IIS6 crashes, WinDBG helpneeded
IIS6 crashes, WinDBG helpneeded
am 22.08.2007 23:45:01 von spamfreelife
Hi,
!analyze -v is below. How exactly I can read stack if lowest row does
not have any module name next to (just hex number?)
0:033> !analyze -v
************************************************************ *******************
*
*
* Exception
Analysis *
*
*
************************************************************ *******************
The call to LoadLibrary(exts) failed, Win32 error 0n2
"The system cannot find the file specified."
Please check your debugger configuration and/or network access.
The call to LoadLibrary(ntsdexts) failed, Win32 error 0n2
"The system cannot find the file specified."
Please check your debugger configuration and/or network access.
FAULTING_IP:
ntdll!RtlpCoalesceFreeBlocks+21
7c82f527 f6460501 test byte ptr [esi+5],1
EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 7c82f527 (ntdll!RtlpCoalesceFreeBlocks+0x00000021)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 0327e02d
Attempt to read from address 0327e02d
DEFAULT_BUCKET_ID: APPLICATION_FAULT
PROCESS_NAME: w3wp.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx"
referenced memory at "0x%08lx". The memory could not be "%s".
READ_ADDRESS: 0327e02d
BUGCHECK_STR: ACCESS_VIOLATION
ORIGINAL_CAB_PATH: C:\WINDOWS\PCHealth\ErrorRep\QSIGNOFF\EF066.cab
NTGLOBALFLAG: 0
MANAGED_STACK: !dumpstack -EE
OS Thread Id: 0x91c (33)
TEB information is not available so a stack size of 0xFFFF is assumed
Current frame:
ChildEBP RetAddr Caller,Callee
LAST_CONTROL_TRANSFER: from 7c0040e1 to 00000000
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be
wrong.
01a8fff0 7c0040e1 0381edf8 00000000 00000000 0x0
01a8fff4 0381edf8 00000000 00000000 00000000 msvcr70!_beginthreadex
+0x8a
7c0040e2 00000000 ffffcf31 a85035ff 15ff7c04 0x381edf8
FOLLOWUP_IP:
msvcr70!_beginthreadex+8a
7c0040e1 c3 ret
SYMBOL_STACK_INDEX: 1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: msvcr70
IMAGE_NAME: msvcr70.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 3c36e574
FAULTING_THREAD: 0000091c
SYMBOL_NAME: msvcr70!_beginthreadex+8a
STACK_COMMAND: ~33s; .ecxr ; kb
FAILURE_BUCKET_ID: ACCESS_VIOLATION_msvcr70!_beginthreadex+8a
BUCKET_ID: ACCESS_VIOLATION_msvcr70!_beginthreadex+8a
Followup: MachineOwner
Re: IIS6 crashes, WinDBG helpneeded
am 23.08.2007 17:52:23 von patfilot
Looks like memory corruption. Most likely something trashed the heap and
then sometime later some other code touched the corrupted area. Also, did
you verify that you have good symbols?
Pat
wrote in message
news:1187819101.194478.184790@x35g2000prf.googlegroups.com.. .
> Hi,
>
> !analyze -v is below. How exactly I can read stack if lowest row does
> not have any module name next to (just hex number?)
>
> 0:033> !analyze -v
> ************************************************************ *******************
> *
> *
> * Exception
> Analysis *
> *
> *
> ************************************************************ *******************
>
> The call to LoadLibrary(exts) failed, Win32 error 0n2
> "The system cannot find the file specified."
> Please check your debugger configuration and/or network access.
> The call to LoadLibrary(ntsdexts) failed, Win32 error 0n2
> "The system cannot find the file specified."
> Please check your debugger configuration and/or network access.
>
> FAULTING_IP:
> ntdll!RtlpCoalesceFreeBlocks+21
> 7c82f527 f6460501 test byte ptr [esi+5],1
>
> EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
> ExceptionAddress: 7c82f527 (ntdll!RtlpCoalesceFreeBlocks+0x00000021)
> ExceptionCode: c0000005 (Access violation)
> ExceptionFlags: 00000000
> NumberParameters: 2
> Parameter[0]: 00000000
> Parameter[1]: 0327e02d
> Attempt to read from address 0327e02d
>
> DEFAULT_BUCKET_ID: APPLICATION_FAULT
>
> PROCESS_NAME: w3wp.exe
>
> ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx"
> referenced memory at "0x%08lx". The memory could not be "%s".
>
> READ_ADDRESS: 0327e02d
>
> BUGCHECK_STR: ACCESS_VIOLATION
>
> ORIGINAL_CAB_PATH: C:\WINDOWS\PCHealth\ErrorRep\QSIGNOFF\EF066.cab
>
> NTGLOBALFLAG: 0
>
> MANAGED_STACK: !dumpstack -EE
> OS Thread Id: 0x91c (33)
> TEB information is not available so a stack size of 0xFFFF is assumed
> Current frame:
> ChildEBP RetAddr Caller,Callee
>
> LAST_CONTROL_TRANSFER: from 7c0040e1 to 00000000
>
> STACK_TEXT:
> WARNING: Frame IP not in any known module. Following frames may be
> wrong.
> 01a8fff0 7c0040e1 0381edf8 00000000 00000000 0x0
> 01a8fff4 0381edf8 00000000 00000000 00000000 msvcr70!_beginthreadex
> +0x8a
> 7c0040e2 00000000 ffffcf31 a85035ff 15ff7c04 0x381edf8
>
>
> FOLLOWUP_IP:
> msvcr70!_beginthreadex+8a
> 7c0040e1 c3 ret
>
> SYMBOL_STACK_INDEX: 1
>
> FOLLOWUP_NAME: MachineOwner
>
> MODULE_NAME: msvcr70
>
> IMAGE_NAME: msvcr70.dll
>
> DEBUG_FLR_IMAGE_TIMESTAMP: 3c36e574
>
> FAULTING_THREAD: 0000091c
>
> SYMBOL_NAME: msvcr70!_beginthreadex+8a
>
> STACK_COMMAND: ~33s; .ecxr ; kb
>
> FAILURE_BUCKET_ID: ACCESS_VIOLATION_msvcr70!_beginthreadex+8a
>
> BUCKET_ID: ACCESS_VIOLATION_msvcr70!_beginthreadex+8a
>
> Followup: MachineOwner
>
Re: IIS6 crashes, WinDBG helpneeded
am 23.08.2007 23:28:02 von ChanKaiShi
How do I verify is symbols were loaded correctly? I exectued .reload before
analysis.
Also if it's in fact memory corruption how do I go about troubleshooting this?
"Pat [MSFT]" wrote:
> Looks like memory corruption. Most likely something trashed the heap and
> then sometime later some other code touched the corrupted area. Also, did
> you verify that you have good symbols?
>
>
> Pat
>
> wrote in message
> news:1187819101.194478.184790@x35g2000prf.googlegroups.com.. .
> > Hi,
> >
> > !analyze -v is below. How exactly I can read stack if lowest row does
> > not have any module name next to (just hex number?)
> >
> > 0:033> !analyze -v
> > ************************************************************ *******************
> > *
> > *
> > * Exception
> > Analysis *
> > *
> > *
> > ************************************************************ *******************
> >
> > The call to LoadLibrary(exts) failed, Win32 error 0n2
> > "The system cannot find the file specified."
> > Please check your debugger configuration and/or network access.
> > The call to LoadLibrary(ntsdexts) failed, Win32 error 0n2
> > "The system cannot find the file specified."
> > Please check your debugger configuration and/or network access.
> >
> > FAULTING_IP:
> > ntdll!RtlpCoalesceFreeBlocks+21
> > 7c82f527 f6460501 test byte ptr [esi+5],1
> >
> > EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
> > ExceptionAddress: 7c82f527 (ntdll!RtlpCoalesceFreeBlocks+0x00000021)
> > ExceptionCode: c0000005 (Access violation)
> > ExceptionFlags: 00000000
> > NumberParameters: 2
> > Parameter[0]: 00000000
> > Parameter[1]: 0327e02d
> > Attempt to read from address 0327e02d
> >
> > DEFAULT_BUCKET_ID: APPLICATION_FAULT
> >
> > PROCESS_NAME: w3wp.exe
> >
> > ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx"
> > referenced memory at "0x%08lx". The memory could not be "%s".
