中国开发网: 论坛: 程序员情感CBD: 贴子 637469
核弹头
技术贴,闲着没事的都来帮帮忙啊。
偶的程序,在本机测试正常,在开发机上运行正常,但在生产机上就出现进程莫名其妙的宕掉,用了drwtsn32跟踪出如下结果来,但不晓得如何分析吖

Application exception occurred:
App: C:\Program Files\EPP\EPPXFS3.exe (pid=628)
When: 31/05/2008 @ 15:26:33.328
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: PVTM1
User Name: Administrator
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 15 Model 2 Stepping 9
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Uniprocessor Free
Registered Organization: idbi bank
Registered Owner: IDBI

*----> Task List <----*
0 System Process
4 System
396 smss.exe
464 csrss.exe
488 winlogon.exe
532 services.exe
544 lsass.exe
788 svchost.exe
848 svchost.exe
884 svchost.exe
932 svchost.exe
1004 svchost.exe
1204 spoolsv.exe
1308 GhostStartService.exe
1600 alg.exe
1812 CSCSERV.EXE
1848 TRCWDMN.EXE
252 Explorer.EXE
460 SOUNDMAN.EXE
448 GhostStartTrayApp.exe
684 CCRM.exe
1760 FWMAIN32.EXE
1556 PVAGECON.EXE
844 FwLoadPm.EXE
628 EPPXFS3.exe
712 FwLoadPm.EXE
1164 CCDialog.exe
1620 FwLoadPm.EXE
2260 svchost.exe
2344 drwtsn32.exe

*----> Module List <----*
(0000000000320000 - 000000000032a000: C:\PROTOPAS\BIN\TRCERR.dll
(0000000000330000 - 000000000033f000: C:\Program Files\EPP\EPPDrv.dll
(0000000000390000 - 00000000003d0000: C:\WINDOWS\system32\XFS_SUPP.DLL
(0000000000400000 - 0000000000436000: C:\Program Files\EPP\EPPXFS3.exe
(0000000000b80000 - 0000000000b9b000: C:\WINDOWS\system32\XFS_CONF.DLL
(0000000000ba0000 - 0000000000bd8000: C:\WOSASSP\BIN\FAP32.DLL
(0000000010000000 - 0000000010052000: C:\WINDOWS\system32\MSXFS.dll
(0000000059a60000 - 0000000059b01000: C:\WINDOWS\system32\DBGHELP.dll
(000000005d090000 - 000000005d127000: C:\WINDOWS\system32\COMCTL32.dll
(0000000060b00000 - 0000000060b15000: C:\CSCW32\DLL\CSCWRCH.dll
(0000000060c00000 - 0000000060c19000: C:\CSCW32\DLL\CSCWINI.dll
(0000000061200000 - 0000000061221000: C:\CSCW32\DLL\cscwtls.dll
(0000000063900000 - 000000006393b000: C:\CSCW32\DLL\TRCWAPI.dll
(0000000073000000 - 0000000073026000: C:\WINDOWS\system32\WINSPOOL.DRV
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\imagehlp.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\Apphelp.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\MSVCRT.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f56000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll

*----> State Dump for Thread Id 0x284 <----*

eax=00127678 ebx=77d4c064 ecx=001276a8 edx=000000af esi=00429f08 edi=00429f08
eip=7c90eb94 esp=0012bdf0 ebp=0012be14 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** WARNING: Unable to verify checksum for C:\Program Files\EPP\EPPXFS3.exe
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\EPP\EPPXFS3.exe -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0012be14 00413f4f 00429f08 00000000 00000000 ntdll!KiFastSystemCallRet
00429f08 00000404 00000000 6bc04f18 0002f9d7 EPPXFS3+0x13f4f

*----> Raw Stack Dump <----*
000000000012bdf0 9b 91 d4 77 85 ea d6 77 - 08 9f 42 00 00 00 00 00 ...w...w..B.....
000000000012be00 00 00 00 00 00 00 00 00 - 64 c0 d4 77 08 9f 42 00 ........d..w..B.
000000000012be10 d8 9e 42 00 08 9f 42 00 - 4f 3f 41 00 08 9f 42 00 ..B...B.O?A...B.
000000000012be20 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000012be30 9c be 12 00 58 72 41 00 - 00 00 00 00 9c be 12 00 ....XrA.........
000000000012be40 90 be 12 00 04 00 00 00 - 00 00 00 00 01 00 00 00 ................
000000000012be50 00 00 00 00 00 00 00 00 - ba 49 41 00 04 00 00 00 .........IA.....
000000000012be60 d8 9e 42 00 d8 9e 42 00 - ff ff ff ff c0 ff 12 00 ..B...B.........
000000000012be70 00 00 00 00 9c be 12 00 - 88 39 43 00 00 00 00 00 .........9C.....
000000000012be80 60 be 12 00 08 ff 12 00 - c8 b0 41 00 00 00 00 00 `.........A.....
000000000012be90 c0 ff 12 00 2b 40 40 00 - d8 9e 42 00 b0 c6 41 00 ....+@@...B...A.
000000000012bea0 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000012beb0 01 00 00 00 00 00 00 00 - 10 01 01 00 00 00 00 00 ................
000000000012bec0 18 00 00 00 9d 75 d5 77 - ff ff ff ff 00 00 00 00 .....u.w........
000000000012bed0 00 00 00 00 00 00 00 00 - 66 00 00 00 66 00 00 00 ........f...f...
000000000012bee0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000012bef0 00 00 00 00 00 00 00 00 - a9 00 02 00 50 82 d2 00 ............P...
000000000012bf00 02 00 00 00 84 c7 41 00 - 00 00 00 00 00 00 00 00 ......A.........
000000000012bf10 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000012bf20 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x8a0 <----*

eax=00000000 ebx=00fabf14 ecx=00000002 edx=00020000 esi=00d28250 edi=6bc04fd8
eip=004030ed esp=00fabdf0 ebp=6bc05ff8 iopl=0 nv up ei pl nz ac po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000216

function: EPPXFS3
004030d7 048d add al,0x8d
004030d9 9c pushfd
004030da 8c2401 mov [ecx+eax],fs
004030dd 0000 add [eax],al
004030df 53 push ebx
004030e0 52 push edx
004030e1 6a06 push 0x6
004030e3 e808530000 call EPPXFS3+0x83f0 (004083f0)
004030e8 8b03 mov eax,[ebx]
004030ea 8b4d02 mov ecx,[ebp+0x2]
FAULT ->004030ed 894802 mov [eax+0x2],ecx ds:0023:00000002=????????
004030f0 8b13 mov edx,[ebx]
004030f2 668b4500 mov ax,[ebp]
004030f6 668902 mov [edx],ax
004030f9 8b44241c mov eax,[esp+0x1c]
004030fd 40 inc eax
004030fe 33db xor ebx,ebx
00403100 8944241c mov [esp+0x1c],eax
00403104 8b542420 mov edx,[esp+0x20]
00403108 668b4d00 mov cx,[ebp]
0040310c 8d44244c lea eax,[esp+0x4c]

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
6bc05ff8 00000000 6bc06000 00000000 11111111 EPPXFS3+0x30ed

*----> Raw Stack Dump <----*
0000000000fabdf0 bc ba 12 00 20 27 d3 00 - 80 ff fa 00 c8 00 00 00 .... '..........
0000000000fabe00 00 00 00 01 00 00 00 00 - 58 4f c0 6b 00 00 00 00 ........XO.k....
0000000000fabe10 18 50 c0 6b 31 00 00 00 - 00 00 00 00 01 00 00 00 .P.k1...........
0000000000fabe20 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fabe30 ff 1f 00 00 a0 01 01 00 - 1a 50 c0 6b 00 00 00 00 .........P.k....
0000000000fabe40 00 00 00 00 00 00 00 00 - 00 00 00 00 44 72 69 76 ............Driv
0000000000fabe50 65 72 2d 3e 53 74 61 72 - 74 43 6c 65 61 72 45 6e er->StartClearEn
0000000000fabe60 74 72 79 28 29 20 2d 3e - 20 30 00 00 00 00 00 00 try() -> 0......
0000000000fabe70 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fabe80 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fabe90 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fabea0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fabeb0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fabec0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fabed0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fabee0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fabef0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fabf00 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fabf10 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fabf20 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

相关信息:


欢迎光临本社区,您还没有登录,不能发贴子。请在 这里登录