Posted to tcl by patthoyts at Mon Oct 13 20:54:08 GMT 2008view raw

  1. 0:000> !analyze -v
  2. *******************************************************************************
  3. * *
  4. * Exception Analysis *
  5. * *
  6. *******************************************************************************
  7.  
  8. *************************************************************************
  9. *** ***
  10. *** ***
  11. *** Your debugger is not using the correct symbols ***
  12. *** ***
  13. *** In order for this command to work properly, your symbol path ***
  14. *** must point to .pdb files that have full type information. ***
  15. *** ***
  16. *** Certain .pdb files (such as the public OS symbols) do not ***
  17. *** contain the required information. Contact the group that ***
  18. *** provided you with these symbols if you need this command to ***
  19. *** work. ***
  20. *** ***
  21. *** Type referenced: kernel32!pNlsUserInfo ***
  22. *** ***
  23. *************************************************************************
  24. *************************************************************************
  25. *** ***
  26. *** ***
  27. *** Your debugger is not using the correct symbols ***
  28. *** ***
  29. *** In order for this command to work properly, your symbol path ***
  30. *** must point to .pdb files that have full type information. ***
  31. *** ***
  32. *** Certain .pdb files (such as the public OS symbols) do not ***
  33. *** contain the required information. Contact the group that ***
  34. *** provided you with these symbols if you need this command to ***
  35. *** work. ***
  36. *** ***
  37. *** Type referenced: kernel32!pNlsUserInfo ***
  38. *** ***
  39. *************************************************************************
  40.  
  41. FAULTING_IP:
  42. ntdll!RtlReportCriticalFailure+67
  43. 00000000`77b06e97 eb00 jmp ntdll!RtlReportCriticalFailure+0x69 (00000000`77b06e99)
  44.  
  45. EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
  46. ExceptionAddress: 0000000077b06e97 (ntdll!RtlReportCriticalFailure+0x0000000000000067)
  47. ExceptionCode: c0000374
  48. ExceptionFlags: 00000001
  49. NumberParameters: 1
  50. Parameter[0]: 0000000077b77080
  51.  
  52. DEFAULT_BUCKET_ID: HEAP_CORRUPTION
  53.  
  54. PROCESS_NAME: EagleShell.exe
  55.  
  56. ERROR_CODE: (NTSTATUS) 0xc0000374 - A heap has been corrupted.
  57.  
  58. NTGLOBALFLAG: 0
  59.  
  60. APPLICATION_VERIFIER_FLAGS: 0
  61.  
  62. MANAGED_STACK:
  63. SP IP Function
  64. 00000000010CE760 0000000000000001 Eagle!Eagle._Components.Public.Engine.EvaluateFile(Eagle._Components.Public.Interpreter, System.Text.Encoding, System.String, Eagle._Components.Public.EngineFlags, Eagle._Components.Public.SubstitutionFlags, Eagle._Components.Public.Result ByRef)+0x2
  65. 00000000010CE830 000007FF001ECF87 Eagle!Eagle._Components.Public.Engine.EvaluateFile(Eagle._Components.Public.Interpreter, System.String, Eagle._Components.Public.EngineFlags, Eagle._Components.Public.SubstitutionFlags, Eagle._Components.Public.Result ByRef)+0x57
  66. 00000000010CE880 000007FF001EBD71 Eagle!Eagle._Components.Public.Interpreter.InternalInitialize(Eagle._Components.Public.Result ByRef)+0x1b1
  67. 00000000010CEA20 000007FF001B4003 Eagle!Eagle._Components.Public.Interpreter.ShellMain(System.String[])+0xc13
  68.  
  69. StackTraceString: <none>
  70. HResult: 80004003
  71.  
  72. EXCEPTION_OBJECT: !pe 4780fb8
  73. Exception object: 0000000004780fb8
  74. Exception type: System.AccessViolationException
  75. Message: Attempted to read or write protected memory. This is often an indication that other memory is corrupt.
  76. InnerException: <none>
  77. StackTrace (generated):
  78. SP IP Function
  79. 00000000010CE760 0000000000000001 Eagle!Eagle._Components.Public.Engine.EvaluateFile(Eagle._Components.Public.Interpreter, System.Text.Encoding, System.String, Eagle._Components.Public.EngineFlags, Eagle._Components.Public.SubstitutionFlags, Eagle._Components.Public.Result ByRef)+0x2
  80. 00000000010CE830 000007FF001ECF87 Eagle!Eagle._Components.Public.Engine.EvaluateFile(Eagle._Components.Public.Interpreter, System.String, Eagle._Components.Public.EngineFlags, Eagle._Components.Public.SubstitutionFlags, Eagle._Components.Public.Result ByRef)+0x57
  81. 00000000010CE880 000007FF001EBD71 Eagle!Eagle._Components.Public.Interpreter.InternalInitialize(Eagle._Components.Public.Result ByRef)+0x1b1
  82. 00000000010CEA20 000007FF001B4003 Eagle!Eagle._Components.Public.Interpreter.ShellMain(System.String[])+0xc13
  83.  
  84. StackTraceString: <none>
  85. HResult: 80004003
  86.  
