Stacktrace does not show point of crash for Windows example

127 views
Skip to first unread message

jensa

unread,
Apr 13, 2012, 10:33:11 AM4/13/12
to google-breakpad-discuss
Hi,

after I've managed to build berakpad and run the windows example, I
was able to generate a stack trace from crash_generation_app.exe. I
triggered a nullpointer dereference violation and got a nice minidump.
When a process this minidump, the function responsible for the crash
is not included in the stack trace. The stack trace should include a
line hinting to
crash_generation_app.cc, line 309
void DerefZeroCrash() {
int* x = 0;
*x = 1;
}
, but it mentiones crash_generation_app.cc twice for other functions.
Am I doing something wrong? I am running the application on Windows7
and the system shows me the message box that my application has not
been terminated correctly after generating the minidump file.

Operating system: Windows NT
6.1.7601 Service Pack 1
CPU: x86
GenuineIntel family 6 model 26 stepping 5
4 CPUs

No crash
Assertion: Unknown assertion type 0x00000000

Thread 0
0 ntdll.dll + 0x470b4
eip = 0x778d70b4 esp = 0x0029f004 ebp = 0x0029f0a0 ebx =
0x0029f054
esi = 0x00000002 edi = 0x00000000 eax = 0x00000000 ecx =
0x00000400
edx = 0x00000000 efl = 0x00000246
Found by: given as instruction pointer in context
1 kernel32.dll + 0x4bc8d
eip = 0x7754bc8e esp = 0x0029f0a8 ebp = 0x0029f0e8
Found by: previous frame's frame pointer
2 kernel32.dll + 0x4bcfb
eip = 0x7754bcfc esp = 0x0029f0f0 ebp = 0x0029f104
Found by: previous frame's frame pointer
3 kernel32.dll + 0x5f164
eip = 0x7755f165 esp = 0x0029f10c ebp = 0x0029f170
Found by: previous frame's frame pointer
4 kernel32.dll + 0x5f201
eip = 0x7755f202 esp = 0x0029f178 ebp = 0x0029f184
Found by: previous frame's frame pointer
5 kernel32.dll + 0x5ef2f
eip = 0x7755ef30 esp = 0x0029f18c ebp = 0x0029f194
Found by: previous frame's frame pointer
6 kernel32.dll + 0x5eea9
eip = 0x7755eeaa esp = 0x0029f19c ebp = 0x0029f220
Found by: previous frame's frame pointer
7 ntdll.dll + 0x77f19
eip = 0x77907f1a esp = 0x0029f228 ebp = 0x0029f8e0
Found by: previous frame's frame pointer
8 ntdll.dll + 0x637c7
eip = 0x778f37c8 esp = 0x0029f8e8 ebp = 0x0029f8f8
Found by: previous frame's frame pointer

Thread 1
0 ntdll.dll + 0x470b4
eip = 0x778d70b4 esp = 0x0073f804 ebp = 0x0073f998 ebx =
0x778bfe90
esi = 0x003785d0 edi = 0x00000000 eax = 0x00040002 ecx =
0x00000004
edx = 0x778d70b4 efl = 0x00000293
Found by: given as instruction pointer in context
1 kernel32.dll + 0x53c44
eip = 0x77553c45 esp = 0x0073f9a0 ebp = 0x0073f9a4
Found by: previous frame's frame pointer
2 ntdll.dll + 0x637f4
eip = 0x778f37f5 esp = 0x0073f9ac ebp = 0x0073f9e4
Found by: previous frame's frame pointer
3 ntdll.dll + 0x637c7
eip = 0x778f37c8 esp = 0x0073f9ec ebp = 0x0073f9fc
Found by: previous frame's frame pointer

