Microsoft (R) Windows Debugger Version 6.10.0003.233 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Robert\AppData\Local\Temp\Bentley\MicroStation\8.11\s0_tIuz1-SOIbXHdlUtOuQ\ExceptionHistory\ExceptionHistory-1\MiniDump.dmp] User Mini Dump File: Only registers, stack and portions of memory are available Symbol search path is: srv*c:\debugging\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Version 6002 (Service Pack 2) MP (2 procs) Free x86 compatible Product: WinNt, suite: SingleUserTS Personal Machine Name: Debug session time: Sun Oct 14 01:26:00.000 2012 (GMT+2) System Uptime: not available Process Uptime: 0 days 3:52:05.000 ................................................................ ................................................................ ................................................................ ................................................................ .............................................. This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr. (13e0.1318): Access violation - code c0000005 (first/second chance not available) eax=04f90000 ebx=00000004 ecx=00000007 edx=77f35cd4 esi=00000484 edi=08a2c130 eip=77f35cd4 esp=0022df74 ebp=0022df84 iopl=0 nv up ei pl zr na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 ntdll!KiFastSystemCallRet: 77f35cd4 c3 ret 0:000> !analyze -v ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* *** ERROR: Symbol file could not be found. Defaulted to export symbols for ustation.exe - *** ERROR: Symbol file could not be found. Defaulted to export symbols for mstnauto.dll - *** ERROR: Symbol file could not be found. Defaulted to export symbols for AutomationDGN.dll - *** ERROR: Symbol file could not be found. Defaulted to export symbols for IppGraLibs.dll - *** ERROR: Symbol file could not be found. Defaulted to export symbols for Bentley.liclib.dll - *** ERROR: Symbol file could not be found. Defaulted to export symbols for atiumdag.dll - Failed to load data access DLL, 0x80004005 Verify that 1) you have a recent build of the debugger (6.2.14 or newer) 2) the file mscordacwks.dll that matches your version of mscorwks.dll is in the version directory 3) or, if you are debugging a dump file, verify that the file mscordacwks___.dll is on your symbol path. 4) you are debugging on the same architecture as the dump file. For example, an IA64 dump file must be debugged on an IA64 machine. You can also run the debugger command .cordll to control the debugger's load of mscordacwks.dll. .cordll -ve -u -l will do a verbose reload. If that succeeds, the SOS command should work on retry. If you are debugging a minidump, you need to make sure that your executable path is pointing to mscorwks.dll as well. Failed to load data access DLL, 0x80004005 Verify that 1) you have a recent build of the debugger (6.2.14 or newer) 2) the file mscordacwks.dll that matches your version of mscorwks.dll is in the version directory 3) or, if you are debugging a dump file, verify that the file mscordacwks___.dll is on your symbol path. 4) you are debugging on the same architecture as the dump file. For example, an IA64 dump file must be debugged on an IA64 machine. You can also run the debugger command .cordll to control the debugger's load of mscordacwks.dll. .cordll -ve -u -l will do a verbose reload. If that succeeds, the SOS command should work on retry. If you are debugging a minidump, you need to make sure that your executable path is