So I built a tiny test app, and I see the exact same problems. This is with all the default settings for VS2008, SP1. How is anyone debugging on x64? Is no one else ever seeing these issues?
-Jeff
-----Original Message-----
From: xxxxx@lists.osr.com [mailto:xxxxx@lists.osr.com] On Behalf Of Jeff Curless
Sent: Tuesday, June 23, 2009 1:41 PM
To: Kernel Debugging Interest List
Subject: RE: Re:[windbg] Weird stack
Yes this is the latest release. I know the PDB is loaded, but the !lmi output says that the debug data is not mapped, which is what I meant. If I connect to the process with Windbg from user-mode, it apparently maps it no problem, which makes sense.
So this is probably an issue of the information being paged out/not mapped and the kernel mode debugger not being able to get to it. Now I thought specifying the image path would help this, since Windbg could just read the debug data from the local image on disk.
-Jeff
-----Original Message-----
From: xxxxx@lists.osr.com [mailto:xxxxx@lists.osr.com] On Behalf Of Skywing
Sent: Monday, June 22, 2009 9:45 PM
To: Kernel Debugging Interest List
Subject: RE: Re:[windbg] Weird stack
No, it loaded symbols (“Symbol Type - PDB”). I assume this is the latest release?
- S
-----Original Message-----
From: Jeff Curless
Sent: Monday, June 22, 2009 15:17
To: Kernel Debugging Interest List
Subject: RE: Re:[windbg] Weird stack
Here is the info, looks like there is a problem due to debug data not being mapped. Any idea how to fix that?
kd> !lmi mydll.dll
Loaded Module Info: [mydll.dll]
Module: mydll
Base Address: 0000000180000000
Image Name: mydll.dll
Machine Type: 34404 (X64)
Time Stamp: 4a3f57c8 Mon Jun 22 06:07:04 2009
Size: 2da000
CheckSum: 0
Characteristics: 2022
Debug Data Dirs: Type Size VA Pointer
CODEVIEW 83, 26474c, 26394c [Debug data not mapped] - can’t validate symbols, if present.
Image Type: FILE - Image read successfully from debugger.
mydll.dll
Symbol Type: PDB - Symbols loaded successfully from symbol search path.
e:\mydll\x64\debug\Mydll.pdb
Compiler: Resource - front end [0.0 bld 0] - back end [9.0 bld 21022]
Load Report: private symbols & lines, not source indexed
e:\mydll\x64\debug\Mydll.pdb
kd> !dh 0000000180000000
File Type: DLL
FILE HEADER VALUES
8664 machine (X64)
8 number of sections
4A3F57C8 time date stamp Mon Jun 22 06:07:04 2009
0 file pointer to symbol table
0 number of symbols
F0 size of optional header
2022 characteristics
Executable
App can handle >2gb addresses
DLL
OPTIONAL HEADER VALUES
20B magic #
9.00 linker version
1CAE00 size of code
10AE00 size of initialized data
0 size of uninitialized data
10ECF0 address of entry point
1000 base of code
----- new -----
0000000180000000 image base
1000 section alignment
200 file alignment
2 subsystem (Windows GUI)
5.02 operating system version
0.00 image version
5.02 subsystem version
2DA000 size of image
400 size of headers
0 checksum
0000000000100000 size of stack reserve
0000000000001000 size of stack commit
0000000000100000 size of heap reserve
0000000000001000 size of heap commit
0 DLL characteristics
295090 [173] address [size] of Export Directory
2CE000 [3C] address [size] of Import Directory
2D4000 [626] address [size] of Resource Directory
2B3000 [179AC] address [size] of Exception Directory
0 [0] address [size] of Security Directory
2D5000 [2C08] address [size] of Base Relocation Directory
1CD480 [1C] address [size] of Debug Directory
0 [0] address [size] of Description Directory
0 [0] address [size] of Special Directory
0 [0] address [size] of Thread Storage Directory
0 [0] address [size] of Load Configuration Directory
0 [0] address [size] of Bound Import Directory
2CE770 [730] address [size] of Import Address Table Directory
2D0000 [1E0] address [size] of Delay Import Directory
0 [0] address [size] of COR20 Header Directory
0 [0] address [size] of Reserved Directory
I’m assuming that the address of the exception directory is a correct RVA based off the image start so:
kd> dq 0000001802b3000<br>00000001
802b3000 ??????????? ????????