Thread 2
0 ntdll.dll + 0x470b4
eip = 0x778d70b4 esp = 0x00a1e9ec ebp = 0x00a1e9fc ebx =
0x03691100
esi = 0x036910c0 edi = 0x00a1ed2c eax = 0x03691060 ecx =
0x00000006
edx = 0x0000006c efl = 0x00000246
Found by: given as instruction pointer in context
1 0x36da80f
eip = 0x036da810 esp = 0x00a1ea04 ebp = 0x00000000
Found by: previous frame's frame pointer
2 ntdll.dll + 0x1e0ec
eip = 0x778ae0ed esp = 0x00a1ea58 ebp = 0x00000000
Found by: stack scanning
3 ntdll.dll + 0x61895
eip = 0x778f1896 esp = 0x00a1ea64 ebp = 0x00000000
Found by: stack scanning
4 ntdll.dll + 0x694a5
eip = 0x778f94a6 esp = 0x00a1ea68 ebp = 0x00000000
Found by: stack scanning
5 ntdll.dll + 0x6951d
eip = 0x778f951e esp = 0x00a1ea88 ebp = 0x00000000
Found by: stack scanning
6 ntdll.dll + 0x5f635
eip = 0x778ef636 esp = 0x00a1ea90 ebp = 0x00000000
Found by: stack scanning
7 ntdll.dll + 0x5fa43
eip = 0x778efa44 esp = 0x00a1ea94 ebp = 0x00000000
Found by: stack scanning
8 ntdll.dll + 0x61df5
eip = 0x778f1df6 esp = 0x00a1eadc ebp = 0x00000000
Found by: stack scanning
9 ntdll.dll + 0x5f635
eip = 0x778ef636 esp = 0x00a1eaec ebp = 0x00000000
Found by: stack scanning
10 ntdll.dll + 0x5f635
eip = 0x778ef636 esp = 0x00a1eaf0 ebp = 0x00000000
Found by: stack scanning
11 ntdll.dll + 0xd729f
eip = 0x779672a0 esp = 0x00a1eb0c ebp = 0x00000000
Found by: stack scanning
12 ntdll.dll + 0x6914c
eip = 0x778f914d esp = 0x00a1eb14 ebp = 0x00000000
Found by: stack scanning
13 ntdll.dll + 0xd729f
eip = 0x779672a0 esp = 0x00a1eb18 ebp = 0x00000000
Found by: stack scanning
14 ntdll.dll + 0x5f635
eip = 0x778ef636 esp = 0x00a1eb1c ebp = 0x00000000
Found by: stack scanning
15 ntdll.dll + 0x1e0ec
eip = 0x778ae0ed esp = 0x00a1eb50 ebp = 0x00000000
Found by: stack scanning
16 ntdll.dll + 0x5f635
eip = 0x778ef636 esp = 0x00a1eb5c ebp = 0x00000000
Found by: stack scanning
17 ntdll.dll + 0x5fa43
eip = 0x778efa44 esp = 0x00a1eb60 ebp = 0x00000000
Found by: stack scanning
18 ntdll.dll + 0x61c7a
eip = 0x778f1c7b esp = 0x00a1eb78 ebp = 0x00000000
Found by: stack scanning
19 ntdll.dll + 0x61cdc
eip = 0x778f1cdd esp = 0x00a1eb84 ebp = 0x00000000
Found by: stack scanning
20 ntdll.dll + 0x1e0ec
eip = 0x778ae0ed esp = 0x00a1ebc4 ebp = 0x00000000
Found by: stack scanning
21 ntdll.dll + 0x61cdc
eip = 0x778f1cdd esp = 0x00a1ebd0 ebp = 0x00000000
Found by: stack scanning
22 ntdll.dll + 0x61e8b
eip = 0x778f1e8c esp = 0x00a1ebd4 ebp = 0x00000000
Found by: stack scanning
23 kernel32.dll + 0x48a89
eip = 0x77548a8a esp = 0x00a1ec10 ebp = 0x00000000
Found by: stack scanning
24 kernel32.dll + 0x48a32
eip = 0x77548a33 esp = 0x00a1ec14 ebp = 0x00000000
Found by: stack scanning
25 ntdll.dll + 0x52ce7
eip = 0x778e2ce8 esp = 0x00a1ec28 ebp = 0x00000000
Found by: stack scanning
26 ntdll.dll + 0x6ebcc
eip = 0x778febcd esp = 0x00a1ec40 ebp = 0x00000000
Found by: stack scanning
27 ntdll.dll + 0xd731f
eip = 0x77967320 esp = 0x00a1ec44 ebp = 0x00000000
Found by: stack scanning
28 ntdll.dll + 0x6ebba
eip = 0x778febbb esp = 0x00a1ec48 ebp = 0x00000000
Found by: stack scanning
29 ntdll.dll + 0x1e0ec
eip = 0x778ae0ed esp = 0x00a1ec78 ebp = 0x00000000
Found by: stack scanning
30 ntdll.dll + 0x6ebba
eip = 0x778febbb esp = 0x00a1ec84 ebp = 0x00000000
Found by: stack scanning
31 ntdll.dll + 0x6eb36
eip = 0x778feb37 esp = 0x00a1ec88 ebp = 0x00000000
Found by: stack scanning
32 ntdll.dll + 0x469c3
eip = 0x778d69c4 esp = 0x00a1ec90 ebp = 0x00000000
Found by: stack scanning
33 KERNELBASE.dll + 0x889f
eip = 0x75c988a0 esp = 0x00a1ec94 ebp = 0x00000000
Found by: stack scanning
34 KERNELBASE.dll + 0x1f174
eip = 0x75caf175 esp = 0x00a1ecb0 ebp = 0x00000000
Found by: stack scanning
35 KERNELBASE.dll + 0x1f181
eip = 0x75caf182 esp = 0x00a1ecc0 ebp = 0x00000000
Found by: stack scanning
36 ntdll.dll + 0x454d3
eip = 0x778d54d4 esp = 0x00a1ed24 ebp = 0x00000000
Found by: stack scanning
37 KERNELBASE.dll + 0x6b31
eip = 0x75c96b32 esp = 0x00a1ed28 ebp = 0x00000000
Found by: stack scanning
38 ntdll.dll + 0x569a6
eip = 0x778e69a7 esp = 0x00a1ed6c ebp = 0x00000000
Found by: stack scanning
39 ntdll.dll + 0x55dd2
eip = 0x778e5dd3 esp = 0x00a1ed78 ebp = 0x00000000
Found by: stack scanning
40 ntdll.dll + 0x494f5
eip = 0x778d94f6 esp = 0x00a1ed94 ebp = 0x00000000
Found by: stack scanning
41 ntdll.dll + 0x64b5a
eip = 0x778f4b5b esp = 0x00a1ed9c ebp = 0x00000000
Found by: stack scanning
42 ntdll.dll + 0x570f1
eip = 0x778e70f2 esp = 0x00a1edd8 ebp = 0x00000000
Found by: stack scanning
43 ntdll.dll + 0x66643
eip = 0x778f6644 esp = 0x00a1edec ebp = 0x00000000
Found by: stack scanning
44 ntdll.dll + 0x1e0ec
eip = 0x778ae0ed esp = 0x00a1ee40 ebp = 0x00000000
Found by: stack scanning
45 ntdll.dll + 0x55da3
eip = 0x778e5da4 esp = 0x00a1ee60 ebp = 0x00000000
Found by: stack scanning
46 ntdll.dll + 0x55dd2
eip = 0x778e5dd3 esp = 0x00a1ee64 ebp = 0x00000000
Found by: stack scanning
47 KERNELBASE.dll + 0x1f229
eip = 0x75caf22a esp = 0x00a1eeb8 ebp = 0x00000000
Found by: stack scanning
48 ntdll.dll + 0x1e0ec
eip = 0x778ae0ed esp = 0x00a1ef2c ebp = 0x00000000
Found by: stack scanning
49 ntdll.dll + 0x55dd2
eip = 0x778e5dd3 esp = 0x00a1ef38 ebp = 0x00000000
Found by: stack scanning
50 ntdll.dll + 0x55adf
eip = 0x778e5ae0 esp = 0x00a1ef3c ebp = 0x00000000
Found by: stack scanning
51 ntdll.dll + 0x52dd5
eip = 0x778e2dd6 esp = 0x00a1ef58 ebp = 0x00000000
Found by: stack scanning
52 ntdll.dll + 0x46a73
eip = 0x778d6a74 esp = 0x00a1ef68 ebp = 0x00000000
Found by: stack scanning
53 KERNELBASE.dll + 0x7583
eip = 0x75c97584 esp = 0x00a1ef6c ebp = 0x00000000
Found by: stack scanning
54 ntdll.dll + 0x46a73
eip = 0x778d6a74 esp = 0x00a1ef90 ebp = 0x00000000
Found by: stack scanning
55 KERNELBASE.dll + 0x7583
eip = 0x75c97584 esp = 0x00a1ef94 ebp = 0x00000000
Found by: stack scanning
56 KERNELBASE.dll + 0x75a3
eip = 0x75c975a4 esp = 0x00a1efb8 ebp = 0x00000000
Found by: stack scanning
57 KERNELBASE.dll + 0x7583
eip = 0x75c97584 esp = 0x00a1efe0 ebp = 0x00000000
Found by: stack scanning
58 KERNELBASE.dll + 0x1e164
eip = 0x75cae165 esp = 0x00a1efe8 ebp = 0x00000000
Found by: stack scanning
59 KERNELBASE.dll + 0x75a3
eip = 0x75c975a4 esp = 0x00a1eff4 ebp = 0x00000000
Found by: stack scanning
60 kernel32.dll + 0x5144d
eip = 0x7755144e esp = 0x00a1eff8 ebp = 0x00000000
Found by: stack scanning
61 dbghelp.dll + 0x4ba6e
eip = 0x7265ba6f esp = 0x00a1f014 ebp = 0x00000000
Found by: stack scanning
62 ntdll.dll + 0x46303
eip = 0x778d6304 esp = 0x00a1f018 ebp = 0x00000000
Found by: stack scanning
63 KERNELBASE.dll + 0x9a24
eip = 0x75c99a25 esp = 0x00a1f01c ebp = 0x00000000
Found by: stack scanning
64 dbghelp.dll + 0x4c619
eip = 0x7265c61a esp = 0x00a1f038 ebp = 0x00000000
Found by: stack scanning
65 dbghelp.dll + 0x4c68a
eip = 0x7265c68b esp = 0x00a1f060 ebp = 0x00000000
Found by: stack scanning
66 dbghelp.dll + 0x44d06
eip = 0x72654d07 esp = 0x00a1f080 ebp = 0x00000000
Found by: stack scanning
67 dbghelp.dll + 0x44ec5
eip = 0x72654ec6 esp = 0x00a1f0a8 ebp = 0x00000000
Found by: stack scanning

