Pat-OK, I think I did everything as you described, the following is what I
got. Seems like there was an error with the analysis??? Maybe you can
make some sense of it ;-)
Thanks for taking a look!
Dan
Microsoft (R) Windows Debugger Version 6.3.0017.0
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\we crash user.dmp]
User Dump File: Only application data is available
Windows 2000 Version 2195 UP Free x86 compatible
Product: WinNt
Debug session time: Tue Aug 17 18:47:31 2004
System Uptime: 0 days 0:58:16.051
Process Uptime: not available
Symbol search path is: *** Invalid ***
****************************************************************************
* Symbol loading may be unreliable without a symbol search path.
*
* Use .symfix to have the debugger choose a symbol path.
*
* After setting your symbol path, use .reload to refresh symbol locations.
*
****************************************************************************
Executable search path is:
.............................................................................
(cc.3c8): Access violation - code c0000005 (!!! second chance !!!)
eax=033022b8 ebx=00000065 ecx=000bc938 edx=00000003 esi=000bc938
edi=00000003
eip=78313a7f esp=025df38c ebp=025df400 iopl=0 nv up ei pl nz na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
*** ERROR: Symbol file could not be found. Defaulted to export symbols
for SHELL32.dll -
SHELL32!Ordinal701+0xb0d:
78313a7f 8b08 mov ecx,[eax] ds:0023:033022b8=????????
0:010> .symfix e:\symbols
Symbol search path is:
SRV*e:\symbols*
http://msdl.microsoft.com/download/symbols
0:010> .reload
.............................................................................
0:010> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ntdll!_PEB ***
*** ***
*************************************************************************
*** ERROR: Symbol file could not be found. Defaulted to export symbols
for COMCTL32.DLL -
FAULTING_IP:
SHELL32!HDXA_DeleteAll+1e
78313a7f 8b08 mov ecx,[eax]
EXCEPTION_RECORD: ffffffff -- (.exr ffffffffffffffff)
ExceptionAddress: 78313a7f (SHELL32!HDXA_DeleteAll+0x0000001e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 033022b8
Attempt to read from address 033022b8
FAULTING_THREAD: 000003c8
DEFAULT_BUCKET_ID: APPLICATION_FAULT
PROCESS_NAME: Explorer.EXE
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx"
referenced memory at "0x%08lx". The memory could not be "%s".
READ_ADDRESS: 033022b8
BUGCHECK_STR: ACCESS_VIOLATION
THREAD_ATTRIBUTES:
LAST_CONTROL_TRANSFER: from 783155e4 to 78313a7f
STACK_TEXT:
025df390 783155e4 000bc938 000e61c0 7831555a SHELL32!HDXA_DeleteAll+0x1e
025df39c 7831555a 000bc938 000e61e0 000e61c0 SHELL32!HDXA_Destroy+0xf
025df3b4 7831551a 70bffd08 000d7858 7107e558
SHELL32!CDefFolderMenu::~CDefFolderMenu+0x2e
025df3c0 7107e558 000e61c0 000d79cc 000d7858
SHELL32!CDefFolderMenu::Release+0x3f
025df400 710439f3 00e0005e 000000e0 000ec3e8
SHDOCVW!CNscTree::_OnContextMenu+0x256
025df430 7102865e 025df8a0 000ec448 00000000
SHDOCVW!CNscTree::_OnNotify+0x3a2
025df444 7102861d 000d7980 00010208 0000004e
SHDOCVW!CNscTree::OnWinEvent+0x4f
025df474 711675c5 000ec3e8 00010208 0000004e
SHDOCVW!CNSCBand::OnWinEvent+0x6b
025df4a8 7116c0d4 00010208 0000004e 00000064
browseui!CBandSite::_SendToToolband+0x42
025df4d4 71183c1f 000efa48 00010200 00000000
browseui!CBandSite::OnWinEvent+0x141
025df520 711928dd 000efa48 00010200 0000004e
browseui!CBrowserBandSite::OnWinEvent+0x14a
025df54c 71183805 0000004e 00000064 025df8a0
browseui!CBaseBar::_CheckForwardWinEvent+0x84
025df568 7116c7ad 0000004e 00000064 025df8a0
browseui!CBaseBar::_OnCommand+0x1a
025df584 7118397b 00010200 0000004e 00000064
browseui!CBaseBar::v_WndProc+0x4d
025df5d4 7118391b 00010200 0000004e 00000064
browseui!CDockingBar::v_WndProc+0x433
025df604 7116c695 00010200 0000004e 00000064
browseui!CBrowserBar::v_WndProc+0x97
025df628 77e12ca8 00010200 0000004e 00000064
browseui!CImpWndProc::s_WndProc+0x66
025df648 77e14398 7116c659 00010200 0000004e USER32!UserCallWinProc+0x18
025df678 77e14925 0047b6a8 0000004e 00000064
USER32!SendMessageWorker+0x31f
025df698 7171603f 00010200 0000004e 00000064 USER32!SendMessageW+0x8c
WARNING: Stack unwind information not available. Following frames may be
wrong.