pointing to mscorwks.dll as well. ************************************************************************* *** *** *** *** *** Your debugger is not using the correct symbols *** *** *** *** In order for this command to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: kernel32!pNlsUserInfo *** *** *** ************************************************************************* ************************************************************************* *** *** *** *** *** Your debugger is not using the correct symbols *** *** *** *** In order for this command to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: kernel32!pNlsUserInfo *** *** *** ************************************************************************* FAULTING_IP: ustation_50000000!mdlModelRef_getViewMask+31 502ffef1 8b13 mov edx,dword ptr [ebx] EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff) ExceptionAddress: 502ffef1 (ustation_50000000!mdlModelRef_getViewMask+0x00000031) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 00000000 Attempt to read from address 00000000 PROCESS_NAME: ustation.exe ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 00000000 READ_ADDRESS: 00000000 FOLLOWUP_IP: ustation_50000000!mdlModelRef_getViewMask+31 502ffef1 8b13 mov edx,dword ptr [ebx] MANAGED_STACK: !dumpstack -EE Failed to load data access DLL, 0x80004005 Verify that 1) you have a recent build of the debugger (6.2.14 or newer) 2) the file mscordacwks.dll that matches your version of mscorwks.dll is in the version directory 3) or, if you are debugging a dump file, verify that the file mscordacwks___.dll is on your symbol path. 4) you are debugging on the same architecture as the dump file. For example, an IA64 dump file must be debugged on an IA64 machine. You can also run the debugger command .cordll to control the debugger's load of mscordacwks.dll. .cordll -ve -u -l will do a verbose reload. If that succeeds, the SOS command should work on retry. If you are debugging a minidump, you need to make sure that your executable path is pointing to mscorwks.dll as well. FAULTING_THREAD: 00001318 DEFAULT_BUCKET_ID: STATUS_ACCESS_VIOLATION PRIMARY_PROBLEM_CLASS: STATUS_ACCESS_VIOLATION BUGCHECK_STR: APPLICATION_FAULT_STATUS_ACCESS_VIOLATION LAST_CONTROL_TRANSFER: from 50110ded to 502ffef1 STACK_TEXT: WARNING: Stack unwind information not available. Following frames may be wrong. 0022f344 50110ded 00000000 0022f3a8 0022f378 ustation_50000000!mdlModelRef_getViewMask+0x31 0022f354 5067a2d0 0f60a118 00000000 00000003 ustation_50000000!mdlElmdscr_display+0xd 0022f378 5017877a 0022f3a8 00000000 10cf9838 ustation_50000000!mdlCnv_roundDoubleToLong+0x1a0 0022f3cc 5019d3f2 10cf9838 10df766d 00000002 ustation_50000000!mdlSystem_getLastMdlLoopRetval+0x28da 0022f484 5019d8b1 508cd2f0 00000002 0022f4ac ustation_50000000!mdlSystem_pumpMessages+0xe62 0022f49c 5060abfd 506a3e0c 508cd2f0 0022f4bc ustation_50000000!ustnmdl_asynchCallAny+0x31 0022f4d4 5051b082 00000000 00000003 0022f4ec ustation_50000000!mdlResource_openFileInUstation+0x15d 0022f504 501bfaa6 508aa508 508a6aa0 0f865368 ustation_50000000!mdlView_getViewport+0xf2 0022f524 501c03cf 0022fa84 0022f578 00000000 ustation_50000000!mdlLocate_getCurrentToolState+0x2b6 0022f53c 501bf850 50201b63 00000000 00000bb4 ustation_50000000!mdlWindow_cursorTurnOffInMainThread+0x24f 0022f560 502069ff 0022fa84 00000001 01b4ad28 ustation_50000000!mdlLocate_getCurrentToolState+0x60 0022fa40 50206a9b 0022fa84 00000001 