______________________________________________________________________ Exception Report - created 2022/07/09 15:40:48 ______________________________________________________________________ LIBC: Killed by SIGSEGV Hostname: Agaradzo OS2/eCS Version: 2.45 # of Processors: 4 Physical Memory: 3431 mb Virt Addr Limit: 3072 mb Exceptq Version: 7.11.5-shl BETA8 (Jun 1 2020 18:37:02) ______________________________________________________________________ Exception C0000005 - Access Violation ______________________________________________________________________ Process: E:\PROGRAMS\SAMBA\TDBTOOL.EXE (07/08/2022 02:14:13 3,695,080) PID: 183 (387) TID: 01 (1) Priority: 200 Filename: E:\PROGRAMS\SAMBA\TDBTOOL.EXE (07/08/2022 02:14:13 3,695,080) Address: 005B:000216A9 (0001:000116A9) Cause: Attempted to read from 00000006 (not a valid address) ______________________________________________________________________ Failing Instruction ______________________________________________________________________ 00021696 MOV BYTE [EBP-0x19], 0x0 (c645 e7 00) 0002169A MOV DWORD [EBP-0x20], 0x0 (c745 e0 00000000) 000216A1 JMP 0x2173f (e9 99000000) 000216A6 MOV EAX, [EBP-0xc] (8b45 f4) 000216A9 >MOVZX EAX, BYTE [EAX] (0fb600) 000216AC MOV [EBP-0x19], AL (8845 e7) 000216AF MOVZX EAX, BYTE [EBP-0x19] (0fb645 e7) 000216B3 TEST AL, AL (84c0) ______________________________________________________________________ Registers ______________________________________________________________________ EAX : 00000006 EBX : 0031FF60 ECX : 00000000 EDX : 0031FFA4 ESI : 00000000 EDI : 00000000 ESP : 0031FE20 EBP : 0031FE98 EIP : 000216A9 EFLG : 00010202 CS : 005B CSLIM: FFFFFFFF SS : 0053 SSLIM: FFFFFFFF EAX : not a valid address EBX : read/write memory on this thread's stack ECX : not a valid address EDX : read/write memory on this thread's stack ESI : not a valid address EDI : not a valid address ______________________________________________________________________ Stack Info for Thread 01 ______________________________________________________________________ Size Base ESP Max Top 00100000 00320000 -> 0031FE20 -> 0031D000 -> 00220000 ______________________________________________________________________ Call Stack ______________________________________________________________________ EBP Address Module Obj:Offset Nearest Public Symbol -------- --------- -------- ------------- ----------------------- Trap -> 000216A9 TDBTOOL 0001:000116A9 convert_string.c#146 _convert_string_error_handle + 69 0001:00011640 (convert_string.c.2.obj) Offset Name Type Hex Value ÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ -12 p 8 bit unsigned 6 -16 q pointer to 8 bit unsigned 0 -20 slen 32 bit unsigned 31FF44 -24 dlen 32 bit unsigned 2 -25 lastp 8 bit unsigned 0 -32 retval 32 bit unsigned 0 -78 ret 0x202 8E720031 -36 p 8 bit unsigned 103027 -40 q pointer to 8 bit unsigned 20036710 -44 retval 32 bit unsigned FA735 -48 slen 32 bit unsigned 31FEA8 -52 dlen 32 bit unsigned 0 -53 lastp 8 bit unsigned 0 -79 ret 0x202 720031FE -60 p 8 bit unsigned 103027 -64 q pointer to 8 bit unsigned 0 -68 retval 32 bit unsigned 103027 -72 slen 32 bit unsigned 20036710 -76 dlen 32 bit unsigned 