public inbox for gcc@gcc.gnu.org
 help / color / mirror / Atom feed
* RE: internal compiler error: Segmentation fault
       [not found] <BAY127-W3905CADAD6C9E6370134AD8D4A0@phx.gbl>
@ 2008-01-10 14:36 ` Kai Tietz
  2008-01-10 15:18   ` J. Finch
  2008-01-10 15:32   ` J. Finch
  0 siblings, 2 replies; 8+ messages in thread
From: Kai Tietz @ 2008-01-10 14:36 UTC (permalink / raw)
  To: J. Finch; +Cc: fortran, FX, GCC Development, mingw-w64-public

Hi,

"J. Finch" wrote on 10.01.2008 15:23:56:

> 
> on the issue as stated in the subject regarding x86_64-pc-mingw64, I
> have downloaded MS debugger as suggested by FX, and I attach the 
> logs where command "p" is stepping.
> 
> fortran Program, c.f90, for test, one statement only
> [program begin]
> end
> [program end]
> 
> The command "cdb gfortran c.f90" output "without.log". This one is good.
> The command "cdb gfortran -O1 c.f90" output the log "with.log" .
> 
> *** attention: attachment may break long line into two*** If you 
> need further information, please let me know.
> 
> 
> [without.log]
> Symbol search path is: *** Invalid ***
> 
****************************************************************************
> * Symbol loading may be unreliable without a symbol search path.   *
> * Use .symfix to have the debugger choose a symbol path.   *
> * After setting your symbol path, use .reload to refresh symbol 
locations. *
> 
****************************************************************************
> Executable search path is:
> ModLoad: 00000000`00400000 00000000`0043c000   image00000000`00400000
> ModLoad: 00000000`77ec0000 00000000`77ff9000   ntdll.dll
> ModLoad: 00000000`77d40000 00000000`77eb3000   C:
> \WINDOWS\system32\kernel32.dll
> ModLoad: 000007ff`7fc00000 000007ff`7fc86000 
C:\WINDOWS\system32\msvcrt.dll
> ModLoad: 00000000`77c20000 00000000`77d2c000 
C:\WINDOWS\system32\USER32.dll
> ModLoad: 000007ff`7fc90000 000007ff`7fd2c000 
C:\WINDOWS\system32\GDI32.dll
> (8b0.5b4): Break instruction exception - code 80000003 (first chance)
> *** ERROR: Symbol file could not be found.  Defaulted to export 
> symbols for ntdll.dll -
> ntdll!DbgBreakPoint:
> 00000000`77ef2aa0 cc              int     3
> 0:000> p
> ntdll!DbgBreakPoint+0x1:
> 00000000`77ef2aa1 c3              ret
> 0:000> p
> ntdll!LdrInitShimEngineDynamic+0xcbc:
> 00000000`77f1bbcc 8b95bc000000    mov     edx,dword ptr [rbp+0BCh] 
> ss:000007ff`fffd80bc=00000070
> 0:000> p
> ntdll!LdrInitShimEngineDynamic+0xcc2:
> 00000000`77f1bbd2 d1ea            shr     edx,1
> 0:000> p
> ntdll!LdrInitShimEngineDynamic+0xcc4:
> 00000000`77f1bbd4 80e201          and     dl,1
> 0:000> p
> ntdll!LdrInitShimEngineDynamic+0xcc7:
> 00000000`77f1bbd7 8815bdb30800    mov     byte ptr [ntdll!
> NlsMbOemCodePageTag+0x882 (00000000`77fa6f9a)],dl 
ds:00000000`77fa6f9a=00
> 0:000> p
> ntdll!LdrInitShimEngineDynamic+0xccd:
> 00000000`77f1bbdd e9939bfbff      jmp     ntdll!
> CsrCaptureMessageBuffer+0x3b5 (00000000`77ed5775)
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3b5:
> 00000000`77ed5775 488bb42410010000 mov     rsi,qword ptr [rsp+110h] 
> ss:00000000`0022f7e0=0000000000000000
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3bd:
> 00000000`77ed577d 4885f6          test    rsi,rsi
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3c0:
> 00000000`77ed5780 0f855c640400    jne     ntdll!
> LdrInitShimEngineDynamic+0xcd2 (00000000`77f1bbe2) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3c6:
> 00000000`77ed5786 498bcd          mov     rcx,r13
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3c9:
> 00000000`77ed5789 e852e2ffff      call    ntdll!
> CsrClientConnectToServer+0x2f0 (00000000`77ed39e0)
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3ce:
> 00000000`77ed578e 4533e4          xor     r12d,r12d
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3d1:
> 00000000`77ed5791 498bcf          mov     rcx,r15
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3d4:
> 00000000`77ed5794 e8d78f0000      call    ntdll!
> RtlDeregisterWait+0x640 (00000000`77ede770)
> 0:000> p
> ModLoad: 000007ff`7d500000 000007ff`7d539000 
C:\WINDOWS\system32\IMM32.DLL
> ModLoad: 000007ff`7fee0000 000007ff`7ffe5000   C:
> \WINDOWS\system32\ADVAPI32.dll
> ModLoad: 000007ff`7fd30000 000007ff`7fec9000 
C:\WINDOWS\system32\RPCRT4.dll
> ModLoad: 000007ff`7e9c0000 000007ff`7e9e2000 
C:\WINDOWS\system32\Secur32.dll
> ModLoad: 000007ff`69300000 000007ff`6930d000 C:\WINDOWS\system32\LPK.DLL
> ModLoad: 000007ff`78e80000 000007ff`78f0e000 
C:\WINDOWS\system32\USP10.dll
> ntdll!CsrCaptureMessageBuffer+0x3d9:
> 00000000`77ed5799 85c0            test    eax,eax
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3db:
> 00000000`77ed579b 8bd8            mov     ebx,eax
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3dd:
> 00000000`77ed579d 0f8861640400    js      ntdll!
> LdrInitShimEngineDynamic+0xcf4 (00000000`77f1bc04) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3e3:
> 00000000`77ed57a3 833d86ea0c0000  cmp     dword ptr [ntdll!
> pow+0x2230 (00000000`77fa4230)],0 ds:00000000`77fa4230=00000000
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3ea:
> 00000000`77ed57aa 0f858e640400    jne     ntdll!
> LdrInitShimEngineDynamic+0xd2e (00000000`77f1bc3e) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3f0:
> 00000000`77ed57b0 488b8530020000  mov     rax,qword ptr [rbp+230h] 
> ss:000007ff`fffd8230=0000000000000000
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3f7:
> 00000000`77ed57b7 4885c0          test    rax,rax
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3fa:
> 00000000`77ed57ba 0f85c7640400    jne     ntdll!
> LdrInitShimEngineDynamic+0xd77 (00000000`77f1bc87) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x400:
> 00000000`77ed57c0 4d85ed          test    r13,r13
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x403:
> 00000000`77ed57c3 0f85c6640400    jne     ntdll!
> LdrInitShimEngineDynamic+0xd7f (00000000`77f1bc8f) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x409:
> 00000000`77ed57c9 33c0            xor     eax,eax
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x40b:
> 00000000`77ed57cb e92ee6ffff      jmp     ntdll!
> RtlSetThreadPoolStartFunc+0x10e
> (00000000`77ed3dfe)
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x10e:
> 00000000`77ed3dfe 660f6fb424b0020000 movdqa xmm6,xmmword ptr 
> [rsp+2B0h] ss:00000000`0022f980=00000000000000000000000000000000
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x117:
> 00000000`77ed3e07 eb4a            jmp     ntdll!
> RtlSetThreadPoolStartFunc+0x163(00000000`77ed3e53)
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x163:
> 00000000`77ed3e53 488bb424f0020000 mov     rsi,qword ptr [rsp+2F0h] 
> ss:00000000`0022f9c0=0000000000000000
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x16b:
> 00000000`77ed3e5b eb2a            jmp     ntdll!
> RtlSetThreadPoolStartFunc+0x197(00000000`77ed3e87)
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x197:
> 00000000`77ed3e87 4c8bbc24c8020000 mov     r15,qword ptr [rsp+2C8h] 
> ss:00000000`0022f998={ntdll (00000000`77ec0000)}
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x19f:
> 00000000`77ed3e8f 4c8bb424d0020000 mov     r14,qword ptr [rsp+2D0h] 
> ss:00000000`0022f9a0=000000000022fab0
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1a7:
> 00000000`77ed3e97 4c8bac24d8020000 mov     r13,qword ptr [rsp+2D8h] 
> ss:00000000`0022f9a8=0000000000000003
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1af:
> 00000000`77ed3e9f 4c8ba424e0020000 mov     r12,qword ptr [rsp+2E0h] 
> ss:00000000`0022f9b0=0000000000000001
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1b7:
> 00000000`77ed3ea7 488bbc24e8020000 mov     rdi,qword ptr [rsp+2E8h] 
> ss:00000000`0022f9b8=000007fffffd8000
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1bf:
> 00000000`77ed3eaf 488bac2418030000 mov     rbp,qword ptr [rsp+318h] 
> ss:00000000`0022f9e8=0000000000000000
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1c7:
> 00000000`77ed3eb7 488b9c2410030000 mov     rbx,qword ptr [rsp+310h] 
> ss:00000000`0022f9e0=0000000000000000
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1cf:
> *** ERROR: Symbol file could not be found.  Defaulted to export 
> symbols for C:\WINDOWS\system32\kernel32.dll -
> 00000000`77ed3ebf 488b8c24a0020000 mov     rcx,qword ptr [rsp+2A0h] 
> ss:00000000`0022f970=0000000077e163a9
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1d7:
> 00000000`77ed3ec7 e8b4fe0100      call    ntdll!
> RtlAllocateHeap+0x1f0 (00000000`77ef3d80)
