我使用windbg打开转储文件。因为我不是开发人员,所以我不明白最新情况。请帮助
Loading Dump File [F:\Calls\Panasonic\DLO admin Service stops\DLOAdminSvcu.exe.15724.dmp]
User Mini Dump File with Full Memory: Only application data is available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Version 7601 (Service Pack 1) MP (16 procs) Free x64
Product: Server, suite: Enterprise TerminalServer SingleUserTS
Machine Name:
Debug session time: Tue Jul 15 13:01:55.000 2014 (UTC + 4:00)
System Uptime: 10 days 2:12:07.249
Process Uptime: 0 days 0:00:18.000
................................................................
................................................................
.
Loading unloaded module list
...
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(3d6c.58c0): Access violation - code c0000005 (first/second chance not available)
ntdll!RtlRaiseException+0x43:
00000000`778795c3 e878720300 call ntdll!RtlCaptureContext (00000000`778b0840)
Verbose mode ON.
0:013> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
Loading symbols for 00000000`00400000 DLOAdminSvcu.exe -> DLOAdminSvcu.exe
*** ERROR: Module load completed but symbols could not be loaded for DLOAdminSvcu.exe
Loading symbols for 00000000`74970000 msvcp80.dll -> msvcp80.dll
Loading symbols for 00000000`74a80000 msvcr80.dll -> msvcr80.dll
Loading symbols for 00000000`77640000 kernel32.dll -> kernel32.dll
Loading symbols for 000007fe`fdca0000 sechost.dll -> sechost.dll
Force unload of C:\Windows\System32\user32.dll
Loading symbols for 00000000`77760000 user32.dll -> user32.dll
ModLoad: 00000000`77760000 00000000`7785a000 C:\Windows\System32\user32.dll
Force unload of C:\Windows\System32\ole32.dll
Loading symbols for 000007fe`fdcc0000 ole32.dll -> ole32.dll
ModLoad: 000007fe`fdcc0000 000007fe`fdec3000 C:\Windows\System32\ole32.dll
Loading symbols for 000007fe`ff8c0000 rpcrt4.dll -> rpcrt4.dll
Loading symbols for 000007fe`eeef0000 netbios.dll -> netbios.dll
Loading symbols for 000007fe`edd70000 comsvcs.dll -> comsvcs.dll
Loading symbols for 00000000`02cc0000 vxACE_3I.dll -> vxACE_3I.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for vxACE_3I.dll -
Loading symbols for 00000000`023c0000 LIBVXVIMMAIL1I.DLL -> LIBVXVIMMAIL1I.DLL
*** ERROR: Symbol file could not be found. Defaulted to export symbols for LIBVXVIMMAIL1I.DLL -
Loading symbols for 000007fe`fcba0000 mswsock.dll -> mswsock.dll
Loading symbols for 000007fe`ff7f0000 ws2_32.dll -> ws2_32.dll
Loading symbols for 00000001`80000000 LIBVXCONDUITLISTENER2.DLL -> LIBVXCONDUITLISTENER2.DLL
*** ERROR: Symbol file could not be found. Defaulted to export symbols for LIBVXCONDUITLISTENER2.DLL -
GetPageUrlData failed, server returned HTTP status 404
URL requested:
FAULTING_IP:
ntdll!RtlRaiseException+43
00000000`778795c3 e878720300 call ntdll!RtlCaptureContext (00000000`778b0840)
EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 00000000778795c3 (ntdll!RtlRaiseException+0x0000000000000043)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 00000000037a0c98
Attempt to write to address 00000000037a0c98
DEFAULT_BUCKET_ID: INVALID_STACK_ACCESS
PROCESS_NAME: DLOAdminSvcu.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 00000000037a0c98
WRITE_ADDRESS: 00000000037a0c98
FOLLOWUP_IP:
DLOAdminSvcu+f7bb2
00000000`004f7bb2 488d4c2428 lea rcx,[rsp+28h]
MOD_LIST: <ANALYSIS/>
NTGLOBALFLAG: 0
APPLICATION_VERIFIER_FLAGS: 0
FAULTING_THREAD: 00000000000058c0
PRIMARY_PROBLEM_CLASS: INVALID_STACK_ACCESS
BUGCHECK_STR: APPLICATION_FAULT_INVALID_STACK_ACCESS_INVALID_POINTER_WRITE
LAST_CONTROL_TRANSFER: from 000007fefd6c940d to 00000000778795c3
STACK_TEXT:
00000000`037a0ca0 000007fe`fd6c940d : 00000000`013386f0 00000000`00000000 00000000`00980ec1 00000000`037a16b3 : ntdll!RtlRaiseException+0x43
00000000`037a12e0 000007fe`fd6daa0d : 00000000`8b086400 00000000`49090101 00000000`77975430 00000000`00000000 : KERNELBASE!RaiseException+0x39
00000000`037a13b0 00000000`004f7bb2 : cccccccc`cccccccc 00000000`013386f0 00000000`00000000 cccccccc`cccccccc : KERNELBASE!OutputDebugStringA+0x6d
00000000`037a1680 00000000`00504ec6 : 00000000`00980d80 00000000`00980e50 00000000`00000000 cccccccc`cccccccc : DLOAdminSvcu+0xf7bb2
00000000`037a1730 00000000`74981ac9 : 00000000`00980d80 00000000`0000000a cccccccc`00000000 00000000`00000025 : DLOAdminSvcu+0x104ec6
00000000`037a1760 00000000`74981e94 : 00000000`013386f0 00000000`013386f0 cccccccc`00000000 cccccccc`cccccccc : msvcp80!std::basic_ostream<char,std::char_traits<char> >::put+0x119 [f:\dd\vctools\crt_bld\self_64_amd64\crt\src\ostream @ 522]
00000000`037a17d0 00000000`004a94cb : 00000000`037a3930 00000000`007dc930 00000000`00000000 00000000`00000000 : msvcp80!std::endl+0x14 [f:\dd\vctools\crt_bld\self_64_amd64\crt\src\ostream @ 977]
00000000`037a1800 00000000`74b1bf40 : 00000000`004a9140 00000000`038995c0 00000000`038995c0 00000000`74ab964e : DLOAdminSvcu+0xa94cb
00000000`037a1850 00000000`74ab964e : 00000000`004a9140 00000000`037a2b58 00000000`00000100 000007fe`f1a51176 : msvcr80!_CallSettingFrame+0x20 [F:\dd\vctools\crt_bld\SELF_64_AMD64\crt\prebuild\eh\AMD64\handlers.asm @ 36]
00000000`037a1870 00000000`778b0c51 : 00000000`00000000 00000000`037a3e20 00000000`00000000 00000000`00000000 : msvcr80!__CxxCallCatchBlock+0xfe [f:\dd\vctools\crt_bld\self_64_amd64\crt\prebuild\eh\frame.cpp @ 1342]
00000000`037a1920 00000000`004a7af4 : 00000000`03899e90 00000000`03899d01 00000000`03899d00 00000000`0000005c : ntdll!RcConsolidateFrames+0x3
00000000`038995c0 00000000`0049def4 : 00000000`0012f2b0 00000000`01b56340 00000000`00000000 cccccccc`cccccccc : DLOAdminSvcu+0xa7af4
00000000`0389aad0 00000000`004470b7 : 00000000`0012f2b0 00000000`00000005 00000000`00000000 00000000`0389fbf0 : DLOAdminSvcu+0x9def4
00000000`0389d4f0 00000000`00706fa1 : 00000000`0012eee8 00000000`0012eee8 00000000`00706ee0 00000000`00000000 : DLOAdminSvcu+0x470b7
00000000`0389fd50 00000000`00737fc1 : 00000000`0012eee8 cccccccc`00000001 cccccccc`cccccccc cccccccc`cccccccc : DLOAdminSvcu+0x306fa1
00000000`0389fda0 00000000`00737e8b : 00000000`01b44490 00000000`01b3f530 cccccccc`cccccccc cccccccc`cccccccc : DLOAdminSvcu+0x337fc1
00000000`0389fe30 00000000`00732d9c : 00000000`01b44490 cccccccc`cccccccc cccccccc`cccccccc cccccccc`cccccccc : DLOAdminSvcu+0x337e8b
00000000`0389fec0 00000000`74a837d7 : 00000000`01b44490 00000000`00000000 00000000`00000000 00000000`00000000 : DLOAdminSvcu+0x332d9c
00000000`0389ff00 00000000`74a83894 : 00000000`74b395c0 00000000`01b55a70 00000000`00000000 00000000`00000000 : msvcr80!_callthreadstartex+0x17 [f:\dd\vctools\crt_bld\self_64_amd64\crt\src\threadex.c @ 348]
