Advertisement
Guest User

Untitled

a guest
Apr 28th, 2011
374
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.91 KB | None | 0 0
  1. 0:000> !analyze -v
  2. *******************************************************************************
  3. * *
  4. * Exception Analysis *
  5. * *
  6. *******************************************************************************
  7.  
  8. Failed to load data access DLL, 0x80004005
  9. Verify that 1) you have a recent build of the debugger (6.2.14 or newer)
  10. 2) the file mscordacwks.dll that matches your version of mscorwks.dll is
  11. in the version directory
  12. 3) or, if you are debugging a dump file, verify that the file
  13. mscordacwks_<arch>_<arch>_<version>.dll is on your symbol path.
  14. 4) you are debugging on the same architecture as the dump file.
  15. For example, an IA64 dump file must be debugged on an IA64
  16. machine.
  17.  
  18. You can also run the debugger command .cordll to control the debugger's
  19. load of mscordacwks.dll. .cordll -ve -u -l will do a verbose reload.
  20. If that succeeds, the SOS command should work on retry.
  21.  
  22. If you are debugging a minidump, you need to make sure that your executable
  23. path is pointing to mscorwks.dll as well.
  24. Failed to load data access DLL, 0x80004005
  25. Verify that 1) you have a recent build of the debugger (6.2.14 or newer)
  26. 2) the file mscordacwks.dll that matches your version of mscorwks.dll is
  27. in the version directory
  28. 3) or, if you are debugging a dump file, verify that the file
  29. mscordacwks_<arch>_<arch>_<version>.dll is on your symbol path.
  30. 4) you are debugging on the same architecture as the dump file.
  31. For example, an IA64 dump file must be debugged on an IA64
  32. machine.
  33.  
  34. You can also run the debugger command .cordll to control the debugger's
  35. load of mscordacwks.dll. .cordll -ve -u -l will do a verbose reload.
  36. If that succeeds, the SOS command should work on retry.
  37.  
  38. If you are debugging a minidump, you need to make sure that your executable
  39. path is pointing to mscorwks.dll as well.
  40. GetPageUrlData failed, server returned HTTP status 404
  41. URL requested: http://watson.microsoft.com/StageOne/BJM_exe/1_0_4107_20217/unknown/0_0_0_0/00000000.htm?Retriage=1
  42.  
  43. FAULTING_IP:
  44. +2a0d990
  45. 00000000`00000000 ?? ???
  46.  
  47. EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
  48. ExceptionAddress: 0000000000000000
  49. ExceptionCode: 80000007 (Wake debugger)
  50. ExceptionFlags: 00000000
  51. NumberParameters: 0
  52.  
  53. BUGCHECK_STR: 80000007
  54.  
  55. PROCESS_NAME: BJM.exe
  56.  
  57. ERROR_CODE: (NTSTATUS) 0x80000007 - {Kernel Debugger Awakened} the system debugger was awakened by an interrupt.
  58.  
  59. EXCEPTION_CODE: (HRESULT) 0x80000007 (2147483655) - Operation aborted
  60.  
  61. MOD_LIST: <ANALYSIS/>
  62.  
  63. NTGLOBALFLAG: 0
  64.  
  65. APPLICATION_VERIFIER_FLAGS: 0
  66.  
  67. MANAGED_STACK: !dumpstack -EE
  68. Failed to load data access DLL, 0x80004005
  69. Verify that 1) you have a recent build of the debugger (6.2.14 or newer)
  70. 2) the file mscordacwks.dll that matches your version of mscorwks.dll is
  71. in the version directory
  72. 3) or, if you are debugging a dump file, verify that the file
  73. mscordacwks_<arch>_<arch>_<version>.dll is on your symbol path.
  74. 4) you are debugging on the same architecture as the dump file.
  75. For example, an IA64 dump file must be debugged on an IA64
  76. machine.
  77.  
  78. You can also run the debugger command .cordll to control the debugger's
  79. load of mscordacwks.dll. .cordll -ve -u -l will do a verbose reload.
  80. If that succeeds, the SOS command should work on retry.
  81.  
  82. If you are debugging a minidump, you need to make sure that your executable
  83. path is pointing to mscorwks.dll as well.
  84.  
  85. DERIVED_WAIT_CHAIN:
  86.  
  87. Dl Eid Cid WaitType
  88. -- --- ------- --------------------------
  89. 0 d50.c3c Multi Handle
  90.  
  91. WAIT_CHAIN_COMMAND: ~0s;k;;
  92.  
  93. BLOCKING_THREAD: 0000000000000c3c
  94.  
  95. DEFAULT_BUCKET_ID: APPLICATION_HANG_WRONG_SYMBOLS
  96.  
  97. PRIMARY_PROBLEM_CLASS: APPLICATION_HANG_WRONG_SYMBOLS
  98.  
  99. LAST_CONTROL_TRANSFER: from 0000000077d6d03b to 0000000077ef09ea
  100.  