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1dc:
> 00000000`77ed3ecc 4881c4f8020000  add     rsp,2F8h
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1e3:
> 00000000`77ed3ed3 c3              ret
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x46f:
> 00000000`77ed582f 8bd8            mov     ebx,eax
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x471:
> 00000000`77ed5831 89442430        mov     dword ptr [rsp+30h],eax 
> ss:00000000`0022fa00=00000000
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x475:
> 00000000`77ed5835 85c0            test    eax,eax
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x477:
> 00000000`77ed5837 0f883a510400    js      ntdll!
> LdrSetAppCompatDllRedirectionCallback+0x197 (00000000`77f1a977) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x47d:
> 00000000`77ed583d 488b8f18030000  mov     rcx,qword ptr [rdi+318h] 
> ds:000007ff`fffd8318=0000000000000000
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x484:
> 00000000`77ed5844 4885c9          test    rcx,rcx
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x487:
> 00000000`77ed5847 0f8563510400    jne     ntdll!
> LdrSetAppCompatDllRedirectionCallback+0x1d0 (00000000`77f1a9b0) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x48d:
> 00000000`77ed584d eb00            jmp     ntdll!
> CsrCaptureMessageBuffer+0x48f (00000000`77ed584f)
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x48f:
> 00000000`77ed584f c605ba160d0000  mov     byte ptr [ntdll!
> NlsMbOemCodePageTag+0x7f8 (00000000`77fa6f10)],0 ds:00000000`77fa6f10=01
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x496:
> 00000000`77ed5856 85db            test    ebx,ebx
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x498:
> 00000000`77ed5858 0f88794c0200    js      ntdll!wcsrchr+0x197 
> (00000000`77efa4d7) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x49e:
> 00000000`77ed585e 833d8b1b0d0000  cmp     dword ptr [ntdll!
> NlsMbOemCodePageTag+0xcd8 (00000000`77fa73f0)],0 
ds:00000000`77fa73f0=00000000
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x4a5:
> 00000000`77ed5865 0f8566510400    jne     ntdll!
> LdrSetAppCompatDllRedirectionCallback+0x1f1 (00000000`77f1a9d1) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x4ab:
> 00000000`77ed586b f0ff05821b0d00  lock inc dword ptr [ntdll!
> NlsMbOemCodePageTag+0xcdc (00000000`77fa73f4)] 
ds:00000000`77fa73f4=00000001
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x4b2:
> 00000000`77ed5872 8b5c2430        mov     ebx,dword ptr [rsp+30h] 
> ss:00000000`0022fa00=00000000
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x4b6:
> 00000000`77ed5876 e95c4c0200      jmp     ntdll!wcsrchr+0x197 
> (00000000`77efa4d7)
> 0:000> p
> ntdll!wcsrchr+0x197:
> 00000000`77efa4d7 e8e476ffff      call    ntdll!NtTestAlert 
> (00000000`77ef1bc0)
> 0:000> p
> ntdll!wcsrchr+0x19c:
> 00000000`77efa4dc 85db            test    ebx,ebx
> 0:000> p
> ntdll!wcsrchr+0x19e:
> 00000000`77efa4de 0f8877050200    js      ntdll!
> LdrSetAppCompatDllRedirectionCallback+0x27b (00000000`77f1aa5b) [br=0]
> 0:000> p
> ntdll!wcsrchr+0x1a4:
> 00000000`77efa4e4 eb00            jmp     ntdll!wcsrchr+0x1a6 
> (00000000`77efa4e6)
> 0:000> p
> ntdll!wcsrchr+0x1a6:
> 00000000`77efa4e6 488b9c24f8000000 mov     rbx,qword ptr [rsp+0F8h] 
> ss:00000000`0022fac8=0000000000000000
> 0:000> p
> ntdll!wcsrchr+0x1ae:
> 00000000`77efa4ee 488bb424d0000000 mov     rsi,qword ptr [rsp+0D0h] 
> ss:00000000`0022faa0=0000000000000000
> 0:000> p
> ntdll!wcsrchr+0x1b6:
> 00000000`77efa4f6 488bbc24c8000000 mov     rdi,qword ptr [rsp+0C8h] 
> ss:00000000`0022fa98=0000000000000000
> 0:000> p
> ntdll!wcsrchr+0x1be:
> 00000000`77efa4fe 4c8ba424c0000000 mov     r12,qword ptr [rsp+0C0h] 
> ss:00000000`0022fa90=0000000000000000
> 0:000> p
> ntdll!wcsrchr+0x1c6:
> 00000000`77efa506 4c8bac24b8000000 mov     r13,qword ptr [rsp+0B8h] 
> ss:00000000`0022fa88=0000000000000000
> 0:000> p
> ntdll!wcsrchr+0x1ce:
> 00000000`77efa50e 4c8bb424b0000000 mov     r14,qword ptr [rsp+0B0h] 
> ss:00000000`0022fa80=0000000000000000
> 0:000> p
> ntdll!wcsrchr+0x1d6:
> 00000000`77efa516 4c8bbc24a8000000 mov     r15,qword ptr [rsp+0A8h] 
> ss:00000000`0022fa78=0000000000000000
> 0:000> p
> ntdll!wcsrchr+0x1de:
> 00000000`77efa51e 4881c4d8000000  add     rsp,0D8h
> 0:000> p
> ntdll!wcsrchr+0x1e5:
> 00000000`77efa525 c3              ret
> 0:000> p
> ntdll!KiUserApcDispatcher+0x15:
> 00000000`77ef30a5 488bcc          mov     rcx,rsp
> 0:000> p
> ntdll!KiUserApcDispatcher+0x18:
> 00000000`77ef30a8 b201            mov     dl,1
> 0:000> p
> ntdll!KiUserApcDispatcher+0x1a:
> 00000000`77ef30aa e861ddffff      call    ntdll!NtContinue 
(00000000`77ef0e10)
> 0:000> p
> ntdll!ZwTerminateProcess+0xa:
> 00000000`77ef0caa c3              ret
> 0:000>
> 
> 
> 
> [with.log]
> Symbol search path is: *** Invalid ***
> 
****************************************************************************
> * Symbol loading may be unreliable without a symbol search path.   *
> * Use .symfix to have the debugger choose a symbol path.   *
> * After setting your symbol path, use .reload to refresh symbol 
locations. *
> 
****************************************************************************
> Executable search path is:
> ModLoad: 00000000`00400000 00000000`0043c000   image00000000`00400000
> ModLoad: 00000000`77ec0000 00000000`77ff9000   ntdll.dll
> ModLoad: 00000000`77d40000 00000000`77eb3000   C:
> \WINDOWS\system32\kernel32.dll
> ModLoad: 000007ff`7fc00000 000007ff`7fc86000 
C:\WINDOWS\system32\msvcrt.dll
> ModLoad: 00000000`77c20000 00000000`77d2c000 
C:\WINDOWS\system32\USER32.dll
> ModLoad: 000007ff`7fc90000 000007ff`7fd2c000 
C:\WINDOWS\system32\GDI32.dll
> (6f4.260): Break instruction exception - code 80000003 (first chance)
> *** ERROR: Symbol file could not be found.  Defaulted to export 
> symbols for ntdll.dll -
> ntdll!DbgBreakPoint:
> 00000000`77ef2aa0 cc              int     3
> 0:000> p
> ntdll!DbgBreakPoint+0x1:
> 00000000`77ef2aa1 c3              ret
> 0:000> p
> ntdll!LdrInitShimEngineDynamic+0xcbc:
> 00000000`77f1bbcc 8b95bc000000    mov     edx,dword ptr [rbp+0BCh] 
> ss:000007ff`fffd70bc=00000070
> 0:000> p
> ntdll!LdrInitShimEngineDynamic+0xcc2:
> 00000000`77f1bbd2 d1ea            shr     edx,1
> 0:000> p
> ntdll!LdrInitShimEngineDynamic+0xcc4:
> 00000000`77f1bbd4 80e201          and     dl,1
> 0:000> p
> ntdll!LdrInitShimEngineDynamic+0xcc7:
> 00000000`77f1bbd7 8815bdb30800    mov     byte ptr [ntdll!
> NlsMbOemCodePageTag+0x882 (00000000`77fa6f9a)],dl 
ds:00000000`77fa6f9a=00
> 0:000> p
> ntdll!LdrInitShimEngineDynamic+0xccd:
> 00000000`77f1bbdd e9939bfbff      jmp     ntdll!
> CsrCaptureMessageBuffer+0x3b5 (00000000`77ed5775)
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3b5:
> 00000000`77ed5775 488bb42410010000 mov     rsi,qword ptr [rsp+110h] 
> ss:00000000`0022f7e0=0000000000000000
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3bd:
> 00000000`77ed577d 4885f6          test    rsi,rsi
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3c0:
> 00000000`77ed5780 0f855c640400    jne     ntdll!
> LdrInitShimEngineDynamic+0xcd2 (00000000`77f1bbe2) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3c6:
> 00000000`77ed5786 498bcd          mov     rcx,r13
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3c9:
> 00000000`77ed5789 e852e2ffff      call    ntdll!
> CsrClientConnectToServer+0x2f0 (00000000`77ed39e0)
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3ce:
> 00000000`77ed578e 4533e4          xor     r12d,r12d
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3d1:
> 00000000`77ed5791 498bcf          mov     rcx,r15
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3d4:
> 00000000`77ed5794 e8d78f0000      call    ntdll!
> RtlDeregisterWait+0x640 (00000000`77ede770)
> 0:000> p
> ModLoad: 000007ff`7d500000 000007ff`7d539000 
C:\WINDOWS\system32\IMM32.DLL
> ModLoad: 000007ff`7fee0000 000007ff`7ffe5000   C:
> \WINDOWS\system32\ADVAPI32.dll
> ModLoad: 000007ff`7fd30000 000007ff`7fec9000 
C:\WINDOWS\system32\RPCRT4.dll
> ModLoad: 000007ff`7e9c0000 000007ff`7e9e2000 
C:\WINDOWS\system32\Secur32.dll
> ModLoad: 000007ff`69300000 000007ff`6930d000 C:\WINDOWS\system32\LPK.DLL
> ModLoad: 000007ff`78e80000 000007ff`78f0e000 
C:\WINDOWS\system32\USP10.dll
> ntdll!CsrCaptureMessageBuffer+0x3d9:
> 00000000`77ed5799 85c0            test    eax,eax
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3db:
> 00000000`77ed579b 8bd8            mov     ebx,eax
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3dd:
> 00000000`77ed579d 0f8861640400    js      ntdll!