00000000`0389ff30 00000000`776559ed : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : msvcr80!_threadstartex+0x84 [f:\dd\vctools\crt_bld\self_64_amd64\crt\src\threadex.c @ 326]
00000000`0389ff60 00000000`7788c541 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`0389ff90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: DLOAdminSvcu+f7bb2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: DLOAdminSvcu
IMAGE_NAME: DLOAdminSvcu.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 51eebd6f
STACK_COMMAND: ~13s; .ecxr ; kb
FAILURE_BUCKET_ID: INVALID_STACK_ACCESS_c0000005_DLOAdminSvcu.exe!Unknown
BUCKET_ID: X64_APPLICATION_FAULT_INVALID_STACK_ACCESS_INVALID_POINTER_WRITE_DLOAdminSvcu+f7bb2
WATSON_STAGEONE_URL:
Followup: MachineOwner
---------
0:013> !teb
TEB at 000007fffffa0000
ExceptionList: 0000000000000000
StackBase: 00000000038a0000
StackLimit: 00000000037a1000
SubSystemTib: 0000000000000000
FiberData: 0000000000001e00
ArbitraryUserPointer: 0000000000000000
Self: 000007fffffa0000
EnvironmentPointer: 0000000000000000
ClientId: 0000000000003d6c . 00000000000058c0
RpcHandle: 0000000000000000
Tls Storage: 000007fffffa0058
PEB Address: 000007fffffdb000
LastErrorValue: 0
LastStatusValue: 103
Count Owned Locks: 0
HardErrorMode: 0
0:013> lmvm ntdll
start end module name
00000000`77860000 00000000`77a09000 ntdll (pdb symbols) c:\symbols\ntdll.pdb\9D04EB0AA387494FBD81ED062072B99C2\ntdll.pdb
Loaded symbol image file: ntdll.dll
Image path: C:\Windows\System32\ntdll.dll
Image name: ntdll.dll
Timestamp: Thu Aug 29 06:17:08 2013 (521EAF24)
CheckSum: 001A875F
ImageSize: 001A9000
File version: 6.1.7601.18247
Product version: 6.1.7601.18247
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntdll.dll
OriginalFilename: ntdll.dll
ProductVersion: 6.1.7601.18247
FileVersion: 6.1.7601.18247 (win7sp1_gdr.130828-1532)
FileDescription: NT Layer DLL
LegalCopyright: © Microsoft Corporation. All rights reserved.
0:013> lmvm DLOAdminSvcu
start end module name
00000000`00400000 00000000`009e5000 DLOAdminSvcu (no symbols)
Loaded symbol image file: DLOAdminSvcu.exe
Image path: E:\Program Files\Symantec\Symantec DLO\DLOAdminSvcu.exe
Image name: DLOAdminSvcu.exe
Timestamp: Tue Jul 23 21:29:19 2013 (51EEBD6F)
CheckSum: 005D759A
ImageSize: 005E5000
File version: 7.5.758.2301
Product version: 7.5.1.0
File flags: 0 (Mask 3F)
File OS: 4 Unknown Win32
File type: 2.0 Dll
File date: 00000000.00000000
Translations: 0409.04b0 0804.04b0 0407.04b0 040a.04b0 040c.04b0 0410.04b0 0411.04b0 0412.04b0 0416.04b0 0404.04b0 0419.04b0
CompanyName: Symantec Corporation
ProductName: Desktop and Laptop Option
OriginalFilename: ConsoleSvc.exe
ProductVersion: 7.50.01.0000
FileVersion: 7.5.758.2301
FileDescription: Administrator Service
LegalCopyright: Copyright© 2013 Symantec Corporation, All rights reserved.
LegalTrademarks: Symantec®, the Symantec logo, Symantec Backup Exec™, and Symantec DLO™ are trademarks or registered trademarks of Symantec Corporation.
答案 0 :(得分:0)
模块加载已完成但无法加载符号 DLOAdminSvcu.exe
首先修复符号以获得可读的堆栈跟踪
您似乎有访问冲突
调用堆栈表明你的函数在OutPutDebugString()附近和此地址之后的某处失败
DLOAdminSvcu+f7bb2
00000000`004f7bb2 488d4c2428 lea rcx,[rsp+28h]
似乎esp已被覆盖或分配了虚假地址。