
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [c:\Users\Administrator\AppData\Local\CrashDumps\js-32-prof-windows-42c95d88aaaa.exe.4652.dmp]
User Mini Dump File: Only registers, stack and portions of memory are available

Symbol search path is: *** Invalid ***
****************************************************************************
* Symbol loading may be unreliable without a symbol search path.           *
* Use .symfix to have the debugger choose a symbol path.                   *
* After setting your symbol path, use .reload to refresh symbol locations. *
****************************************************************************
Executable search path is:
Windows 7 Version 9600 MP (16 procs) Free x86 compatible
Product: Server, suite: TerminalServer SingleUserTS
Machine Name:
Debug session time: Tue Oct  4 12:35:05.000 2016 (UTC + 0:00)
System Uptime: not available
Process Uptime: not available
......................................
This dump file has a breakpoint exception stored in it.
The stored exception information can be accessed via .ecxr.
eax=00000000 ebx=00000000 ecx=5f7b6461 edx=00000000 esi=00000003 edi=00000003
eip=774ec7ec esp=020ddc64 ebp=020dddec iopl=0         nv up ei pl nz na po nc
cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00000202
Unable to load image C:\Windows\System32\ntdll.dll, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntdll.dll
*** ERROR: Module load completed but symbols could not be loaded for ntdll.dll
ntdll+0x3c7ec:
774ec7ec c21400          ret     14h
0:000> cdb: Reading initial command '$<c:\Users\Administrator\funfuzz\util\cdbCmds.txt'
0:000> .echo Toggle for 32-bit/64-bit modes
Toggle for 32-bit/64-bit modes
0:000> .echo See http://people.mozilla.org/~aklotz/windbgcheatsheet.html
See http://people.mozilla.org/~aklotz/windbgcheatsheet.html
0:000> !wow64exts.sw
!wow64exts.sw : command invalid on non-64bit target
0:000> .echo Display lines in stack trace
Display lines in stack trace
0:000> .lines
Line number information will be loaded
0:000> .echo .ecxr switches to the exception context frame
.ecxr switches to the exception context frame
0:000> .ecxr
eax=06fda948 ebx=020de8dc ecx=5f7b6461 edx=00000000 esi=1c2fbaab edi=020de910
eip=1c2fbbb0 esp=020de910 ebp=00000018 iopl=0         nv up ei pl zr na pe cy
cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00000247
1c2fbbb0 cc              int     3
*** WARNING: Unable to verify timestamp for ntdll.dll
*** ERROR: Module load completed but symbols could not be loaded for ntdll.dll
*** WARNING: Unable to verify timestamp for kernel32.dll
*** ERROR: Module load completed but symbols could not be loaded for kernel32.dll
*** WARNING: Unable to verify checksum for js-32-prof-windows-42c95d88aaaa.exe
0:000> .echo Inspect program counter, equivalent of gdb's "x/i $pc"
Inspect program counter, equivalent of gdb's "x/i $pc"
0:000> u
ntdll+0x3c7ec:
774ec7ec c21400          ret     14h
774ec7ef 90              nop
774ec7f0 b85b000000      mov     eax,5Bh
774ec7f5 64ff15c0000000  call    dword ptr fs:[0C0h]
774ec7fc c21000          ret     10h
774ec7ff 90              nop
774ec800 b85c000000      mov     eax,5Ch
774ec805 64ff15c0000000  call    dword ptr fs:[0C0h]
0:000> .echo Inspect eip (32-bit) register, equivalent of gdb's "x/b $eax"
Inspect eip (32-bit) register, equivalent of gdb's "x/b $eax"
0:000> db @@c++(@eip) L4
1c2fbbb0  cc f2 0f 10                                      ....
0:000> .echo Inspect rip (64-bit) register, equivalent of gdb's "x/b $rax"
Inspect rip (64-bit) register, equivalent of gdb's "x/b $rax"
0:000> db @@c++(@rip) L8
Bad register error at '@rip) '
0:000> .echo To switch frames: .frame /r /c <frame number>
To switch frames: .frame /r /c <frame number>
0:000> .echo Then inspect locals using: dv <locals in this frame>
Then inspect locals using: dv <locals in this frame>
0:000> .echo Running !analyze
Running !analyze
0:000> !analyze -v
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

***** OS symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Your debugger is not using the correct symbols                 ***
***                                                                   ***
***    In order for this command to work properly, your symbol path   ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ntdll!_PEB                                    ***
***                                                                   ***
*************************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
*                                                                   *
* The Symbol Path can be set by:                                    *
*   using the _NT_SYMBOL_PATH environment variable.                 *
*   using the -y <symbol_path> argument when starting the debugger. *
*   using .sympath and .sympath+                                    *
*********************************************************************
*** WARNING: Unable to verify timestamp for KERNELBASE.dll
*** ERROR: Module load completed but symbols could not be loaded for KERNELBASE.dll

FAULTING_IP:
+82
1c2fbbb0 cc              int     3

EXCEPTION_RECORD:  ffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 1c2fbbb0
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 1
Parameter[0]: 00000000

DEFAULT_BUCKET_ID:  WRONG_SYMBOLS

PROCESS_NAME:  js-32-prof-windows-42c95d88aaaa.exe

ADDITIONAL_DEBUG_TEXT:
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.