  101. FAULTING_THREAD: 0000000000000000
  102.  
  103. STACK_TEXT:
  104. 00000000`0012d588 00000000`77d6d03b : 00000000`00000001 00000000`00000102 00000000`00000000 00000000`0012d630 : ntdll!ZwWaitForMultipleObjects+0xa
  105. 00000000`0012d590 00000000`77c41ea7 : 00000000`00000003 00000000`00000102 00000000`00000000 00000000`0012d8e0 : kernel32!WaitForMultipleObjectsEx+0x1cf
  106. 00000000`0012d6b0 00000000`77c41f69 : 00000000`00000000 00000000`00000000 00000000`000003e8 00000000`00000001 : user32!RealMsgWaitForMultipleObjectsEx+0x1dc
  107. 00000000`0012d790 000007ff`5718c2d0 : ffffffff`fffffffe 00000000`0012d8e0 00000000`00000000 00000000`000003e8 : user32!MsgWaitForMultipleObjectsEx+0x49
  108. 00000000`0012d7d0 000007ff`57255f78 : 00000000`80010115 00000000`00000001 00000000`0012d9e0 00000000`80010115 : ole32!CCliModalLoop::BlockFn+0xcc
  109. 00000000`0012d840 00000642`7f5c624f : 00000000`001603c0 00000642`7845d2f8 00000642`7845d2f8 00000642`7fa53048 : ole32!CoWaitForMultipleHandles+0x1c8
  110. 00000000`0012d980 00000642`7f5bbf15 : 00000642`00000000 00000000`0012da48 00000642`7845d2f8 00000000`001603c0 : mscorwks!NT5WaitRoutine+0x77
  111. 00000000`0012d9e0 00000642`7f4474bb : ffffffff`00000001 00000000`0012dcc8 00000000`00000000 00000642`000003e8 : mscorwks!MsgWaitHelper+0xed
  112. 00000000`0012da90 00000642`7f476501 : 00000000`00000000 00000000`0012dcc8 00000000`00000000 00000000`000003e8 : mscorwks!Thread::DoAppropriateAptStateWait+0x67
  113. 00000000`0012daf0 00000642`7f573080 : ffffffff`fffffffe 00000000`001603c0 00000000`0012dcc8 00000642`00000001 : mscorwks!Thread::DoAppropriateWaitWorker+0x191
  114. 00000000`0012dbf0 00000642`7f9f8701 : 00000000`0012dcf0 00000642`00000001 00000000`00000010 00000000`00000000 : mscorwks!Thread::DoAppropriateWait+0x5c
  115. 00000000`0012dc60 00000642`78365303 : 00000000`11785378 00000000`000003e8 00000000`0012df00 00000000`11785300 : mscorwks!WaitHandleNative::CorWaitOneNative+0x221
  116. 00000000`0012dea0 00000642`7693250b : 00000000`00000000 00000000`11785378 00000000`0012ded0 00000000`117854f0 : mscorlib_ni+0x365303
  117. 00000000`0012dee0 00000642`762f7707 : 00000000`11785490 00000642`763e0dd8 00000000`11785378 00000000`1120d4f8 : System_Windows_Forms_ni+0x99250b
  118. 00000000`0012df30 00000642`76934d00 : 00000000`1120d4f8 00000642`7830c0ee 00000000`00000000 00000000`0012e290 : System_Windows_Forms_ni+0x357707
  119. 00000000`0012e0c0 00000642`76c5e03f : 00000642`80045d48 00000642`782eaa1e 00000000`110853b8 00000000`00002015 : System_Windows_Forms_ni+0x994d00
  120. 00000000`0012e140 00000642`74efaf0b : 00000000`11085570 00000642`00000000 00000000`00000000 00000000`00000000 : System_Windows_Forms_ni+0xcbe03f
  121. 00000000`0012e190 00000642`74ef89b4 : 00000000`1120e528 00000000`77c42101 00000000`11217468 00000000`00000001 : System_ni+0x67af0b
  122. 00000000`0012e220 00000642`74ef9304 : 00000000`11085201 00000000`110853b8 00000000`11217468 00000642`7f7a8be5 : System_ni+0x6789b4
  123. 00000000`0012e2b0 00000642`74a766e5 : 00000000`0012e201 00000000`00000001 00000000`0012e3d8 00000000`00000000 : System_ni+0x679304
  124. 00000000`0012e300 00000642`74a75f44 : fffffadd`887d9c70 00000000`00180336 00000000`00002015 00000000`00000000 : System_ni+0x1f66e5
  125. 00000000`0012e500 00000642`7f5ffb8a : 00000000`0012e6c8 000007ff`fffde000 fffffadd`887d9c70 ffffffff`fffffffe : System_ni+0x1f5f44
  126. 00000000`0012e540 00000000`77c43abc : 00000000`0012e6b8 00000000`00000000 00000000`00000000 0000002f`00000038 : mscorwks!UMThunkStubAMD64+0x7a
