Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 0:000> !analyze -v
- *******************************************************************************
- * *
- * Exception Analysis *
- * *
- *******************************************************************************
- Failed to load data access DLL, 0x80004005
- Verify that 1) you have a recent build of the debugger (6.2.14 or newer)
- 2) the file mscordacwks.dll that matches your version of mscorwks.dll is
- in the version directory
- 3) or, if you are debugging a dump file, verify that the file
- mscordacwks_<arch>_<arch>_<version>.dll is on your symbol path.
- 4) you are debugging on the same architecture as the dump file.
- For example, an IA64 dump file must be debugged on an IA64
- machine.
- You can also run the debugger command .cordll to control the debugger's
- load of mscordacwks.dll. .cordll -ve -u -l will do a verbose reload.
- If that succeeds, the SOS command should work on retry.
- If you are debugging a minidump, you need to make sure that your executable
- path is pointing to mscorwks.dll as well.
- Failed to load data access DLL, 0x80004005
- Verify that 1) you have a recent build of the debugger (6.2.14 or newer)
- 2) the file mscordacwks.dll that matches your version of mscorwks.dll is
- in the version directory
- 3) or, if you are debugging a dump file, verify that the file
- mscordacwks_<arch>_<arch>_<version>.dll is on your symbol path.
- 4) you are debugging on the same architecture as the dump file.
- For example, an IA64 dump file must be debugged on an IA64
- machine.
- You can also run the debugger command .cordll to control the debugger's
- load of mscordacwks.dll. .cordll -ve -u -l will do a verbose reload.
- If that succeeds, the SOS command should work on retry.
- If you are debugging a minidump, you need to make sure that your executable
- path is pointing to mscorwks.dll as well.
- GetPageUrlData failed, server returned HTTP status 404
- URL requested: http://watson.microsoft.com/StageOne/BJM_exe/1_0_4107_20217/unknown/0_0_0_0/00000000.htm?Retriage=1
- FAULTING_IP:
- +2a0d990
- 00000000`00000000 ?? ???
- EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
- ExceptionAddress: 0000000000000000
- ExceptionCode: 80000007 (Wake debugger)
- ExceptionFlags: 00000000
- NumberParameters: 0
- BUGCHECK_STR: 80000007
- PROCESS_NAME: BJM.exe
- ERROR_CODE: (NTSTATUS) 0x80000007 - {Kernel Debugger Awakened} the system debugger was awakened by an interrupt.
- EXCEPTION_CODE: (HRESULT) 0x80000007 (2147483655) - Operation aborted
- MOD_LIST: <ANALYSIS/>
- NTGLOBALFLAG: 0
- APPLICATION_VERIFIER_FLAGS: 0
- MANAGED_STACK: !dumpstack -EE
- Failed to load data access DLL, 0x80004005
- Verify that 1) you have a recent build of the debugger (6.2.14 or newer)
- 2) the file mscordacwks.dll that matches your version of mscorwks.dll is
- in the version directory
- 3) or, if you are debugging a dump file, verify that the file
- mscordacwks_<arch>_<arch>_<version>.dll is on your symbol path.
- 4) you are debugging on the same architecture as the dump file.
- For example, an IA64 dump file must be debugged on an IA64
- machine.
- You can also run the debugger command .cordll to control the debugger's
- load of mscordacwks.dll. .cordll -ve -u -l will do a verbose reload.
- If that succeeds, the SOS command should work on retry.
- If you are debugging a minidump, you need to make sure that your executable
- path is pointing to mscorwks.dll as well.