FAULTING_MODULE: 774b0000 ntdll

DEBUG_FLR_IMAGE_TIMESTAMP:  57f38c83

ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION}  Breakpoint  A breakpoint has been reached.

EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid

EXCEPTION_PARAMETER1:  00000000

MOD_LIST: <ANALYSIS/>

FAULTING_THREAD:  00001560

PRIMARY_PROBLEM_CLASS:  WRONG_SYMBOLS

BUGCHECK_STR:  APPLICATION_FAULT_WRONG_SYMBOLS

LAST_CONTROL_TRANSFER:  from 0125f102 to 1c2fbbb0

STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
020de914 0125f102 09256748 020de9c8 00000044 0x1c2fbbb0
020de9c8 ffffff82 00200000 ffffff81 ffffff81 js_32_prof_windows_42c95d88aaaa!js::jit::PrepareOsrTempData+0x82 [c:\users\administrator\trees\mozilla-central\js\src\jit\baselineic.cpp @ 121]
020dea38 00e9a9a8 00fd1326 08e10000 020deb48 0xffffff82
020deaa8 010a7b82 08e36838 020deb88 00ff1fd0 js_32_prof_windows_42c95d88aaaa!js::AddTypePropertyId+0x1d8 [c:\users\administrator\trees\mozilla-central\js\src\vm\typeinference.cpp @ 2811]
00000000 00000000 00000000 00000000 00000000 js_32_prof_windows_42c95d88aaaa!JSObject::makeLazyGroup+0x212 [c:\users\administrator\trees\mozilla-central\js\src\vm\objectgroup.cpp @ 344]


STACK_COMMAND:  ~0s; .ecxr ; kb

FOLLOWUP_IP:
js_32_prof_windows_42c95d88aaaa!js::jit::PrepareOsrTempData+82 [c:\users\administrator\trees\mozilla-central\js\src\jit\baselineic.cpp @ 121]
0125f102 83c418          add     esp,18h

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  js_32_prof_windows!js::jit::PrepareOsrTempData+82

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: js_32_prof_windows_42c95d88aaaa

IMAGE_NAME:  js-32-prof-windows-42c95d88aaaa.exe

BUCKET_ID:  WRONG_SYMBOLS

FAILURE_BUCKET_ID:  WRONG_SYMBOLS_80000003_js-32-prof-windows-42c95d88aaaa.exe!js::jit::PrepareOsrTempData

Followup: MachineOwner
---------

0:000> .echo Backtrace of faulting thread, limited to 50 frames
Backtrace of faulting thread, limited to 50 frames
0:000> ~#kn 50
# ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
00 020dddec 75027b89 ntdll+0x3c7ec
01 020dde08 750807bf kernel32+0x17b89
02 020de248 75080295 kernel32+0x707bf
03 020de260 74eef605 kernel32+0x70295
04 020de2ec 7755f154 KERNELBASE+0xbf605
05 020dfd40 7750ab5a ntdll+0xaf154
06 020dfd50 00000000 ntdll+0x5ab5a
0:000> .echo Backtrace, limited to 50 frames (should execute after .ecxr)
Backtrace, limited to 50 frames (should execute after .ecxr)
0:000> kb 50
ChildEBP RetAddr  Args to Child
WARNING: Stack unwind information not available. Following frames may be wrong.
020dddec 75027b89 00000003 020dde30 00000000 ntdll+0x3c7ec
020dde08 750807bf 00000003 020dde30 00000000 kernel32+0x17b89
020de248 75080295 00000000 00000001 00000000 kernel32+0x707bf
020de260 74eef605 020de31c 00000001 5a68f989 kernel32+0x70295
020de2ec 7755f154 020de31c 774f0830 020dfd40 KERNELBASE+0xbf605
020dfd40 7750ab5a ffffffff 774f000a 00000000 ntdll+0xaf154
020dfd50 00000000 013a7c34 ff105000 00000000 ntdll+0x5ab5a
0:000> q
quit: