Home > Software engineering >  Windbg analysis results for help
Windbg analysis results for help

Time:09-23

Here is a DMP file analysis results to the server, because before played windbg, trouble great god help to see what is abnormal, thanks!
 FAULTING_IP: 
+ 97 c4e00
00000000 ` 00000000?? ?????

EXCEPTION_RECORD: FFFFFFFFFFFFFFFF -- (. Exr 0 XFFFFFFFFFFFFFFFF)
ExceptionAddress: 0000000000000000
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 0

0000000000002 dd8 FAULTING_THREAD:

PROCESS_NAME: zidongpaichan. Exe

ERROR_CODE: (NTSTATUS) 0 x80000003 - {

EXCEPTION_CODE: (NTSTATUS) 0 x80000003 (2147483651) - {

MOD_LIST: & lt; ANALYSIS/& gt;

NTGLOBALFLAG: 0

APPLICATION_VERIFIER_FLAGS: 0

MANAGED_STACK:! Dumpstack - EE
No export dumpstack found

ADDITIONAL_DEBUG_TEXT: Followup set -based on the attribute [Is_ChosenCrashFollowupThread] from Frame: [0] on the thread: [PSEUDO_THREAD]

LAST_CONTROL_TRANSFER: f2738 from 00000000773 to 00000000773 f2772

BUGCHECK_STR: APPLICATION_FAULT_STACKIMMUNE_NOSOS

PRIMARY_PROBLEM_CLASS: STACKIMMUNE

DEFAULT_BUCKET_ID: STACKIMMUNE

STACK_TEXT:
00000000 00000000 00000000 00000000 zidongpaichan ` `. Exe + 0 x0


Exe SYMBOL_NAME: zidongpaichan.

FOLLOWUP_NAME: MachineOwner

There comes MODULE_NAME:

Exe IMAGE_NAME: zidongpaichan.

527 a18f5 DEBUG_FLR_IMAGE_TIMESTAMP:

STACK_COMMAND: dt NTDLL! LdrpLastDllInitializer BaseDllName; Dt NTDLL! LdrpFailureData; * * the Pseudo Context * *; KB

FAILURE_BUCKET_ID: STACKIMMUNE_80000003_________ exe! Unknown

Exe BUCKET_ID: X64_APPLICATION_FAULT_STACKIMMUNE_NOSOS_________.

FOLLOWUP_IP:
____ + 0
00000000 ` 00 e30000 4 d5a pop r10

Followup: MachineOwner
-- -- -- -- -- -- -- -- --

CodePudding user response:

To what windb, exe PDB file copy of the bug to DMP file directory, with 2010 directly open the DMP file, run, you can see the source location error,

CodePudding user response:

You put the corresponding PDB file windbg to import, then execute! Analysis - V analysis

CodePudding user response:

With the depends. Exe view zidongpaichan. Exe depend on which DLL

CodePudding user response:

refer to the original poster superrobin response:
here is a DMP file analysis results to the server, because before played windbg, trouble great god help to see what is abnormal, thanks!
 FAULTING_IP: 
+ 97 c4e00
00000000 ` 00000000?? ?????

EXCEPTION_RECORD: FFFFFFFFFFFFFFFF -- (. Exr 0 XFFFFFFFFFFFFFFFF)
ExceptionAddress: 0000000000000000
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 0

0000000000002 dd8 FAULTING_THREAD:

PROCESS_NAME: zidongpaichan. Exe

ERROR_CODE: (NTSTATUS) 0 x80000003 - {

EXCEPTION_CODE: (NTSTATUS) 0 x80000003 (2147483651) - {

MOD_LIST: & lt; ANALYSIS/& gt;

NTGLOBALFLAG: 0

APPLICATION_VERIFIER_FLAGS: 0

MANAGED_STACK:! Dumpstack - EE
No export dumpstack found

ADDITIONAL_DEBUG_TEXT: Followup set -based on the attribute [Is_ChosenCrashFollowupThread] from Frame: [0] on the thread: [PSEUDO_THREAD]

LAST_CONTROL_TRANSFER: f2738 from 00000000773 to 00000000773 f2772

BUGCHECK_STR: APPLICATION_FAULT_STACKIMMUNE_NOSOS

PRIMARY_PROBLEM_CLASS: STACKIMMUNE

DEFAULT_BUCKET_ID: STACKIMMUNE

STACK_TEXT:
00000000 00000000 00000000 00000000 zidongpaichan ` `. Exe + 0 x0


Exe SYMBOL_NAME: zidongpaichan.

FOLLOWUP_NAME: MachineOwner

There comes MODULE_NAME:

Exe IMAGE_NAME: zidongpaichan.

527 a18f5 DEBUG_FLR_IMAGE_TIMESTAMP:

STACK_COMMAND: dt NTDLL! LdrpLastDllInitializer BaseDllName; Dt NTDLL! LdrpFailureData; * * the Pseudo Context * *; KB

FAILURE_BUCKET_ID: STACKIMMUNE_80000003_________ exe! Unknown

Exe BUCKET_ID: X64_APPLICATION_FAULT_STACKIMMUNE_NOSOS_________.

FOLLOWUP_IP:
____ + 0
00000000 ` 00 e30000 4 d5a pop r10

Followup: MachineOwner
-- -- -- -- -- -- -- -- --




Also the original poster such problems, the original poster problem solved?

CodePudding user response:

reference zhao4zhong1 reply: 3/f
with the depends. Exe view zidongpaichan. Exe depend on which DLL


The way these and what role still cannot solve the problem, miss zhao
  • Related