> >
> > READ_ADDRESS: 0327e02d
> >
> > BUGCHECK_STR: ACCESS_VIOLATION
> >
> > ORIGINAL_CAB_PATH: C:\WINDOWS\PCHealth\ErrorRep\QSIGNOFF\EF066.cab
> >
> > NTGLOBALFLAG: 0
> >
> > MANAGED_STACK: !dumpstack -EE
> > OS Thread Id: 0x91c (33)
> > TEB information is not available so a stack size of 0xFFFF is assumed
> > Current frame:
> > ChildEBP RetAddr Caller,Callee
> >
> > LAST_CONTROL_TRANSFER: from 7c0040e1 to 00000000
> >
> > STACK_TEXT:
> > WARNING: Frame IP not in any known module. Following frames may be
> > wrong.
> > 01a8fff0 7c0040e1 0381edf8 00000000 00000000 0x0
> > 01a8fff4 0381edf8 00000000 00000000 00000000 msvcr70!_beginthreadex
> > +0x8a
> > 7c0040e2 00000000 ffffcf31 a85035ff 15ff7c04 0x381edf8
> >
> >
> > FOLLOWUP_IP:
> > msvcr70!_beginthreadex+8a
> > 7c0040e1 c3 ret
> >
> > SYMBOL_STACK_INDEX: 1
> >
> > FOLLOWUP_NAME: MachineOwner
> >
> > MODULE_NAME: msvcr70
> >
> > IMAGE_NAME: msvcr70.dll
> >
> > DEBUG_FLR_IMAGE_TIMESTAMP: 3c36e574
> >
> > FAULTING_THREAD: 0000091c
> >
> > SYMBOL_NAME: msvcr70!_beginthreadex+8a
> >
> > STACK_COMMAND: ~33s; .ecxr ; kb
> >
> > FAILURE_BUCKET_ID: ACCESS_VIOLATION_msvcr70!_beginthreadex+8a
> >
> > BUCKET_ID: ACCESS_VIOLATION_msvcr70!_beginthreadex+8a
> >
> > Followup: MachineOwner
> >
>
Re: IIS6 crashes, WinDBG helpneeded
am 24.08.2007 19:32:50 von patfilot
Try switching to a known good thread and dumping the stack:
~0s
kb
If the stack looks good then you will have the symbols. You can also dump
the module list:
lm
And it will tell you if the symbols for a module loaded. If it is blank it
means that no attempt was made (i.e. WinDBG only grabs symbols that it needs
on demand, then caches them locally). You can also check the symbol cache
on the HDD.
..reload only reloads symbols, it doesn't check the path to the symbols.
First get the symbols setup, then we can look into the memory corruption -
we may get a good hint as to what the problem is. Otherwise, you can use
PageHeap to set guard pages in memory and force a crash-on-corruption vs a
crash-on-access.
Pat
"ChanKaiShi" wrote in message
news:6225AD3F-7C62-4795-972A-7D6327701D41@microsoft.com...
> How do I verify is symbols were loaded correctly? I exectued .reload
> before
> analysis.
> Also if it's in fact memory corruption how do I go about troubleshooting
> this?
>
> "Pat [MSFT]" wrote:
>
>> Looks like memory corruption. Most likely something trashed the heap and
>> then sometime later some other code touched the corrupted area. Also,
>> did
>> you verify that you have good symbols?
>>
>>
>> Pat
>>
>> wrote in message
>> news:1187819101.194478.184790@x35g2000prf.googlegroups.com.. .
>> > Hi,
>> >
>> > !analyze -v is below. How exactly I can read stack if lowest row does
>> > not have any module name next to (just hex number?)
>> >
>> > 0:033> !analyze -v
>> > ************************************************************ *******************
>> > *
>> > *
>> > * Exception
>> > Analysis *
>> > *
>> > *
>> > ************************************************************ *******************
>> >
>> > The call to LoadLibrary(exts) failed, Win32 error 0n2
>> > "The system cannot find the file specified."
>> > Please check your debugger configuration and/or network access.
>> > The call to LoadLibrary(ntsdexts) failed, Win32 error 0n2
>> > "The system cannot find the file specified."
>> > Please check your debugger configuration and/or network access.
>> >
>> > FAULTING_IP:
>> > ntdll!RtlpCoalesceFreeBlocks+21
>> > 7c82f527 f6460501 test byte ptr [esi+5],1
>> >
>> > EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
>> > ExceptionAddress: 7c82f527 (ntdll!RtlpCoalesceFreeBlocks+0x00000021)
>> > ExceptionCode: c0000005 (Access violation)
>> > ExceptionFlags: 00000000
>> > NumberParameters: 2
>> > Parameter[0]: 00000000
>> > Parameter[1]: 0327e02d
>> > Attempt to read from address 0327e02d
>> >
>> > DEFAULT_BUCKET_ID: APPLICATION_FAULT
>> >
>> > PROCESS_NAME: w3wp.exe
>> >
>> > ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx"
>> > referenced memory at "0x%08lx". The memory could not be "%s".
>> >
>> > READ_ADDRESS: 0327e02d
>> >
>> > BUGCHECK_STR: ACCESS_VIOLATION
>> >
>> > ORIGINAL_CAB_PATH: C:\WINDOWS\PCHealth\ErrorRep\QSIGNOFF\EF066.cab
>> >
>> > NTGLOBALFLAG: 0
>> >
>> > MANAGED_STACK: !dumpstack -EE
>> > OS Thread Id: 0x91c (33)
>> > TEB information is not available so a stack size of 0xFFFF is assumed
>> > Current frame:
>> > ChildEBP RetAddr Caller,Callee
>> >
>> > LAST_CONTROL_TRANSFER: from 7c0040e1 to 00000000
>> >
>> > STACK_TEXT:
>> > WARNING: Frame IP not in any known module. Following frames may be
>> > wrong.
>> > 01a8fff0 7c0040e1 0381edf8 00000000 00000000 0x0
>> > 01a8fff4 0381edf8 00000000 00000000 00000000 msvcr70!_beginthreadex
>> > +0x8a
>> > 7c0040e2 00000000 ffffcf31 a85035ff 15ff7c04 0x381edf8
>> >
>> >
>> > FOLLOWUP_IP:
>> > msvcr70!_beginthreadex+8a
>> > 7c0040e1 c3 ret
>> >
>> > SYMBOL_STACK_INDEX: 1
>> >
>> > FOLLOWUP_NAME: MachineOwner
>> >
>> > MODULE_NAME: msvcr70
>> >
>> > IMAGE_NAME: msvcr70.dll
>> >
>> > DEBUG_FLR_IMAGE_TIMESTAMP: 3c36e574
>> >
>> > FAULTING_THREAD: 0000091c
>> >
>> > SYMBOL_NAME: msvcr70!_beginthreadex+8a
>> >
>> > STACK_COMMAND: ~33s; .ecxr ; kb
>> >
>> > FAILURE_BUCKET_ID: ACCESS_VIOLATION_msvcr70!_beginthreadex+8a
>> >
>> > BUCKET_ID: ACCESS_VIOLATION_msvcr70!_beginthreadex+8a
>> >
>> > Followup: MachineOwner
>> >
>>
Re: IIS6 crashes, WinDBG helpneeded
am 24.08.2007 19:50:06 von ChanKaiShi
Appears to me symbols look ok?
