this a whirl. Though... the guy across from me has a cygwin gcc/g++ installation that reports the same version as mine, except over a 1.5.18-1 cygwin DLL, and everything works as expected there. Of course who knows what *that* means, but FWIW I've never seen this symptom with this particular code base at or prior to 1.5.18-1, going back several years. I can't speak to releases in between 1.5.18-1 and 1.5.21-1, as we haven't updated in a while.


I will keep digging, and report if I learn anything useful. Further ideas on how to catch this are welcome too :-).


Thanks for your input.

Rob

00:00:00.000: Started "c:\workareas\prj-main\zedasoft\c++\libs\main\test\util\STRINGTOKENIZERTEST.EXE" (process 0x7DC) at address 0x00400000 by thread 1.  Successfully hooked module.
00:00:00.000: Loaded "c:\windows\system32\NTDLL.DLL" at address 0x7C900000 by thread 1.  Successfully hooked module.
00:00:00.062: Loaded "c:\windows\system32\KERNEL32.DLL" at address 0x7C800000 by thread 1.  Successfully hooked module.
00:00:00.062: DllMain(0x7C900000, DLL_PROCESS_ATTACH, 0x00000000) in "c:\windows\system32\NTDLL.DLL" called by thread 1.
00:00:00.062: DllMain(0x7C900000, DLL_PROCESS_ATTACH, 0x00000000) in "c:\windows\system32\NTDLL.DLL" returned 1 (0x1) by thread 1.
00:00:00.062: DllMain(0x7C800000, DLL_PROCESS_ATTACH, 0x00000000) in "c:\windows\system32\KERNEL32.DLL" called by thread 1.
00:00:00.078: DllMain(0x7C800000, DLL_PROCESS_ATTACH, 0x00000000) in "c:\windows\system32\KERNEL32.DLL" returned 1 (0x1) by thread 1.
00:00:00.078: Injected "e:\thirdparty\dependencywalker_2.1\DEPENDS.DLL" at address 0x08370000 by thread 1.
00:00:00.078: DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "e:\thirdparty\dependencywalker_2.1\DEPENDS.DLL" called by thread 1.
00:00:00.093: DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "e:\thirdparty\dependencywalker_2.1\DEPENDS.DLL" returned 1 (0x1) by thread 1.
00:00:00.093: Loaded "e:\thirdparty\cygwin_1.5.21-1\bin\CYGWIN1.DLL" at address 0x61000000 by thread 1.  Successfully hooked module.
00:00:00.125: Loaded "c:\windows\system32\ADVAPI32.DLL" at address 0x77DD0000 by thread 1.  Successfully hooked module.
00:00:00.125: Loaded "c:\windows\system32\RPCRT4.DLL" at address 0x77E70000 by thread 1.  Successfully hooked module.
00:00:00.172: Loaded "c:\workareas\buildoutput-main\zedasoft\c++\windows_x86\zedasoft\lib\LIBZEDASOFTFOUNDATION.DLL" at address 0x10000000 by thread 1.  Successfully hooked module.
00:00:00.422: First chance exception 0xC0000005 (Access Violation) occurred in "c:\windows\system32\NTDLL.DLL" at address 0x7C91E183 by thread 1.
00:00:00.422: Unloaded "Unknown" at address 0x004D0000 by thread 1.
00:00:02.250: First chance exception 0xC0000005 (Access Violation) occurred in "c:\windows\system32\NTDLL.DLL" at address 0x7C964ED1 by thread 1.
00:00:02.250: Second chance exception 0xC0000005 (Access Violation) occurred in "c:\windows\system32\NTDLL.DLL" at address 0x7C964ED1 by thread 1.
00:00:02.250: Exited "c:\workareas\prj-main\zedasoft\c++\libs\main\test\util\STRINGTOKENIZERTEST.EXE" (process 0x7DC) with code -1073741819 (0xC0000005) by thread 1.
00:00:00.000: Started "c:\workareas\prj-main\zedasoft\c++\libs\main\test\util\STRINGTOKENIZERTEST.EXE" (process 0xA5C) at address 0x00400000 by thread 1.  Successfully hooked module.
00:00:00.000: Loaded "c:\windows\system32\NTDLL.DLL" at address 0x7C900000 by thread 1.  Successfully hooked module.
00:00:00.062: Loaded "c:\windows\system32\KERNEL32.DLL" at address 0x7C800000 by thread 1.  Successfully hooked module.
00:00:00.062: DllMain(0x7C900000, DLL_PROCESS_ATTACH, 0x00000000) in "c:\windows\system32\NTDLL.DLL" called by thread 1.
00:00:00.062: DllMain(0x7C900000, DLL_PROCESS_ATTACH, 0x00000000) in "c:\windows\system32\NTDLL.DLL" returned 1 (0x1) by thread 1.
00:00:00.062: DllMain(0x7C800000, DLL_PROCESS_ATTACH, 0x00000000) in "c:\windows\system32\KERNEL32.DLL" called by thread 1.
00:00:00.078: DllMain(0x7C800000, DLL_PROCESS_ATTACH, 0x00000000) in "c:\windows\system32\KERNEL32.DLL" returned 1 (0x1) by thread 1.
00:00:00.078: Injected "e:\thirdparty\dependencywalker_2.1\DEPENDS.DLL" at address 0x08370000 by thread 1.
00:00:00.109: DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "e:\thirdparty\dependencywalker_2.1\DEPENDS.DLL" called by thread 1.
00:00:00.109: DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "e:\thirdparty\dependencywalker_2.1\DEPENDS.DLL" returned 1 (0x1) by thread 1.
00:00:00.109: Loaded "e:\thirdparty\cygwin_1.5.21-1\bin\CYGWIN1.DLL" at address 0x61000000 by thread 1.  Successfully hooked module.
00:00:00.140: Loaded "c:\windows\system32\ADVAPI32.DLL" at address 0x77DD0000 by thread 1.  Successfully hooked module.
00:00:00.140: Loaded "c:\windows\system32\RPCRT4.DLL" at address 0x77E70000 by thread 1.  Successfully hooked module.
00:00:00.203: Loaded "c:\workareas\buildoutput-main\zedasoft\c++\windows_x86\zedasoft\lib\LIBZEDASOFTFOUNDATION.DLL" at address 0x10000000 by thread 1.  Successfully hooked module.
00:00:00.453: LDR: LdrRelocateImageWithBias() failed 0xc000007b
00:00:00.453: LDR: OldBase     : 10000000
00:00:00.453: LDR: NewBase     : 004D0000
00:00:00.453: LDR: Diff        : 0xfffffffff04d0000
00:00:00.453: LDR: NextOffset  : 0054A798
00:00:00.453: LDR: *NextOffset : 0x3034
00:00:00.453: LDR: SizeOfBlock : 0x7826803c
00:00:00.453: Unloaded "Unknown" at address 0x004D0000 by thread 1.
00:00:02.781: First chance exception 0xC000007B (Unknown) occurred in "c:\windows\system32\NTDLL.DLL" at address 0x7C964ED1 by thread 1.
00:00:02.796: Second chance exception 0xC000007B (Unknown) occurred in "c:\windows\system32\NTDLL.DLL" at address 0x7C964ED1 by thread 1.
00:00:02.796: Exited "c:\workareas\prj-main\zedasoft\c++\libs\main\test\util\STRINGTOKENIZERTEST.EXE" (process 0xA5C) with code -1073741701 (0xC000007B) by thread 1.

--
Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple
Problem reports:       http://cygwin.com/problems.html
Documentation:         http://cygwin.com/docs.html
FAQ:                   http://cygwin.com/faq/

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]