Bug #2802 Debug?
Submitted: 15 Feb 2004 5:37 Modified: 12 Apr 2004 2:08
Reporter: Jørn Bekkevold Email Updates:
Status: Closed Impact on me:
None 
Category:MySQL Administrator Severity:S3 (Non-critical)
Version:1.0.1.alpha OS:Windows (w2k 5.0)
Assigned to: Michael G. Zinner CPU Architecture:Any

[15 Feb 2004 5:37] Jørn Bekkevold
Description:
Application exception occurred:
        App:  (pid=1496)
        When: 2/15/2004 @ 14:19:22.332
        Exception number: 80000003 (hardcoded breakpoint)

*----> System Information <----*
        Computer Name: BALTIC
        User Name: Administrator
        Number of Processors: 1
        Processor Type: x86 Family 6 Model 4 Stepping 4
        Windows 2000 Version: 5.0
        Current Build: 2195
        Service Pack: 4
        Current Type: Uniprocessor Free
        Registered Organization: Baltic
        Registered Owner: Jørn Bekkevold

*----> Task List <----*
   0 Idle.exe
   8 System.exe
 176 SMSS.exe
 200 CSRSS.exe
 196 WINLOGON.exe
 248 SERVICES.exe
 260 LSASS.exe
 448 svchost.exe
 472 spoolsv.exe
 500 msdtc.exe
 608 Apache.exe
 644 avgserv.exe
 652 Apache.exe
 676 svchost.exe
 908 hidserv.exe
 924 ibguard.exe
1032 mysqld-nt.exe
1060 regsvc.exe
1064 mstask.exe
1144 tcpsvcs.exe
1164 NOPDB.exe
 336 vsmon.exe
1228 explorer.exe
1276 WinMgmt.exe
1284 svchost.exe
1304 inetinfo.exe
1332 mqsvc.exe
1632 MemoryBoost.exe
1596 realsched.exe
1640 avgcc32.exe
1672 zapro.exe
1740 CSAgent.exe
1756 Netscp.exe
1768 launcher.exe
1708 getright.exe
1780 getright.exe
1824 FINDFAST.exe
1784 OSA.exe
1888 WZQKPICK.exe
1892 winmysqladmin.e.exe
2000 ibserver.exe
1496 MySQLAdministra.exe
2160 DRWTSN32.exe
   0 _Total.exe

(00400000 - 005FA000) 
(77F80000 - 77FFB000) 
(7C570000 - 7C623000) 
(77E10000 - 77E6F000) 
(77F40000 - 77F79000) 
(7C2D0000 - 7C332000) 
(77D30000 - 77D9E000) 
(779B0000 - 77A4B000) 
(77A50000 - 77B3C000) 
(77820000 - 77827000) 
(759B0000 - 759B6000) 
(71710000 - 71794000) 
(77800000 - 7781E000) 
(76620000 - 76631000) 
(782F0000 - 78538000) 
(70A70000 - 70AD5000) 
(78000000 - 78045000) 
(76B30000 - 76B6E000) 
(75050000 - 75058000) 
(75030000 - 75044000) 
(75020000 - 75028000) 
(10000000 - 10044000) 
(00230000 - 0031F000) 
(77520000 - 77525000) 
(00320000 - 003D6000) 
(00600000 - 006DA000) 
(006E0000 - 006F2000) 
(00700000 - 00781000) 
(00790000 - 00799000) 
(007A0000 - 00819000) 
(01310000 - 01316000) 
(775A0000 - 77626000) 
(77840000 - 7787E000) 
(770C0000 - 770E3000) 

State Dump for Thread Id 0x878

eax=00000001 ebx=0120e494 ecx=70a92585 edx=00180000 esi=0120e494 edi=0012fcb4
eip=1001ddee esp=0012fbac ebp=0012fbb0 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: <nosymbols>
        1001ddd3 68248b0310       push    0x10038b24
        1001ddd8 6a00             push    0x0
        1001ddda 6a00             push    0x0
        1001dddc 6a00             push    0x0
        1001ddde 6a01             push    0x1
        1001dde0 e8af54ffff       call    myx_tg+0x9b (10013294)
        1001dde5 83c420           add     esp,0x20
        1001dde8 83f801           cmp     eax,0x1
        1001ddeb 7501             jnz     1002a9ee
        1001dded cc               int     3
FAULT ->1001ddee 8b45fc           mov     eax,[ebp+0xfc]         ss:00bf9a96=????????
        1001ddf1 83781403         cmp   dword ptr [eax+0x14],0x3 ds:00ac9ee7=????????
        1001ddf5 7565             jnz     1002695c
        1001ddf7 8b4dfc           mov     ecx,[ebp+0xfc]         ss:00bf9a96=????????
        1001ddfa 81790cbcbadcfe                                  ds:7155c46b=????????
                                  cmp     dword ptr [ecx+0xc],0xfedcbabc
        1001de01 7509             jnz     1002690c
        1001de03 8b55fc           mov     edx,[ebp+0xfc]         ss:00bf9a96=????????
        1001de06 837a1800         cmp   dword ptr [edx+0x18],0x0 ds:00c49ee6=????????
        1001de0a 7421             jz      1002462d
        1001de0c 68d88a0310       push    0x10038ad8
        1001de11 6a00             push    0x0
        1001de13 6889040000       push    0x489

