Windbg 应用程序因\u堆栈\u访问无效而崩溃。需要帮助来解码转储文件吗

Windbg 应用程序因\u堆栈\u访问无效而崩溃。需要帮助来解码转储文件吗,windbg,access-violation,Windbg,Access Violation,我已使用windbg打开转储文件。因为我不是一个开发者,所以我不明白发生了什么。好心帮忙 Loading Dump File [F:\Calls\Panasonic\DLO admin Service stops\DLOAdminSvcu.exe.15724.dmp] User Mini Dump File with Full Memory: Only application data is available Symbol search path is: SRV*C:\Symbols*htt

我已使用windbg打开转储文件。因为我不是一个开发者,所以我不明白发生了什么。好心帮忙

Loading Dump File [F:\Calls\Panasonic\DLO admin Service stops\DLOAdminSvcu.exe.15724.dmp]
User Mini Dump File with Full Memory: Only application data is available

Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Version 7601 (Service Pack 1) MP (16 procs) Free x64
Product: Server, suite: Enterprise TerminalServer SingleUserTS
Machine Name:
Debug session time: Tue Jul 15 13:01:55.000 2014 (UTC + 4:00)
System Uptime: 10 days 2:12:07.249
Process Uptime: 0 days 0:00:18.000
................................................................
................................................................
.
Loading unloaded module list
...
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(3d6c.58c0): Access violation - code c0000005 (first/second chance not available)
ntdll!RtlRaiseException+0x43:
00000000`778795c3 e878720300      call    ntdll!RtlCaptureContext (00000000`778b0840)
Verbose mode ON.
0:013> !analyze -v
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

Loading symbols for 00000000`00400000 DLOAdminSvcu.exe ->   DLOAdminSvcu.exe
*** ERROR: Module load completed but symbols could not be loaded for DLOAdminSvcu.exe
Loading symbols for 00000000`74970000      msvcp80.dll ->   msvcp80.dll
Loading symbols for 00000000`74a80000      msvcr80.dll ->   msvcr80.dll
Loading symbols for 00000000`77640000     kernel32.dll ->   kernel32.dll
Loading symbols for 000007fe`fdca0000      sechost.dll ->   sechost.dll
Force unload of C:\Windows\System32\user32.dll
Loading symbols for 00000000`77760000       user32.dll ->   user32.dll
ModLoad: 00000000`77760000 00000000`7785a000   C:\Windows\System32\user32.dll
Force unload of C:\Windows\System32\ole32.dll
Loading symbols for 000007fe`fdcc0000        ole32.dll ->   ole32.dll
ModLoad: 000007fe`fdcc0000 000007fe`fdec3000   C:\Windows\System32\ole32.dll
Loading symbols for 000007fe`ff8c0000       rpcrt4.dll ->   rpcrt4.dll
Loading symbols for 000007fe`eeef0000      netbios.dll ->   netbios.dll
Loading symbols for 000007fe`edd70000      comsvcs.dll ->   comsvcs.dll
Loading symbols for 00000000`02cc0000     vxACE_3I.dll ->   vxACE_3I.dll
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for vxACE_3I.dll - 
Loading symbols for 00000000`023c0000 LIBVXVIMMAIL1I.DLL ->   LIBVXVIMMAIL1I.DLL
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for LIBVXVIMMAIL1I.DLL - 
Loading symbols for 000007fe`fcba0000      mswsock.dll ->   mswsock.dll
Loading symbols for 000007fe`ff7f0000       ws2_32.dll ->   ws2_32.dll
Loading symbols for 00000001`80000000 LIBVXCONDUITLISTENER2.DLL ->   LIBVXCONDUITLISTENER2.DLL
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for LIBVXCONDUITLISTENER2.DLL - 
GetPageUrlData failed, server returned HTTP status 404
URL requested: 
FAULTING_IP: 
ntdll!RtlRaiseException+43
00000000`778795c3 e878720300      call    ntdll!RtlCaptureContext (00000000`778b0840)

