Mailing List Archive: 49091 messages
  • Home
  • Script library
  • AltME Archive
  • Mailing list
  • Articles Index
  • Site search
 

[REBOL] Re: Another Rebol Crash

From: rebol-list2:seznam:cz at: 23-Nov-2002 15:24

Hello Anton, Friday, November 22, 2002, 11:38:04 AM, you wrote: A> Hi Oldes, A> I did not see this crash. A> Each time it returned "", on the 2 latest A> windows betas and the last full (non-beta) A> release of View, and latest full and beta A> releases of Core. A> Windows 2000. A> Take care to try also a clean open of rebol, A> with no user code. You sure you haven't A> redefined something? A> Anton.
>> Hello rebol-list, >> >> I've just found this bug: >> >> o: open/direct/read %user.r >> copy/part o 0 ;=== crash! >> >> =( Oliva David )=======================( [oliva--david--seznam--cz] )==
Ach.... I forgot to add the binary path to the example:) Unfortunately I made the same mistake in the feedback as well:( o: open/direct/binary/read %user.r copy/part o 0 ;=== crash! i think it should be: #{} tested with Rebol/view 1.2.8.3.1 and with rebol/base with w2000 ----------------------------------------------------------------- Application exception occurred: App: (pid=308) When: 23.11.2002 @ 15:22:16.685 Exception number: c0000005 (access violation) ... State Dump for Thread Id 0x49c eax=00000000 ebx=00000000 ecx=00000000 edx=0000000d esi=00d87318 edi=00d2edf0 eip=00450ed2 esp=0012fd54 ebp=0012fd68 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 function: <nosymbols> 00450eae 0f8567ffffff jne 00450e1b 00450eb4 eb05 jmp 004599bb 00450eb6 8b450c mov eax,[ebp+0xc] ss:00d3d33a=00000000 00450eb9 33db xor ebx,ebx 00450ebb 837d1024 cmp dword ptr [ebp+0x10],0x24 ss:00d3d33a=00000000 00450ebf 0f84ee020000 je 004511b3 00450ec5 832db09f480010 sub dword ptr [00489fb0],0x10 ds:00489fb0=008e8898 00450ecc 8b0f mov ecx,[edi] ds:00d2edf0=00000000 00450ece 3bcb cmp ecx,ebx 00450ed0 750b jnz 004547dd FAULT ->00450ed2 395804 cmp [eax+0x4],ebx ds:00c0d5d2=ffffffff 00450ed5 7506 jnz 004565dd 00450ed7 57 push edi 00450ed8 e9d0020000 jmp 004511ad 00450edd 837d1028 cmp dword ptr [ebp+0x10],0x28 ss:00d3d33a=00000000 00450ee1 7429 jz 0045b00c 00450ee3 a1849f4800 mov eax,[00489f84] ds:00489f84=008e58a8 00450ee8 897804 mov [eax+0x4],edi ds:00c0d5d2=ffffffff 00450eeb a1849f4800 mov eax,[00489f84] ds:00489f84=008e58a8 00450ef0 895808 mov [eax+0x8],ebx ds:00c0d5d2=ffffffff 00450ef3 a1849f4800 mov eax,[00489f84] ds:00489f84=008e58a8 00450ef8 8918 mov [eax],ebx ds:00000000=???????? *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0012FD68 0045034F 008EE368 00000000 00000034 008E58A8 !<nosymbols> 0012FDB8 0040F10E 008EE368 00000034 00D7B6F0 00D7B6F0 !<nosymbols> 0012FDF0 0040F644 009A5C70 0012FE60 00D7B6F0 00D7B710 !<nosymbols> 0012FE3C 0040F9D0 0012FE60 00000000 00A351B0 00D2F2D0 !<nosymbols> 0012FE58 0040FA12 00B0B518 00427CE7 00B0B4E8 0048A120 !<nosymbols> 0012FEA0 00427AB5 78009E33 78009E39 7801CBC9 0012FFB0 !<nosymbols> 0012FEC0 0042AD97 0048A120 00000001 008E2428 00690076 !<nosymbols> 0012FF24 0045EFD6 00400000 00000000 0013360A 00000001 !<nosymbols> 0012FFC0 77E97D08 00690076 00770065 7FFDF000 C0000005 !<nosymbols> 0012FFF0 00000000 0045EE80 00000000 000000C8 00000100 kernel32!CreateProcessW *----> Raw Stack Dump <----* 0012fd54 00 00 00 00 00 00 00 00 - 18 73 d8 00 00 ee d2 00 .........s...... 0012fd64 50 5b a2 00 b8 fd 12 00 - 4f 03 45 00 68 e3 8e 00 P[......O.E.h... 0012fd74 00 00 00 00 34 00 00 00 - a8 58 8e 00 b0 c9 a2 00 ....4....X...... 0012fd84 68 e3 8e 00 b0 c9 a2 00 - 68 e3 8e 00 30 ee d2 00 h.......h...0... 0012fd94 02 00 00 00 ec fd 12 00 - 28 d3 d9 00 40 5b a2 00 ........(...@[.. 0012fda4 00 00 00 00 30 5b a2 00 - 86 88 43 00 00 00 00 00 ....0[....C..... 0012fdb4 c7 b0 45 00 f0 fd 12 00 - 0e f1 40 00 68 e3 8e 00 ..E.......@.h... 0012fdc4 34 00 00 00 f0 b6 d7 00 - f0 b6 d7 00 70 5c 9a 00 4...........p\.. 0012fdd4 e8 b4 b0 00 e0 59 cc 00 - 00 00 00 00 b0 c9 a2 00 .....Y.......... 0012fde4 60 5b a2 00 a8 58 8e 00 - 10 5b a2 00 3c fe 12 00 `[...X...[..<... 0012fdf4 44 f6 40 00 70 5c 9a 00 - 60 fe 12 00 f0 b6 d7 00 D.@.p\..`....... 0012fe04 10 b7 d7 00 38 38 d7 00 - 68 58 8e 00 00 00 00 00 ....88..hX...... 0012fe14 43 cf d9 00 b0 51 a3 00 - 00 b7 d7 00 10 00 00 00 C....Q.......... 0012fe24 e8 b4 b0 00 f0 b6 d7 00 - 00 b7 d7 00 b0 51 a3 00 .............Q.. 0012fe34 00 b7 d7 00 10 00 00 00 - 58 fe 12 00 d0 f9 40 00 ........X.....@. 0012fe44 60 fe 12 00 00 00 00 00 - b0 51 a3 00 d0 f2 d2 00 `........Q...... 0012fe54 10 00 00 00 a0 fe 12 00 - 12 fa 40 00 18 b5 b0 00 ..........@..... 0012fe64 e7 7c 42 00 e8 b4 b0 00 - 20 a1 48 00 40 ef 9c 00 .|B..... .H.@... 0012fe74 00 00 00 00 94 fe 12 00 - d0 f9 40 00 9c fe 12 00 ..........@..... 0012fe84 00 00 00 00 d0 f2 d2 00 - 15 00 00 00 e0 59 cc 00 .............Y.. =( Oliva David )=======================( [oliva--david--seznam--cz] )== =( Earth/Europe/Czech_Republic/Brno )============================= =( coords: [lat: 49.22 long: 16.67] )=============================