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0012FBB0 1001DB8E 011E0B90 00000001 0012FCB4 1001C1A2 !<nosymbols> 
0012FBC0 1001C1A2 011E0B90 0012FDC0 0120E494 0120E494 !<nosymbols> 
0012FCB4 1001BEEB 01669400 00000003 0012FF04 0120E494 !<nosymbols> 
0012FDC0 1001AED6 0166BCA8 0165F4A0 011E0B30 00000003 !<nosymbols> 
0012FF04 004C4E04 01214360 0012FF38 0012FF44 00403C44 !<nosymbols> 
0012FF3C 004C4CD0 0012FF70 00403CBF 0012FF60 0120E494 !<nosymbols> 
0012FF60 00524719 00000000 00487701 0012FF98 00524813 !<nosymbols> 
0012FF90 005278E6 0012FFB4 005279D6 0012FFC0 00740061 !<nosymbols> 
0012FFC0 7C5987E7 00720074 00740061 7FFDF000 00650078 !<nosymbols> 
0012FFF0 00000000 00527824 00000000 000000C8 00000100 kernel32!ProcessIdToSessionId 

*----> Raw Stack Dump <----*
0012fbac  70 0b 1e 01 c0 fb 12 00 - 8e db 01 10 90 0b 1e 01  p...............
0012fbbc  01 00 00 00 b4 fc 12 00 - a2 c1 01 10 90 0b 1e 01  ................
0012fbcc  c0 fd 12 00 94 e4 20 01 - 94 e4 20 01 03 00 00 00  ...... ... .....
0012fbdc  cc cc cc cc cc cc cc cc - cc cc cc cc cc cc cc cc  ................
0012fbec  cc cc cc cc cc cc cc cc - cc cc cc cc cc cc cc cc  ................
0012fbfc  cc cc cc cc cc cc cc cc - cc cc cc cc cc cc cc cc  ................
0012fc0c  cc cc cc cc cc cc cc cc - cc cc cc cc cc cc cc cc  ................
0012fc1c  cc cc cc cc cc cc cc cc - cc cc cc cc cc cc cc cc  ................
0012fc2c  cc cc cc cc cc cc cc cc - cc cc cc cc cc cc cc cc  ................
0012fc3c  cc cc cc cc cc cc cc cc - cc cc cc cc cc cc cc cc  ................
0012fc4c  cc cc cc cc cc cc cc cc - cc cc cc cc cc cc cc cc  ................
0012fc5c  cc cc cc cc cc cc cc cc - cc cc cc cc cc cc cc cc  ................
0012fc6c  cc cc cc cc cc cc cc cc - cc cc cc cc cc cc cc cc  ................
0012fc7c  cc cc cc cc cc cc cc cc - cc cc cc cc cc cc cc cc  ................
0012fc8c  cc cc cc cc cc cc cc cc - cc cc cc cc cc cc cc cc  ................
0012fc9c  cc cc cc cc 90 0b 1e 01 - cc cc cc cc cc cc cc cc  ................
0012fcac  c8 0b 1e 01 cc cc cc cc - c0 fd 12 00 eb be 01 10  ................
0012fcbc  00 94 66 01 03 00 00 00 - 04 ff 12 00 94 e4 20 01  ..f........... .
0012fccc  94 e4 20 01 cc cc cc cc - cc cc cc cc cc cc cc cc  .. .............
0012fcdc  cc cc cc cc cc cc cc cc - cc cc cc cc cc cc cc cc  ................

State Dump for Thread Id 0x7bc

eax=00000158 ebx=00148010 ecx=00147ee0 edx=00000000 esi=00147ee0 edi=00000100
eip=77f839c7 esp=0154fe28 ebp=0154ff74 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000206

function: NtReplyWaitReceivePortEx
        77f839bc b8ac000000       mov     eax,0xac
        77f839c1 8d542404         lea     edx,[esp+0x4]          ss:02019d0f=????????
        77f839c5 cd2e             int     2e
        77f839c7 c21400           ret     0x14
        77f839ca 8b4710           mov     eax,[edi+0x10]         ds:00ac9fe6=????????
        77f839cd 8b483c           mov     ecx,[eax+0x3c]         ds:00aca03e=????????
        77f839d0 f6400801         test    byte ptr [eax+0x8],0x1       ds:00aca03e=??
        77f839d4 7502             jnz     RtlCreateProcessParameters+0xd (77f83cd8)
        77f839d6 03c8             add     ecx,eax
        77f839d8 894de4           mov     [ebp+0xe4],ecx         ss:02019e5a=????????
        77f839db 8b4710           mov     eax,[edi+0x10]         ds:00ac9fe6=????????
        77f839de 668b4038         mov     ax,[eax+0x38]              ds:00aca03f=????
        77f839e2 668945e0         mov     [ebp+0xe0],ax              ss:02019e5b=????
        77f839e6 668945e2         mov     [ebp+0xe2],ax              ss:02019e5b=????
        77f839ea 53               push    ebx

