Posted to tcl by patthoyts at Mon Oct 13 20:54:08 GMT 2008view raw
- 0:000> !analyze -v
- *******************************************************************************
- * *
- * Exception Analysis *
- * *
- *******************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: kernel32!pNlsUserInfo ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: kernel32!pNlsUserInfo ***
- *** ***
- *************************************************************************
- FAULTING_IP:
- ntdll!RtlReportCriticalFailure+67
- 00000000`77b06e97 eb00 jmp ntdll!RtlReportCriticalFailure+0x69 (00000000`77b06e99)
- EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
- ExceptionAddress: 0000000077b06e97 (ntdll!RtlReportCriticalFailure+0x0000000000000067)
- ExceptionCode: c0000374
- ExceptionFlags: 00000001
- NumberParameters: 1
- Parameter[0]: 0000000077b77080
- DEFAULT_BUCKET_ID: HEAP_CORRUPTION
- PROCESS_NAME: EagleShell.exe
- ERROR_CODE: (NTSTATUS) 0xc0000374 - A heap has been corrupted.
- NTGLOBALFLAG: 0
- APPLICATION_VERIFIER_FLAGS: 0
- MANAGED_STACK:
- SP IP Function
- 00000000010CE760 0000000000000001 Eagle!Eagle._Components.Public.Engine.EvaluateFile(Eagle._Components.Public.Interpreter, System.Text.Encoding, System.String, Eagle._Components.Public.EngineFlags, Eagle._Components.Public.SubstitutionFlags, Eagle._Components.Public.Result ByRef)+0x2
- 00000000010CE830 000007FF001ECF87 Eagle!Eagle._Components.Public.Engine.EvaluateFile(Eagle._Components.Public.Interpreter, System.String, Eagle._Components.Public.EngineFlags, Eagle._Components.Public.SubstitutionFlags, Eagle._Components.Public.Result ByRef)+0x57
- 00000000010CE880 000007FF001EBD71 Eagle!Eagle._Components.Public.Interpreter.InternalInitialize(Eagle._Components.Public.Result ByRef)+0x1b1
- 00000000010CEA20 000007FF001B4003 Eagle!Eagle._Components.Public.Interpreter.ShellMain(System.String[])+0xc13
- StackTraceString: <none>
- HResult: 80004003
- EXCEPTION_OBJECT: !pe 4780fb8
- Exception object: 0000000004780fb8
- Exception type: System.AccessViolationException
- Message: Attempted to read or write protected memory. This is often an indication that other memory is corrupt.
- InnerException: <none>
- StackTrace (generated):
- SP IP Function
- 00000000010CE760 0000000000000001 Eagle!Eagle._Components.Public.Engine.EvaluateFile(Eagle._Components.Public.Interpreter, System.Text.Encoding, System.String, Eagle._Components.Public.EngineFlags, Eagle._Components.Public.SubstitutionFlags, Eagle._Components.Public.Result ByRef)+0x2
- 00000000010CE830 000007FF001ECF87 Eagle!Eagle._Components.Public.Engine.EvaluateFile(Eagle._Components.Public.Interpreter, System.String, Eagle._Components.Public.EngineFlags, Eagle._Components.Public.SubstitutionFlags, Eagle._Components.Public.Result ByRef)+0x57
- 00000000010CE880 000007FF001EBD71 Eagle!Eagle._Components.Public.Interpreter.InternalInitialize(Eagle._Components.Public.Result ByRef)+0x1b1
- 00000000010CEA20 000007FF001B4003 Eagle!Eagle._Components.Public.Interpreter.ShellMain(System.String[])+0xc13
- StackTraceString: <none>
- HResult: 80004003
- MANAGED_OBJECT: !dumpobj 4781158
- Name: System.String
- MethodTable: 000007fef1c065e8
- EEClass: 000007fef180e4f0
- Size: 230(0xe6) bytes
- (C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.dll)
- String: Attempted to read or write protected memory. This is often an indication that other memory is corrupt.