> LdrInitShimEngineDynamic+0xcf4 (00000000`77f1bc04) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3e3:
> 00000000`77ed57a3 833d86ea0c0000  cmp     dword ptr [ntdll!
> pow+0x2230 (00000000`77fa4230)],0 ds:00000000`77fa4230=00000000
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3ea:
> 00000000`77ed57aa 0f858e640400    jne     ntdll!
> LdrInitShimEngineDynamic+0xd2e (00000000`77f1bc3e) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3f0:
> 00000000`77ed57b0 488b8530020000  mov     rax,qword ptr [rbp+230h] 
> ss:000007ff`fffd7230=0000000000000000
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3f7:
> 00000000`77ed57b7 4885c0          test    rax,rax
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x3fa:
> 00000000`77ed57ba 0f85c7640400    jne     ntdll!
> LdrInitShimEngineDynamic+0xd77 (00000000`77f1bc87) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x400:
> 00000000`77ed57c0 4d85ed          test    r13,r13
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x403:
> 00000000`77ed57c3 0f85c6640400    jne     ntdll!
> LdrInitShimEngineDynamic+0xd7f (00000000`77f1bc8f) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x409:
> 00000000`77ed57c9 33c0            xor     eax,eax
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x40b:
> 00000000`77ed57cb e92ee6ffff      jmp     ntdll!
> RtlSetThreadPoolStartFunc+0x10e(00000000`77ed3dfe)
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x10e:
> 00000000`77ed3dfe 660f6fb424b0020000 movdqa xmm6,xmmword ptr 
> [rsp+2B0h] ss:00000000`0022f980=00000000000000000000000000000000
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x117:
> 00000000`77ed3e07 eb4a            jmp     ntdll!
> RtlSetThreadPoolStartFunc+0x163(00000000`77ed3e53)
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x163:
> 00000000`77ed3e53 488bb424f0020000 mov     rsi,qword ptr [rsp+2F0h] 
> ss:00000000`0022f9c0=0000000000000000
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x16b:
> 00000000`77ed3e5b eb2a            jmp     ntdll!
> RtlSetThreadPoolStartFunc+0x197(00000000`77ed3e87)
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x197:
> 00000000`77ed3e87 4c8bbc24c8020000 mov     r15,qword ptr [rsp+2C8h] 
> ss:00000000`0022f998={ntdll (00000000`77ec0000)}
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x19f:
> 00000000`77ed3e8f 4c8bb424d0020000 mov     r14,qword ptr [rsp+2D0h] 
> ss:00000000`0022f9a0=000000000022fab0
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1a7:
> 00000000`77ed3e97 4c8bac24d8020000 mov     r13,qword ptr [rsp+2D8h] 
> ss:00000000`0022f9a8=0000000000000003
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1af:
> 00000000`77ed3e9f 4c8ba424e0020000 mov     r12,qword ptr [rsp+2E0h] 
> ss:00000000`0022f9b0=0000000000000001
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1b7:
> 00000000`77ed3ea7 488bbc24e8020000 mov     rdi,qword ptr [rsp+2E8h] 
> ss:00000000`0022f9b8=000007fffffd7000
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1bf:
> 00000000`77ed3eaf 488bac2418030000 mov     rbp,qword ptr [rsp+318h] 
> ss:00000000`0022f9e8=0000000000000000
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1c7:
> 00000000`77ed3eb7 488b9c2410030000 mov     rbx,qword ptr [rsp+310h] 
> ss:00000000`0022f9e0=0000000000000000
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1cf:
> 00000000`77ed3ebf 488b8c24a0020000 mov     rcx,qword ptr [rsp+2A0h] 
> ss:00000000`0022f970=0000000077c1653c
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1d7:
> 00000000`77ed3ec7 e8b4fe0100      call    ntdll!
> RtlAllocateHeap+0x1f0 (00000000`77ef3d80)
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1dc:
> 00000000`77ed3ecc 4881c4f8020000  add     rsp,2F8h
> 0:000> p
> ntdll!RtlSetThreadPoolStartFunc+0x1e3:
> 00000000`77ed3ed3 c3              ret
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x46f:
> 00000000`77ed582f 8bd8            mov     ebx,eax
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x471:
> 00000000`77ed5831 89442430        mov     dword ptr [rsp+30h],eax 
> ss:00000000`0022fa00=00000000
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x475:
> 00000000`77ed5835 85c0            test    eax,eax
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x477:
> 00000000`77ed5837 0f883a510400    js      ntdll!
> LdrSetAppCompatDllRedirectionCallback+0x197 (00000000`77f1a977) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x47d:
> 00000000`77ed583d 488b8f18030000  mov     rcx,qword ptr [rdi+318h] 
> ds:000007ff`fffd7318=0000000000000000
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x484:
> 00000000`77ed5844 4885c9          test    rcx,rcx
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x487:
> 00000000`77ed5847 0f8563510400    jne     ntdll!
> LdrSetAppCompatDllRedirectionCallback+0x1d0 (00000000`77f1a9b0) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x48d:
> 00000000`77ed584d eb00            jmp     ntdll!
> CsrCaptureMessageBuffer+0x48f (00000000`77ed584f)
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x48f:
> 00000000`77ed584f c605ba160d0000  mov     byte ptr [ntdll!
> NlsMbOemCodePageTag+0x7f8 (00000000`77fa6f10)],0 ds:00000000`77fa6f10=01
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x496:
> 00000000`77ed5856 85db            test    ebx,ebx
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x498:
> 00000000`77ed5858 0f88794c0200    js      ntdll!wcsrchr+0x197 
> (00000000`77efa4d7) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x49e:
> 00000000`77ed585e 833d8b1b0d0000  cmp     dword ptr [ntdll!
> NlsMbOemCodePageTag+0xcd8 (00000000`77fa73f0)],0 
ds:00000000`77fa73f0=00000000
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x4a5:
> 00000000`77ed5865 0f8566510400    jne     ntdll!
> LdrSetAppCompatDllRedirectionCallback+0x1f1 (00000000`77f1a9d1) [br=0]
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x4ab:
> 00000000`77ed586b f0ff05821b0d00  lock inc dword ptr [ntdll!
> NlsMbOemCodePageTag+0xcdc (00000000`77fa73f4)] 
ds:00000000`77fa73f4=00000001
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x4b2:
> 00000000`77ed5872 8b5c2430        mov     ebx,dword ptr [rsp+30h] 
> ss:00000000`0022fa00=00000000
> 0:000> p
> ntdll!CsrCaptureMessageBuffer+0x4b6:
> 00000000`77ed5876 e95c4c0200      jmp     ntdll!wcsrchr+0x197 
> (00000000`77efa4d7)
> 0:000> p
> ntdll!wcsrchr+0x197:
> 00000000`77efa4d7 e8e476ffff      call    ntdll!NtTestAlert 
> (00000000`77ef1bc0)
> 0:000> p
> ntdll!wcsrchr+0x19c:
> 00000000`77efa4dc 85db            test    ebx,ebx
> 0:000> p
> ntdll!wcsrchr+0x19e:
> 00000000`77efa4de 0f8877050200    js      ntdll!
> LdrSetAppCompatDllRedirectionCallback+0x27b (00000000`77f1aa5b) [br=0]
> 0:000> p
> ntdll!wcsrchr+0x1a4:
> 00000000`77efa4e4 eb00            jmp     ntdll!wcsrchr+0x1a6 
> (00000000`77efa4e6)
> 0:000> p
> ntdll!wcsrchr+0x1a6:
> 00000000`77efa4e6 488b9c24f8000000 mov     rbx,qword ptr [rsp+0F8h] 
> ss:00000000`0022fac8=0000000000000000
> 0:000> p
> ntdll!wcsrchr+0x1ae:
> 00000000`77efa4ee 488bb424d0000000 mov     rsi,qword ptr [rsp+0D0h] 
> ss:00000000`0022faa0=0000000000000000
> 0:000> p
> ntdll!wcsrchr+0x1b6:
> 00000000`77efa4f6 488bbc24c8000000 mov     rdi,qword ptr [rsp+0C8h] 
> ss:00000000`0022fa98=0000000000000000
> 0:000> p
> ntdll!wcsrchr+0x1be:
> 00000000`77efa4fe 4c8ba424c0000000 mov     r12,qword ptr [rsp+0C0h] 
> ss:00000000`0022fa90=0000000000000000
> 0:000> p
> ntdll!wcsrchr+0x1c6:
> 00000000`77efa506 4c8bac24b8000000 mov     r13,qword ptr [rsp+0B8h] 
> ss:00000000`0022fa88=0000000000000000
> 0:000> p
> ntdll!wcsrchr+0x1ce:
> 00000000`77efa50e 4c8bb424b0000000 mov     r14,qword ptr [rsp+0B0h] 
> ss:00000000`0022fa80=0000000000000000
> 0:000> p
> ntdll!wcsrchr+0x1d6:
> 00000000`77efa516 4c8bbc24a8000000 mov     r15,qword ptr [rsp+0A8h] 
> ss:00000000`0022fa78=0000000000000000
> 0:000> p
> ntdll!wcsrchr+0x1de:
> 00000000`77efa51e 4881c4d8000000  add     rsp,0D8h
> 0:000> p
> ntdll!wcsrchr+0x1e5:
> 00000000`77efa525 c3              ret
> 0:000> p
> ntdll!KiUserApcDispatcher+0x15:
> 00000000`77ef30a5 488bcc          mov     rcx,rsp
> 0:000> p
> ntdll!KiUserApcDispatcher+0x18:
> 00000000`77ef30a8 b201            mov     dl,1
> 0:000> p
> ntdll!KiUserApcDispatcher+0x1a:
> 00000000`77ef30aa e861ddffff      call    ntdll!NtContinue 
(00000000`77ef0e10)
> 0:000> p
> c.f90: In function 'MAIN__':
> c.f90:1: internal compiler error: Segmentation fault
> Please submit a full bug report,
> with preprocessed source if appropriate.
> See  for instructions.
> ntdll!ZwTerminateProcess+0xa:
> 00000000`77ef0caa c3              ret
> 0:000>