0:033> ~0s
eax=00000000 ebx=00000000 ecx=000004d2 edx=00001f68 esi=00000180 edi=00000000
eip=7c82ed54 esp=0006fc0c ebp=0006fc7c iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
ntdll!KiFastSystemCallRet:
7c82ed54 c3 ret
0:000> kb
ChildEBP RetAddr Args to Child
0006fc08 7c822124 77e6bad8 00000180 00000000 ntdll!KiFastSystemCallRet
0006fc0c 77e6bad8 00000180 00000000 00000000 ntdll!NtWaitForSingleObject+0xc
0006fc7c 77e6ba42 00000180 ffffffff 00000000
kernel32!WaitForSingleObjectEx+0xac
0006fc90 5a36467a 00000180 ffffffff 00000000 kernel32!WaitForSingleObject+0x12
0006fca0 5a366e63 00285358 5a3af41d 00000000
w3dt!WP_CONTEXT::RunMainThreadLoop+0x10
0006fca8 5a3af41d 00000000 64711da9 00000000 w3dt!UlAtqStartListen+0x2d
0006fcb8 5a3bc259 0100141c 010013e4 010012d0
w3core!W3_SERVER::StartListen+0xbd
0006ff0c 0100187c 00000007 00283c20 00000000 w3core!UlW3Start+0x26e
0006ff44 01001a23 00000007 00283c20 002847e8 w3wp!wmain+0x22a
0006ffc0 77e523e5 00000000 00000000 bffdf000 w3wp!wmainCRTStartup+0x12b
0006fff0 00000000 010018f8 00000000 00000000 kernel32!BaseProcessStart+0x23
Below is symbol list, where do we go from here?
start end module name
01000000 01005000 w3wp # (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\w3wp.pdb\D7E88A6D65314A0DACE963B6252016741\w3wp. pdb
023e0000 023ec000 App_Code C (no symbols)
02830000 02844000 SiebelObjectLibrary C (no symbols)
02850000 0285c000 SiebelEService C (no symbols)
02880000 02888000 App_global_asax C (no symbols)
02a20000 02a2a000 Interop_SiebelBusObjectInterfaces C (no symbols)
02a50000 02a7c000 sstchca (export symbols) sstchca.dll
02a80000 02b1b000 sscfcmn (export symbols) sscfcmn.dll
02b30000 02b99000 sslcsym (export symbols) sslcsym.dll
02ba0000 02bb6000 sslcosd (export symbols) sslcosd.dll
02bc0000 02bc6000 sslcosa (export symbols) sslcosa.dll
02bd0000 02cb0000 sslcshar C (export symbols) sslcshar.dll
02cb0000 02cb6000 libarm (export symbols) libarm.dll
02cc0000 02cc6000 sslcver (export symbols) sslcver.dll
02cd0000 02ce3000 sstcomc (export symbols) sstcomc.dll
02cf0000 02d12000 stcfel (export symbols) stcfel.dll
02d20000 02f28000 sscfdm (export symbols) sscfdm.dll
02f30000 02f3c000 sslclm (export symbols) sslclm.dll
02f40000 02f63000 sslcrsa (export symbols) sslcrsa.dll
02f70000 02f7d000 sslcfsm (export symbols) sslcfsm.dll
02f80000 02f8f000 sslcsrms (export symbols) sslcsrms.dll
02f90000 02fbe000 sslcscr (export symbols) sslcscr.dll
02fc0000 030cc000 sslcsrd (export symbols) sslcsrd.dll
030d0000 03169000 sslcnapi (export symbols) sslcnapi.dll
03170000 0317e000 sslccore (export symbols) sslccore.dll
03180000 03186000 sslcsnsr (export symbols) sslcsnsr.dll
03190000 03199000 sslcsrtr (export symbols) sslcsrtr.dll
031a0000 031b1000 sslcsrcn (export symbols) sslcsrcn.dll
031c0000 031cb000 sslcsrvr (export symbols) sslcsrvr.dll
031d0000 031e8000 sslcos (export symbols) sslcos.dll
031f0000 03200000 sslcns (export symbols) sslcns.dll
03200000 0320e000 sslcsnns (export symbols) sslcsnns.dll
03210000 03218000 sslcsnsc (export symbols) sslcsnsc.dll
03220000 03228000 sslcsecc (export symbols) sslcsecc.dll
03230000 03247000 sslcsecm (export symbols) sslcsecm.dll
03250000 0325e000 sslccachev2 (export symbols) sslccachev2.dll
03260000 03269000 sslcmsgagent (export symbols) sslcmsgagent.dll
03270000 03279000 stcfole (export symbols) stcfole.dll
03320000 03329000 sslcacln (export symbols) sslcacln.dll
03440000 0344f000 sslcevt (export symbols) sslcevt.dll
03450000 034ca000 srcf (export symbols) srcf.dll
034d0000 03555000 srcfapps (export symbols) srcfapps.dll
035a0000 035cf000 sbcf (export symbols) sbcf.dll
035d0000 035d6000 sbcfapps (export symbols) sbcfapps.dll
035e0000 0360f000 sstcomr (export symbols) sstcomr.dll
03610000 0362b000 sslcsmgr (export symbols) sslcsmgr.dll
03630000 03636000 sslcsssm (export symbols) sslcsssm.dll
03640000 0364e000 sslcsnom (export symbols) sslcsnom.dll
03bd0000 03be8000 App_Web_defaultwsdlhelpgenerator_aspx_cdcab7d2_ihb_nefu
C (private pdb symbols)
c:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\Temporary ASP.NET
Files\webservices_eservicews\d462b199\967a221f\App_Web_defau ltwsdlhelpgenerator.aspx.cdcab7d2.ihb-nefu.pdb
03eb0000 03ec5000 sscftclg (export symbols) sscftclg.dll
10000000 102c5000 xpsp2res (no symbols)
2d770000 2d77e000 sslczlib (export symbols) sslczlib.dll
5a300000 5a307000 w3tp (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\w3tp.pdb\56F01DE2A8604D5881B61771296802AE1\w3tp. pdb
5a320000 5a332000 w3isapi (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\w3isapi.pdb\5E8F4AF93952413B862A5169D2721F212\w3 isapi.pdb
5a360000 5a36d000 w3dt (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\w3dt.pdb\9B17510C0C384C7E989D1BF012F38CCB2\w3dt. pdb
5a390000 5a3e8000 w3core (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\w3core.pdb\1FAF4F2AFB7149C48B1E17098D2406A22\w3c ore.pdb
5a3f0000 5a3f6000 w3comlog (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\w3comlog.pdb\66A1E174C0B04EAFBF9B9EA4988E22651\w 3comlog.pdb
5a400000 5a408000 w3cache (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\w3cache.pdb\1F522D88492C476F8FB16348532B46EA2\w3 cache.pdb
5a420000 5a431000 iismap (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\iismap.pdb\B61FDE62195C4252847BEBDA8B9E657B1\iis map.pdb
5b640000 5b658000 strmfilt (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\strmfilt.pdb\5880BB519C39463A88A42185F8E523FE1\s trmfilt.pdb
5ccf0000 5ccff000 samlib (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\samlib.pdb\1CC9EE2C4FDE4F86A27D506CB5304F8E2\sam lib.pdb
5e600000 5e6ba000 Microsoft_JScript (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\Microsoft.JScript.pdb\0367756C0FA446DDA9BA1B68CB 29F0421\Microsoft.JScript.pdb
5f270000 5f2c9000 hnetcfg (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\HNetCfg.pdb\DB938DB1CADE442C9331F8BBB932F9ED1\HN etCfg.pdb
60060000 60066000 aspnet_filter (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\aspnet_filter.pdb\CBA3B20B09E741BA823405423A1D14 E31\aspnet_filter.pdb
60070000 60075000 aspnet_isapi T (no symbols)
608f0000 60901000 admwprox (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\admwprox.pdb\B1B3B6AC037B43FCA39C5369000100291\a dmwprox.pdb
60ba0000 60bb1000 wamreg (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\wamreg.pdb\184618650BC14DE7980DE37BB5FA78411\wam reg.pdb
62da0000 62da7000 lonsint (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\lonsint.pdb\837F421906854FAEB65DC7ECA97319191\lo nsint.pdb
64700000 6472d000 iisutil (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\iisutil.pdb\D8BE604F942D4CE49A3D58FCDAB6E1F62\ii sutil.pdb
647b0000 647d7000 iisRtl (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\iisRtl.pdb\8825F5C6117C4408B8BADA38F5A0F8051\iis Rtl.pdb
64890000 6497e000 System_Configuration_ni C (pdb symbols)
C:\Program Files\Debugging Tools for
Windows\sym\System.Configuration.pdb\DA5610F2158A4B7081C4109 0241F38DB1\System.Configuration.pdb
64e70000 65137000 System_Data (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\System.Data.pdb\500E0BA7E5D946BE818FC24957B75CED 1\System.Data.pdb
65140000 657a8000 System_Data_ni C (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\System.Data.pdb\500E0BA7E5D946BE818FC24957B75CED 1\System.Data.pdb
67150000 67159000 httpapi (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\httpapi.pdb\446C5429700045759166343B5E2E65D31\ht tpapi.pdb
673f0000 67496000 System_EnterpriseServices_ni C (pdb symbols)
C:\Program Files\Debugging Tools for
Windows\sym\System.EnterpriseServices.pdb\3CC957D929B546FE85 C642A39C3C18DA1\System.EnterpriseServices.pdb
67aa0000 67ae3000 System_Transactions (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\System.Transactions.pdb\31235D4122BD43759DA18F02 00C3E1341\System.Transactions.pdb
67af0000 67b9c000 System_Transactions_ni C (pdb symbols)
C:\Program Files\Debugging Tools for
Windows\sym\System.Transactions.pdb\31235D4122BD43759DA18F02 00C3E1341\System.Transactions.pdb
68000000 6802f000 rsaenh # (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\rsaenh.pdb\A6F04DA3E25E4DA9BE89712B76BAB9041\rsa enh.pdb