28E72 -77 lastp 8 bit unsigned 0 -80 ret 0x202 31FE68 0031FE98 00021C8F TDBTOOL 0001:00011C8F convert_string.c#291 _convert_string_handle + 43 0001:00011C4C (convert_string.c.2.obj) Offset Name Type Hex Value ÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ 8 ic pointer to type 0x213 200365F0 12 from 0x217 31FFA4 16 to 0x217 2158BC 20 src void 6 24 srclen 32 bit unsigned 31FF44 28 dest pointer to void 0 32 destlen 32 bit unsigned 2 36 converted_size pointer to 32 bit unsigned 5 -9 ret 0x202 0 -16 reason 8 bit unsigned 10261 0031FED8 000229BA TDBTOOL 0001:000129BA convert_string.c#513 _convert_string + 44 0001:00012976 (convert_string.c.2.obj) Offset Name Type Hex Value ÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ 8 from 0x217 31FFA4 12 to 0x217 2158BC 16 src void 6 20 srclen 32 bit unsigned 31FF44 24 dest pointer to void 0 28 destlen 32 bit unsigned 2 32 converted_size pointer to 32 bit unsigned 5 0031FF08 000126C3 TDBTOOL 0001:000026C3 tdbtool.c#965 main + 2EE 0001:000023D5 (..\..\lib\tdb\tools\tdbtool.c) 0031FF30 00010027 TDBTOOL 0001:00000027 crt0.s#90 __text + 27 0001:00000000 ({standard input}) 0031FF54 1E23F621 LIBCX0 0001:0000F621 ___init_app + 11 0001:0000F610 (main.obj) 0031FFE0 1E3B6C9B LIBCN0 0001:00046C9B appinit.s#16 ___init_app + B 0001:00046C90 (appinit.obj) ______________________________________________________________________ Labels on the Stack ______________________________________________________________________ ESP Address Module Obj:Offset Nearest Public Symbol -------- --------- -------- ------------- ----------------------- 0031FE4C 00028E72 TDBTOOL 0001:00018E72 talloc.c#2472 _talloc_strdup + 3C 0001:00018E36 (talloc.c.1.obj) 0031FE54 00103027 TDBTOOL 0001:000F3027 loadparm.c#495 _store_lp_set_cmdline + 3EC 0001:000F2C3B (loadparm.c.72.obj) 0031FE5C 00103027 TDBTOOL 0001:000F3027 loadparm.c#495 _store_lp_set_cmdline + 3EC 0001:000F2C3B (loadparm.c.72.obj) 0031FE6C 000FA735 TDBTOOL 0001:000EA735 codepoints.c#16635 _smb_iconv_handle_reinit + 18E 0001:000EA5A7 (codepoints.c.2.obj) 0031FE74 00103027 TDBTOOL 0001:000F3027 loadparm.c#495 _store_lp_set_cmdline + 3EC 0001:000F2C3B (loadparm.c.72.obj) 0031FE9C 00021C8F TDBTOOL 0001:00011C8F convert_string.c#291 _convert_string_handle + 43 0001:00011C4C (convert_string.c.2.obj) 0031FEC8 00010261 TDBTOOL 0001:00000261 tdbtool.c#160 _main - 2174 0001:000023D5 (..\..\lib\tdb\tools\tdbtool.c) 0031FEDC 000229BA TDBTOOL 0001:000129BA convert_string.c#513 _convert_string + 44 0001:00012976 (convert_string.c.2.obj) 0031FF0C 000126C3 TDBTOOL 0001:000026C3 tdbtool.c#965 main + 2EE 0001:000023D5 (..\..\lib\tdb\tools\tdbtool.c) 0031FF34 00010027 TDBTOOL 0001:00000027 crt0.s#90 __text + 27 0001:00000000 ({standard input}) 0031FF48 1E23F2B5 LIBCX0 0001:0000F2B5 main.c#80 libcxExceptionHandler 0001:0000F2B5 (.\libcx-0.7.2\src\main.c) 0031FF58 1E23F621 LIBCX0 0001:0000F621 ___init_app + 11 0001:0000F610 (main.obj) 0031FF70 1E3ECDB0 LIBCN0 0001:0007CDB0 exceptions.c#74 __libc_Back_exceptionHandler 0001:0007CDB0 (exceptions.obj) 0031FFC4 1E38A0E4 LIBCN0 0001:0001A0E4 __init.c#307 ___init + 64 0001:0001A080 (.