EXCEPTION_RECORD:  ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 00000000778795c3 (ntdll!RtlRaiseException+0x0000000000000043)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000001
   Parameter[1]: 00000000037a0c98
Attempt to write to address 00000000037a0c98

DEFAULT_BUCKET_ID:  INVALID_STACK_ACCESS

PROCESS_NAME:  DLOAdminSvcu.exe

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  00000000037a0c98

WRITE_ADDRESS:  00000000037a0c98 

FOLLOWUP_IP: 
DLOAdminSvcu+f7bb2
00000000`004f7bb2 488d4c2428      lea     rcx,[rsp+28h]

MOD_LIST: <ANALYSIS/>

NTGLOBALFLAG:  0

APPLICATION_VERIFIER_FLAGS:  0

FAULTING_THREAD:  00000000000058c0

PRIMARY_PROBLEM_CLASS:  INVALID_STACK_ACCESS

BUGCHECK_STR:  APPLICATION_FAULT_INVALID_STACK_ACCESS_INVALID_POINTER_WRITE

LAST_CONTROL_TRANSFER:  from 000007fefd6c940d to 00000000778795c3

STACK_TEXT:  
00000000`037a0ca0 000007fe`fd6c940d : 00000000`013386f0 00000000`00000000 00000000`00980ec1 00000000`037a16b3 : ntdll!RtlRaiseException+0x43
00000000`037a12e0 000007fe`fd6daa0d : 00000000`8b086400 00000000`49090101 00000000`77975430 00000000`00000000 : KERNELBASE!RaiseException+0x39
00000000`037a13b0 00000000`004f7bb2 : cccccccc`cccccccc 00000000`013386f0 00000000`00000000 cccccccc`cccccccc : KERNELBASE!OutputDebugStringA+0x6d
00000000`037a1680 00000000`00504ec6 : 00000000`00980d80 00000000`00980e50 00000000`00000000 cccccccc`cccccccc : DLOAdminSvcu+0xf7bb2
00000000`037a1730 00000000`74981ac9 : 00000000`00980d80 00000000`0000000a cccccccc`00000000 00000000`00000025 : DLOAdminSvcu+0x104ec6
00000000`037a1760 00000000`74981e94 : 00000000`013386f0 00000000`013386f0 cccccccc`00000000 cccccccc`cccccccc : msvcp80!std::basic_ostream<char,std::char_traits<char> >::put+0x119 [f:\dd\vctools\crt_bld\self_64_amd64\crt\src\ostream @ 522]
00000000`037a17d0 00000000`004a94cb : 00000000`037a3930 00000000`007dc930 00000000`00000000 00000000`00000000 : msvcp80!std::endl+0x14 [f:\dd\vctools\crt_bld\self_64_amd64\crt\src\ostream @ 977]
00000000`037a1800 00000000`74b1bf40 : 00000000`004a9140 00000000`038995c0 00000000`038995c0 00000000`74ab964e : DLOAdminSvcu+0xa94cb
00000000`037a1850 00000000`74ab964e : 00000000`004a9140 00000000`037a2b58 00000000`00000100 000007fe`f1a51176 : msvcr80!_CallSettingFrame+0x20 [F:\dd\vctools\crt_bld\SELF_64_AMD64\crt\prebuild\eh\AMD64\handlers.asm @ 36]
00000000`037a1870 00000000`778b0c51 : 00000000`00000000 00000000`037a3e20 00000000`00000000 00000000`00000000 : msvcr80!__CxxCallCatchBlock+0xfe [f:\dd\vctools\crt_bld\self_64_amd64\crt\prebuild\eh\frame.cpp @ 1342]
00000000`037a1920 00000000`004a7af4 : 00000000`03899e90 00000000`03899d01 00000000`03899d00 00000000`0000005c : ntdll!RcConsolidateFrames+0x3
00000000`038995c0 00000000`0049def4 : 00000000`0012f2b0 00000000`01b56340 00000000`00000000 cccccccc`cccccccc : DLOAdminSvcu+0xa7af4
00000000`0389aad0 00000000`004470b7 : 00000000`0012f2b0 00000000`00000005 00000000`00000000 00000000`0389fbf0 : DLOAdminSvcu+0x9def4
00000000`0389d4f0 00000000`00706fa1 : 00000000`0012eee8 00000000`0012eee8 00000000`00706ee0 00000000`00000000 : DLOAdminSvcu+0x470b7
00000000`0389fd50 00000000`00737fc1 : 00000000`0012eee8 cccccccc`00000001 cccccccc`cccccccc cccccccc`cccccccc : DLOAdminSvcu+0x306fa1
00000000`0389fda0 00000000`00737e8b : 00000000`01b44490 00000000`01b3f530 cccccccc`cccccccc cccccccc`cccccccc : DLOAdminSvcu+0x337fc1
00000000`0389fe30 00000000`00732d9c : 00000000`01b44490 cccccccc`cccccccc cccccccc`cccccccc cccccccc`cccccccc : DLOAdminSvcu+0x337e8b
00000000`0389fec0 00000000`74a837d7 : 00000000`01b44490 00000000`00000000 00000000`00000000 00000000`00000000 : DLOAdminSvcu+0x332d9c
00000000`0389ff00 00000000`74a83894 : 00000000`74b395c0 00000000`01b55a70 00000000`00000000 00000000`00000000 : msvcr80!_callthreadstartex+0x17 [f:\dd\vctools\crt_bld\self_64_amd64\crt\src\threadex.c @ 348]
00000000`0389ff30 00000000`776559ed : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : msvcr80!_threadstartex+0x84 [f:\dd\vctools\crt_bld\self_64_amd64\crt\src\threadex.c @ 326]
00000000`0389ff60 00000000`7788c541 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd
00000000`0389ff90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x1d


SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  DLOAdminSvcu+f7bb2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: DLOAdminSvcu

IMAGE_NAME:  DLOAdminSvcu.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  51eebd6f

STACK_COMMAND:  ~13s; .ecxr ; kb

FAILURE_BUCKET_ID:  INVALID_STACK_ACCESS_c0000005_DLOAdminSvcu.exe!Unknown

BUCKET_ID:  X64_APPLICATION_FAULT_INVALID_STACK_ACCESS_INVALID_POINTER_WRITE_DLOAdminSvcu+f7bb2

WATSON_STAGEONE_URL:  

Followup: MachineOwner
---------

0:013> !teb
TEB at 000007fffffa0000
    ExceptionList:        0000000000000000
    StackBase:            00000000038a0000
    StackLimit:           00000000037a1000
    SubSystemTib:         0000000000000000
    FiberData:            0000000000001e00
    ArbitraryUserPointer: 0000000000000000
    Self:                 000007fffffa0000
    EnvironmentPointer:   0000000000000000
    ClientId:             0000000000003d6c . 00000000000058c0
    RpcHandle:            0000000000000000
    Tls Storage:          000007fffffa0058
    PEB Address:          000007fffffdb000
    LastErrorValue:       0
    LastStatusValue:      103
    Count Owned Locks:    0
    HardErrorMode:        0
0:013> lmvm ntdll
start             end                 module name
00000000`77860000 00000000`77a09000   ntdll      (pdb symbols)          c:\symbols\ntdll.pdb\9D04EB0AA387494FBD81ED062072B99C2\ntdll.pdb
    Loaded symbol image file: ntdll.dll
    Image path: C:\Windows\System32\ntdll.dll
    Image name: ntdll.dll
    Timestamp:        Thu Aug 29 06:17:08 2013 (521EAF24)
    CheckSum:         001A875F
    ImageSize:        001A9000
    File version:     6.1.7601.18247
    Product version:  6.1.7601.18247
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        2.0 Dll
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft® Windows® Operating System
    InternalName:     ntdll.dll
    OriginalFilename: ntdll.dll
    ProductVersion:   6.1.7601.18247
    FileVersion:      6.1.7601.18247 (win7sp1_gdr.130828-1532)
    FileDescription:  NT Layer DLL
    LegalCopyright:   © Microsoft Corporation. All rights reserved.
0:013> lmvm DLOAdminSvcu
start             end                 module name
00000000`00400000 00000000`009e5000   DLOAdminSvcu   (no symbols)           
    Loaded symbol image file: DLOAdminSvcu.exe
    Image path: E:\Program Files\Symantec\Symantec DLO\DLOAdminSvcu.exe
    Image name: DLOAdminSvcu.exe
    Timestamp:        Tue Jul 23 21:29:19 2013 (51EEBD6F)
    CheckSum:         005D759A
    ImageSize:        005E5000