506876f8 ustation_50000000!mdlSystem_parseFileNameAndModelName+0x2eff 0022fa58 5015c726 0022fa84 00000001 00000001 ustation_50000000!mdlInput_processQueuedInput+0x1b 0022faa0 501a6796 01b4ad50 00000000 0022fd2c ustation_50000000!mdlInput_standardKeyinActive+0xd6 0022fab0 501a6a44 00000000 00000001 0022fd50 ustation_50000000!mdlSystem_enterGraphicsExtended+0x15b6 0022fd2c 501e0891 00000001 0022fd50 00000000 ustation_50000000!mdlSystem_enterGraphicsExtended+0x1864 0022fe8c 501e090c 00400000 00000000 00000000 ustation_50000000!win32Intface_winMainStartFromForeignExecutable+0x1a1 0022feac 004036f7 00400000 00000000 00261e45 ustation_50000000!win32Intface_winMain+0x1c 0022fed4 004037c5 00400000 00000000 00261e45 ustation+0x36f7 0022fef8 0040143f 00400000 00000000 00261e45 ustation+0x37c5 0022ff88 7723d309 7ffdf000 0022ffd4 77f11603 ustation+0x143f 0022ff94 77f11603 7ffdf000 774380ea 00000000 kernel32!BaseThreadInitThunk+0xe 0022ffd4 77f115d6 004015c0 7ffdf000 00000000 ntdll!__RtlUserThreadStart+0x23 0022ffec 00000000 004015c0 7ffdf000 00000000 ntdll!_RtlUserThreadStart+0x1b STACK_COMMAND: ~0s; .ecxr ; kb SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: ustation_50000000!mdlModelRef_getViewMask+31 FOLLOWUP_NAME: MachineOwner MODULE_NAME: ustation_50000000 IMAGE_NAME: ustation.dll DEBUG_FLR_IMAGE_TIMESTAMP: 4a11a0c1 FAILURE_BUCKET_ID: STATUS_ACCESS_VIOLATION_c0000005_ustation.dll!mdlModelRef_getViewMask BUCKET_ID: APPLICATION_FAULT_STATUS_ACCESS_VIOLATION_ustation_50000000!mdlModelRef_getViewMask+31 WATSON_IBUCKET: 1377855099 WATSON_IBUCKETTABLE: 1 Followup: MachineOwner --------- 0:000> kbn # ChildEBP RetAddr Args to Child 00 0022df88 77f34340 77212422 0022dfec 000f0005 ntdll!KiFastSystemCallRet 01 0022df8c 77212422 0022dfec 000f0005 00000002 ntdll!NtCreateSection+0xc 02 0022dff4 77f34190 7723b0d6 00000f3c 0f0fd900 kernel32!CreateFileMappingA+0x135 03 0022e040 08a2e96f 0022e0a4 0022e05c 0022e054 ntdll!ZwClose+0xc 04 0022e074 08a2ee73 0022e6c8 0c0aed18 0022e0a4 dbghelp!GenTryGetCorMemory+0x4f 05 0022e2dc 08a2f54d 0022e6c8 08a2f57f 08a2c130 dbghelp!GenGetCorMemory+0x3b3 06 0022e6a4 0c02ad20 00000000 00000000 0c0aed18 dbghelp!GenGetProcessInfo+0x6bd WARNING: Frame IP not in any known module. Following frames may be wrong. 07 0022e6b0 0c0aed18 00000000 00000000 0c02ad20 0xc02ad20 08 00000000 00000000 00000000 00000000 00000000 0xc0aed18 0:000> .exr 0xffffffffffffffff ExceptionAddress: 502ffef1 (ustation_50000000!mdlModelRef_getViewMask+0x00000031) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 00000000 Attempt to read from address 00000000 0:000> lmvm ustation_50000000 start end module name 50000000 509a7000 ustation_50000000 (export symbols) ustation.dll Loaded symbol image file: ustation.dll Mapped memory image file: C:\Program Files\Bentley\MicroStation\ustation.dll Image path: C:\Program Files\Bentley\MicroStation\ustation.dll Image name: ustation.dll Has CLR image header, track-debug-data flag not set Timestamp: Mon May 18 19:54:09 2009 (4A11A0C1) CheckSum: 0095E5E1 ImageSize: 009A7000 File version: 8.11.5.17 Product version: 8.11.5.17 File flags: 2 (Mask 3F) Pre-release File OS: 40004 NT Win32 File type: 2.0 Dll File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Bentley Systems Inc. ProductName: PseudoStation InternalName: .dll OriginalFilename: .dll ProductVersion: 08.11.05.17 FileVersion: 08.11.05.17 FileDescription: for Windows LegalCopyright: Copyright © 2009 Bentley Systems Inc.