\libc-0.1.10\src\emx\src\lib\sys\__init.c) 0031FFE4 1E3B6C9B LIBCN0 0001:00046C9B appinit.s#16 ___init_app + B 0001:00046C90 (appinit.obj) 0031FFEC 1FFECE38 DOSCALL1 0004:0000CE38 DOS32R3EXITADDR ______________________________________________________________________ Stack Contents from ESP-100 to Stack Base (ESP = 0031FE20) ______________________________________________________________________ --addr-- --------------dwords--------------- -----chars------ 0031FD20 : 00000000 00000183 00080000 00000000 : ................ 0031FD30 : FFFF0000 00120000 00000000 00000000 : ................ 0031FD40 : 00000000 00000000 00000000 00000000 : ................ 0031FD50 : 20200000 00004020 00000000 00000000 : .. @.......... 0031FD60 : 00000000 0000150B 00000053 00000053 : ........S...S... 0031FD70 : 00000000 00000000 00000006 0031FF60 : ............`.1. 0031FD80 : 00000000 0031FFA4 0031FE98 000216A9 : ......1...1..... 0031FD90 : 0000005B 00010202 0031FE20 00000053 : [....... .1.S... 0031FDA0 : 20030000 00000031 200366E0 00000000 : ... 1....f. .... 0031FDB0 : 00000000 00000000 0031FDF8 00026443 : ..........1.Cd.. 0031FDC0 : 00000000 00000031 00000000 200365C0 : ....1........e. 0031FDD0 : 00000108 00000000 20036760 20036760 : ........`g. `g. 0031FDE0 : 00000031 200366E0 00000000 20036760 : 1....f. ....`g. 0031FDF0 : 00000000 000000D8 0031FE18 0002653D : ..........1.=e.. 0031FE00 : 20036710 00000001 00000000 0031FE38 : .g. ........8.1. 0031FE10 : 200365C0 00000000 0031FE48 00028E31 : .e. ....H.1.1... 0031FE20 : 20036760 20036790 00000000 200365F0 : `g. .g. .....e. 0031FE30 : 00000000 00000000 20036760 20036790 : ........`g. .g. 0031FE40 : 200365F0 00000000 0031FE68 00028E72 : .e. ....h.1.r... 0031FE50 : 20036710 00103027 00000000 00103027 : .g. '0......'0.. 0031FE60 : 00000000 00000000 0031FEA8 000FA735 : ..........1.5... 0031FE70 : 20036710 00103027 00000000 00000000 : .g. '0.......... 0031FE80 : 00000002 0031FF44 00000000 00000006 : ....D.1......... 0031FE90 : 00000000 00000000 0031FED8 00021C8F : ..........1..... 0031FEA0 : 200365F0 0031FFA4 002158BC 00000006 : .e. ..1..X!..... 0031FEB0 : 0031FF44 00000000 00000002 00000005 : D.1............. 0031FEC0 : 00000000 00000000 00010261 00000000 : ........a....... 0031FED0 : 00000000 0031FF60 0031FF08 000229BA : ....`.1...1..).. 0031FEE0 : 200365F0 0031FFA4 002158BC 00000006 : .e. ..1..X!..... 0031FEF0 : 0031FF44 00000000 00000002 00000005 : D.1............. 0031FF00 : 00000000 0031FF60 0031FF30 000126C3 : ....`.1.0.1..&.. 0031FF10 : 0031FFA4 002158BC 00000006 0031FF44 : ..1..X!.....D.1. 0031FF20 : 00000000 00000002 00000005 00000003 : ................ 0031FF30 : 0031FF54 00010027 00000003 0031FF74 : T.1.'.......t.1. 0031FF40 : 20030180 0031FF6C 1E23F2B5 00000000 : ... l.1...#..... 0031FF50 : 0031FFE0 0031FFE0 1E23F621 0031FF60 : ..1...1.!.#.`.1. 0031FF60 : 00000003 0031FF74 20030180 FFFFFFFF : ....t.1.... .... 0031FF70 : 1E3ECDB0 0031FF85 0031FFA4 0031FFB2 : ..>...1...1...1. 0031FF80 : 00000000 5C3A4580 676F7250 736D6172 : .....E:\Programs 0031FF90 : 6D61535C 745C6162 6F746264 652E6C6F : \Samba\tdbtool.e 0031FFA0 : 80006578 76726573 64697265 6264742E : xe..serverid.tdb 0031FFB0 : 6E698000 00006F66 00000000 00000070 : ..info......p... 0031FFC0 : 00000028 1E38A0E4 00000000 00000000 : (.....8......... 