This looks fine. What is the call stack looks like? And how does the 
function calling ntdll looks like?
I think, you should step on an "int 3". Because you simply debug the 
exception handling routine itself.

Cheers,
 i.A. Kai Tietz

|  (\_/)  This is Bunny. Copy and paste Bunny
| (='.'=) into your signature to help him gain
| (")_(") world domination.

------------------------------------------------------------------------------------------
  OneVision Software Entwicklungs GmbH & Co. KG
  Dr.-Leo-Ritter-Straße 9 - 93049 Regensburg
  Tel: +49.(0)941.78004.0 - Fax: +49.(0)941.78004.489 - www.OneVision.com
  Commerzbank Regensburg - BLZ 750 400 62 - Konto 6011050
  Handelsregister: HRA 6744, Amtsgericht Regensburg
  Komplementärin: OneVision Software Entwicklungs Verwaltungs GmbH
  Dr.-Leo-Ritter-Straße 9 – 93049 Regensburg
  Handelsregister: HRB 8932, Amtsgericht Regensburg - Geschäftsführer: 
Ulrike Döhler, Manuela Kluger



^ permalink raw reply	[flat|nested] 8+ messages in thread

* RE: internal compiler error: Segmentation fault
  2008-01-10 14:36 ` internal compiler error: Segmentation fault Kai Tietz
@ 2008-01-10 15:18   ` J. Finch
  2008-01-10 15:32   ` J. Finch
  1 sibling, 0 replies; 8+ messages in thread
From: J. Finch @ 2008-01-10 15:18 UTC (permalink / raw)
  To: Kai Tietz; +Cc: fortran, FX, GCC Development, mingw-w64-public





>
> This looks fine. What is the call stack looks like? And how does the
> function calling ntdll looks like?
> I think, you should step on an "int 3". Because you simply debug the
> exception handling routine itself.
>

Hi, Kai:

I attach the stack in the following:




C:\temp\fortran>cdb gfortran -O1 c.f90

Microsoft (R) Windows Debugger Version 6.8.0004.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

CommandLine: gfortran -O1 c.f90
Symbol search path is: *** Invalid ***
****************************************************************************
* Symbol loading may be unreliable without a symbol search path.           *
* Use .symfix to have the debugger choose a symbol path.                   *
* After setting your symbol path, use .reload to refresh symbol locations. *
****************************************************************************
Executable search path is:
ModLoad: 00000000`00400000 00000000`0043c000   image00000000`00400000
ModLoad: 00000000`77ec0000 00000000`77ff9000   ntdll.dll
ModLoad: 00000000`77d40000 00000000`77eb3000   C:\WINDOWS\system32\kernel32.dll
ModLoad: 000007ff`7fc00000 000007ff`7fc86000   C:\WINDOWS\system32\msvcrt.dll
ModLoad: 00000000`77c20000 00000000`77d2c000   C:\WINDOWS\system32\USER32.dll
ModLoad: 000007ff`7fc90000 000007ff`7fd2c000   C:\WINDOWS\system32\GDI32.dll
(a20.a24): Break instruction exception - code 80000003 (first chance)
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for ntdll.dll -
ntdll!DbgBreakPoint:
00000000`77ef2aa0 cc              int     3
0:000> g
ModLoad: 000007ff`7d500000 000007ff`7d539000   C:\WINDOWS\system32\IMM32.DLL
ModLoad: 000007ff`7fee0000 000007ff`7ffe5000   C:\WINDOWS\system32\ADVAPI32.dll
ModLoad: 000007ff`7fd30000 000007ff`7fec9000   C:\WINDOWS\system32\RPCRT4.dll
ModLoad: 000007ff`7e9c0000 000007ff`7e9e2000   C:\WINDOWS\system32\Secur32.dll
ModLoad: 000007ff`69300000 000007ff`6930d000   C:\WINDOWS\system32\LPK.DLL
ModLoad: 000007ff`78e80000 000007ff`78f0e000   C:\WINDOWS\system32\USP10.dll
c.f90: In function 'MAIN__':
c.f90:1: internal compiler error: Segmentation fault
Please submit a full bug report,
with preprocessed source if appropriate.
See  for instructions.
ntdll!ZwTerminateProcess+0xa:
00000000`77ef0caa c3              ret
0:000> kb
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
RetAddr           : Args to Child
            : Call Site
00000000`77d5a329 : 00000000`00000001 00000000`00000001 00000000`00000001 00000000`00000000 : ntdll!ZwTerminateProcess+0xa
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\msvcrt.dll -
000007ff`7fc4069b : 00000000`00000000 00000000`00428030 00000000`00000000 00000000`40000060 : kernel32!ExitProcess+0x59
000007ff`7fc40863 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : msvcrt!strerror+0x3beb
*** ERROR: Module load completed but symbols could not be loaded for image00000000`00400000
00000000`0040141d : 00000000`00000003 00000000`003d3590 00000000`00000000 00000000`00419a10 : msvcrt!initterm+0x193
00000000`00000003 : 00000000`003d3590 00000000`00000000 00000000`00419a10 00000000`00000000 : image00000000_00400000+0x141d
00000000`003d3590 : 00000000`00000000 00000000`00419a10 00000000`00000000 00000000`00000000 : 0x3
00000000`00000000 : 00000000`00419a10 00000000`00000000 00000000`00000000 00000000`00000000 : 0x3d3590
00000000`00419a10 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : image00000000_00400000+0x19a10
00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
0:000>
_________________________________________________________________
Share life as it happens with the new Windows Live.
http://www.windowslive.com/share.html?ocid=TXT_TAGHM_Wave2_sharelife_012008

^ permalink raw reply	[flat|nested] 8+ messages in thread

* RE: internal compiler error: Segmentation fault
  2008-01-10 14:36 ` internal compiler error: Segmentation fault Kai Tietz
  2008-01-10 15:18   ` J. Finch
@ 2008-01-10 15:32   ` J. Finch
  2008-01-10 16:06     ` Kai Tietz
  1 sibling, 1 reply; 8+ messages in thread
From: J. Finch @ 2008-01-10 15:32 UTC (permalink / raw)
  To: Kai Tietz; +Cc: fortran, FX, GCC Development, mingw-w64-public




Hi,

stack before and after segmentation fault is as:


......
......
ntdll!KiUserApcDispatcher+0x15:
00000000`77ef30a5 488bcc          mov     rcx,rsp
0:000> p
ntdll!KiUserApcDispatcher+0x18:
00000000`77ef30a8 b201            mov     dl,1
0:000> k
Child-SP          RetAddr           Call Site
00000000`0022fab0 00000000`77d59620 ntdll!KiUserApcDispatcher+0x18
00000000`0022ffa8 00000000`00000000 kernel32!BaseProcessStart
0:000> p
ntdll!KiUserApcDispatcher+0x1a:
00000000`77ef30aa e861ddffff      call    ntdll!NtContinue (00000000`77ef0e10)
0:000> k
Child-SP          RetAddr           Call Site
00000000`0022fab0 00000000`77d59620 ntdll!KiUserApcDispatcher+0x1a
00000000`0022ffa8 00000000`00000000 kernel32!BaseProcessStart
0:000> p
c.f90: In function 'MAIN__':
c.f90:1: internal compiler error: Segmentation fault
Please submit a full bug report,
with preprocessed source if appropriate.
See  for instructions.
ntdll!ZwTerminateProcess+0xa:
00000000`77ef0caa c3              ret
0:000> k
Child-SP          RetAddr           Call Site
00000000`0022fd08 00000000`77d5a329 ntdll!ZwTerminateProcess+0xa
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\msvcrt.dll -
00000000`0022fd10 000007ff`7fc4069b kernel32!ExitProcess+0x59
00000000`0022fe60 000007ff`7fc40863 msvcrt!strerror+0x3beb
*** ERROR: Module load completed but symbols could not be loaded for image00000000`00400000
00000000`0022fe90 00000000`0040141d msvcrt!initterm+0x193
00000000`0022fed0 00000000`00000003 image00000000_00400000+0x141d
00000000`0022fed8 00000000`003d3590 0x3
00000000`0022fee0 00000000`00000000 0x3d3590
00000000`0022fee8 00000000`00419a10 0x0
00000000`0022fef0 00000000`00000000 image00000000_00400000+0x19a10
00000000`0022fef8 00000000`00000000 0x0
00000000`0022ff00 00000000`00000000 0x0
00000000`0022ff08 00000000`00000000 0x0
00000000`0022ff10 00000000`00000000 0x0
00000000`0022ff18 00000000`00000000 0x0
00000000`0022ff20 00000000`00000000 0x0
00000000`0022ff28 00000000`00000000 0x0
00000000`0022ff30 00000000`00000000 0x0
00000000`0022ff38 00000000`00000000 0x0
00000000`0022ff40 00000000`00000000 0x0
00000000`0022ff48 00000000`00000000 0x0
0:000>
_________________________________________________________________
Get the power of Windows + Web with the new Windows Live.
http://www.windowslive.com?ocid=TXT_TAGHM_Wave2_powerofwindows_012008

^ permalink raw reply	[flat|nested] 8+ messages in thread

* RE: internal compiler error: Segmentation fault
  2008-01-10 15:32   ` J. Finch
@ 2008-01-10 16:06     ` Kai Tietz
  2008-01-10 18:38       ` J. Finch
  0 siblings, 1 reply; 8+ messages in thread
From: Kai Tietz @ 2008-01-10 16:06 UTC (permalink / raw)
  To: J. Finch; +Cc: fortran, FX, GCC Development, mingw-w64-public

Hi,

"J. Finch" wrote on 10.01.2008 16:31:38:

Thank you very much for your dumps, but you should use on runtime the 
option '-dH' option to enforce that you reach the point, where the 
exception is caused.

> stack before and after segmentation fault is as:
> 
> 
> ......
> ......
> ntdll!KiUserApcDispatcher+0x15:
> 00000000`77ef30a5 488bcc          mov     rcx,rsp
> 0:000> p
> ntdll!KiUserApcDispatcher+0x18:
> 00000000`77ef30a8 b201            mov     dl,1
> 0:000> k
> Child-SP          RetAddr           Call Site
> 00000000`0022fab0 00000000`77d59620 ntdll!KiUserApcDispatcher+0x18
> 00000000`0022ffa8 00000000`00000000 kernel32!BaseProcessStart
> 0:000> p
> ntdll!KiUserApcDispatcher+0x1a:
> 00000000`77ef30aa e861ddffff      call    ntdll!NtContinue 
(00000000`77ef0e10)
> 0:000> k
> Child-SP          RetAddr           Call Site
> 00000000`0022fab0 00000000`77d59620 ntdll!KiUserApcDispatcher+0x1a
> 00000000`0022ffa8 00000000`00000000 kernel32!BaseProcessStart
> 0:000> p
> c.f90: In function 'MAIN__':
> c.f90:1: internal compiler error: Segmentation fault
> Please submit a full bug report,
> with preprocessed source if appropriate.
> See  for instructions.
> ntdll!ZwTerminateProcess+0xa:
> 00000000`77ef0caa c3              ret
> 0:000> k
> Child-SP          RetAddr           Call Site
> 00000000`0022fd08 00000000`77d5a329 ntdll!ZwTerminateProcess+0xa
> *** ERROR: Symbol file could not be found.  Defaulted to export 
> symbols for C:\WINDOWS\system32\msvcrt.dll -
> 00000000`0022fd10 000007ff`7fc4069b kernel32!ExitProcess+0x59
> 00000000`0022fe60 000007ff`7fc40863 msvcrt!strerror+0x3beb
> *** ERROR: Module load completed but symbols could not be loaded for
> image00000000`00400000
> 00000000`0022fe90 00000000`0040141d msvcrt!initterm+0x193
> 00000000`0022fed0 00000000`00000003 image00000000_00400000+0x141d
> 00000000`0022fed8 00000000`003d3590 0x3
> 00000000`0022fee0 00000000`00000000 0x3d3590
> 00000000`0022fee8 00000000`00419a10 0x0
> 00000000`0022fef0 00000000`00000000 image00000000_00400000+0x19a10
> 00000000`0022fef8 00000000`00000000 0x0
> 00000000`0022ff00 00000000`00000000 0x0
> 00000000`0022ff08 00000000`00000000 0x0
> 00000000`0022ff10 00000000`00000000 0x0
> 00000000`0022ff18 00000000`00000000 0x0
> 00000000`0022ff20 00000000`00000000 0x0
> 00000000`0022ff28 00000000`00000000 0x0
> 00000000`0022ff30 00000000`00000000 0x0
> 00000000`0022ff38 00000000`00000000 0x0
> 00000000`0022ff40 00000000`00000000 0x0
> 00000000`0022ff48 00000000`00000000 0x0
> 0:000>

Cheers,
 i.A. Kai Tietz

|  (\_/)  This is Bunny. Copy and paste Bunny
| (='.'=) into your signature to help him gain
| (")_(") world domination.

------------------------------------------------------------------------------------------
  OneVision Software Entwicklungs GmbH & Co. KG
  Dr.-Leo-Ritter-Straße 9 - 93049 Regensburg
  Tel: +49.(0)941.78004.0 - Fax: +49.(0)941.78004.489 - www.OneVision.com
  Commerzbank Regensburg - BLZ 750 400 62 - Konto 6011050
  Handelsregister: HRA 6744, Amtsgericht Regensburg
  Komplementärin: OneVision Software Entwicklungs Verwaltungs GmbH
  Dr.-Leo-Ritter-Straße 9 – 93049 Regensburg
  Handelsregister: HRB 8932, Amtsgericht Regensburg - Geschäftsführer: 
Ulrike Döhler, Manuela Kluger


^ permalink raw reply	[flat|nested] 8+ messages in thread

* RE: internal compiler error: Segmentation fault
  2008-01-10 16:06     ` Kai Tietz
@ 2008-01-10 18:38       ` J. Finch
  0 siblings, 0 replies; 8+ messages in thread
From: J. Finch @ 2008-01-10 18:38 UTC (permalink / raw)
  To: Kai Tietz; +Cc: fortran, FX, GCC Development, mingw-w64-public





Hi, Kai,

This is what you want, with -dH. If you need further information, please let me know. Finch.