685b0000 685ba000 gzip (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\gzip.pdb\B3E91739F4724B7895568A843722B6B71\gzip. pdb
685c0000 6910a000 System_Web_ni C (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\System.Web.pdb\2B1A72C51A274953879D3C2B1C5799231 \System.Web.pdb
695a0000 697da000 System_Web_Mobile_ni C (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\System.Web.Mobile.pdb\665AE29617B948248639955ECA EF77D81\System.Web.Mobile.pdb
69890000 698d0000 System_Web_RegularExpressions_ni C (pdb symbols)
C:\Program Files\Debugging Tools for
Windows\sym\System.Web.RegularExpressions.pdb\2E973DE3738C4A 608BB9E465A9DB3CB91\System.Web.RegularExpressions.pdb
698f0000 69ad2000 System_Web_Services_ni C (pdb symbols)
C:\Program Files\Debugging Tools for
Windows\sym\System.Web.Services.pdb\C5A139ABA70343ECA73D231A 258092D91\System.Web.Services.pdb
69be0000 6a148000 System_Xml_ni C (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\System.Xml.pdb\EE73F002989646779F269078A0DD937A1 \System.Xml.pdb
6a2a0000 6a2ec000 webengine T (no symbols)
6d0f0000 6d110000 iisres (no symbols)
6d580000 6d628000 dbghelp (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\dbghelp.pdb\9BF851401BD2479DA9DF4293F44CA2411\db ghelp.pdb
71ae0000 71ae8000 wshtcpip (pdb symbols) C:\Program
Files\Debugging Tools for Windows\sym\wshtcpip.pdb\3E80161D2\wshtcpip.pdb
71b20000 71b61000 mswsock (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\mswsock.pdb\478CAFB429F84F8081CABDCAD97007C32\ms wsock.pdb
71bb0000 71bb9000 wsock32 (pdb symbols) C:\Program
Files\Debugging Tools for Windows\sym\wsock32.pdb\3E800C7A2\wsock32.pdb
71bd0000 71be1000 mpr (pdb symbols) C:\Program
Files\Debugging Tools for Windows\sym\mpr.pdb\3E8016DD2\mpr.pdb
71bf0000 71bf8000 ws2help (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\ws2help.pdb\0314A09694AB4E9FB5A17185669D24972\ws 2help.pdb
71c00000 71c17000 ws2_32 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\ws2_32.pdb\EEEF06D925B3453F9D988B190AA5DAF52\ws2 _32.pdb
71c40000 71c98000 netapi32 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\netapi32.pdb\F9CA3C62BA1C49C3ADF226438B1E97AC2\n etapi32.pdb
71f60000 71f64000 security (pdb symbols) C:\Program
Files\Debugging Tools for Windows\sym\security.pdb\3E7FFFC11\security.pdb
745e0000 748a6000 msi (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\msi.pdb\F51A178F210A4790B7828A9EB7691C102\msi.pd b
74a80000 74aaf000 oleacc (pdb symbols) C:\Program
Files\Debugging Tools for Windows\sym\oleacc.pdb\3E8010AF2\oleacc.pdb
75da0000 75e5c000 sxs (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\sxs.pdb\D67B764232144363A0B2D79DA8857E402\sxs.pd b
76190000 761a2000 msasn1 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\msasn1.pdb\0EC22D857C0E456485696BC360603E0E2\msa sn1.pdb
761b0000 76243000 crypt32 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\crypt32.pdb\228D593096EF4B8E98599ED37D096BFE2\cr ypt32.pdb
76750000 76777000 schannel (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\schannel.pdb\9CA7C80C30A844D8AA538C94B3EDB37F2\s channel.pdb
76920000 769e4000 userenv (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\userenv.pdb\F68DBB7869BF4246A3D995C8BB09BA522\us erenv.pdb
76b70000 76b7b000 psapi (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\psapi.pdb\AF3CD7FDF21A4E79AFDFAB0B089ABBBC1\psap i.pdb
76ed0000 76eff000 dnsapi (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\dnsapi.pdb\489F79DEA41A40AB92BBA3188CBF27032\dns api.pdb
76f10000 76f3e000 wldap32 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\wldap32.pdb\D471FF11ABEE4840AA587CDA875D674C2\wl dap32.pdb
76f50000 76f63000 secur32 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\secur32.pdb\766A414091A74564AEDB1687955A7E5D2\se cur32.pdb
76f70000 76f77000 winrnr (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\winrnr.pdb\4239063085E043069CAD58EFCC3BC0591\win rnr.pdb
76f80000 76f88000 rasadhlp (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\rasadhlp.pdb\124BD1BAF1ED4A25A5FD12B0E15EC36C2\r asadhlp.pdb
77010000 770d6000 comres (pdb symbols) C:\Program
Files\Debugging Tools for Windows\sym\COMRes.pdb\3E7FFF891\COMRes.pdb
77210000 772b8000 wininet (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\wininet.pdb\C77F63F816C9459A9EC97AEBD6E9E9C72\wi ninet.pdb
77380000 77412000 user32 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\user32.pdb\5EA4E31A1AA540B9864D75E5434A777E2\use r32.pdb
77420000 77523000 comctl32 # (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\comctl32.pdb\65A5419D043B4ED89E9B4A89235776BD1\c omctl32.pdb
77670000 777a4000 ole32 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\ole32.pdb\315B02A9919F4F6584F42575BE6B51772\ole3 2.pdb
777b0000 77833000 clbcatq (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\clbcatq.pdb\117902ED64834FA49E788E78D059A6102\cl bcatq.pdb
77b90000 77b98000 version (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\version.pdb\62E608390B354524A451E87A68080E872\ve rsion.pdb
77ba0000 77bfa000 msvcrt (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\msvcrt.pdb\62B8BDC3CC194D2992DCFAED78B621FC1\msv crt.pdb
77c00000 77c48000 gdi32 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\gdi32.pdb\82CEAD5ADEFF4B1188E304ACF752B4F42\gdi3 2.pdb
77c50000 77cef000 rpcrt4 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\rpcrt4.pdb\187CE4439F4C425994FA1EF24ADD452B2\rpc rt4.pdb
77d00000 77d8c000 oleaut32 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\oleaut32.pdb\3BA3D54909FA46898F8C72988B3BD9B52\o leaut32.pdb
77da0000 77df2000 shlwapi (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\shlwapi.pdb\DA6A0069FDF546C98890AE84D99E4C6B2\sh lwapi.pdb
77e00000 77e22000 ntmarta (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\ntmarta.pdb\EC3D8F38D74949C39BDB089C67D492672\nt marta.pdb
77e40000 77f42000 kernel32 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\kernel32.pdb\DF4F569C743446809ACD3DFD1E9FA2AF2\k ernel32.pdb
77f50000 77fec000 advapi32 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\advapi32.pdb\A4D23CDE2C2949FABA38312EDCE973832\a dvapi32.pdb
780c0000 78121000 msvcp60 # (pdb symbols) C:\Program
Files\Debugging Tools for Windows\sym\msvcp60.pdb\3CF541551\msvcp60.pdb
78130000 781cb000 msvcr80 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\msvcr80.i386.pdb\4258E68C99EB4FBFB847A607785A948 D1\msvcr80.i386.pdb
79000000 79045000 mscoree (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\mscoree.pdb\0D7C30DDE4864A76BCE4B0CB18E63C4E2\ms coree.pdb
79060000 790b3000 mscorjit (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\mscorjit.pdb\8D935A6E838D46A0B8A4B550F0AF27A82\m scorjit.pdb
790c0000 79ba8000 mscorlib_ni C (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\mscorlib.pdb\06A826D298CB41A3B63D7BDACDDAF9321\m scorlib.pdb
79e70000 7a3d1000 mscorwks (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\mscorwks.pdb\7FA9D4C5454E4346B11ED781C22BDF462\m scorwks.pdb
7a440000 7abfe000 System_ni C (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\System.pdb\5062AE74D4D241B586F2E1BB36B19AA31\Sys tem.pdb
7c000000 7c054000 msvcr70 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\msvcr70.pdb\3295127CD51C4935A617363ABFE9B8A02\ms vcr70.pdb
7c080000 7c0f7000 msvcp70 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\msvcp70.pdb\37E0F6E8279044B68CF0B4621E333A642\ms vcp70.pdb
7c250000 7c33e000 mfc70u (export symbols) mfc70u.dll
7c800000 7c8c0000 ntdll (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\ntdll.pdb\DCE823FCF71A4BF5AA489994520EA18F2\ntdl l.pdb
7c8d0000 7d0d4000 shell32 (pdb symbols) C:\Program
Files\Debugging Tools for
Windows\sym\shell32.pdb\7B06F9700CFA47B7991348282A69D1852\sh ell32.pdb
"Pat [MSFT]" wrote:
> Try switching to a known good thread and dumping the stack:
> ~0s
> kb
>
> If the stack looks good then you will have the symbols. You can also dump
> the module list:
> lm
>
> And it will tell you if the symbols for a module loaded. If it is blank it
> means that no attempt was made (i.e. WinDBG only grabs symbols that it needs
> on demand, then caches them locally). You can also check the symbol cache
> on the HDD.