0031FFD0 : 00000000 00000000 00000000 00000000 : ................ 0031FFE0 : 00000000 1E3B6C9B 00000000 1FFECE38 : .....l;.....8... 0031FFF0 : 000016AE 00000000 00320000 00320D5B : ..........2.[.2. ______________________________________________________________________ Memory addressed by EBX (0031FF60) for 160 bytes ______________________________________________________________________ --addr-- -----dwords------ ---------bytes--------- -chars-- 0031FF60 : 00000003 0031FF74 : 03 00 00 00 74 FF 31 00 : ....t.1. 0031FF68 : 20030180 FFFFFFFF : 80 01 03 20 FF FF FF FF : ... .... 0031FF70 : 1E3ECDB0 0031FF85 : B0 CD 3E 1E 85 FF 31 00 : ..>...1. 0031FF78 : 0031FFA4 0031FFB2 : A4 FF 31 00 B2 FF 31 00 : ..1...1. 0031FF80 : 00000000 5C3A4580 : 00 00 00 00 80 45 3A 5C : .....E:\ 0031FF88 : 676F7250 736D6172 : 50 72 6F 67 72 61 6D 73 : Programs 0031FF90 : 6D61535C 745C6162 : 5C 53 61 6D 62 61 5C 74 : \Samba\t 0031FF98 : 6F746264 652E6C6F : 64 62 74 6F 6F 6C 2E 65 : dbtool.e 0031FFA0 : 80006578 76726573 : 78 65 00 80 73 65 72 76 : xe..serv 0031FFA8 : 64697265 6264742E : 65 72 69 64 2E 74 64 62 : erid.tdb 0031FFB0 : 6E698000 00006F66 : 00 80 69 6E 66 6F 00 00 : ..info.. 0031FFB8 : 00000000 00000070 : 00 00 00 00 70 00 00 00 : ....p... 0031FFC0 : 00000028 1E38A0E4 : 28 00 00 00 E4 A0 38 1E : (.....8. 0031FFC8 : 00000000 00000000 : 00 00 00 00 00 00 00 00 : ........ 0031FFD8 : 2 lines not printed duplicate the line above 0031FFE0 : 00000000 1E3B6C9B : 00 00 00 00 9B 6C 3B 1E : .....l;. 0031FFE8 : 00000000 1FFECE38 : 00 00 00 00 38 CE FE 1F : ....8... 0031FFF0 : 000016AE 00000000 : AE 16 00 00 00 00 00 00 : ........ 0031FFF8 : 00320000 00320D5B : 00 00 32 00 5B 0D 32 00 : ..2.[.2. ______________________________________________________________________ Memory addressed by EDX (0031FFA4) for 92 bytes ______________________________________________________________________ --addr-- -----dwords------ ---------bytes--------- -chars-- 0031FFA4 : 76726573 64697265 : 73 65 72 76 65 72 69 64 : serverid 0031FFAC : 6264742E 6E698000 : 2E 74 64 62 00 80 69 6E : .tdb..in 0031FFB4 : 00006F66 00000000 : 66 6F 00 00 00 00 00 00 : fo...... 0031FFBC : 00000070 00000028 : 70 00 00 00 28 00 00 00 : p...(... 0031FFC4 : 1E38A0E4 00000000 : E4 A0 38 1E 00 00 00 00 : ..8..... 0031FFCC : 00000000 00000000 : 00 00 00 00 00 00 00 00 : ........ 0031FFDC : 2 lines not printed duplicate the line above 0031FFE4 : 1E3B6C9B 00000000 : 9B 6C 3B 1E 00 00 00 00 : .l;..... 0031FFEC : 1FFECE38 000016AE : 38 CE FE 1F AE 16 00 00 : 8....... 0031FFF4 : 00000000 00320000 : 00 00 00 00 00 00 32 00 : ......2. 0031FFFC : 00320D5B : 5B 0D 32 00 : [.2. ______________________________________________________________________ DLLs accessible from this process ______________________________________________________________________ DOSCALLS 06/03/2021 22:27:29 870,886 D:\OS2KRNL DISTORM 0f380000 0000a274 11/11/2012 23:43:02 57,491 E:\USR\LIB\DISTORM.DLL PMMERGE 18e20000 00001000 04/10/2007 18:26:01 1,270,275 D:\OS2\DLL\PMMERGE.DLL PMGPI 1aae0000 00010000 10/16/2001 13:31:09 248,446 D:\OS2\DLL\PMGPI.DLL URPO 1c820000 