.........
.........
(8b8.8bc): Break instruction exception - code 80000003 (first chance)
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for ntdll.dll -
ntdll!DbgBreakPoint:
00000000`77ef2aa0 cc              int     3
0:000> p
ntdll!DbgBreakPoint+0x1:
00000000`77ef2aa1 c3              ret
0:000> p
ntdll!LdrInitShimEngineDynamic+0xcbc:
00000000`77f1bbcc 8b95bc000000    mov     edx,dword ptr [rbp+0BCh] ss:000007ff`fffde0bc=00000070
0:000> p
ntdll!LdrInitShimEngineDynamic+0xcc2:
00000000`77f1bbd2 d1ea            shr     edx,1
0:000> p
ntdll!LdrInitShimEngineDynamic+0xcc4:
00000000`77f1bbd4 80e201          and     dl,1
0:000> p
ntdll!LdrInitShimEngineDynamic+0xcc7:
00000000`77f1bbd7 8815bdb30800    mov     byte ptr [ntdll!NlsMbOemCodePageTag+0x882 (00000000`77fa6f9a)],dl ds:00000000`77fa6f9a=00
0:000> p
ntdll!LdrInitShimEngineDynamic+0xccd:
00000000`77f1bbdd e9939bfbff      jmp     ntdll!CsrCaptureMessageBuffer+0x3b5 (00000000`77ed5775)
0:000> p
ntdll!CsrCaptureMessageBuffer+0x3b5:
00000000`77ed5775 488bb42410010000 mov     rsi,qword ptr [rsp+110h] ss:00000000`0022f7e0=0000000000000000
0:000> p
ntdll!CsrCaptureMessageBuffer+0x3bd:
00000000`77ed577d 4885f6          test    rsi,rsi
0:000> p
ntdll!CsrCaptureMessageBuffer+0x3c0:
00000000`77ed5780 0f855c640400    jne     ntdll!LdrInitShimEngineDynamic+0xcd2 (00000000`77f1bbe2) [br=0]
0:000> p
ntdll!CsrCaptureMessageBuffer+0x3c6:
00000000`77ed5786 498bcd          mov     rcx,r13
0:000> p
ntdll!CsrCaptureMessageBuffer+0x3c9:
00000000`77ed5789 e852e2ffff      call    ntdll!CsrClientConnectToServer+0x2f0 (00000000`77ed39e0)
0:000> p
ntdll!CsrCaptureMessageBuffer+0x3ce:
00000000`77ed578e 4533e4          xor     r12d,r12d
0:000> p
ntdll!CsrCaptureMessageBuffer+0x3d1:
00000000`77ed5791 498bcf          mov     rcx,r15
0:000> p
ntdll!CsrCaptureMessageBuffer+0x3d4:
00000000`77ed5794 e8d78f0000      call    ntdll!RtlDeregisterWait+0x640 (00000000`77ede770)
0:000> p
ModLoad: 000007ff`7d500000 000007ff`7d539000   C:\WINDOWS\system32\IMM32.DLL
ModLoad: 000007ff`7fee0000 000007ff`7ffe5000   C:\WINDOWS\system32\ADVAPI32.dll
ModLoad: 000007ff`7fd30000 000007ff`7fec9000   C:\WINDOWS\system32\RPCRT4.dll
ModLoad: 000007ff`7e9c0000 000007ff`7e9e2000   C:\WINDOWS\system32\Secur32.dll
ModLoad: 000007ff`69300000 000007ff`6930d000   C:\WINDOWS\system32\LPK.DLL
ModLoad: 000007ff`78e80000 000007ff`78f0e000   C:\WINDOWS\system32\USP10.dll
ntdll!CsrCaptureMessageBuffer+0x3d9:
00000000`77ed5799 85c0            test    eax,eax
0:000> p
ntdll!CsrCaptureMessageBuffer+0x3db:
00000000`77ed579b 8bd8            mov     ebx,eax
0:000> p
ntdll!CsrCaptureMessageBuffer+0x3dd:
00000000`77ed579d 0f8861640400    js      ntdll!LdrInitShimEngineDynamic+0xcf4 (00000000`77f1bc04) [br=0]
0:000> p
ntdll!CsrCaptureMessageBuffer+0x3e3:
00000000`77ed57a3 833d86ea0c0000  cmp     dword ptr [ntdll!pow+0x2230 (00000000`77fa4230)],0 ds:00000000`77fa4230=00000000
0:000> p
ntdll!CsrCaptureMessageBuffer+0x3ea:
00000000`77ed57aa 0f858e640400    jne     ntdll!LdrInitShimEngineDynamic+0xd2e (00000000`77f1bc3e) [br=0]
0:000> p
ntdll!CsrCaptureMessageBuffer+0x3f0:
00000000`77ed57b0 488b8530020000  mov     rax,qword ptr [rbp+230h] ss:000007ff`fffde230=0000000000000000
0:000> p
ntdll!CsrCaptureMessageBuffer+0x3f7:
00000000`77ed57b7 4885c0          test    rax,rax
0:000> p
ntdll!CsrCaptureMessageBuffer+0x3fa:
00000000`77ed57ba 0f85c7640400    jne     ntdll!LdrInitShimEngineDynamic+0xd77 (00000000`77f1bc87) [br=0]
0:000> p
ntdll!CsrCaptureMessageBuffer+0x400:
00000000`77ed57c0 4d85ed          test    r13,r13
0:000> p
ntdll!CsrCaptureMessageBuffer+0x403:
00000000`77ed57c3 0f85c6640400    jne     ntdll!LdrInitShimEngineDynamic+0xd7f (00000000`77f1bc8f) [br=0]
0:000> p
ntdll!CsrCaptureMessageBuffer+0x409:
00000000`77ed57c9 33c0            xor     eax,eax
0:000> p
ntdll!CsrCaptureMessageBuffer+0x40b:
00000000`77ed57cb e92ee6ffff      jmp     ntdll!RtlSetThreadPoolStartFunc+0x10e
(00000000`77ed3dfe)
0:000> p
ntdll!RtlSetThreadPoolStartFunc+0x10e:
00000000`77ed3dfe 660f6fb424b0020000 movdqa xmm6,xmmword ptr [rsp+2B0h] ss:00000000`0022f980=00000000000000000000000000000000
0:000> p
ntdll!RtlSetThreadPoolStartFunc+0x117:
00000000`77ed3e07 eb4a            jmp     ntdll!RtlSetThreadPoolStartFunc+0x163(00000000`77ed3e53)
0:000> p
ntdll!RtlSetThreadPoolStartFunc+0x163:
00000000`77ed3e53 488bb424f0020000 mov     rsi,qword ptr [rsp+2F0h] ss:00000000`0022f9c0=0000000000000000
0:000> p
ntdll!RtlSetThreadPoolStartFunc+0x16b:
00000000`77ed3e5b eb2a            jmp     ntdll!RtlSetThreadPoolStartFunc+0x197(00000000`77ed3e87)
0:000> p
ntdll!RtlSetThreadPoolStartFunc+0x197:
00000000`77ed3e87 4c8bbc24c8020000 mov     r15,qword ptr [rsp+2C8h] ss:00000000`0022f998={ntdll (00000000`77ec0000)}
0:000> p
ntdll!RtlSetThreadPoolStartFunc+0x19f:
00000000`77ed3e8f 4c8bb424d0020000 mov     r14,qword ptr [rsp+2D0h] ss:00000000`0022f9a0=000000000022fab0
0:000> p
ntdll!RtlSetThreadPoolStartFunc+0x1a7:
00000000`77ed3e97 4c8bac24d8020000 mov     r13,qword ptr [rsp+2D8h] ss:00000000`0022f9a8=0000000000000003
0:000> p
ntdll!RtlSetThreadPoolStartFunc+0x1af:
00000000`77ed3e9f 4c8ba424e0020000 mov     r12,qword ptr [rsp+2E0h] ss:00000000`0022f9b0=0000000000000001
0:000> p
ntdll!RtlSetThreadPoolStartFunc+0x1b7:
00000000`77ed3ea7 488bbc24e8020000 mov     rdi,qword ptr [rsp+2E8h] ss:00000000`0022f9b8=000007fffffde000
0:000> p
ntdll!RtlSetThreadPoolStartFunc+0x1bf:
00000000`77ed3eaf 488bac2418030000 mov     rbp,qword ptr [rsp+318h] ss:00000000`0022f9e8=0000000000000000
0:000> p
ntdll!RtlSetThreadPoolStartFunc+0x1c7:
00000000`77ed3eb7 488b9c2410030000 mov     rbx,qword ptr [rsp+310h] ss:00000000`0022f9e0=0000000000000000
0:000> p
ntdll!RtlSetThreadPoolStartFunc+0x1cf:
00000000`77ed3ebf 488b8c24a0020000 mov     rcx,qword ptr [rsp+2A0h] ss:00000000`0022f970=0000000077f8515f
0:000> p
ntdll!RtlSetThreadPoolStartFunc+0x1d7:
00000000`77ed3ec7 e8b4fe0100      call    ntdll!RtlAllocateHeap+0x1f0 (00000000`77ef3d80)
0:000> p
ntdll!RtlSetThreadPoolStartFunc+0x1dc:
00000000`77ed3ecc 4881c4f8020000  add     rsp,2F8h
0:000> p
ntdll!RtlSetThreadPoolStartFunc+0x1e3:
00000000`77ed3ed3 c3              ret
0:000> p
ntdll!CsrCaptureMessageBuffer+0x46f:
00000000`77ed582f 8bd8            mov     ebx,eax
0:000> p
ntdll!CsrCaptureMessageBuffer+0x471:
00000000`77ed5831 89442430        mov     dword ptr [rsp+30h],eax ss:00000000`0022fa00=00000000
0:000> p
ntdll!CsrCaptureMessageBuffer+0x475:
00000000`77ed5835 85c0            test    eax,eax
0:000> p
ntdll!CsrCaptureMessageBuffer+0x477:
00000000`77ed5837 0f883a510400    js      ntdll!LdrSetAppCompatDllRedirectionCallback+0x197 (00000000`77f1a977) [br=0]
0:000> p
ntdll!CsrCaptureMessageBuffer+0x47d:
00000000`77ed583d 488b8f18030000  mov     rcx,qword ptr [rdi+318h] ds:000007ff`fffde318=0000000000000000
0:000> p
ntdll!CsrCaptureMessageBuffer+0x484:
00000000`77ed5844 4885c9          test    rcx,rcx
0:000> p
ntdll!CsrCaptureMessageBuffer+0x487:
00000000`77ed5847 0f8563510400    jne     ntdll!LdrSetAppCompatDllRedirectionCallback+0x1d0 (00000000`77f1a9b0) [br=0]
0:000> p
ntdll!CsrCaptureMessageBuffer+0x48d:
00000000`77ed584d eb00            jmp     ntdll!CsrCaptureMessageBuffer+0x48f (00000000`77ed584f)
0:000> p
ntdll!CsrCaptureMessageBuffer+0x48f:
00000000`77ed584f c605ba160d0000  mov     byte ptr [ntdll!NlsMbOemCodePageTag+0x7f8 (00000000`77fa6f10)],0 ds:00000000`77fa6f10=01
0:000> p
ntdll!CsrCaptureMessageBuffer+0x496:
00000000`77ed5856 85db            test    ebx,ebx
0:000> p
ntdll!CsrCaptureMessageBuffer+0x498:
00000000`77ed5858 0f88794c0200    js      ntdll!wcsrchr+0x197 (00000000`77efa4d7) [br=0]
0:000> p
ntdll!CsrCaptureMessageBuffer+0x49e:
00000000`77ed585e 833d8b1b0d0000  cmp     dword ptr [ntdll!NlsMbOemCodePageTag+0xcd8 (00000000`77fa73f0)],0 ds:00000000`77fa73f0=00000000
0:000> p
ntdll!CsrCaptureMessageBuffer+0x4a5:
00000000`77ed5865 0f8566510400    jne     ntdll!LdrSetAppCompatDllRedirectionCallback+0x1f1 (00000000`77f1a9d1) [br=0]
0:000> p
ntdll!CsrCaptureMessageBuffer+0x4ab:
00000000`77ed586b f0ff05821b0d00  lock inc dword ptr [ntdll!NlsMbOemCodePageTag+0xcdc (00000000`77fa73f4)] ds:00000000`77fa73f4=00000001
0:000> p
ntdll!CsrCaptureMessageBuffer+0x4b2:
00000000`77ed5872 8b5c2430        mov     ebx,dword ptr [rsp+30h] ss:00000000`0022fa00=00000000
0:000> p
ntdll!CsrCaptureMessageBuffer+0x4b6:
00000000`77ed5876 e95c4c0200      jmp     ntdll!wcsrchr+0x197 (00000000`77efa4d7)
0:000> p
ntdll!wcsrchr+0x197:
00000000`77efa4d7 e8e476ffff      call    ntdll!NtTestAlert (00000000`77ef1bc0)
0:000> p
ntdll!wcsrchr+0x19c:
00000000`77efa4dc 85db            test    ebx,ebx
0:000> p
ntdll!wcsrchr+0x19e:
00000000`77efa4de 0f8877050200    js      ntdll!LdrSetAppCompatDllRedirectionCallback+0x27b (00000000`77f1aa5b) [br=0]
0:000> p
ntdll!wcsrchr+0x1a4:
00000000`77efa4e4 eb00            jmp     ntdll!wcsrchr+0x1a6 (00000000`77efa4e6)
0:000> p
ntdll!wcsrchr+0x1a6:
00000000`77efa4e6 488b9c24f8000000 mov     rbx,qword ptr [rsp+0F8h] ss:00000000`0022fac8=0000000000000000
0:000> p
ntdll!wcsrchr+0x1ae:
00000000`77efa4ee 488bb424d0000000 mov     rsi,qword ptr [rsp+0D0h] ss:00000000`0022faa0=0000000000000000
0:000> p
ntdll!wcsrchr+0x1b6:
00000000`77efa4f6 488bbc24c8000000 mov     rdi,qword ptr [rsp+0C8h] ss:00000000`0022fa98=0000000000000000
0:000> p
ntdll!wcsrchr+0x1be:
00000000`77efa4fe 4c8ba424c0000000 mov     r12,qword ptr [rsp+0C0h] ss:00000000`0022fa90=0000000000000000
0:000> p
ntdll!wcsrchr+0x1c6:
00000000`77efa506 4c8bac24b8000000 mov     r13,qword ptr [rsp+0B8h] ss:00000000`0022fa88=0000000000000000
0:000> p
ntdll!wcsrchr+0x1ce:
00000000`77efa50e 4c8bb424b0000000 mov     r14,qword ptr [rsp+0B0h] ss:00000000`0022fa80=0000000000000000
0:000> p
ntdll!wcsrchr+0x1d6:
00000000`77efa516 4c8bbc24a8000000 mov     r15,qword ptr [rsp+0A8h] ss:00000000`0022fa78=0000000000000000
0:000> p
ntdll!wcsrchr+0x1de:
00000000`77efa51e 4881c4d8000000  add     rsp,0D8h
0:000> p
ntdll!wcsrchr+0x1e5:
00000000`77efa525 c3              ret
0:000> p
ntdll!KiUserApcDispatcher+0x15:
00000000`77ef30a5 488bcc          mov     rcx,rsp
0:000> p
ntdll!KiUserApcDispatcher+0x18:
00000000`77ef30a8 b201            mov     dl,1
0:000> k
Child-SP          RetAddr           Call Site
00000000`0022fab0 00000000`77d59620 ntdll!KiUserApcDispatcher+0x18
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
00000000`0022ffa8 00000000`00000000 kernel32!BaseProcessStart
0:000> p
ntdll!KiUserApcDispatcher+0x1a:
00000000`77ef30aa e861ddffff      call    ntdll!NtContinue (00000000`77ef0e10)
0:000> k
Child-SP          RetAddr           Call Site
00000000`0022fab0 00000000`77d59620 ntdll!KiUserApcDispatcher+0x1a
00000000`0022ffa8 00000000`00000000 kernel32!BaseProcessStart
0:000> p
c.f90: In function 'MAIN__':
c.f90:1: internal compiler error: Segmentation fault