  87. MANAGED_OBJECT: !dumpobj 4781158
  88. Name: System.String
  89. MethodTable: 000007fef1c065e8
  90. EEClass: 000007fef180e4f0
  91. Size: 230(0xe6) bytes
  92. (C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.dll)
  93. String: Attempted to read or write protected memory. This is often an indication that other memory is corrupt.
  94. Fields:
  95. MT Field Offset Type VT Attr Value Name
  96. 000007fef1c0d858 4000096 8 System.Int32 1 instance 103 m_arrayLength
  97. 000007fef1c0d858 4000097 c System.Int32 1 instance 102 m_stringLength
  98. 000007fef1c08030 4000098 10 System.Char 1 instance 41 m_firstChar
  99. 000007fef1c065e8 4000099 20 System.String 0 shared static Empty
  100. >> Domain:Value Unable to get AppDomain 121fa80
  101. 000007fef1c07ee0 400009a 28 System.Char[] 0 shared static WhitespaceChars
  102. >> Domain:Value Unable to get AppDomain 121fa80
  103.  
  104. EXCEPTION_MESSAGE: Attempted to read or write protected memory. This is often an indication that other memory is corru
  105.  
  106. LAST_CONTROL_TRANSFER: from 0000000000000000 to 0000000077ab3a57
  107.  
  108. ADDITIONAL_DEBUG_TEXT: Enable Pageheap/AutoVerifer
  109.  
  110. FAULTING_THREAD: 0000000000000f30
  111.  
  112. PRIMARY_PROBLEM_CLASS: HEAP_CORRUPTION
  113.  
  114. BUGCHECK_STR: APPLICATION_FAULT_HEAP_CORRUPTION
  115.  
  116. STACK_TEXT:
  117. 00000000`77ab3a57 ntdll!RtlpFreeHeap
  118. 00000000`77aa91f7 ntdll!RtlFreeHeap
  119. 00000000`7788ceaa kernel32!HeapFree
  120. 000007fe`f3cfbe9d mscorwks!EEHeapFree
  121. 000007fe`f3706696 mscorwks!MethodTable::MethodDataObject::`scalar deleting destructor'
  122. 000007fe`f36ef3cd mscorwks!MethodDataCache::Insert
  123. 000007fe`f37637ff mscorwks!MethodTable::GetMethodDataHelper
  124. 000007fe`f3744ea1 mscorwks!EEClass::FindMethod
  125. 000007fe`f374e3e7 mscorwks!MemberLoader::GetDescFromMemberDefOrRefThrowing
  126. 000007fe`f374db94 mscorwks!MemberLoader::GetMethodDescFromMemberDefOrRefOrSpecThrowing
  127. 000007fe`f374d288 mscorwks!CEEInfo::findMethodInternal
  128. 000007fe`f3743e70 mscorwks!CEEInfo::findMethod
  129. 000007fe`f4fe7589 mscorjit!GenIR::GenIR_FgCall
  130. 000007fe`f4fe09e5 mscorjit!ReaderBase::fgBuildPhase1
  131. 000007fe`f4feac73 mscorjit!ReaderBase::fgBuildBasicBlocksFromBytes
  132. 000007fe`f4fc84c7 mscorjit!ReaderBase::MSILToIR
  133. 000007fe`f4f9eca1 mscorjit!THX_dop2
  134. 000007fe`f4f95110 mscorjit!PreJit::compileMethod
  135. 000007fe`f37a1f51 mscorwks!invokeCompileMethodHelper
  136. 000007fe`f378e412 mscorwks!invokeCompileMethod
  137. 000007fe`f378e505 mscorwks!CallCompileMethodWithSEHWrapper
  138. 000007fe`f377856b mscorwks!UnsafeJitFunction
  139. 000007fe`f3777a7a mscorwks!MethodDesc::MakeJitWorker
  140. 000007fe`f373de9f mscorwks!MethodDesc::DoPrestub
  141. 000007fe`f372d5fb mscorwks!PreStubWorker
  142. 000007fe`f3862557 mscorwks!ThePreStubAMD64
  143. 000007ff`001ed35b unknown
  144.  
  145.  
  146. FOLLOWUP_IP:
  147. mscorwks!MethodTable::MethodDataObject::`scalar deleting destructor'+4e
  148. 000007fe`f3706696 90 nop
  149.  
  150. SYMBOL_STACK_INDEX: 4
  151.  
  152. SYMBOL_NAME: mscorwks!MethodTable::MethodDataObject::`scalar deleting destructor'+4e
  153.  
  154. FOLLOWUP_NAME: MachineOwner
  155.  
  156. MODULE_NAME: mscorwks
  157.  
  158. IMAGE_NAME: mscorwks.dll
  159.  
  160. DEBUG_FLR_IMAGE_TIMESTAMP: 4889e870
  161.  
  162. STACK_COMMAND: dds 77b770e8 ; kb
  163.  
  164. FAILURE_BUCKET_ID: HEAP_CORRUPTION_c0000374_mscorwks.dll!MethodTable::MethodDataObject::`scalar deleting destructor'
  165.  
  166. BUCKET_ID: X64_APPLICATION_FAULT_HEAP_CORRUPTION_mscorwks!MethodTable::MethodDataObject::_scalar_deleting_destructor_+4e
  167.  
  168. Followup: MachineOwner
  169. ---------