>
> .reload only reloads symbols, it doesn't check the path to the symbols.
>
> First get the symbols setup, then we can look into the memory corruption -
> we may get a good hint as to what the problem is. Otherwise, you can use
> PageHeap to set guard pages in memory and force a crash-on-corruption vs a
> crash-on-access.
>
>
> Pat
>
> "ChanKaiShi" wrote in message
> news:6225AD3F-7C62-4795-972A-7D6327701D41@microsoft.com...
> > How do I verify is symbols were loaded correctly? I exectued .reload
> > before
> > analysis.
> > Also if it's in fact memory corruption how do I go about troubleshooting
> > this?
> >
> > "Pat [MSFT]" wrote:
> >
> >> Looks like memory corruption. Most likely something trashed the heap and
> >> then sometime later some other code touched the corrupted area. Also,
> >> did
> >> you verify that you have good symbols?
> >>
> >>
> >> Pat
> >>
> >> wrote in message
> >> news:1187819101.194478.184790@x35g2000prf.googlegroups.com.. .
> >> > Hi,
> >> >
> >> > !analyze -v is below. How exactly I can read stack if lowest row does
> >> > not have any module name next to (just hex number?)
> >> >
> >> > 0:033> !analyze -v
> >> > ************************************************************ *******************
> >> > *
> >> > *
> >> > * Exception
> >> > Analysis *
> >> > *
> >> > *
> >> > ************************************************************ *******************
> >> >
> >> > The call to LoadLibrary(exts) failed, Win32 error 0n2
> >> > "The system cannot find the file specified."
> >> > Please check your debugger configuration and/or network access.
> >> > The call to LoadLibrary(ntsdexts) failed, Win32 error 0n2
> >> > "The system cannot find the file specified."
> >> > Please check your debugger configuration and/or network access.
> >> >
> >> > FAULTING_IP:
> >> > ntdll!RtlpCoalesceFreeBlocks+21
> >> > 7c82f527 f6460501 test byte ptr [esi+5],1
> >> >
> >> > EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
> >> > ExceptionAddress: 7c82f527 (ntdll!RtlpCoalesceFreeBlocks+0x00000021)
> >> > ExceptionCode: c0000005 (Access violation)
> >> > ExceptionFlags: 00000000
> >> > NumberParameters: 2
> >> > Parameter[0]: 00000000
> >> > Parameter[1]: 0327e02d
> >> > Attempt to read from address 0327e02d
> >> >
> >> > DEFAULT_BUCKET_ID: APPLICATION_FAULT
> >> >
> >> > PROCESS_NAME: w3wp.exe
> >> >
> >> > ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx"
> >> > referenced memory at "0x%08lx". The memory could not be "%s".
> >> >
> >> > READ_ADDRESS: 0327e02d
> >> >
> >> > BUGCHECK_STR: ACCESS_VIOLATION
> >> >
> >> > ORIGINAL_CAB_PATH: C:\WINDOWS\PCHealth\ErrorRep\QSIGNOFF\EF066.cab
> >> >
> >> > NTGLOBALFLAG: 0
> >> >
> >> > MANAGED_STACK: !dumpstack -EE
> >> > OS Thread Id: 0x91c (33)
> >> > TEB information is not available so a stack size of 0xFFFF is assumed
> >> > Current frame:
> >> > ChildEBP RetAddr Caller,Callee
> >> >
> >> > LAST_CONTROL_TRANSFER: from 7c0040e1 to 00000000
> >> >
> >> > STACK_TEXT:
> >> > WARNING: Frame IP not in any known module. Following frames may be
> >> > wrong.
> >> > 01a8fff0 7c0040e1 0381edf8 00000000 00000000 0x0
> >> > 01a8fff4 0381edf8 00000000 00000000 00000000 msvcr70!_beginthreadex
> >> > +0x8a
> >> > 7c0040e2 00000000 ffffcf31 a85035ff 15ff7c04 0x381edf8
> >> >
> >> >
> >> > FOLLOWUP_IP:
> >> > msvcr70!_beginthreadex+8a
> >> > 7c0040e1 c3 ret
> >> >
> >> > SYMBOL_STACK_INDEX: 1
> >> >
> >> > FOLLOWUP_NAME: MachineOwner
> >> >
> >> > MODULE_NAME: msvcr70
> >> >
> >> > IMAGE_NAME: msvcr70.dll
> >> >
> >> > DEBUG_FLR_IMAGE_TIMESTAMP: 3c36e574
> >> >
> >> > FAULTING_THREAD: 0000091c
> >> >
> >> > SYMBOL_NAME: msvcr70!_beginthreadex+8a
> >> >
> >> > STACK_COMMAND: ~33s; .ecxr ; kb
> >> >
> >> > FAILURE_BUCKET_ID: ACCESS_VIOLATION_msvcr70!_beginthreadex+8a
> >> >
> >> > BUCKET_ID: ACCESS_VIOLATION_msvcr70!_beginthreadex+8a
> >> >
> >> > Followup: MachineOwner
> >> >
> >>
>
Re: IIS6 crashes, WinDBG helpneeded
am 29.08.2007 22:58:19 von patfilot
You need to run PageHeap - the documentation is in the WinDBG help files.
Or you can contact MS-Support for debugging assistance.
Pat
"ChanKaiShi" wrote in message
news:02F33701-CF58-4C58-8F63-37670C9370DC@microsoft.com...
> Appears to me symbols look ok?
>
> 0:033> ~0s
> eax=00000000 ebx=00000000 ecx=000004d2 edx=00001f68 esi=00000180
> edi=00000000
> eip=7c82ed54 esp=0006fc0c ebp=0006fc7c iopl=0 nv up ei pl zr na pe
> nc
> cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000
> efl=00000246
> ntdll!KiFastSystemCallRet:
> 7c82ed54 c3 ret
> 0:000> kb
> ChildEBP RetAddr Args to Child
> 0006fc08 7c822124 77e6bad8 00000180 00000000 ntdll!KiFastSystemCallRet
> 0006fc0c 77e6bad8 00000180 00000000 00000000
> ntdll!NtWaitForSingleObject+0xc
> 0006fc7c 77e6ba42 00000180 ffffffff 00000000
> kernel32!WaitForSingleObjectEx+0xac
> 0006fc90 5a36467a 00000180 ffffffff 00000000
> kernel32!WaitForSingleObject+0x12
> 0006fca0 5a366e63 00285358 5a3af41d 00000000
> w3dt!WP_CONTEXT::RunMainThreadLoop+0x10
> 0006fca8 5a3af41d 00000000 64711da9 00000000 w3dt!UlAtqStartListen+0x2d
> 0006fcb8 5a3bc259 0100141c 010013e4 010012d0
> w3core!W3_SERVER::StartListen+0xbd
> 0006ff0c 0100187c 00000007 00283c20 00000000 w3core!UlW3Start+0x26e
> 0006ff44 01001a23 00000007 00283c20 002847e8 w3wp!wmain+0x22a
> 0006ffc0 77e523e5 00000000 00000000 bffdf000 w3wp!wmainCRTStartup+0x12b
> 0006fff0 00000000 010018f8 00000000 00000000
> kernel32!BaseProcessStart+0x23
>
> Below is symbol list, where do we go from here?