This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
gfortran: Internal error: Aborted (program f951)
Please submit a full bug report.
See  for instructions.
ntdll!ZwTerminateProcess+0xa:
00000000`77ef0caa c3              ret
0:000>

_________________________________________________________________
Watch “Cause Effect,” a show about real people making a real difference.
http://im.live.com/Messenger/IM/MTV/?source=text_watchcause

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: internal compiler error: Segmentation fault
  2008-01-09 15:37     ` Kai Tietz
@ 2008-01-09 15:43       ` FX
  0 siblings, 0 replies; 8+ messages in thread
From: FX @ 2008-01-09 15:43 UTC (permalink / raw)
  To: Kai Tietz; +Cc: J. Finch, fortran, GCC Development, mingw-w64-public

> To have a better chance to find the issue could you anwser these question?

I'll let J. answer these himself, since I have no direct experience of
the bug myself (no Win64 machine), but...

> a) Does this happens on a cross compiler, too?

I doubt it, since he sees the bug even on trivial programs at -O1 and,
last time I tried, cross-compilers worked fairly well.

> b) Which runtime version of mingw-w64 you are using?

I've asked, but got no answer.

> I am currently on gdb support for x86_64 mingw target. But I expect, it
> will still take some time until I publish.

That's great news nonetheless!

-- 
FX Coudert
http://www.homepages.ucl.ac.uk/~uccafco/

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: internal compiler error: Segmentation fault
  2008-01-09 15:09   ` FX
@ 2008-01-09 15:37     ` Kai Tietz
  2008-01-09 15:43       ` FX
  0 siblings, 1 reply; 8+ messages in thread
From: Kai Tietz @ 2008-01-09 15:37 UTC (permalink / raw)
  To: FX; +Cc: J. Finch, fortran, GCC Development, mingw-w64-public

> [for mingw-w64-public@... and gcc@... readers, seeshort  thread
> starting at http://gcc.gnu.org/ml/fortran/2008-01/msg00103.html]
> 
> > Gcc gets the similar problem. It only works without optimization. 
> It seems not a problem with gfortran.
> 
> OK, then it'd be more appropriate to ask the mingw mailing-list or the
> generic gcc@gcc.gnu.org list.
> 
> > GMP version is 4.2.2, and has been modified for x86_64. The 
> original 4.2.2 does not support x86_64-pc-mingw32.
> 
> Does GMP pass tests? Have you built it with extra checking enabled? I
> don't suspect what you're seeing is a GMP problem, but you can never
> be too sure.

To have a better chance to find the issue could you anwser these question?

a) Does this happens on a cross compiler, too? You can get on via the 
mingw-w64 pages on sourceforge.
b) Which runtime version of mingw-w64 you are using?
c) How did you compile gmp? As reference may take a look at 
http://terpstra.ca/lurker/message/20071208.235835.12a77213.en.html
This is a patch for gmp seems to work with mingw-w64 runtime as author 
tells.

> > I do not have gdb for windows for the time being.
> 
> That's why I gave you a download link for MS debuggers (I don't think
> gdb is supported on x86_64-mingw32). I'm not sure much can be done
> without a debugger.
I am currently on gdb support for x86_64 mingw target. But I expect, it 
will still take some time until I publish.

Cheers,
 i.A. Kai Tietz

|  (\_/)  This is Bunny. Copy and paste Bunny
| (='.'=) into your signature to help him gain
| (")_(") world domination.

------------------------------------------------------------------------------------------
  OneVision Software Entwicklungs GmbH & Co. KG
  Dr.-Leo-Ritter-Straße 9 - 93049 Regensburg
  Tel: +49.(0)941.78004.0 - Fax: +49.(0)941.78004.489 - www.OneVision.com
  Commerzbank Regensburg - BLZ 750 400 62 - Konto 6011050
  Handelsregister: HRA 6744, Amtsgericht Regensburg
  Komplementärin: OneVision Software Entwicklungs Verwaltungs GmbH
  Dr.-Leo-Ritter-Straße 9 – 93049 Regensburg
  Handelsregister: HRB 8932, Amtsgericht Regensburg - Geschäftsführer: 
Ulrike Döhler, Manuela Kluger


^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: internal compiler error: Segmentation fault
       [not found] ` <BAY127-W419B706D2D2ACAC13608CE8D490@phx.gbl>
@ 2008-01-09 15:09   ` FX
  2008-01-09 15:37     ` Kai Tietz
  0 siblings, 1 reply; 8+ messages in thread
From: FX @ 2008-01-09 15:09 UTC (permalink / raw)
  To: J. Finch; +Cc: fortran, GCC Development, mingw-w64-public

[for mingw-w64-public@... and gcc@... readers, seeshort  thread
starting at http://gcc.gnu.org/ml/fortran/2008-01/msg00103.html]

> Gcc gets the similar problem. It only works without optimization. It seems not a problem with gfortran.

OK, then it'd be more appropriate to ask the mingw mailing-list or the
generic gcc@gcc.gnu.org list.

> GMP version is 4.2.2, and has been modified for x86_64. The original 4.2.2 does not support x86_64-pc-mingw32.

Does GMP pass tests? Have you built it with extra checking enabled? I
don't suspect what you're seeing is a GMP problem, but you can never
be too sure.

> I do not have gdb for windows for the time being.

That's why I gave you a download link for MS debuggers (I don't think
gdb is supported on x86_64-mingw32). I'm not sure much can be done
without a debugger.

FX

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2008-01-10 18:38 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <BAY127-W3905CADAD6C9E6370134AD8D4A0@phx.gbl>
2008-01-10 14:36 ` internal compiler error: Segmentation fault Kai Tietz
2008-01-10 15:18   ` J. Finch
2008-01-10 15:32   ` J. Finch
2008-01-10 16:06     ` Kai Tietz
2008-01-10 18:38       ` J. Finch
     [not found] <19c433eb0801090519l676a7645u162dc18760e99cc9@mail.gmail.com>
     [not found] ` <BAY127-W419B706D2D2ACAC13608CE8D490@phx.gbl>
2008-01-09 15:09   ` FX
2008-01-09 15:37     ` Kai Tietz
2008-01-09 15:43       ` FX

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).