    File version:     7.5.758.2301
    Product version:  7.5.1.0
    File flags:       0 (Mask 3F)
    File OS:          4 Unknown Win32
    File type:        2.0 Dll
    File date:        00000000.00000000
    Translations:     0409.04b0 0804.04b0 0407.04b0 040a.04b0 040c.04b0 0410.04b0 0411.04b0 0412.04b0 0416.04b0 0404.04b0 0419.04b0
    CompanyName:      Symantec Corporation
    ProductName:      Desktop and Laptop Option
    OriginalFilename: ConsoleSvc.exe
    ProductVersion:   7.50.01.0000
    FileVersion:      7.5.758.2301
    FileDescription:  Administrator Service
    LegalCopyright:   Copyright© 2013 Symantec Corporation, All rights reserved.
    LegalTrademarks:  Symantec®, the Symantec logo, Symantec Backup Exec™, and Symantec DLO™ are trademarks or registered trademarks of Symantec Corporation.
加载转储文件[F:\Calls\Panasonic\DLO admin Service stops\DLOAdminSvcu.exe.15724.dmp]
内存已满的用户小型转储文件:只有应用程序数据可用
符号搜索路径为:SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
可执行搜索路径为:
Windows 7版本7601(Service Pack 1)MP(16进程)免费x64
产品:服务器,套件:企业终端服务器单用户
计算机名称:
调试会话时间:2014年7月15日星期二13:01:55.000(UTC+4:00)
系统正常运行时间:10天2:12:07.249
进程正常运行时间:0天0:00:18.000
................................................................
................................................................
.
加载卸载模块列表
...
此转储文件中存储了感兴趣的异常。
存储的异常信息可以通过.ecxr访问。
(3d6c.58c0):访问冲突-代码c0000005(第一次/第二次机会不可用)
ntdll!RtlRaiseException+0x43:
00000000`778795c3 e878720300调用ntdll!RtlCaptureContext(00000000`778b0840)
详细模式打开。
0:013> !分析-v
*******************************************************************************
*                                                                             *
*异常分析*
*                                                                             *
*******************************************************************************
正在加载00000000`00400000 DLOAdminSvcu.exe->DLOAdminSvcu.exe的符号
***错误:模块加载已完成,但无法为DLOAdminSvcu.exe加载符号
正在加载00000000`74970000 msvcp80.dll->msvcp80.dll的符号
正在加载00000000`74a80000 msvcr80.dll->msvcr80.dll的符号
正在加载00000000`77640000 kernel32.dll->kernel32.dll的符号
正在加载000007fe`fdca0000 sechost.dll->sechost.dll的符号
强制卸载C:\Windows\System32\user32.dll
正在加载00000000`77760000 user32.dll->user32.dll的符号
ModLoad:00000000`77760000 00000000`7785a000 C:\Windows\System32\user32.dll
强制卸载C:\Windows\System32\ole32.dll
正在加载000007fe`fdcc0000 ole32.dll->ole32.dll的符号
ModLoad:000007fe`fdcc0000 000007fe`fdec3000 C:\Windows\System32\ole32.dll
正在加载000007fe`ff8c0000 rpcrt4.dll->rpcrt4.dll的符号
正在加载000007fe`eeef0000 netbios.dll->netbios.dll的符号