  127. 00000000`0012e5d0 00000000`77c43f5c : 00000000`001603c0 00000000`003c313c 00000000`00000000 00000000`0012e830 : user32!UserCallWinProcCheckWow+0x1f9
  128. 00000000`0012e6a0 00000642`7f601837 : 00000000`001603c0 00000000`0012eac8 00000000`0012e8a8 00000000`001603c0 : user32!DispatchMessageWorker+0x3af
  129. 00000000`0012e710 00000642`762ff577 : 00000000`00000000 00000642`75fd3f20 00000000`00180336 00000000`ffffffff : mscorwks!DoNDirectCall__PatchGetThreadCall+0x7b
  130. 00000000`0012e7b0 00000642`762fe523 : 00000000`11080878 00000000`0012eac8 00000000`00000000 00000000`00000000 : System_Windows_Forms_ni+0x35f577
  131. 00000000`0012e930 00000642`762fdd98 : 00000000`11105b10 00000000`00000001 00000000`ffffffff 00000000`00000000 : System_Windows_Forms_ni+0x35e523
  132. 00000000`0012eb80 00000642`762fd805 : 00000000`11080878 00000000`ffffffff 00000000`11101900 00000000`11111790 : System_Windows_Forms_ni+0x35dd98
  133. 00000000`0012ecd0 00000642`80180d07 : 00000000`110ac150 00000000`ffffffff 00000000`11491920 00000000`11111790 : System_Windows_Forms_ni+0x35d805
  134. 00000000`0012ed30 00000642`8018016d : 00000000`110727b8 00000000`11072798 00000642`7f3a5880 00000000`00000000 : 0x642`80180d07
  135. 00000000`0012f000 00000642`7f602012 : 00000000`11072798 00000642`7f4d532a 00000642`7f3a5880 00000000`00000000 : 0x642`8018016d
  136. 00000000`0012f040 00000642`7f4c0243 : 00000000`00000000 00000642`78436728 00000000`00000000 00000000`00000000 : mscorwks!CallDescrWorker+0x82
  137. 00000000`0012f090 00000642`7f4ce49f : 00000000`0012f1c8 00000000`00000008 00000000`0012f3e0 00000000`0012f1c8 : mscorwks!CallDescrWorkerWithHandler+0xd3
  138. 00000000`0012f130 00000642`7f4493bb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0012f640 : mscorwks!MethodDesc::CallDescr+0x24f
  139. 00000000`0012f380 00000642`7f42cb44 : 00000000`00000001 00000000`00000000 00000000`0017f390 00000000`00000000 : mscorwks!ClassLoader::RunMain+0x22b
  140. 00000000`0012f5e0 00000642`7f5722a5 : 00000000`0012fc30 00000000`00000000 00000000`0016fea8 00000000`00000200 : mscorwks!Assembly::ExecuteMainMethod+0xbc
  141. 00000000`0012f8d0 00000642`7f4239e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000642`7f59bebe : mscorwks!SystemDomain::ExecuteMainMethod+0x491
  142. 00000000`0012fea0 00000642`7f433c90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : mscorwks!ExecuteEXE+0x47
  143. 00000000`0012fef0 00000642`7ee55b21 : ffffffff`ffffffff 00000000`001603c0 00000000`00000000 00000000`00000000 : mscorwks!CorExeMain+0xac
  144. 00000000`0012ff50 00000000`77d596ac : 00000000`00000000 00000642`7f330000 00000000`00000000 00000000`0012ffa8 : mscoree!CorExeMain_Exported+0x57
  145. 00000000`0012ff80 00000000`00000000 : 00000642`7ee55ab8 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseProcessStart+0x29
  146.  
  147.  
  148. FOLLOWUP_IP:
  149. ntdll!ZwWaitForMultipleObjects+a
  150. 00000000`77ef09ea c3 ret
  151.  
  152. SYMBOL_STACK_INDEX: 0
  153.  
  154. SYMBOL_NAME: ntdll!ZwWaitForMultipleObjects+a
  155.  
  156. FOLLOWUP_NAME: MachineOwner
  157.  
  158. MODULE_NAME: ntdll
  159.  
  160. IMAGE_NAME: ntdll.dll
  161.  
  162. DEBUG_FLR_IMAGE_TIMESTAMP: 4cc18323
  163.  
  164. STACK_COMMAND: ~0s ; kb
  165.  
  166. BUCKET_ID: X64_80000007_ntdll!ZwWaitForMultipleObjects+a
  167.  
  168. FAILURE_BUCKET_ID: APPLICATION_HANG_WRONG_SYMBOLS_80000007_ntdll.dll!ZwWaitForMultipleObjects
  169.  
  170. WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/BJM_exe/1_0_4107_20217/4d9453e2/unknown/0_0_0_0/bbbbbbb4/80000007/00000000.htm?Retriage=1
  171.  
  172. Followup: MachineOwner
  173. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement