Using the OutputStackTrace() in dbgeng.dll outputs the stack twic- e?

I’ve been playing with the dbgeng.dll SDK sample. Using the sample code in
the SDK the OutputStackTrace() call seems to result in the stack trace being
output twice. Any idea whats up here?

If I use the Execute() call with the “kb” command passed in the stack is
only output correctly (once). I’ve attached the output of the SDK sample
code run against a dump.

Thanks for any help,

Ed Smith
Mangosoft Corporation



Symbol search path is:
\avalon\attach_Ed\ARP_Examples\NTClientAssert_3\NT;\avalon\attachments\sy
mbols_4.0sp5

Loading Dump File
[\avalon\attach_Ed\ARP_Examples\NTClientAssert_3\NT\CR20647$S42.1.dmp5]
Kernel Dump File: Full address space is available

Microsoft (R) Windows 2000 Kernel Debugger
Version 2.0.0016.0
Copyright (C) Microsoft Corporation. 1981-2000

Loaded kdextx86 extension DLL
Loaded dbghelp extension DLL
Symbol search path is:
\avalon\attach_Ed\ARP_Examples\NTClientAssert_3\NT;\avalon\attachments\sy
mbols_4.0sp5
Executable search path is:
KdDebuggerDataBlock not available - must be an NT4 dump file
Windows NT 4 Kernel Version 1381 (Service Pack 5) UP Free x86 compatible
Debug session time: Wed Feb 07 22:56:48 2001
Kernel base = 0x80100000 PsLoadedModuleList = 0x80150560
KdDebuggerDataBlock not available - must be an NT4 dump file
Loading Kernel Symbols
…Unable to read image header for Floppy.SYS at fc6f8000 - HRESULT
0x80004005
…Unable to read image header for Null.SYS at fc9c9000 - HRESULT 0x80004005
…Unable to read image header for Beep.SYS at fc9ca000 - HRESULT 0x80004005

Loading unloaded module list
Unable to examine unloaded module list
Loading User Symbols

****************************************************************************
***
*
*
* Bugcheck Analysis
*
*
*
****************************************************************************
***
Bugcheck code 00560325
Arguments 00000001 00000000 00000000 00000000

ChildEBP RetAddr Args to Child
fe9d3414 fe847878 00000001 fe8bd3cc fe8bd39a clmind!palLastRites+0xb1
fe9d3468 fe84882f 80408ef4 e13c271c fe9d3400
clmind!DOcbDirCache__AddNames+0x80
fe9d348c fe8170d8 80408ef4 e13c271c 00000000
clmind!DOcbDirCachePtr__AddNames+0x7a
fe9d34c4 fe8111a1 80408ef4 e13c271c 804e8130 clmind!DOcb__AddEntry+0x60
fe9d36a0 fe80f80e 80408ef4 ffa9f64c 00000002
clmind!DVcb__RemoteTraverseUnmarshal+0x10b
fe9d3760 fe85b6c7 80408ef4 813de464 0012019f clmind!DVcb__CreateInode+0x3d
fe9d3ae8 80111b39 804e8130 805ab168 fe9d3e10 clmind!MindCreate+0x464
fe9d3afc 8017281c 804e0d88 fe9d3e0c 00000000 ntoskrnl!IofCallDriver+0x37
fe9d3c08 80172e72 804e8130 00000000 fe9d3d08 ntoskrnl!IopParseDevice+0x7cc
fe9d3c40 80191119 804e0d88 00000000 fe9d3d08 ntoskrnl!IopParseFile+0x44
fe9d3cc8 8018d089 00000020 fe9d3dc4 00000040
ntoskrnl!ObpLookupObjectName+0xc9
fe9d3ddc 801643e2 00fcfd94 00000000 9d3e0001
ntoskrnl!ObOpenObjectByName+0xbb
fe9d3e90 8016916c 00fcfdf4 c0100080 00fcfd94 ntoskrnl!IoCreateFile+0x436
fe9d3ed0 8013dde4 00fcfdf4 c0100080 00fcfd94 ntoskrnl!NtCreateFile+0x2e
fe9d3ed0 77f677df 00fcfdf4 c0100080 00fcfd94 ntoskrnl!KiSystemService+0xc4
00fcfd54 77f10f15 00fcfdf4 c0100080 00fcfd94 ntdll!NtCreateFile+0xb
00fcfdf8 77f10b78 7ffddc00 c0000000 00000000 KERNEL32!CreateFileW+0x396
*** ERROR: Module load completed but symbols could not be loaded for
loadgen.exe
00fcfe28 0041ec2d 00c3ced0 c0000000 00000000 KERNEL32!CreateFileA+0x6a
00c3ced0 4665766f 2e656c69 0066676c 5c000066 loadgen+0x1ec2d
4d5f474c 00000000 00000000 00000000 00000000 0x4665766f

First 50 frames of the call stack:

ChildEBP RetAddr

00 fe9d3414 fe847878 clmind!palLastRites+0xb1
01 fe9d3468 fe84882f clmind!DOcbDirCache__AddNames+0x80
02 fe9d348c fe8170d8 clmind!DOcbDirCachePtr__AddNames+0x7a
03 fe9d34c4 fe8111a1 clmind!DOcb__AddEntry+0x60
04 fe9d36a0 fe80f80e clmind!DVcb__RemoteTraverseUnmarshal+0x10b
05 fe9d3760 fe85b6c7 clmind!DVcb__CreateInode+0x3d
06 fe9d3ae8 80111b39 clmind!MindCreate+0x464
07 fe9d3afc 8017281c ntoskrnl!IofCallDriver+0x37
08 fe9d3c08 80172e72 ntoskrnl!IopParseDevice+0x7cc
09 fe9d3c40 80191119 ntoskrnl!IopParseFile+0x44
0a fe9d3cc8 8018d089 ntoskrnl!ObpLookupObjectName+0xc9
0b fe9d3ddc 801643e2 ntoskrnl!ObOpenObjectByName+0xbb
0c fe9d3e90 8016916c ntoskrnl!IoCreateFile+0x436
0d fe9d3ed0 8013dde4 ntoskrnl!NtCreateFile+0x2e
0e fe9d3ed0 77f677df ntoskrnl!KiSystemService+0xc4
0f 00fcfd54 77f10f15 ntdll!NtCreateFile+0xb
10 00fcfdf8 77f10b78 KERNEL32!CreateFileW+0x396
11 00fcfe28 0041ec2d KERNEL32!CreateFileA+0x6a
12 00c3ced0 4665766f loadgen+0x1ec2d
13 4d5f474c 00000000 0x4665766f

ChildEBP RetAddr

00 fe9d3414 fe847878 clmind!palLastRites+0xb1
01 fe9d3468 fe84882f clmind!DOcbDirCache__AddNames+0x80
02 fe9d348c fe8170d8 clmind!DOcbDirCachePtr__AddNames+0x7a
03 fe9d34c4 fe8111a1 clmind!DOcb__AddEntry+0x60
04 fe9d36a0 fe80f80e clmind!DVcb__RemoteTraverseUnmarshal+0x10b
05 fe9d3760 fe85b6c7 clmind!DVcb__CreateInode+0x3d
06 fe9d3ae8 80111b39 clmind!MindCreate+0x464
07 fe9d3afc 8017281c ntoskrnl!IofCallDriver+0x37
08 fe9d3c08 80172e72 ntoskrnl!IopParseDevice+0x7cc
09 fe9d3c40 80191119 ntoskrnl!IopParseFile+0x44
0a fe9d3cc8 8018d089 ntoskrnl!ObpLookupObjectName+0xc9
0b fe9d3ddc 801643e2 ntoskrnl!ObOpenObjectByName+0xbb
0c fe9d3e90 8016916c ntoskrnl!IoCreateFile+0x436
0d fe9d3ed0 8013dde4 ntoskrnl!NtCreateFile+0x2e
0e fe9d3ed0 77f677df ntoskrnl!KiSystemService+0xc4
0f 00fcfd54 77f10f15 ntdll!NtCreateFile+0xb
10 00fcfdf8 77f10b78 KERNEL32!CreateFileW+0x396
11 00fcfe28 0041ec2d KERNEL32!CreateFileA+0x6a
12 00c3ced0 4665766f loadgen+0x1ec2d
13 4d5f474c 00000000 0x4665766f


You are currently subscribed to windbg as: $subst(‘Recip.EmailAddr’)
To unsubscribe send a blank email to leave-windbg-$subst(‘Recip.MemberIDChar’)@lists.osr.com