025df728 71722215 025df744 fffffffb 025df8a0 COMCTL32!Ordinal73+0xbd6
025df768 71750134 00010200 ffffffff fffffffb COMCTL32!Ordinal342+0x5c
025df7cc 77e12ca8 00010202 0000004e 00000064 COMCTL32!Ordinal383+0x3f38
025df7ec 77e14398 7174ff1b 00010202 0000004e USER32!UserCallWinProc+0x18
025df81c 77e14925 0047aa18 0000004e 00000064
USER32!SendMessageWorker+0x31f
025df83c 7171603f 00010202 0000004e 00000064 USER32!SendMessageW+0x8c
025df8cc 71752cb5 000f0718 fffffffb 00000000 COMCTL32!Ordinal73+0xbd6
025df8f0 71755551 00010208 0000005a 0000006b COMCTL32!Ordinal413+0x799
025df940 77e12ca8 00010208 00000204 00000002 COMCTL32!Ordinal413+0x3035
025df960 77e152e6 71755025 00010208 00000204 USER32!UserCallWinProc+0x18
025df984 77e16487 71755025 00010208 00000204
USER32!CallWindowProcAorW+0x94
025df9a4 717521f0 71755025 00010208 00000204 USER32!CallWindowProcW+0x19
025df9c0 7175276f 00010208 00000204 00000002 COMCTL32!Ordinal363+0x1c9
025dfa1c 71752574 000c5ca8 00010208 00000204 COMCTL32!Ordinal413+0x253
025dfa40 710276b0 00010208 00000204 00000002 COMCTL32!Ordinal413+0x58
025dfa5c 7175276f 00010208 00000204 00000002
SHDOCVW!CNotifySubclassWndProc::_SubclassWndProc+0xa5
025dfab8 71752574 000c5ca8 00010208 00000204 COMCTL32!Ordinal413+0x253
025dfadc 7102765a 00010208 00000204 00000002 COMCTL32!Ordinal413+0x58
025dfb28 710275e1 00010208 00000204 00000002
SHDOCVW!CNscTree::_SubClassTreeWndProc+0x369
025dfb48 7175276f 00010208 00000204 00000002
SHDOCVW!CNscTree::s_SubClassTreeWndProc+0x32
025dfba4 71752643 000c5ca8 00010208 00000204 COMCTL32!Ordinal413+0x253
025dfc00 77e12ca8 00010208 00000204 00000002 COMCTL32!Ordinal413+0x127
025dfc20 77e12dc5 717525ac 00010208 00000204 USER32!UserCallWinProc+0x18
025dfcac 77e12f0f 025dfef0 00000000 71162200
USER32!DispatchMessageWorker+0x2e4
025dfcb8 71162200 025dfef0 00000000 000c7a70 USER32!DispatchMessageW+0xb
025dfcd0 71181cf9 025dfef0 00000000 0006ea0c
browseui!TimedDispatchMessage+0x35
025dff28 71181acf 00000000 00000000 0006ea0c
browseui!BrowserThreadProc+0x2d5
025dffb4 7c4e987c 000c2bf0 00000000 0006ea0c
browseui!BrowserProtectedThreadProc+0xce
025dffec 00000000 71181a8b 000c2bf0 00000000 KERNEL32!BaseThreadStart+0x52
FOLLOWUP_IP:
SHDOCVW!CNscTree::_OnContextMenu+256
7107e558 6a00 push 0x0
SYMBOL_STACK_INDEX: 4
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: SHDOCVW!CNscTree::_OnContextMenu+256
MODULE_NAME: SHDOCVW
IMAGE_NAME: SHDOCVW.DLL
DEBUG_FLR_IMAGE_TIMESTAMP: 3d6e2bf2
STACK_COMMAND: ~10s ; kb
BUCKET_ID: ACCESS_VIOLATION_SHDOCVW!CNscTree::_OnContextMenu+256
Followup: MachineOwner
---------
The dmp file is a binary file. You will need to use one of the MS
debuggers to read it:
1) Download and install WinDBG - it comes in the debugger pack
(
http://www.microsoft.com/whdc/devtools/debugging/installx86.mspx)
2) Create a directory for the symbols, c:\symbols
3) Launch WinDBG (Start-->Programs-->Debugging Tools For Windows)
4) Open the .dmp file (File-->Open Crash Dump)
5) Set the symbol path: .symfix c:\symbols <enter>
6) Reset the symbols: .reload <enter>
7) Type !analyze -v <enter>
This will spew a bunch of information, but included will an analysis of
the most likely cause of the failure. If you need help understanding the
output, you can post it to the group.
BTW, this method also works on mini-dumps, kernel dumps, etc.
Pat