>
> start end module name
> 01000000 01005000 w3wp # (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\w3wp.pdb\D7E88A6D65314A0DACE963B6252016741\w3wp. pdb
> 023e0000 023ec000 App_Code C (no symbols)
> 02830000 02844000 SiebelObjectLibrary C (no symbols)
> 02850000 0285c000 SiebelEService C (no symbols)
> 02880000 02888000 App_global_asax C (no symbols)
> 02a20000 02a2a000 Interop_SiebelBusObjectInterfaces C (no symbols)
>
> 02a50000 02a7c000 sstchca (export symbols) sstchca.dll
> 02a80000 02b1b000 sscfcmn (export symbols) sscfcmn.dll
> 02b30000 02b99000 sslcsym (export symbols) sslcsym.dll
> 02ba0000 02bb6000 sslcosd (export symbols) sslcosd.dll
> 02bc0000 02bc6000 sslcosa (export symbols) sslcosa.dll
> 02bd0000 02cb0000 sslcshar C (export symbols) sslcshar.dll
> 02cb0000 02cb6000 libarm (export symbols) libarm.dll
> 02cc0000 02cc6000 sslcver (export symbols) sslcver.dll
> 02cd0000 02ce3000 sstcomc (export symbols) sstcomc.dll
> 02cf0000 02d12000 stcfel (export symbols) stcfel.dll
> 02d20000 02f28000 sscfdm (export symbols) sscfdm.dll
> 02f30000 02f3c000 sslclm (export symbols) sslclm.dll
> 02f40000 02f63000 sslcrsa (export symbols) sslcrsa.dll
> 02f70000 02f7d000 sslcfsm (export symbols) sslcfsm.dll
> 02f80000 02f8f000 sslcsrms (export symbols) sslcsrms.dll
> 02f90000 02fbe000 sslcscr (export symbols) sslcscr.dll
> 02fc0000 030cc000 sslcsrd (export symbols) sslcsrd.dll
> 030d0000 03169000 sslcnapi (export symbols) sslcnapi.dll
> 03170000 0317e000 sslccore (export symbols) sslccore.dll
> 03180000 03186000 sslcsnsr (export symbols) sslcsnsr.dll
> 03190000 03199000 sslcsrtr (export symbols) sslcsrtr.dll
> 031a0000 031b1000 sslcsrcn (export symbols) sslcsrcn.dll
> 031c0000 031cb000 sslcsrvr (export symbols) sslcsrvr.dll
> 031d0000 031e8000 sslcos (export symbols) sslcos.dll
> 031f0000 03200000 sslcns (export symbols) sslcns.dll
> 03200000 0320e000 sslcsnns (export symbols) sslcsnns.dll
> 03210000 03218000 sslcsnsc (export symbols) sslcsnsc.dll
> 03220000 03228000 sslcsecc (export symbols) sslcsecc.dll
> 03230000 03247000 sslcsecm (export symbols) sslcsecm.dll
> 03250000 0325e000 sslccachev2 (export symbols) sslccachev2.dll
> 03260000 03269000 sslcmsgagent (export symbols) sslcmsgagent.dll
> 03270000 03279000 stcfole (export symbols) stcfole.dll
> 03320000 03329000 sslcacln (export symbols) sslcacln.dll
> 03440000 0344f000 sslcevt (export symbols) sslcevt.dll
> 03450000 034ca000 srcf (export symbols) srcf.dll
> 034d0000 03555000 srcfapps (export symbols) srcfapps.dll
> 035a0000 035cf000 sbcf (export symbols) sbcf.dll
> 035d0000 035d6000 sbcfapps (export symbols) sbcfapps.dll
> 035e0000 0360f000 sstcomr (export symbols) sstcomr.dll
> 03610000 0362b000 sslcsmgr (export symbols) sslcsmgr.dll
> 03630000 03636000 sslcsssm (export symbols) sslcsssm.dll
> 03640000 0364e000 sslcsnom (export symbols) sslcsnom.dll
> 03bd0000 03be8000
> App_Web_defaultwsdlhelpgenerator_aspx_cdcab7d2_ihb_nefu
> C (private pdb symbols)
> c:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\Temporary ASP.NET
> Files\webservices_eservicews\d462b199\967a221f\App_Web_defau ltwsdlhelpgenerator.aspx.cdcab7d2.ihb-nefu.pdb
> 03eb0000 03ec5000 sscftclg (export symbols) sscftclg.dll
> 10000000 102c5000 xpsp2res (no symbols)
> 2d770000 2d77e000 sslczlib (export symbols) sslczlib.dll
> 5a300000 5a307000 w3tp (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\w3tp.pdb\56F01DE2A8604D5881B61771296802AE1\w3tp. pdb
> 5a320000 5a332000 w3isapi (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\w3isapi.pdb\5E8F4AF93952413B862A5169D2721F212\w3 isapi.pdb
> 5a360000 5a36d000 w3dt (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\w3dt.pdb\9B17510C0C384C7E989D1BF012F38CCB2\w3dt. pdb
> 5a390000 5a3e8000 w3core (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\w3core.pdb\1FAF4F2AFB7149C48B1E17098D2406A22\w3c ore.pdb
> 5a3f0000 5a3f6000 w3comlog (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\w3comlog.pdb\66A1E174C0B04EAFBF9B9EA4988E22651\w 3comlog.pdb
> 5a400000 5a408000 w3cache (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\w3cache.pdb\1F522D88492C476F8FB16348532B46EA2\w3 cache.pdb
> 5a420000 5a431000 iismap (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\iismap.pdb\B61FDE62195C4252847BEBDA8B9E657B1\iis map.pdb
> 5b640000 5b658000 strmfilt (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\strmfilt.pdb\5880BB519C39463A88A42185F8E523FE1\s trmfilt.pdb
> 5ccf0000 5ccff000 samlib (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\samlib.pdb\1CC9EE2C4FDE4F86A27D506CB5304F8E2\sam lib.pdb
> 5e600000 5e6ba000 Microsoft_JScript (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\Microsoft.JScript.pdb\0367756C0FA446DDA9BA1B68CB 29F0421\Microsoft.JScript.pdb
> 5f270000 5f2c9000 hnetcfg (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\HNetCfg.pdb\DB938DB1CADE442C9331F8BBB932F9ED1\HN etCfg.pdb
> 60060000 60066000 aspnet_filter (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\aspnet_filter.pdb\CBA3B20B09E741BA823405423A1D14 E31\aspnet_filter.pdb
> 60070000 60075000 aspnet_isapi T (no symbols)
> 608f0000 60901000 admwprox (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\admwprox.pdb\B1B3B6AC037B43FCA39C5369000100291\a dmwprox.pdb
> 60ba0000 60bb1000 wamreg (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\wamreg.pdb\184618650BC14DE7980DE37BB5FA78411\wam reg.pdb
> 62da0000 62da7000 lonsint (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\lonsint.pdb\837F421906854FAEB65DC7ECA97319191\lo nsint.pdb
> 64700000 6472d000 iisutil (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\iisutil.pdb\D8BE604F942D4CE49A3D58FCDAB6E1F62\ii sutil.pdb
> 647b0000 647d7000 iisRtl (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\iisRtl.pdb\8825F5C6117C4408B8BADA38F5A0F8051\iis Rtl.pdb
> 64890000 6497e000 System_Configuration_ni C (pdb symbols)
> C:\Program Files\Debugging Tools for
> Windows\sym\System.Configuration.pdb\DA5610F2158A4B7081C4109 0241F38DB1\System.Configuration.pdb
> 64e70000 65137000 System_Data (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\System.Data.pdb\500E0BA7E5D946BE818FC24957B75CED 1\System.Data.pdb
> 65140000 657a8000 System_Data_ni C (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\System.Data.pdb\500E0BA7E5D946BE818FC24957B75CED 1\System.Data.pdb
> 67150000 67159000 httpapi (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\httpapi.pdb\446C5429700045759166343B5E2E65D31\ht tpapi.pdb
> 673f0000 67496000 System_EnterpriseServices_ni C (pdb symbols)
