| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | How to interpret crash code |
> Sorry to butt in, but I think there is a better way :-) > > What I (under Windows) do is the following. I start the debugger and let the > debugger run the app. When an exception occurs, the debugger is invoked in With wild pointers, the exception sometimes occurs FAR away from the cause. Then you have to start removing large blocks of code to narrow it down to what exactly you screwed up. (I once copied a structure using the sizeof() the wrong structure (the data file header structure instead of the data file record structure) and overwrite some memory, corrupting the dos memory chain. It worked fine until the program exited and tried to free the memory, at which point dos said "the system has been stopped." You can easily trash your own structures, variables, etc, and trying to figure out what you did wrong by looking at the assembly language (which you didnt' make, the compiler made), is doing it the hard way. Unless you've got a compiler error (which I have encountered), it's easier to pick it out of the source code than the .exe. Rob --- Xblat* Origin: The Conversation Pit. Marlton, NJ. 609-985-7553 V32bis (1:266/30) SEEN-BY: 12/2442 620/243 624/50 632/348 640/820 690/660 711/409 410 413 430 SEEN-BY: 711/807 808 809 934 942 949 712/353 515 713/888 800/1 7877/2809 @PATH: 266/30 40 100 505 3615/50 229/2 12/2442 711/409 808 809 934 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.