Professional UI Solutions
Site Map   /  Register
 
 

Forum

Please Log In to post a new message or reply to an existing one. If you are not registered, please register.

NOTE: Some forums may be read-only if you are not currently subscribed to our technical support services.

Forums » Prof-UIS General Discussion » Got a crash of 2.88. Can anyone give me a hint? user dump file list is attached Collapse All
Subject Author Date
HP Jiang Jan 12, 2011 - 1:59 AM

my application is crash while running on the stress testing.


user dump file is found and analyzed by command: !analyze -v


see below:




FAULTING_IP:

ProfUIS288m+18c88d

0150c88d f7410400010000  test    dword ptr [ecx+4],100h



EXCEPTION_RECORD:  ffffffff -- (.exr 0xffffffffffffffff)

ExceptionAddress: 0150c88d (ProfUIS288m+0x0018c88d)

   ExceptionCode: c0000005 (Access violation)

  ExceptionFlags: 00000000

NumberParameters: 2

   Parameter[0]: 00000000

   Parameter[1]: 73692078

Attempt to read from address 73692078

PROCESS_NAME:  IOS.exe



ADDITIONAL_DEBUG_TEXT: 

Use ’!findthebuild’ command to search for the target build information.

If the build information is available, run ’!findthebuild -s ; .reload’ to set symbol path and load symbols.



FAULTING_MODULE: 7c900000 ntdll



DEBUG_FLR_IMAGE_TIMESTAMP:  4b219884



ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".



EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".



EXCEPTION_PARAMETER1:  00000000



EXCEPTION_PARAMETER2:  73692078



READ_ADDRESS:  73692078



FOLLOWUP_IP:

ProfUIS288m+18c88d

0150c88d f7410400010000  test    dword ptr [ecx+4],100h


Then using command of "ln" in Windbg,


(0150c830)   ProfUIS288m!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcIn+0x5d   |  (0150c940)   ProfUIS288m!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcOut


thanks and regards


 


 


 

HP Jiang Jan 12, 2011 - 2:07 AM

attached another analysis result:


 




FAULTING_IP:

ProfUIS288m!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcIn+5d

0150c88d f7410400010000  test    dword ptr [ecx+4],100h



EXCEPTION_RECORD:  ffffffff -- (.exr 0xffffffffffffffff)

ExceptionAddress: 0150c88d (ProfUIS288m!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcIn+0x0000005d)

   ExceptionCode: c0000005 (Access violation)

  ExceptionFlags: 00000000

NumberParameters: 2

   Parameter[0]: 00000000

   Parameter[1]: 73692078

Attempt to read from address 73692078



PROCESS_NAME:  IOS.exe



ADDITIONAL_DEBUG_TEXT: 

Use ’!findthebuild’ command to search for the target build information.

If the build information is available, run ’!findthebuild -s ; .reload’ to set symbol path and load symbols.



FAULTING_MODULE: 7c900000 ntdll



DEBUG_FLR_IMAGE_TIMESTAMP:  4b219884



ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".



EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".



EXCEPTION_PARAMETER1:  00000000



EXCEPTION_PARAMETER2:  73692078



READ_ADDRESS:  73692078



FOLLOWUP_IP:

ProfUIS288m!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcIn+5d

0150c88d f7410400010000  test    dword ptr [ecx+4],100h



FAULTING_THREAD:  000004ec



BUGCHECK_STR:  APPLICATION_FAULT_INVALID_POINTER_READ_WRONG_SYMBOLS



PRIMARY_PROBLEM_CLASS:  INVALID_POINTER_READ



DEFAULT_BUCKET_ID:  INVALID_POINTER_READ



LAST_CONTROL_TRANSFER:  from 00000000 to 0150c88d



STACK_TEXT: 

00000000 00000000 00000000 00000000 00000000 ProfUIS288m!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcIn+0x5d





STACK_COMMAND:  ~0s; .ecxr ; kb



SYMBOL_STACK_INDEX:  0



SYMBOL_NAME:  ProfUIS288m!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcIn+5d



FOLLOWUP_NAME:  MachineOwner



MODULE_NAME: ProfUIS288m



IMAGE_NAME:  ProfUIS288m.dll



BUCKET_ID:  WRONG_SYMBOLS



FAILURE_BUCKET_ID:  INVALID_POINTER_READ_c0000005_ProfUIS288m.dll!CExtHookSpy::HookSpyItem_t::SHS_HookCallWindowProcIn



WATSON_STAGEONE_URL:  http://watson.microsoft.com/StageOne/IOS_exe/1_1_66_1/4d2c0ca8/ProfUIS288m_dll/2_8_8_0/4b219884/c0000005/0018c88d.htm?Retriage=1#@lt;br />


Followup: MachineOwner