> C:\Program Files\Debugging Tools for
> Windows\sym\System.EnterpriseServices.pdb\3CC957D929B546FE85 C642A39C3C18DA1\System.EnterpriseServices.pdb
> 67aa0000 67ae3000 System_Transactions (pdb symbols)
> C:\Program
> Files\Debugging Tools for
> Windows\sym\System.Transactions.pdb\31235D4122BD43759DA18F02 00C3E1341\System.Transactions.pdb
> 67af0000 67b9c000 System_Transactions_ni C (pdb symbols)
> C:\Program Files\Debugging Tools for
> Windows\sym\System.Transactions.pdb\31235D4122BD43759DA18F02 00C3E1341\System.Transactions.pdb
> 68000000 6802f000 rsaenh # (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\rsaenh.pdb\A6F04DA3E25E4DA9BE89712B76BAB9041\rsa enh.pdb
> 685b0000 685ba000 gzip (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\gzip.pdb\B3E91739F4724B7895568A843722B6B71\gzip. pdb
> 685c0000 6910a000 System_Web_ni C (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\System.Web.pdb\2B1A72C51A274953879D3C2B1C5799231 \System.Web.pdb
> 695a0000 697da000 System_Web_Mobile_ni C (pdb symbols)
> C:\Program
> Files\Debugging Tools for
> Windows\sym\System.Web.Mobile.pdb\665AE29617B948248639955ECA EF77D81\System.Web.Mobile.pdb
> 69890000 698d0000 System_Web_RegularExpressions_ni C (pdb symbols)
> C:\Program Files\Debugging Tools for
> Windows\sym\System.Web.RegularExpressions.pdb\2E973DE3738C4A 608BB9E465A9DB3CB91\System.Web.RegularExpressions.pdb
> 698f0000 69ad2000 System_Web_Services_ni C (pdb symbols)
> C:\Program Files\Debugging Tools for
> Windows\sym\System.Web.Services.pdb\C5A139ABA70343ECA73D231A 258092D91\System.Web.Services.pdb
> 69be0000 6a148000 System_Xml_ni C (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\System.Xml.pdb\EE73F002989646779F269078A0DD937A1 \System.Xml.pdb
> 6a2a0000 6a2ec000 webengine T (no symbols)
> 6d0f0000 6d110000 iisres (no symbols)
> 6d580000 6d628000 dbghelp (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\dbghelp.pdb\9BF851401BD2479DA9DF4293F44CA2411\db ghelp.pdb
> 71ae0000 71ae8000 wshtcpip (pdb symbols) C:\Program
> Files\Debugging Tools for Windows\sym\wshtcpip.pdb\3E80161D2\wshtcpip.pdb
> 71b20000 71b61000 mswsock (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\mswsock.pdb\478CAFB429F84F8081CABDCAD97007C32\ms wsock.pdb
> 71bb0000 71bb9000 wsock32 (pdb symbols) C:\Program
> Files\Debugging Tools for Windows\sym\wsock32.pdb\3E800C7A2\wsock32.pdb
> 71bd0000 71be1000 mpr (pdb symbols) C:\Program
> Files\Debugging Tools for Windows\sym\mpr.pdb\3E8016DD2\mpr.pdb
> 71bf0000 71bf8000 ws2help (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\ws2help.pdb\0314A09694AB4E9FB5A17185669D24972\ws 2help.pdb
> 71c00000 71c17000 ws2_32 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\ws2_32.pdb\EEEF06D925B3453F9D988B190AA5DAF52\ws2 _32.pdb
> 71c40000 71c98000 netapi32 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\netapi32.pdb\F9CA3C62BA1C49C3ADF226438B1E97AC2\n etapi32.pdb
> 71f60000 71f64000 security (pdb symbols) C:\Program
> Files\Debugging Tools for Windows\sym\security.pdb\3E7FFFC11\security.pdb
> 745e0000 748a6000 msi (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\msi.pdb\F51A178F210A4790B7828A9EB7691C102\msi.pd b
> 74a80000 74aaf000 oleacc (pdb symbols) C:\Program
> Files\Debugging Tools for Windows\sym\oleacc.pdb\3E8010AF2\oleacc.pdb
> 75da0000 75e5c000 sxs (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\sxs.pdb\D67B764232144363A0B2D79DA8857E402\sxs.pd b
> 76190000 761a2000 msasn1 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\msasn1.pdb\0EC22D857C0E456485696BC360603E0E2\msa sn1.pdb
> 761b0000 76243000 crypt32 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\crypt32.pdb\228D593096EF4B8E98599ED37D096BFE2\cr ypt32.pdb
> 76750000 76777000 schannel (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\schannel.pdb\9CA7C80C30A844D8AA538C94B3EDB37F2\s channel.pdb
> 76920000 769e4000 userenv (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\userenv.pdb\F68DBB7869BF4246A3D995C8BB09BA522\us erenv.pdb
> 76b70000 76b7b000 psapi (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\psapi.pdb\AF3CD7FDF21A4E79AFDFAB0B089ABBBC1\psap i.pdb
> 76ed0000 76eff000 dnsapi (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\dnsapi.pdb\489F79DEA41A40AB92BBA3188CBF27032\dns api.pdb
> 76f10000 76f3e000 wldap32 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\wldap32.pdb\D471FF11ABEE4840AA587CDA875D674C2\wl dap32.pdb
> 76f50000 76f63000 secur32 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\secur32.pdb\766A414091A74564AEDB1687955A7E5D2\se cur32.pdb
> 76f70000 76f77000 winrnr (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\winrnr.pdb\4239063085E043069CAD58EFCC3BC0591\win rnr.pdb
> 76f80000 76f88000 rasadhlp (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\rasadhlp.pdb\124BD1BAF1ED4A25A5FD12B0E15EC36C2\r asadhlp.pdb
> 77010000 770d6000 comres (pdb symbols) C:\Program
> Files\Debugging Tools for Windows\sym\COMRes.pdb\3E7FFF891\COMRes.pdb
> 77210000 772b8000 wininet (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\wininet.pdb\C77F63F816C9459A9EC97AEBD6E9E9C72\wi ninet.pdb
> 77380000 77412000 user32 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\user32.pdb\5EA4E31A1AA540B9864D75E5434A777E2\use r32.pdb
> 77420000 77523000 comctl32 # (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\comctl32.pdb\65A5419D043B4ED89E9B4A89235776BD1\c omctl32.pdb
> 77670000 777a4000 ole32 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\ole32.pdb\315B02A9919F4F6584F42575BE6B51772\ole3 2.pdb
> 777b0000 77833000 clbcatq (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\clbcatq.pdb\117902ED64834FA49E788E78D059A6102\cl bcatq.pdb
> 77b90000 77b98000 version (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\version.pdb\62E608390B354524A451E87A68080E872\ve rsion.pdb
> 77ba0000 77bfa000 msvcrt (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\msvcrt.pdb\62B8BDC3CC194D2992DCFAED78B621FC1\msv crt.pdb
> 77c00000 77c48000 gdi32 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\gdi32.pdb\82CEAD5ADEFF4B1188E304ACF752B4F42\gdi3 2.pdb
> 77c50000 77cef000 rpcrt4 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\rpcrt4.pdb\187CE4439F4C425994FA1EF24ADD452B2\rpc rt4.pdb
> 77d00000 77d8c000 oleaut32 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\oleaut32.pdb\3BA3D54909FA46898F8C72988B3BD9B52\o leaut32.pdb
> 77da0000 77df2000 shlwapi (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\shlwapi.pdb\DA6A0069FDF546C98890AE84D99E4C6B2\sh lwapi.pdb
