I am a Pelles C for Windows newbie, I think I need help.
It is just a warnning, but it happend on all my Win64 PE (Win32 PE is ok).
Is there a way to deal with it?
Quote from: learn64bit on October 12, 2022, 02:02:09 PM
Is there a way to deal with it?
Post source code and maybe someone can help. :icon_idea:
That means compress the source code and other pertinent files into a zip file and attach the zip file.
Just showing an image is not enough information for anyone to help you figure out where any errors might be in your code, your makefile (or command line options).
I am not familiar myself with pelles C, all I can offer is that advice given above.
Try it without dbg-file, keep debug-info in exe
What kind of folder situation you have, exe, dbg and sourcefile in same folder ?
Win32 PE also have warnning in WinDbg. But it is just a warnning, everything works fine.
WinDbg v10.0.19041.865 AMD64, Win7 64 SP1
CommandLine: D:\ydcTempQ\PEpad.exe
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*D:\Symbols*https://msdl.microsoft.com/download/symbols
DBGHELP: Symbol Search Path: srv*d:\symbols*https://msdl.microsoft.com/download/symbols
Symbol search path is: srv*D:\Symbols*https://msdl.microsoft.com/download/symbols
Executable search path is:
ModLoad: 00000000`002f0000 00000000`0030c000 PEpad.exe
ModLoad: 00000000`774b0000 00000000`77659000 ntdll.dll
ModLoad: 00000000`77690000 00000000`77810000 ntdll32.dll
ModLoad: 00000000`74fe0000 00000000`7501f000 C:\Windows\SYSTEM32\wow64.dll
ModLoad: 00000000`74f80000 00000000`74fdc000 C:\Windows\SYSTEM32\wow64win.dll
ModLoad: 00000000`74f70000 00000000`74f78000 C:\Windows\SYSTEM32\wow64cpu.dll
(12e4.eac): Break instruction exception - code 80000003 (first chance)
SYMSRV: BYINDEX: 0x8
d:\symbols*https://msdl.microsoft.com/download/symbols
ntdll.pdb
6192BFDB9F04442995FFCB0BE95172E12
SYMSRV: PATH: d:\symbols\ntdll.pdb\6192BFDB9F04442995FFCB0BE95172E12\ntdll.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: ntdll - public symbols
d:\symbols\ntdll.pdb\6192BFDB9F04442995FFCB0BE95172E12\ntdll.pdb
ntdll!LdrpDoDebuggerBreak+0x30:
00000000`7755cb60 cc int 3
0:000> !sym noisy
noisy mode - symbol prompts on
0:000> bl *
0:000> bp PEpad!WinMain
DBGHELP: PEpad.exe is stripped. Searching for dbg file
SYMSRV: BYINDEX: 0x9
d:\symbols*https://msdl.microsoft.com/download/symbols
PEpad.dbg
63454B741c000
SYMSRV: UNC: d:\symbols\PEpad.dbg\63454B741c000\PEpad.dbg - path not found
SYMSRV: UNC: d:\symbols\PEpad.dbg\63454B741c000\PEpad.db_ - path not found
SYMSRV: UNC: d:\symbols\PEpad.dbg\63454B741c000\file.ptr - path not found
SYMSRV: HTTPGET: /download/symbols/index2.txt
SYMSRV: HttpSendRequest: 800C2EE7 - ERROR_INTERNET_NAME_NOT_RESOLVED
SYMSRV: HTTPGET: /download/symbols/PEpad.dbg/63454B741c000/PEpad.dbg
SYMSRV: HttpSendRequest: 800C2EE7 - ERROR_INTERNET_NAME_NOT_RESOLVED
SYMSRV: RESULT: 0x800C2EE7
*** WARNING: Unable to verify checksum for PEpad.exe
DBGHELP: PEpad - coff symbols
D:\ydcTempQ\PEpad.dbg
0:000> g
ModLoad: 00000000`77390000 00000000`774af000 WOW64_IMAGE_SECTION
ModLoad: 00000000`754a0000 00000000`755b0000 WOW64_IMAGE_SECTION