???
00000001802b3010 ????????
??? ???????????<br>00000001
802b3020 ??????????? ????????
???
00000001802b3030 ????????
??? ???????????<br>00000001
802b3040 ??????????? ????????
???
00000001802b3050 ????????
??? ???????????<br>00000001
802b3060 ??????????? ????????
???
00000001802b3070 ????????
??? ???????????<br><br>Looks like it's paged out.<br><br>-Jeff<br><br>-----Original Message-----<br>From: xxxxx@lists.osr.com [mailto:xxxxx@lists.osr.com] On Behalf Of Skywing<br>Sent: Monday, June 22, 2009 5:58 PM<br>To: Kernel Debugging Interest List<br>Subject: RE: Re:[windbg] Weird stack<br><br>Yes, that's Bad(tm). That will cause stack tracing to behave incorrectly. Do you have symbols loaded for mydll? (What's !lmi mydll show?)<br><br>Can you read the exception directory (from !dh mydll -- look for the exception directory listing there to find its RVA and length) from mydll?<br><br>- S<br><br>-----Original Message-----<br>From: xxxxx@lists.osr.com [mailto:xxxxx@lists.osr.com] On Behalf Of Jeff Curless<br>Sent: Monday, June 22, 2009 2:08 PM<br>To: Kernel Debugging Interest List<br>Subject: RE: Re:[windbg] Weird stack<br><br>No I don't:<br><br>kd> .fnent mydll!myfunc<br>No function entry for 00000001
800515f0
-Jeff
-----Original Message-----
From: xxxxx@lists.osr.com [mailto:xxxxx@lists.osr.com] On Behalf Of Scott Noone
Sent: Monday, June 22, 2009 4:53 PM
To: Kernel Debugging Interest List
Subject: Re:[windbg] Weird stack
“Skywing” wrote in message
news:xxxxx@windbg…
>You should just use k instead of kv on amd64 as that is completely
>unreadable.
It’s important to have a really wide monitor when dealing with x64 dumps
I’m also entirely addicted to “kc” now, which shows a much more reasonable
call stack:
0: kd> kc
Call Site
intelppm!C1Halt
intelppm!AcpiC1Idle
nt!PopProcessorIdle
nt!KiIdleLoop
nt!KiSystemStartup
0x0
“Jeff Curless” wrote in message news:xxxxx@windbg…
>Also if I do this:
>Kd> k
>Child-SP RetAddr Call Site
>000000000b29d690 00000000
02a0f360 mydll!myfunction+0x70 [my.cpp @ 128]
>000000000b29d698 00000000
00000000 0x2a0f360
Very weird. If you do a
.fnent mydll!myfunction
Do you get a result?
-scott
–
Scott Noone
Consulting Associate
OSR Open Systems Resources, Inc.
http://www.osronline.com
“Skywing” wrote in message
news:xxxxx@windbg…
You should just use k instead of kv on amd64 as that is completely
unreadable. (Especially on a handheld screen!)
That being said, my guess is that you have an intervening frame for which
unwind information couldn’t be pulled.
Unwinding on amd64 requires reading unwind metadata for each frame. This
can be problematic in kd because of things becoming paged out.
- If part of the loaded module list is paged out, or you did not load user
mode symbols beforehand, then the debugger won’t have a binary for a given
frame’s RIP and unwinding will break* because no unwind metadata can be
found.
- If symbols cannot be loaded and the unwind metadata for a binary is paged
out (not uncommon), then unwinding will break* because no unwind metadata
can be found.
- If you don’t have symbol load notifications enabled (or otherwise weren’t
there to get the notification at the time a particular binary was loaded),
and the image headers are paged out, then the debugger won’t be able to get
unwind metadata and unwinding will break*.
- If the caller was JIT’d code, then unwinding will break* in kernel mode as
the kernel debugger doesn’t support loading the JIT unwind helper DLL
(AFAIK).
*: I believe the debugger will treat these scenarios according to the
specification for a leaf function on amd64. This is going to be incorrect
for a function that isn’t a leaf function.
In your case, we see mydll!myfunction1 returning to 00000000002ad368 (your<br>first example), or mydll!myfunc3 00000000
0750d9e8 (your second example),
neither of which the debugger has associated with a loaded module. That
means the debugger probably gets lost at those respective frames because it
can’t access the unwind table for those functions.
- S
-----Original Message-----
From: xxxxx@lists.osr.com
[mailto:xxxxx@lists.osr.com] On Behalf Of Jeff Curless
Sent: Monday, June 22, 2009 12:56 PM
To: Kernel Debugging Interest List
Subject: RE:[windbg] Weird stack
Here is more. It appears to definitely be something to do with my PDBs as
the Microsoft ones from the symbol server look correct…
# Child-SP RetAddr : Args to Child
: Call Site
00 000000000750d9b0 00000000
0750d9e8 : 000000000750d9e8 00000000
0750da78
000000000750d9d8 cccccccc
cccccccc : mydll!myfunc3
01 000000000750d9b8 00000000
0750d9e8 : 000000000750da78 00000000
0750d9d8
cccccccccccccccc 00000000
07ab0d28 : 0x750d9e8
02 000000000750d9c0 00000000
0750da78 : 000000000750d9d8 cccccccc
cccccccc
0000000007ab0d28 cccccc00
cccccccc : 0x750d9e8
03 000000000750d9c8 00000000
0750d9d8 : cccccccccccccccc 00000000
07ab0d28
cccccc00cccccccc 00000001
802b0268 : 0x750da78
04 000000000750d9d0 cccccccc
cccccccc : 0000000007ab0d28 cccccc00
cccccccc
00000001802b0268 cccccccc
cccccccc : 0x750d9d8
05 000000000750d9d8 00000000
07ab0d28 : cccccc00cccccccc 00000001
802b0268
cccccccccccccccc cccccccc
cccccccc : 0xcccccccccccccccc<br>06 00000000
0750d9e0 cccccc00cccccccc : 00000001
802b0268 cccccccccccccccc<br>cccccccc
cccccccc cccccccccccccccc : 0x7ab0d28<br>07 00000000
0750d9e8 00000001802b0268 : cccccccc
cccccccc cccccccccccccccc<br>cccccccc
cccccccc fffffffffffffffe : 0xcccccc00
cccccccc
08 000000000750d9f0 cccccccc
cccccccc : cccccccccccccccc cccccccc
cccccccc
fffffffffffffffe 00000000
0750d9e8 : mydll!myfunc2
09 000000000750d9f8 cccccccc
cccccccc : cccccccccccccccc ffffffff
fffffffe
000000000750d9e8 00000000
0750d9e8 : 0xcccccccccccccccc<br>0a 00000000
0750da00 cccccccccccccccc : ffffffff
fffffffe 000000000750d9e8<br>00000000
0750d9e8 cccccccc00000000 : 0xcccccccc
cccccccc
0b 000000000750da08 ffffffff
fffffffe : 000000000750d9e8 00000000
0750d9e8
cccccccc00000000 cccccccc
cccccccc : 0xcccccccccccccccc<br>0c 00000000
0750da10 000000000750d9e8 : 00000000
0750d9e8 cccccccc00000000<br>cccccccc
cccccccc cccccccccccccccc : 0xffffffff
fffffffe
0d 000000000750da18 00000000
0750d9e8 : cccccccc00000000 cccccccc
cccccccc
cccccccccccccccc cccccccc
cccccccc : 0x750d9e8
0e 000000000750da20 cccccccc
00000000 : cccccccccccccccc cccccccc
cccccccc
cccccccccccccccc 00000000
0750dac0 : 0x750d9e8
0f 000000000750da28 cccccccc
cccccccc : cccccccccccccccc cccccccc
cccccccc
000000000750dac0 00000001
800247f0 : 0xcccccccc00000000<br>10 00000000
0750da30 cccccccccccccccc : cccccccc
cccccccc 000000000750dac0<br>00000001
800247f0 0000000000f6fd60 : 0xcccccccc
cccccccc
11 000000000750da38 cccccccc
cccccccc : 000000000750dac0 00000001
800247f0
0000000000f6fd60 00000000
0750da78 : 0xcccccccccccccccc<br>12 00000000
0750da40 000000000750dac0 : 00000001
800247f0 0000000000f6fd60<br>00000000
0750da78 cccccccccccccccc : 0xcccccccc
cccccccc
13 000000000750da48 00000001
800247f0 : 0000000000f6fd60 00000000
0750da78
cccccccccccccccc cccccccc
cccccccc : 0x750dac0
14 000000000750da50 00000000
00f6fd60 : 000000000750da78 cccccccc
cccccccc
cccccccccccccccc cccccccc
cccccccc : mydll!myfunc1
15 000000000750da58 00000000
0750da78 : cccccccccccccccc cccccccc
cccccccc
cccccccccccccccc 00000000
07ab09a8 : 0xf6fd60
16 000000000750da60 cccccccc
cccccccc : cccccccccccccccc cccccccc
cccccccc
0000000007ab09a8 cccccccc
cccccccc : 0x750da78
17 000000000750da68 cccccccc
cccccccc : cccccccccccccccc 00000000
07ab09a8
cccccccccccccccc cccccccc
cccccccc : 0xcccccccccccccccc<br>18 00000000
0750da70 cccccccccccccccc : 00000000
07ab09a8 cccccccccccccccc<br>cccccccc
cccccccc cccccccccccccccc : 0xcccccccc
cccccccc
19 000000000750da78 00000000
07ab09a8 : cccccccccccccccc cccccccc
cccccccc
cccccccccccccccc cccccccc
cccccccc : 0xcccccccccccccccc<br>1a 00000000
0750da80 cccccccccccccccc : cccccccc
cccccccc cccccccccccccccc<br>cccccccc
cccccccc cccccccccccccccc : 0x7ab09a8<br>1b 00000000
0750da88 cccccccccccccccc : cccccccc
cccccccc cccccccccccccccc<br>cccccccc
cccccccc fffffffffffffffe : 0xcccccccc
cccccccc
1c 000000000750da90 cccccccc
cccccccc : cccccccccccccccc cccccccc
cccccccc
fffffffffffffffe cccccccc
cccccccc : 0xcccccccccccccccc<br>1d 00000000
0750da98 cccccccccccccccc : cccccccc
cccccccc fffffffffffffffe<br>cccccccc
cccccccc cccccccccccccccc : 0xcccccccc
cccccccc
1e 000000000750daa0 cccccccc
cccccccc : fffffffffffffffe cccccccc
cccccccc
cccccccccccccccc 00000000
07a99680 : 0xcccccccccccccccc<br>1f 00000000
0750daa8 fffffffffffffffe : cccccccc
cccccccc cccccccccccccccc<br>00000000
07a99680 000007fefdaf528f : 0xcccccccc
cccccccc
20 000000000750dab0 cccccccc
cccccccc : cccccccccccccccc 00000000
07a99680
000007fefdaf528f 00000000
00f6b760 : 0xfffffffffffffffe<br>21 00000000
0750dab8 cccccccccccccccc : 00000000
07a99680 000007fefdaf528f<br>00000000
00f6b760 0000000005e9b827 : 0xcccccccc
cccccccc
22 000000000750dac0 00000000
07a99680 : 000007fefdaf528f 00000000
00f6b760
0000000005e9b827 00000000
052f62b4 : 0xcccccccccccccccc<br>23 00000000
0750dac8 000007fefdaf528f : 00000000
00f6b760 0000000005e9b827<br>00000000
052f62b4 0000000000000400 : 0x7a99680<br>24 00000000
0750dad0 000007fefdaf54d0 : 00000000
0750df90 000007fe05e9b827<br>00000000
052f62b4 000000000750de80 : OLEAUT32!IDispatch_Invoke_Stub+0xcf<br>25 00000000
0750db70 000007fefdbd599c : 000007fe
fdb40082 000000000750df90<br>000007fe
fdb43a50 000007fefdb426d8 :<br>OLEAUT32!IDispatch_RemoteInvoke_Thunk+0x60<br>26 00000000
0750dbe0 000007fefdc64442 : 00000000
00000000 0000000007ab0798<br>00000000
07a96200 000007fefdb625c0 : RPCRT4!NdrStubCall2+0xc0b<br>27 00000000
0750e1e0 000007fefdafb24e : 00000000