Thread 3
0 ntdll.dll + 0x470b4
eip = 0x778d70b4 esp = 0x008cf660 ebp = 0x008cf69c ebx =
0x00000000
esi = 0x0000000e edi = 0x00f8ddc8 eax = 0x00000000 ecx =
0x7ffdc000
edx = 0x00000578 efl = 0x00000202
Found by: given as instruction pointer in context
1 user32.dll + 0xa07b
eip = 0x75dfa07c esp = 0x008cf6a4 ebp = 0x008cf6c0
Found by: previous frame's frame pointer
2 crash_generation_app.exe!google_breakpad::AppendTextToEditBox
[crash_generation_app.cc : 159 + 0xb]
eip = 0x00f510eb esp = 0x008cf6c8 ebp = 0x008cf95c
Found by: previous frame's frame pointer
3 crash_generation_app.exe!google_breakpad::AppendTextWorker
[crash_generation_app.cc : 174 + 0xa]
eip = 0x00f5114c esp = 0x008cf8e8 ebp = 0x008cf95c
Found by: call frame info
4 ntdll.dll + 0x2d876
eip = 0x778bd877 esp = 0x008cf8f0 ebp = 0x008cf95c
Found by: call frame info
5 ntdll.dll + 0x30841
eip = 0x778c0842 esp = 0x008cf964 ebp = 0x008cfabc
Found by: previous frame's frame pointer
6 kernel32.dll + 0x53c44
eip = 0x77553c45 esp = 0x008cfac4 ebp = 0x008cfac8
Found by: previous frame's frame pointer
7 ntdll.dll + 0x637f4
eip = 0x778f37f5 esp = 0x008cfad0 ebp = 0x008cfb08
Found by: previous frame's frame pointer
8 ntdll.dll + 0x637c7
eip = 0x778f37c8 esp = 0x008cfb10 ebp = 0x008cfb20
Found by: previous frame's frame pointer

Loaded modules:
0x00f50000 - 0x00f75fff crash_generation_app.exe ??? (main)
0x72610000 - 0x726fafff dbghelp.dll 6.1.7601.17514
0x74250000 - 0x74262fff dwmapi.dll 6.1.7600.16385
0x746b0000 - 0x746d4fff powrprof.dll 6.1.7600.16385
0x74870000 - 0x748affff uxtheme.dll 6.1.7600.16385
0x748b0000 - 0x74a4dfff comctl32.dll 6.10.7601.17514
0x75960000 - 0x7596bfff CRYPTBASE.dll 6.1.7600.16385
0x75bb0000 - 0x75bd6fff cfgmgr32.dll 6.1.7601.17514
0x75be0000 - 0x75bf1fff devobj.dll 6.1.7600.16385
0x75c90000 - 0x75cd9fff KERNELBASE.dll 6.1.7601.17514
0x75d50000 - 0x75decfff usp10.dll 1.626.7601.17514
0x75df0000 - 0x75eb8fff user32.dll 6.1.7601.17514
0x75ec0000 - 0x75f5ffff advapi32.dll 6.1.7601.17514
0x75f60000 - 0x75f7efff imm32.dll 6.1.7601.17514
0x76ea0000 - 0x76ffbfff ole32.dll 6.1.7601.17514
0x77000000 - 0x7704dfff gdi32.dll 6.1.7601.17514
0x77050000 - 0x770d2fff clbcatq.dll 2001.12.8530.16385
0x770e0000 - 0x77180fff rpcrt4.dll 6.1.7601.17514
0x77200000 - 0x7728efff oleaut32.dll 6.1.7601.17514
0x77290000 - 0x7742cfff setupapi.dll 6.1.7601.17514
0x77430000 - 0x774fbfff msctf.dll 6.1.7600.16385
0x77500000 - 0x775d3fff kernel32.dll 6.1.7601.17514
0x777e0000 - 0x7788bfff msvcrt.dll 7.0.7600.16385
0x77890000 - 0x779cbfff ntdll.dll 6.1.7601.17514
0x779d0000 - 0x779d9fff lpk.dll 6.1.7600.16385
0x779e0000 - 0x779f8fff sechost.dll 6.1.7600.16385
0x77a60000 - 0x77ab6fff shlwapi.dll 6.1.7601.17514