- Fields:
- MT Field Offset Type VT Attr Value Name
- 000007fef1c0d858 4000096 8 System.Int32 1 instance 103 m_arrayLength
- 000007fef1c0d858 4000097 c System.Int32 1 instance 102 m_stringLength
- 000007fef1c08030 4000098 10 System.Char 1 instance 41 m_firstChar
- 000007fef1c065e8 4000099 20 System.String 0 shared static Empty
- >> Domain:Value Unable to get AppDomain 121fa80
- 000007fef1c07ee0 400009a 28 System.Char[] 0 shared static WhitespaceChars
- >> Domain:Value Unable to get AppDomain 121fa80
- EXCEPTION_MESSAGE: Attempted to read or write protected memory. This is often an indication that other memory is corru
- LAST_CONTROL_TRANSFER: from 0000000000000000 to 0000000077ab3a57
- ADDITIONAL_DEBUG_TEXT: Enable Pageheap/AutoVerifer
- FAULTING_THREAD: 0000000000000f30
- PRIMARY_PROBLEM_CLASS: HEAP_CORRUPTION
- BUGCHECK_STR: APPLICATION_FAULT_HEAP_CORRUPTION
- STACK_TEXT:
- 00000000`77ab3a57 ntdll!RtlpFreeHeap
- 00000000`77aa91f7 ntdll!RtlFreeHeap
- 00000000`7788ceaa kernel32!HeapFree
- 000007fe`f3cfbe9d mscorwks!EEHeapFree
- 000007fe`f3706696 mscorwks!MethodTable::MethodDataObject::`scalar deleting destructor'
- 000007fe`f36ef3cd mscorwks!MethodDataCache::Insert
- 000007fe`f37637ff mscorwks!MethodTable::GetMethodDataHelper
- 000007fe`f3744ea1 mscorwks!EEClass::FindMethod
- 000007fe`f374e3e7 mscorwks!MemberLoader::GetDescFromMemberDefOrRefThrowing
- 000007fe`f374db94 mscorwks!MemberLoader::GetMethodDescFromMemberDefOrRefOrSpecThrowing
- 000007fe`f374d288 mscorwks!CEEInfo::findMethodInternal
- 000007fe`f3743e70 mscorwks!CEEInfo::findMethod
- 000007fe`f4fe7589 mscorjit!GenIR::GenIR_FgCall
- 000007fe`f4fe09e5 mscorjit!ReaderBase::fgBuildPhase1
- 000007fe`f4feac73 mscorjit!ReaderBase::fgBuildBasicBlocksFromBytes
- 000007fe`f4fc84c7 mscorjit!ReaderBase::MSILToIR
- 000007fe`f4f9eca1 mscorjit!THX_dop2
- 000007fe`f4f95110 mscorjit!PreJit::compileMethod
- 000007fe`f37a1f51 mscorwks!invokeCompileMethodHelper
- 000007fe`f378e412 mscorwks!invokeCompileMethod
- 000007fe`f378e505 mscorwks!CallCompileMethodWithSEHWrapper
- 000007fe`f377856b mscorwks!UnsafeJitFunction
- 000007fe`f3777a7a mscorwks!MethodDesc::MakeJitWorker
- 000007fe`f373de9f mscorwks!MethodDesc::DoPrestub
- 000007fe`f372d5fb mscorwks!PreStubWorker
- 000007fe`f3862557 mscorwks!ThePreStubAMD64
- 000007ff`001ed35b unknown
- FOLLOWUP_IP:
- mscorwks!MethodTable::MethodDataObject::`scalar deleting destructor'+4e
- 000007fe`f3706696 90 nop
- SYMBOL_STACK_INDEX: 4
- SYMBOL_NAME: mscorwks!MethodTable::MethodDataObject::`scalar deleting destructor'+4e
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: mscorwks
- IMAGE_NAME: mscorwks.dll
- DEBUG_FLR_IMAGE_TIMESTAMP: 4889e870
- STACK_COMMAND: dds 77b770e8 ; kb
- FAILURE_BUCKET_ID: HEAP_CORRUPTION_c0000374_mscorwks.dll!MethodTable::MethodDataObject::`scalar deleting destructor'
- BUCKET_ID: X64_APPLICATION_FAULT_HEAP_CORRUPTION_mscorwks!MethodTable::MethodDataObject::_scalar_deleting_destructor_+4e
- Followup: MachineOwner
- ---------