> 77e00000 77e22000 ntmarta (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\ntmarta.pdb\EC3D8F38D74949C39BDB089C67D492672\nt marta.pdb
> 77e40000 77f42000 kernel32 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\kernel32.pdb\DF4F569C743446809ACD3DFD1E9FA2AF2\k ernel32.pdb
> 77f50000 77fec000 advapi32 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\advapi32.pdb\A4D23CDE2C2949FABA38312EDCE973832\a dvapi32.pdb
> 780c0000 78121000 msvcp60 # (pdb symbols) C:\Program
> Files\Debugging Tools for Windows\sym\msvcp60.pdb\3CF541551\msvcp60.pdb
> 78130000 781cb000 msvcr80 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\msvcr80.i386.pdb\4258E68C99EB4FBFB847A607785A948 D1\msvcr80.i386.pdb
> 79000000 79045000 mscoree (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\mscoree.pdb\0D7C30DDE4864A76BCE4B0CB18E63C4E2\ms coree.pdb
> 79060000 790b3000 mscorjit (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\mscorjit.pdb\8D935A6E838D46A0B8A4B550F0AF27A82\m scorjit.pdb
> 790c0000 79ba8000 mscorlib_ni C (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\mscorlib.pdb\06A826D298CB41A3B63D7BDACDDAF9321\m scorlib.pdb
> 79e70000 7a3d1000 mscorwks (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\mscorwks.pdb\7FA9D4C5454E4346B11ED781C22BDF462\m scorwks.pdb
> 7a440000 7abfe000 System_ni C (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\System.pdb\5062AE74D4D241B586F2E1BB36B19AA31\Sys tem.pdb
> 7c000000 7c054000 msvcr70 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\msvcr70.pdb\3295127CD51C4935A617363ABFE9B8A02\ms vcr70.pdb
> 7c080000 7c0f7000 msvcp70 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\msvcp70.pdb\37E0F6E8279044B68CF0B4621E333A642\ms vcp70.pdb
> 7c250000 7c33e000 mfc70u (export symbols) mfc70u.dll
> 7c800000 7c8c0000 ntdll (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\ntdll.pdb\DCE823FCF71A4BF5AA489994520EA18F2\ntdl l.pdb
> 7c8d0000 7d0d4000 shell32 (pdb symbols) C:\Program
> Files\Debugging Tools for
> Windows\sym\shell32.pdb\7B06F9700CFA47B7991348282A69D1852\sh ell32.pdb
>
>
>
> "Pat [MSFT]" wrote:
>
>> Try switching to a known good thread and dumping the stack:
>> ~0s
>> kb
>>
>> If the stack looks good then you will have the symbols. You can also
>> dump
>> the module list:
>> lm
>>
>> And it will tell you if the symbols for a module loaded. If it is blank
>> it
>> means that no attempt was made (i.e. WinDBG only grabs symbols that it
>> needs
>> on demand, then caches them locally). You can also check the symbol
>> cache
>> on the HDD.
>>
>> .reload only reloads symbols, it doesn't check the path to the symbols.
>>
>> First get the symbols setup, then we can look into the memory
>> corruption -
>> we may get a good hint as to what the problem is. Otherwise, you can use
>> PageHeap to set guard pages in memory and force a crash-on-corruption vs
>> a
>> crash-on-access.
>>
>>
>> Pat
>>
>> "ChanKaiShi" wrote in message
>> news:6225AD3F-7C62-4795-972A-7D6327701D41@microsoft.com...
>> > How do I verify is symbols were loaded correctly? I exectued .reload
>> > before
>> > analysis.
>> > Also if it's in fact memory corruption how do I go about
>> > troubleshooting
>> > this?
>> >
>> > "Pat [MSFT]" wrote:
>> >
>> >> Looks like memory corruption. Most likely something trashed the heap
>> >> and
>> >> then sometime later some other code touched the corrupted area. Also,
>> >> did
>> >> you verify that you have good symbols?
>> >>
>> >>
>> >> Pat
>> >>
>> >> wrote in message
>> >> news:1187819101.194478.184790@x35g2000prf.googlegroups.com.. .
>> >> > Hi,
>> >> >
>> >> > !analyze -v is below. How exactly I can read stack if lowest row
>> >> > does
>> >> > not have any module name next to (just hex number?)
>> >> >
>> >> > 0:033> !analyze -v
>> >> > ************************************************************ *******************
>> >> > *
>> >> > *
>> >> > * Exception
>> >> > Analysis *
>> >> > *
>> >> > *
>> >> > ************************************************************ *******************
>> >> >
>> >> > The call to LoadLibrary(exts) failed, Win32 error 0n2
>> >> > "The system cannot find the file specified."
>> >> > Please check your debugger configuration and/or network access.
>> >> > The call to LoadLibrary(ntsdexts) failed, Win32 error 0n2
>> >> > "The system cannot find the file specified."
>> >> > Please check your debugger configuration and/or network access.
>> >> >
>> >> > FAULTING_IP:
>> >> > ntdll!RtlpCoalesceFreeBlocks+21
>> >> > 7c82f527 f6460501 test byte ptr [esi+5],1
>> >> >
>> >> > EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
>> >> > ExceptionAddress: 7c82f527 (ntdll!RtlpCoalesceFreeBlocks+0x00000021)
>> >> > ExceptionCode: c0000005 (Access violation)
>> >> > ExceptionFlags: 00000000
>> >> > NumberParameters: 2
>> >> > Parameter[0]: 00000000
>> >> > Parameter[1]: 0327e02d
>> >> > Attempt to read from address 0327e02d
>> >> >
>> >> > DEFAULT_BUCKET_ID: APPLICATION_FAULT
>> >> >
>> >> > PROCESS_NAME: w3wp.exe
>> >> >
>> >> > ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx"
>> >> > referenced memory at "0x%08lx". The memory could not be "%s".
>> >> >
>> >> > READ_ADDRESS: 0327e02d
>> >> >
>> >> > BUGCHECK_STR: ACCESS_VIOLATION
>> >> >
>> >> > ORIGINAL_CAB_PATH: C:\WINDOWS\PCHealth\ErrorRep\QSIGNOFF\EF066.cab
>> >> >
>> >> > NTGLOBALFLAG: 0
>> >> >
>> >> > MANAGED_STACK: !dumpstack -EE
>> >> > OS Thread Id: 0x91c (33)
>> >> > TEB information is not available so a stack size of 0xFFFF is
>> >> > assumed
>> >> > Current frame:
>> >> > ChildEBP RetAddr Caller,Callee
>> >> >
>> >> > LAST_CONTROL_TRANSFER: from 7c0040e1 to 00000000
>> >> >
>> >> > STACK_TEXT:
>> >> > WARNING: Frame IP not in any known module. Following frames may be
>> >> > wrong.
>> >> > 01a8fff0 7c0040e1 0381edf8 00000000 00000000 0x0
>> >> > 01a8fff4 0381edf8 00000000 00000000 00000000 msvcr70!_beginthreadex
>> >> > +0x8a
>> >> > 7c0040e2 00000000 ffffcf31 a85035ff 15ff7c04 0x381edf8
>> >> >
>> >> >
>> >> > FOLLOWUP_IP:
>> >> > msvcr70!_beginthreadex+8a
>> >> > 7c0040e1 c3 ret
>> >> >
>> >> > SYMBOL_STACK_INDEX: 1
>> >> >
>> >> > FOLLOWUP_NAME: MachineOwner
>> >> >
>> >> > MODULE_NAME: msvcr70
>> >> >
>> >> > IMAGE_NAME: msvcr70.dll
>> >> >
>> >> > DEBUG_FLR_IMAGE_TIMESTAMP: 3c36e574
>> >> >
>> >> > FAULTING_THREAD: 0000091c
>> >> >
>> >> > SYMBOL_NAME: msvcr70!_beginthreadex+8a
>> >> >
>> >> > STACK_COMMAND: ~33s; .ecxr ; kb
>> >> >
>> >> > FAILURE_BUCKET_ID: ACCESS_VIOLATION_msvcr70!_beginthreadex+8a
>> >> >
>> >> > BUCKET_ID: ACCESS_VIOLATION_msvcr70!_beginthreadex+8a
>> >> >
>> >> > Followup: MachineOwner
>> >> >
>> >>
>>