00000001 0000000000000000<br>00000000
07ab07a8 0000000007ab0770 : RPCRT4!CStdStubBuffer_Invoke+0x9a<br>28 00000000
0750e210 000007fefda18809 : 00000000
00000000 0000000000000000<br>00000000
00105f40 00000000001107a0 : OLEAUT32!CStubWrapper::Invoke+0x9e<br>29 00000000
0750e240 000007fefda1877f : 00000000
0010f8a0 0000000000117534<br>00000000
001107a0 00000001801f7e48 : ole32!SyncStubInvoke+0x5d<br>2a 00000000
0750e2b0 000007fefd8e85ab : 00000000
0010f8a0 0000000005334ca0<br>00000000
07a0d720 0000000000000001 : ole32!StubInvoke+0xdb<br>2b 00000000
0750e360 000007fefd8e9bf5 : cccccccc
00000000 0000000000117534<br>00000000
07ab0770 000000000010f8a0 : ole32!CCtxComChnl::ContextInvoke+0x19f<br>2c 00000000
0750e4e0 000007fefda18a83 : 00000000
05334ca0 0000000000000000<br>00000000
07a0d720 0000000000000000 : ole32!STAInvoke+0x91<br>2d 00000000
0750e530 000007fefda183b7 : 00000000
d0908070 0000000005334ca0<br>00000000
0010fa30 00000000052f62b0 : ole32!AppInvoke+0x193<br>2e 00000000
0750e5a0 000007fefda18b15 : 00000000
0010f810 0000000000000400<br>00000000
00000000 0000000000000000 : ole32!ComInvokeWithLockAndIPID+0x407<br>2f 00000000
0750e720 000007fefd8e9ad9 : 00000000
00105f40 0000000000000000<br>00000000
000ff008 000000000010f810 : ole32!ComInvoke+0x85<br>30 00000000
0750e750 000007fefd8e9982 : 00000000
05334ca0 000000000010f818<br>00000000
00000400 0000000000000000 : ole32!ThreadDispatch+0x29<br>31 00000000
0750e780 0000000076f5d24a : 00000000
00000624 00000000000006cc<br>00000000
00000000 0000000007a4fea0 : ole32!ThreadWndProc+0xaa<br>32 00000000
0750e800 0000000076f5d39e : 00000000
0750e980 000007fefd8e98d8<br>00000000
00000000 0000000001068ae0 : USER32!UserCallWinProcCheckWow+0x1ad<br>33 00000000
0750e8c0 000007fef67e7a79 : 00000000
052e9500 00000000052e9500<br>000007fe
fd8e98d8 0000000000000100 : USER32!DispatchMessageWorker+0x389<br>34 00000000
0750e940 000007fef68805ee : 00000000
000f2a60 0000000000000000<br>00000000
00000000 0000000003440880 :<br>IEFRAME!CBrowserFrame::FrameMessagePump+0x411<br>35 00000000
0750ea00 000007fef685bd65 : 00000000
00000000 0000000000062801<br>00000000
052e9500 0000000000000000 : IEFRAME!BrowserThreadProc+0x14d<br>36 00000000
0750eaa0 000007fef685bdcf : 10127334
00000001 0000000000000000<br>00000000
00000000 0000000000000000 : IEFRAME!BrowserNewThreadProc+0x98<br>37 00000000
0750eae0 0000000076e3495d : 00000000
00000000 0000000000000000<br>00000000
00000000 0000000000000000 : IEFRAME!SHOpenFolderWindow+0x1df<br>38 00000000
0750fb90 0000000077038791 : 00000000
00000000 0000000000000000<br>00000000
00000000 0000000000000000 : kernel32!BaseThreadInitThunk+0xd<br>39 00000000
0750fbc0 0000000000000000 : 00000000
00000000 0000000000000000<br>00000000
00000000 0000000000000000 : ntdll!RtlUserThreadStart+0x1d<br><br>Thanks,<br>-Jeff<br><br>-----Original Message-----<br>From: xxxxx@lists.osr.com<br>[mailto:xxxxx@lists.osr.com] On Behalf Of Jeff Curless<br>Sent: Monday, June 22, 2009 3:47 PM<br>To: Kernel Debugging Interest List<br>Subject: [windbg] Weird stack<br><br>When I am kernel debugging on x64 and I am looking at a user-mode stack I<br>get a lot of funky output:<br><br>RetAddr : Args to Child<br>: Call Site<br>00000001