- DERIVED_WAIT_CHAIN:
- Dl Eid Cid WaitType
- -- --- ------- --------------------------
- 0 d50.c3c Multi Handle
- WAIT_CHAIN_COMMAND: ~0s;k;;
- BLOCKING_THREAD: 0000000000000c3c
- DEFAULT_BUCKET_ID: APPLICATION_HANG_WRONG_SYMBOLS
- PRIMARY_PROBLEM_CLASS: APPLICATION_HANG_WRONG_SYMBOLS
- LAST_CONTROL_TRANSFER: from 0000000077d6d03b to 0000000077ef09ea
- FAULTING_THREAD: 0000000000000000
- STACK_TEXT:
- 00000000`0012d588 00000000`77d6d03b : 00000000`00000001 00000000`00000102 00000000`00000000 00000000`0012d630 : ntdll!ZwWaitForMultipleObjects+0xa
- 00000000`0012d590 00000000`77c41ea7 : 00000000`00000003 00000000`00000102 00000000`00000000 00000000`0012d8e0 : kernel32!WaitForMultipleObjectsEx+0x1cf
- 00000000`0012d6b0 00000000`77c41f69 : 00000000`00000000 00000000`00000000 00000000`000003e8 00000000`00000001 : user32!RealMsgWaitForMultipleObjectsEx+0x1dc
- 00000000`0012d790 000007ff`5718c2d0 : ffffffff`fffffffe 00000000`0012d8e0 00000000`00000000 00000000`000003e8 : user32!MsgWaitForMultipleObjectsEx+0x49
- 00000000`0012d7d0 000007ff`57255f78 : 00000000`80010115 00000000`00000001 00000000`0012d9e0 00000000`80010115 : ole32!CCliModalLoop::BlockFn+0xcc
- 00000000`0012d840 00000642`7f5c624f : 00000000`001603c0 00000642`7845d2f8 00000642`7845d2f8 00000642`7fa53048 : ole32!CoWaitForMultipleHandles+0x1c8
- 00000000`0012d980 00000642`7f5bbf15 : 00000642`00000000 00000000`0012da48 00000642`7845d2f8 00000000`001603c0 : mscorwks!NT5WaitRoutine+0x77
- 00000000`0012d9e0 00000642`7f4474bb : ffffffff`00000001 00000000`0012dcc8 00000000`00000000 00000642`000003e8 : mscorwks!MsgWaitHelper+0xed
- 00000000`0012da90 00000642`7f476501 : 00000000`00000000 00000000`0012dcc8 00000000`00000000 00000000`000003e8 : mscorwks!Thread::DoAppropriateAptStateWait+0x67
- 00000000`0012daf0 00000642`7f573080 : ffffffff`fffffffe 00000000`001603c0 00000000`0012dcc8 00000642`00000001 : mscorwks!Thread::DoAppropriateWaitWorker+0x191
- 00000000`0012dbf0 00000642`7f9f8701 : 00000000`0012dcf0 00000642`00000001 00000000`00000010 00000000`00000000 : mscorwks!Thread::DoAppropriateWait+0x5c
- 00000000`0012dc60 00000642`78365303 : 00000000`11785378 00000000`000003e8 00000000`0012df00 00000000`11785300 : mscorwks!WaitHandleNative::CorWaitOneNative+0x221
- 00000000`0012dea0 00000642`7693250b : 00000000`00000000 00000000`11785378 00000000`0012ded0 00000000`117854f0 : mscorlib_ni+0x365303
- 00000000`0012dee0 00000642`762f7707 : 00000000`11785490 00000642`763e0dd8 00000000`11785378 00000000`1120d4f8 : System_Windows_Forms_ni+0x99250b
- 00000000`0012df30 00000642`76934d00 : 00000000`1120d4f8 00000642`7830c0ee 00000000`00000000 00000000`0012e290 : System_Windows_Forms_ni+0x357707
- 00000000`0012e0c0 00000642`76c5e03f : 00000642`80045d48 00000642`782eaa1e 00000000`110853b8 00000000`00002015 : System_Windows_Forms_ni+0x994d00
- 00000000`0012e140 00000642`74efaf0b : 00000000`11085570 00000642`00000000 00000000`00000000 00000000`00000000 : System_Windows_Forms_ni+0xcbe03f
- 00000000`0012e190 00000642`74ef89b4 : 00000000`1120e528 00000000`77c42101 00000000`11217468 00000000`00000001 : System_ni+0x67af0b
- 00000000`0012e220 00000642`74ef9304 : 00000000`11085201 00000000`110853b8 00000000`11217468 00000642`7f7a8be5 : System_ni+0x6789b4
- 00000000`0012e2b0 00000642`74a766e5 : 00000000`0012e201 00000000`00000001 00000000`0012e3d8 00000000`00000000 : System_ni+0x679304
- 00000000`0012e300 00000642`74a75f44 : fffffadd`887d9c70 00000000`00180336 00000000`00002015 00000000`00000000 : System_ni+0x1f66e5
- 00000000`0012e500 00000642`7f5ffb8a : 00000000`0012e6c8 000007ff`fffde000 fffffadd`887d9c70 ffffffff`fffffffe : System_ni+0x1f5f44