00000bc0 06/30/2016 09:51:09 2,768 E:\USR\LIB\URPO.DLL GMP10 1c830000 000620b0 09/07/2020 01:53:06 309,676 E:\USR\LIB\GMP10.DLL HOGWEE50 1c8a0000 00026780 03/25/2020 08:12:12 143,989 E:\USR\LIB\HOGWEE50.DLL P11KIT0 1c8d0000 000b7b70 12/10/2020 01:01:01 405,938 E:\USR\LIB\P11KIT0.DLL IDN20 1c990000 0001c2c0 01/13/2020 08:40:27 82,574 E:\USR\LIB\IDN20.DLL UNISTRI2 1c9b0000 00186540 01/13/2020 03:37:12 887,595 E:\USR\LIB\UNISTRI2.DLL PTHR01 1cb40000 00002070 10/04/2021 02:08:26 7,787 E:\USR\LIB\PTHR01.DLL TASN16 1cb50000 0000dcb0 11/04/2019 06:02:15 42,862 E:\USR\LIB\TASN16.DLL INTL8 1cb60000 000082f0 06/30/2016 15:21:21 27,573 E:\USR\LIB\INTL8.DLL GTLS30 1cb70000 00155ba0 04/04/2020 05:20:28 1,009,710 E:\USR\LIB\GTLS30.DLL LDAP 1ccd0000 001a1900 04/28/2018 03:52:24 1,040,317 E:\USR\LIB\LDAP.DLL NETTLE70 1e010000 0002ceb0 03/25/2020 08:12:12 145,225 E:\USR\LIB\NETTLE70.DLL MMAP 1e1f0000 00002de0 08/25/2014 09:08:27 9,568 E:\USR\LIB\MMAP.DLL LIBCX0 1e230000 00012f60 08/26/2021 08:27:23 59,049 E:\USR\LIB\LIBCX0.DLL GCC1 1e260000 00013070 07/22/2020 21:00:13 59,120 E:\USR\LIB\GCC1.DLL EXCEPTQ 1e290000 000136c6 06/01/2020 20:37:01 162,595 E:\USR\LIB\EXCEPTQ.DLL PREWRITE 1e360000 00001e00 07/25/2021 01:09:19 11,521 D:\SYS\DLL\PREWRITE.DLL LIBCN0 1e370000 00116540 03/22/2022 14:09:09 1,266,157 E:\USR\LIB\LIBCN0.DLL LIBC066 1e4b0000 0002f2c0 03/22/2022 14:09:08 316,300 E:\USR\LIB\LIBC066.DLL TCPIP32 1f210000 0001bb20 08/16/2011 06:01:00 87,504 D:\MPTN\DLL\TCPIP32.DLL VBE2GRAD 1f330000 000048f0 10/31/2020 12:28:16 65,425 D:\OS2\DLL\VBE2GRAD.DLL PANOGREX 1f350000 0000030d 10/31/2020 11:14:09 2,041 D:\OS2\DLL\PANOGREX.DLL VMAN 1f360000 0000d9f9 03/22/2006 14:20:26 67,993 D:\OS2\DLL\VMAN.DLL GRE2VMAN 1f3b0000 000044a8 10/25/2007 16:54:19 21,325 D:\OS2\DLL\GRE2VMAN.DLL FREETYPE 1f450000 0001729c 03/23/2020 22:38:23 82,402 D:\OS2\DLL\FREETYPE.DLL PMUNIF 1f480000 0000c3a0 10/16/2001 14:59:29 43,823 D:\OS2\DLL\PMUNIF.DLL PMATM 1f4a0000 0003bd25 09/14/2001 15:41:26 224,343 D:\OS2\DLL\PMATM.DLL DISPLAY 1f500000 0000004c 03/22/2006 08:54:14 44,198 D:\OS2\DLL\DISPLAY.DLL LOCALE 1f5a0000 00025fd0 09/04/2002 17:31:00 108,353 D:\OS2\DLL\LOCALE.DLL BVHWNDW 1f600000 00004316 09/10/2001 16:17:17 16,797 D:\OS2\DLL\BVHWNDW.DLL SOFTDRAW 1f680000 000c5a96 12/29/2004 11:15:00 417,095 D:\OS2\DLL\SOFTDRAW.DLL SPL1B 1f750000 00000822 01/18/2005 13:37:00 7,125 D:\OS2\DLL\SPL1B.DLL PMSPL 1f760000 00006a46 01/18/2005 13:37:00 280,283 D:\OS2\DLL\PMSPL.DLL PMSHLTKT 1f7e0000 0000e000 09/06/2000 12:45:10 44,232 D:\OS2\DLL\PMSHLTKT.DLL PMVIOP 1f7f0000 0000e204 12/29/2004 11:46:00 66,820 D:\OS2\DLL\PMVIOP.DLL UCV32 1f820000 00005c91 09/04/2002 22:30:00 27,463 D:\OS2\DLL\UCV32.DLL UCONV 1f9a0000 0000024f 01/20/2020 07:34:15 1,682 D:\OS2\DLL\UCONV.DLL LIBUNI 1f9b0000 00012b9c 01/20/2020 07:34:15 80,766 D:\OS2\DLL\LIBUNI.DLL FFST 1ff40000 00002234 03/08/2002 18:23:00 11,425 D:\OS2\DLL\FFST.DLL DOSCALL1 1ffc0000 0000c1f4 11/24/2011 03:24:00 132,401 D:\OS2\DLL\DOSCALL1.DLL ______________________________________________________________________ End of Exception Report - report took 193 ms to generate ______________________________________________________________________