800247f0 : 00000000002ad368 cccccccc
cccccccc cccccccccccccccc<br>cccccccc
cccccccc : mydll!myfunction2
00000000002ad368 : cccccccc
cccccccc cccccccccccccccc cccccccc
cccccccc
cccccccccccccccc : mydll!myfunction1<br>cccccccc
cccccccc : cccccccccccccccc cccccccc
cccccccc cccccccccccccccc<br>00000000
00000000 : 0x2ad368
cccccccccccccccc : cccccccc
cccccccc cccccccccccccccc 00000000
00000000
cccccccccccccccc : 0xcccccccc
cccccccc
cccccccccccccccc : cccccccc
cccccccc 0000000000000000 cccccccc
cccccccc
cccccccccccccccc : 0xcccccccc
cccccccc
cccccccccccccccc : 00000000
00000000 cccccccccccccccc cccccccc
cccccccc
cccccccccccccccc : 0xcccccccc
cccccccc
0000000000000000 : cccccccc
cccccccc cccccccccccccccc cccccccc
cccccccc
cccccccccccccccc : 0xcccccccc
cccccccc
This is a debug build of user-mode code, with matching PDBs. Has anyone
else seen this? It makes debugging a lot more of a pain to say the least…
Newest WinDbg, PDBs built with newest VS2008, newest service pack. VMWare
VM running Windows Vista x64, SP1.
Thanks!
-Jeff
—
WINDBG is sponsored by OSR
For our schedule of WDF, WDM, debugging and other seminars visit:
http://www.osr.com/seminars
To unsubscribe, visit the List Server section of OSR Online at
http://www.osronline.com/page.cfm?name=ListServer
—
WINDBG is sponsored by OSR
For our schedule of WDF, WDM, debugging and other seminars visit:
http://www.osr.com/seminars
To unsubscribe, visit the List Server section of OSR Online at
http://www.osronline.com/page.cfm?name=ListServer
—
WINDBG is sponsored by OSR
For our schedule of WDF, WDM, debugging and other seminars visit:
http://www.osr.com/seminars
To unsubscribe, visit the List Server section of OSR Online at http://www.osronline.com/page.cfm?name=ListServer
—
WINDBG is sponsored by OSR
For our schedule of WDF, WDM, debugging and other seminars visit:
http://www.osr.com/seminars
To unsubscribe, visit the List Server section of OSR Online at http://www.osronline.com/page.cfm?name=ListServer
—
WINDBG is sponsored by OSR
For our schedule of WDF, WDM, debugging and other seminars visit:
http://www.osr.com/seminars
To unsubscribe, visit the List Server section of OSR Online at http://www.osronline.com/page.cfm?name=ListServer
—
WINDBG is sponsored by OSR
For our schedule of WDF, WDM, debugging and other seminars visit:
http://www.osr.com/seminars
To unsubscribe, visit the List Server section of OSR Online at http://www.osronline.com/page.cfm?name=ListServer
—
WINDBG is sponsored by OSR
For our schedule of WDF, WDM, debugging and other seminars visit:
http://www.osr.com/seminars
To unsubscribe, visit the List Server section of OSR Online at http://www.osronline.com/page.cfm?name=ListServer
—
WINDBG is sponsored by OSR
For our schedule of WDF, WDM, debugging and other seminars visit:
http://www.osr.com/seminars
To unsubscribe, visit the List Server section of OSR Online at http://www.osronline.com/page.cfm?name=ListServer