- 00000000`0012e540 00000000`77c43abc : 00000000`0012e6b8 00000000`00000000 00000000`00000000 0000002f`00000038 : mscorwks!UMThunkStubAMD64+0x7a
- 00000000`0012e5d0 00000000`77c43f5c : 00000000`001603c0 00000000`003c313c 00000000`00000000 00000000`0012e830 : user32!UserCallWinProcCheckWow+0x1f9
- 00000000`0012e6a0 00000642`7f601837 : 00000000`001603c0 00000000`0012eac8 00000000`0012e8a8 00000000`001603c0 : user32!DispatchMessageWorker+0x3af
- 00000000`0012e710 00000642`762ff577 : 00000000`00000000 00000642`75fd3f20 00000000`00180336 00000000`ffffffff : mscorwks!DoNDirectCall__PatchGetThreadCall+0x7b
- 00000000`0012e7b0 00000642`762fe523 : 00000000`11080878 00000000`0012eac8 00000000`00000000 00000000`00000000 : System_Windows_Forms_ni+0x35f577
- 00000000`0012e930 00000642`762fdd98 : 00000000`11105b10 00000000`00000001 00000000`ffffffff 00000000`00000000 : System_Windows_Forms_ni+0x35e523
- 00000000`0012eb80 00000642`762fd805 : 00000000`11080878 00000000`ffffffff 00000000`11101900 00000000`11111790 : System_Windows_Forms_ni+0x35dd98
- 00000000`0012ecd0 00000642`80180d07 : 00000000`110ac150 00000000`ffffffff 00000000`11491920 00000000`11111790 : System_Windows_Forms_ni+0x35d805
- 00000000`0012ed30 00000642`8018016d : 00000000`110727b8 00000000`11072798 00000642`7f3a5880 00000000`00000000 : 0x642`80180d07
- 00000000`0012f000 00000642`7f602012 : 00000000`11072798 00000642`7f4d532a 00000642`7f3a5880 00000000`00000000 : 0x642`8018016d
- 00000000`0012f040 00000642`7f4c0243 : 00000000`00000000 00000642`78436728 00000000`00000000 00000000`00000000 : mscorwks!CallDescrWorker+0x82
- 00000000`0012f090 00000642`7f4ce49f : 00000000`0012f1c8 00000000`00000008 00000000`0012f3e0 00000000`0012f1c8 : mscorwks!CallDescrWorkerWithHandler+0xd3
- 00000000`0012f130 00000642`7f4493bb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0012f640 : mscorwks!MethodDesc::CallDescr+0x24f
- 00000000`0012f380 00000642`7f42cb44 : 00000000`00000001 00000000`00000000 00000000`0017f390 00000000`00000000 : mscorwks!ClassLoader::RunMain+0x22b
- 00000000`0012f5e0 00000642`7f5722a5 : 00000000`0012fc30 00000000`00000000 00000000`0016fea8 00000000`00000200 : mscorwks!Assembly::ExecuteMainMethod+0xbc
- 00000000`0012f8d0 00000642`7f4239e3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000642`7f59bebe : mscorwks!SystemDomain::ExecuteMainMethod+0x491
- 00000000`0012fea0 00000642`7f433c90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : mscorwks!ExecuteEXE+0x47
- 00000000`0012fef0 00000642`7ee55b21 : ffffffff`ffffffff 00000000`001603c0 00000000`00000000 00000000`00000000 : mscorwks!CorExeMain+0xac
- 00000000`0012ff50 00000000`77d596ac : 00000000`00000000 00000642`7f330000 00000000`00000000 00000000`0012ffa8 : mscoree!CorExeMain_Exported+0x57
- 00000000`0012ff80 00000000`00000000 : 00000642`7ee55ab8 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseProcessStart+0x29
- FOLLOWUP_IP:
- ntdll!ZwWaitForMultipleObjects+a
- 00000000`77ef09ea c3 ret
- SYMBOL_STACK_INDEX: 0
- SYMBOL_NAME: ntdll!ZwWaitForMultipleObjects+a
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: ntdll
- IMAGE_NAME: ntdll.dll
- DEBUG_FLR_IMAGE_TIMESTAMP: 4cc18323
- STACK_COMMAND: ~0s ; kb
- BUCKET_ID: X64_80000007_ntdll!ZwWaitForMultipleObjects+a
- FAILURE_BUCKET_ID: APPLICATION_HANG_WRONG_SYMBOLS_80000007_ntdll.dll!ZwWaitForMultipleObjects
- WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/BJM_exe/1_0_4107_20217/4d9453e2/unknown/0_0_0_0/bbbbbbb4/80000007/00000000.htm?Retriage=1
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement