Forum
Please
Log In
to post a new message or reply to an existing one. If you are not registered, please
register.
NOTE: Some forums may be read-only if you are not currently subscribed to
our technical support services.
Subject |
Author |
Date |
|
HP Jiang
|
Jan 12, 2011 - 1:59 AM
|
my application is crash while running on the stress testing. user dump file is found and analyzed by command: !analyze -v see below:
FAULTING_IP:
ProfUIS288m+18c88d
0150c88d f7410400010000 test dword ptr [ecx+4],100h
EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 0150c88d (ProfUIS288m+0x0018c88d)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 73692078
Attempt to read from address 73692078
PROCESS_NAME: IOS.exe
ADDITIONAL_DEBUG_TEXT:
Use ’!findthebuild’ command to search for the target build information.
If the build information is available, run ’!findthebuild -s ; .reload’ to set symbol path and load symbols.
FAULTING_MODULE: 7c900000 ntdll
DEBUG_FLR_IMAGE_TIMESTAMP: 4b219884
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 73692078
READ_ADDRESS: 73692078
FOLLOWUP_IP:
ProfUIS288m+18c88d
0150c88d f7410400010000 test dword ptr [ecx+4],100h
Then using command of "ln" in Windbg, (0150c830) ProfUIS288m!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcIn+0x5d | (0150c940) ProfUIS288m!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcOut thanks and regards
|
|
HP Jiang
|
Jan 12, 2011 - 2:07 AM
|
attached another analysis result:
FAULTING_IP:
ProfUIS288m!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcIn+5d
0150c88d f7410400010000 test dword ptr [ecx+4],100h
EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 0150c88d (ProfUIS288m!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcIn+0x0000005d)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 73692078
Attempt to read from address 73692078
PROCESS_NAME: IOS.exe
ADDITIONAL_DEBUG_TEXT:
Use ’!findthebuild’ command to search for the target build information.
If the build information is available, run ’!findthebuild -s ; .reload’ to set symbol path and load symbols.
FAULTING_MODULE: 7c900000 ntdll
DEBUG_FLR_IMAGE_TIMESTAMP: 4b219884
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 73692078
READ_ADDRESS: 73692078
FOLLOWUP_IP:
ProfUIS288m!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcIn+5d
0150c88d f7410400010000 test dword ptr [ecx+4],100h
FAULTING_THREAD: 000004ec
BUGCHECK_STR: APPLICATION_FAULT_INVALID_POINTER_READ_WRONG_SYMBOLS
PRIMARY_PROBLEM_CLASS: INVALID_POINTER_READ
DEFAULT_BUCKET_ID: INVALID_POINTER_READ
LAST_CONTROL_TRANSFER: from 00000000 to 0150c88d
STACK_TEXT:
00000000 00000000 00000000 00000000 00000000 ProfUIS288m!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcIn+0x5d
STACK_COMMAND: ~0s; .ecxr ; kb
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: ProfUIS288m!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcIn+5d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ProfUIS288m
IMAGE_NAME: ProfUIS288m.dll
BUCKET_ID: WRONG_SYMBOLS
FAILURE_BUCKET_ID: INVALID_POINTER_READ_c0000005_ProfUIS288m.dll!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcIn
WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/IOS_exe/1_1_66_1/4d2c0ca8/ProfUIS288m_dll/2_8_8_0/4b219884/c0000005/0018c88d.htm?Retriage=1#@lt;br />
Followup: MachineOwner
|
|