ModLoad: 00000000`77390000 00000000`774af000 NOT_AN_IMAGE
ModLoad: 00000000`77290000 00000000`7738a000 NOT_AN_IMAGE
ModLoad: 00000000`754a0000 00000000`755b0000 C:\Windows\syswow64\kernel32.dll
ModLoad: 00000000`762d0000 00000000`76316000 C:\Windows\syswow64\KERNELBASE.dll
ModLoad: 00000000`76320000 00000000`76420000 C:\Windows\syswow64\USER32.dll
ModLoad: 00000000`759e0000 00000000`75a70000 C:\Windows\syswow64\GDI32.dll
ModLoad: 00000000`75250000 00000000`7525a000 C:\Windows\syswow64\LPK.dll
ModLoad: 00000000`75280000 00000000`7531d000 C:\Windows\syswow64\USP10.dll
ModLoad: 00000000`755b0000 00000000`7565c000 C:\Windows\syswow64\msvcrt.dll
ModLoad: 00000000`75370000 00000000`75410000 C:\Windows\syswow64\ADVAPI32.dll
ModLoad: 00000000`75b90000 00000000`75ba9000 C:\Windows\SysWOW64\sechost.dll
ModLoad: 00000000`75f70000 00000000`76060000 C:\Windows\syswow64\RPCRT4.dll
ModLoad: 00000000`751f0000 00000000`75250000 C:\Windows\syswow64\SspiCli.dll
ModLoad: 00000000`751e0000 00000000`751ec000 C:\Windows\syswow64\CRYPTBASE.dll
ModLoad: 00000000`6f680000 00000000`6f81e000 C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\COMCTL32.dll
ModLoad: 00000000`75bb0000 00000000`75c07000 C:\Windows\syswow64\SHLWAPI.dll
ModLoad: 00000000`756f0000 00000000`7576b000 C:\Windows\syswow64\COMDLG32.dll
ModLoad: 00000000`76420000 00000000`7706a000 C:\Windows\syswow64\SHELL32.dll
(12e4.eac): WOW64 breakpoint - code 4000001f (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
SYMSRV: BYINDEX: 0xA
d:\symbols*https://msdl.microsoft.com/download/symbols
wntdll.pdb
DCCFF2D483FA4DEE81DC04552C73BB5E2
SYMSRV: PATH: d:\symbols\wntdll.pdb\DCCFF2D483FA4DEE81DC04552C73BB5E2\wntdll.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: ntdll32 - public symbols
d:\symbols\wntdll.pdb\DCCFF2D483FA4DEE81DC04552C73BB5E2\wntdll.pdb
ntdll32!LdrpDoDebuggerBreak+0x2c:
77730f3b cc int 3
0:000:x86> g
ModLoad: 770a0000 77100000 C:\Windows\SysWOW64\IMM32.DLL
ModLoad: 75910000 759dc000 C:\Windows\syswow64\MSCTF.dll
ModLoad: 74e00000 74e29000 C:\Windows\SysWOW64\nvinit.dll
ModLoad: 74df0000 74df9000 C:\Windows\SysWOW64\VERSION.dll
ModLoad: 6f670000 6f676000 C:\Program Files (x86)\NVIDIA Corporation\CoProcManager\detoured.dll
ModLoad: 6f630000 6f661000 C:\Program Files (x86)\NVIDIA Corporation\CoProcManager\nvd3d9wrap.dll
ModLoad: 75770000 7590d000 C:\Windows\syswow64\SETUPAPI.dll
ModLoad: 77070000 77097000 C:\Windows\syswow64\CFGMGR32.dll
ModLoad: 77100000 7718f000 C:\Windows\syswow64\OLEAUT32.dll
ModLoad: 75c10000 75d6c000 C:\Windows\syswow64\ole32.dll
ModLoad: 75260000 75272000 C:\Windows\syswow64\DEVOBJ.dll
ModLoad: 6f610000 6f630000 C:\Program Files (x86)\NVIDIA Corporation\CoProcManager\nvdxgiwrap.dll
Breakpoint 0 hit
PEpad!WinMain:
002f1000 55 push ebp
0:000:x86> u
PEpad!WinMain:
002f1000 55 push ebp
002f1001 89e5 mov ebp,esp
002f1003 83ec4c sub esp,4Ch
002f1006 53 push ebx
002f1007 56 push esi
002f1008 8b5d08 mov ebx,dword ptr [ebp+8]
002f100b 8b4510 mov eax,dword ptr [ebp+10h]
002f100e 8b7514 mov esi,dword ptr [ebp+14h]
only with linker option -release, exe have checksum
Please use code tags (# button) with longer lists in this forum