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0154FF74 77D56D9E 77D39A00 00147EE0 401479DC 00000070 ntdll!NtReplyWaitReceivePortEx 
0154FFA8 77D41C6C 00146D40 0154FFEC 7C57B382 00148010 rpcrt4!TowerConstruct 
0154FFB4 7C57B382 00148010 401479DC 00000070 00148010 rpcrt4!I_RpcServerInqTransportType 
0154FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW 

State Dump for Thread Id 0x138

eax=77ab4639 ebx=00000102 ecx=00130178 edx=00000000 esi=77f89153 edi=0164ff74
eip=77f8915e esp=0164ff60 ebp=0164ff7c iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000206

function: ZwDelayExecution
        77f89153 b832000000       mov     eax,0x32
        77f89158 8d542404         lea     edx,[esp+0x4]          ss:02119e47=????????
        77f8915c cd2e             int     2e
        77f8915e c20800           ret     0x8

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0164FF7C 7C59A0B8 0000EA60 00000000 77AB85FC 0000EA60 ntdll!ZwDelayExecution 
00007530 00000000 00000000 00000000 00000000 00000000 kernel32!Sleep 

*----> Raw Stack Dump <----*
0164ff60  ed a0 59 7c 00 00 00 00 - 74 ff 64 01 1d 9e 59 7c  ..Y|....t.d...Y|
0164ff70  f8 a6 14 00 00 ba 3c dc - ff ff ff ff 30 75 00 00  ......<.....0u..
0164ff80  b8 a0 59 7c 60 ea 00 00 - 00 00 00 00 fc 85 ab 77  ..Y|`..........w
0164ff90  60 ea 00 00 fb 46 ab 77 - 00 00 00 00 00 00 a5 77  `....F.w.......w
0164ffa0  f8 a6 14 00 ec ff 64 01 - f8 a6 14 00 53 46 ab 77  ......d.....SF.w
0164ffb0  d8 7a a6 77 c3 7a a6 77 - 82 b3 57 7c f8 a6 14 00  .z.w.z.w..W|....
0164ffc0  d8 7a a6 77 c3 7a a6 77 - f8 a6 14 00 00 c0 fd 7f  .z.w.z.w........
0164ffd0  78 01 13 00 c0 ff 64 01 - 78 01 13 00 ff ff ff ff  x.....d.x.......
0164ffe0  b4 1b 5c 7c f0 2a 57 7c - 00 00 00 00 00 00 00 00  ..\|.*W|........
0164fff0  00 00 00 00 39 46 ab 77 - f8 a6 14 00 00 00 00 00  ....9F.w........
01650000  08 00 00 00 01 01 00 00 - ee ff ee ff 00 00 00 00  ................
01650010  00 00 14 01 00 c0 04 00 - 00 00 65 01 00 01 00 00  ..........e.....
01650020  40 00 65 01 00 00 75 01 - 4f 00 00 00 02 00 00 00  @.e...u.O.......
01650030  b8 05 14 01 00 00 00 00 - f0 af 65 01 00 00 00 00  ..........e.....
01650040  09 00 08 00 01 01 08 00 - 00 00 00 00 03 00 00 00  ................
01650050  a0 43 3b 00 00 00 00 00 - 00 00 00 00 78 bf 14 01  .C;.........x...
01650060  00 00 00 00 00 00 00 00 - d0 71 14 01 00 00 00 00  .........q......
01650070  c8 bf 14 01 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
01650080  00 00 00 00 00 00 00 00 - 09 00 09 00 01 01 08 00  ................
01650090  00 00 00 00 03 00 00 00 - a0 43 3b 00 00 00 00 00  .........C;.....

How to repeat:
??
[18 Feb 2004 11:09] Michael G. Zinner
Could you tell me where exactly the access violation occured?

Which section was selected? There have been a number of issues with umlauts and characters not in the std. ASCII charset which have been addressed in the upcoming version 1.0.2a.

Could you please verify if the bug is still present in this version?

Thanks a 1k times!
[19 Feb 2004 1:18] Jørn Bekkevold
"Could you tell me where exactly the access violation occured?"
It occures on start up with following message:
Debug error!
Program:C:\Programfiles:..............\.....\

DAMAGE:after normal block[#56]at 0x011E0B90
(Press retry to debug the application)

It works when I press ignore!
[12 Apr 2004 2:08] Michael G. Zinner
Thank you for your bug report. This issue has been committed to our
source repository of that product and will be incorporated into the
next release.

If necessary, you can access the source repository and build the latest
available version, including the bugfix, yourself. More information 
about accessing the source trees is available at
    http://www.mysql.com/doc/en/Installing_source_tree.html