TIP: Click on subject to list as thread! ANSI
echo: os2prog
to: Wim Veldhuis
from: Rob Landley
date: 1995-01-22 17:14:32
subject: How to interpret crash code

> Sorry to butt in, but I think there is a better way :-)
> 
> What I (under Windows) do is the following. I start the debugger and let the
> debugger run the app. When an exception occurs, the debugger is invoked in

With wild pointers, the exception sometimes occurs FAR away from the cause.
 Then you have to start removing large blocks of code to narrow it down to
what exactly you screwed up.  (I once copied a structure using the sizeof()
the wrong structure (the data file header structure instead of the data
file record structure) and overwrite some memory, corrupting the dos memory
chain.  It worked fine until the program exited and tried to free the
memory, at which point dos said "the system has been stopped."

You can easily trash your own structures, variables, etc, and trying to
figure out what you did wrong by looking at the assembly language (which
you didnt' make, the compiler made), is doing it the hard way.  Unless
you've got a compiler error (which I have encountered), it's easier to pick
it out of the source code than the .exe.
 
Rob
 
--- Xblat
* Origin: The Conversation Pit. Marlton, NJ. 609-985-7553 V32bis (1:266/30)
SEEN-BY: 12/2442 620/243 624/50 632/348 640/820 690/660 711/409 410 413 430
SEEN-BY: 711/807 808 809 934 942 949 712/353 515 713/888 800/1 7877/2809
@PATH: 266/30 40 100 505 3615/50 229/2 12/2442 711/409 808 809 934

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.