Best regards,
Jens

Ted Mielczarek

unread,
Apr 13, 2012, 10:38:46 AM4/13/12
to google-brea...@googlegroups.com
On Fri, Apr 13, 2012 at 10:33 AM, jensa <jens.m...@googlemail.com> wrote:
Note:

> No crash
> Assertion: Unknown assertion type 0x00000000

Breakpad is picking up on some other type of assertion and
terminating, it's apparently not getting to the actual null pointer
dereference.

> Thread 3
>  0  ntdll.dll + 0x470b4
>    eip = 0x778d70b4   esp = 0x008cf660   ebp = 0x008cf69c   ebx =
> 0x00000000
>    esi = 0x0000000e   edi = 0x00f8ddc8   eax = 0x00000000   ecx =
> 0x7ffdc000
>    edx = 0x00000578   efl = 0x00000202
>    Found by: given as instruction pointer in context
>  1  user32.dll + 0xa07b
>    eip = 0x75dfa07c   esp = 0x008cf6a4   ebp = 0x008cf6c0
>    Found by: previous frame's frame pointer
>  2  crash_generation_app.exe!google_breakpad::AppendTextToEditBox
> [crash_generation_app.cc : 159 + 0xb]
>    eip = 0x00f510eb   esp = 0x008cf6c8   ebp = 0x008cf95c
>    Found by: previous frame's frame pointer

Whatever's going on here is the culprit. You can get symbols for
ntdll.dll and user32.dll from the Microsoft symbol server (perhaps
using symchk.exe) and dump them with dump_syms to get useful function
names for those top two frames.

-Ted

Reply all
Reply to author
Forward
0 new messages