正在加载000007fe`edd70000 comsvcs.dll->comsvcs.dll的符号
正在加载00000000`02cc0000 vxACE_3I.dll->vxACE_3I.dll的符号
***错误:找不到符号文件。默认为为vxACE_3I.dll导出符号-
正在加载00000000`023c0000 LIBVXVIMMAIL1I.DLL->LIBVXVIMMAIL1I.DLL的符号
***错误:找不到符号文件。默认为导出LIBVXVIMMAIL1I.DLL的符号-
正在加载000007fe`fcba0000 mswsock.dll->mswsock.dll的符号
正在加载000007fe`ff7f0000 ws2_32.dll->ws2_32.dll的符号
正在加载0000000 1`80000000 libvxconduiter2.DLL->libvxconduiter2.DLL的符号
***错误:找不到符号文件。默认为导出libvxconduiteListener2.DLL的符号-
GetPageUrlData失败,服务器返回HTTP状态404
请求的URL:
断层IP:
ntdll!RtlRaiseException+43
00000000`778795c3 e878720300调用ntdll!RtlCaptureContext(00000000`778b0840)
异常记录:ffffffffffffffff--(.exr 0xffffffffffffffff)
例外地址:00000000778795c3(ntdll!RtlRaiseException+0x0000000000000043)
例外代码:c0000005(访问冲突)
例外标志:00000000
数字参数:2
参数[0]:000000000000000 1
参数[1]:000000000 37A0C98
尝试写入地址000000000 37A0C98
默认\u BUCKET\u ID:无效的\u堆栈\u访问
进程名称:DLOAdminSvcu.exe
错误代码:(NTSTATUS)0xc0000005-0x%08lx处的指令引用了0x%08lx处的内存。内存不能是%s。
异常代码:(NTSTATUS)0xc0000005-0x%08lx处的指令引用了0x%08lx处的内存。内存不能是%s。
异常参数1:000000000000000 1
异常参数2:000000000 37A0C98
写入地址:000000000 37A0C98
后续行动(IP):
DLOAdminSvcu+f7bb2
00000000`004f7bb2 488d4c2428 lea rcx,[rsp+28小时]
模块列表:
NTGLOBALFLAG:0
应用程序\验证程序\标志:0
错误线程:00000000000058c0
主要\u问题\u类:无效的\u堆栈\u访问
错误检查\u STR:应用程序\u错误\u无效\u堆栈\u访问\u无效\u指针\u写入
最后一次控制权转移:从000007fefd6c940d到00000000 778795C3
堆栈文本:
00000000`037a0ca0 000007fe`fd6c940d:00000000`013386F000000000`00000000`00980ec1 00000000`037a16b3:ntdll!RtlRaiseException+0x43
00000000`037A12E0000007FE`fd6daa0d:00000000`8B086400000000000`490901000000000`77975430 00000000`00000000:KERNELBASE!RAISEEException+0x39
00000000`037a13b0 00000000`004f7bb2:cccc`cccccccc 00000000`013386F000000000`00000000 cccccc`cccccc:KERNELBASE!OutputDebugStringA+0x6d
00000000`037a1680 00000000`00504ec6:00000000`00980d80 00000000`00980e50 00000000`00000000 CCCC`CCCCCC:DLOAdminSvcu+0xf7bb2
00000000`037A173000000000`74981ac9:00000000`00980d80 00000000`00000000 A CCCC`00000000`00000000`00000025:DLOAdminSvcu+0x104ec6
00000000`037A176000000000`74981e94:00000000`013386F000000000`013386f0 CCCC`00000000 CCCC`CCCCCC:msvcp80!std::basic\u ostream::put+0x119[f:\dd\vctools\crt\u bld\self\u 64\u amd64\crt\src\ostream@522]
00000000`037A17D000000000`004a94cb:00000000`037A39300000000`007DC9300000000`00000000`00000000`00000000`00000000:msvcp80!std::endl+0x14[f:\dd\vctools\crt\u bld\self\u 64\u amd64\crt\src\ostream@977]
00000000`037a1800 00000000`74b1bf40:00000000`004a9140 00000000`038995C000000000`038995C000000000`74ab964e:DLOA
DLOAdminSvcu+f7bb2
00000000`004f7bb2 488d4c2428      lea     rcx,[rsp+28h]