Sybase NNTP forums - End Of Life (EOL)

The NNTP forums from Sybase - forums.sybase.com - are now closed.

All new questions should be directed to the appropriate forum at the SAP Community Network (SCN).

Individual products have links to the respective forums on SCN, or you can go to SCN and search for your product in the search box (upper right corner) to find your specific developer center.

Reading a Dr. Watson Log Generated by ASA 8

3 posts in General Discussion Last posting was on 2003-07-08 18:52:01.0Z
Doug Stone Posted on 2003-07-02 17:37:29.0Z
From: "Doug Stone" <nospamdstone@res-q.com>
Subject: Reading a Dr. Watson Log Generated by ASA 8
Date: Wed, 2 Jul 2003 10:37:29 -0700
Lines: 796
X-Priority: 3
X-MSMail-Priority: Normal
X-Newsreader: Microsoft Outlook Express 6.00.2800.1158
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
Message-ID: <OlZYsFMQDHA.348@forums-2-dub>
Newsgroups: ianywhere.public.general
NNTP-Posting-Host: user-112vkdk.biz.mindspring.com 66.47.209.180
Path: forums-1-dub!forums-master.sybase.com!forums-2-dub.sybase.com
Xref: forums-1-dub ianywhere.public.general:1273
Article PK: 3516

Hi. I'm wondering if there is a way for non-assembly language programmers
to glean useful information from a Dr. Watson log file.
For instance, a customer of Sybase and my company just sent me the Dr.
Watson information below. I see that the App pid is 326--which one finds
later in this text is the number assigned to dbsrv8. The text below also
indicates that dbsrv8 was responsible for two Dr. Watsons on 6/29/2003.
I've only pasted a couple of hundred lines from each error. The full text
of these events is over 10k lines.

Does anyone know how to obtain other useful information from a Dr. Watson
log of dbsrv8?

Thanks,
Doug

*************begin dr watson log

Application exception occurred:
App: (pid=326)
When: 6/29/2003 @ 5:41:3.417
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: DSCNTS10
User Name: SYSTEM
Number of Processors: 2
Processor Type: x86 Family 6 Model 7 Stepping 2
Windows Version: 4.0
Current Build: 1381
Service Pack: 6
Current Type: Multiprocessor Free
Registered Organization: DSCH
Registered Owner: Computer Services

*----> Task List <----*
0 Idle.exe
2 System.exe
28 smss.exe
40 csrss.exe
46 winlogon.exe
50 services.exe
53 lsass.exe
78 spoolss.exe
88 RpcSs.exe
101 msdtc.exe
122 AfaAgent.exe
127 amgrsrvc.exe
145 AWHOST32.exe
156 MCSHIELD.exe
160 VsTskMgr.exe
178 mnmsrvc.exe
186 sqlservr.exe
173 naimas32.exe
195 pstores.exe
199 MSTask.exe
205 timeserv.exe
213 winmgmt.exe
222 WinVNC.exe
245 beremote.exe
249 inetinfo.exe
315 LOCATOR.exe
242 nddeagnt.exe
337 explorer.exe
143 rundll32.exe
326 DBSRV8.exe
343 drwtsn32.exe
0 _Total.exe

(00400000 - 00414000)
(77f60000 - 77fbe000) dll\ntdll.dbg
(65560000 - 65b26000)
(77dc0000 - 77dff000) dll\advapi32.dbg
(77f00000 - 77f5e000) dll\kernel32.dbg
(77e70000 - 77ec5000) dll\user32.dbg
(77ed0000 - 77efc000) dll\gdi32.dbg
(77e10000 - 77e67000) dll\rpcrt4.dbg
(776d0000 - 776d8000) dll\wsock32.dbg
(776b0000 - 776c4000) dll\ws2_32.dbg
(78000000 - 78040000)
(776a0000 - 776a7000) dll\ws2help.dbg
(77d80000 - 77db2000) dll\comdlg32.dbg
(70970000 - 70b18000) SHELL32.dbg
(70bd0000 - 70c1c000) SHLWAPI.dbg
(71700000 - 7178a000) COMCTL32.dbg
(10000000 - 1000e000)
(77b20000 - 77bd7000) dll\ole32.dbg
(00c60000 - 00cd6000)
(77bf0000 - 77bf7000) dll\rpcltc1.dbg
(21440000 - 21440000)
(77660000 - 7766f000) dll\msafd.dbg
(77690000 - 77699000) dll\wshtcpip.dbg
(74ff0000 - 74ffe000) dll\rnr20.dbg

State Dump for Thread Id 0x96

eax=77de0065 ebx=0012fc08 ecx=00000032 edx=00000000 esi=0000005c
edi=00000000
eip=77f67f07 esp=0012fb28 ebp=0012fb90 iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: ZwReadFile
77f67efc b886000000 mov eax,0x86
77f67f01 8d542404 lea edx,[esp+0x4]
ss:0107e52f=????????
77f67f05 cd2e int 2e
77f67f07 c22400 ret 0x24
77f67f0a 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012fb90 77dd8a35 0000005c 00136190 0000021a 0012fbc0 ntdll!ZwReadFile
0012fbc4 77dd8481 0000005c 00136190 0000021a 0012fc08
advapi32!RegisterServiceCtrlHandlerA
0012fc28 77dd829e 0000005c 00136190 0000021a 0012fdbd
advapi32!StartServiceCtrlDispatcherW
0012fc4c 657723d3 0012fc70 77f13e50 0012ffc0 7ffdf000
advapi32!StartServiceCtrlDispatcherA
00000001 00000000 00000000 00000000 00000000 00000000 !TestWndProc

*----> Raw Stack Dump <----*
0012fb28 a6 d2 f0 77 5c 00 00 00 - 00 00 00 00 00 00 00 00
...w\...........
0012fb38 00 00 00 00 64 fb 12 00 - 90 61 13 00 1a 02 00 00
....d....a......
0012fb48 00 00 00 00 00 00 00 00 - 00 00 00 00 90 61 13 00
.............a..
0012fb58 08 fc 12 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0012fb68 90 fb 12 00 d8 fb 12 00 - 04 00 00 00 00 00 00 00
................
0012fb78 50 fb 12 00 00 00 00 00 - 18 fc 12 00 44 b9 f3 77
P...........D..w
0012fb88 40 ca f3 77 ff ff ff ff - c4 fb 12 00 35 8a dd 77
@..w........5..w
0012fb98 5c 00 00 00 90 61 13 00 - 1a 02 00 00 c0 fb 12 00
\....a..........
0012fba8 00 00 00 00 00 00 00 00 - a0 41 13 00 ac 41 13 00
.........A...A..
0012fbb8 5c 00 00 00 d8 fb 12 00 - 00 00 00 00 28 fc 12 00
\...........(...
0012fbc8 81 84 dd 77 5c 00 00 00 - 90 61 13 00 1a 02 00 00
...w\....a......
0012fbd8 08 fc 12 00 90 61 13 00 - 00 00 00 00 1a 02 00 00
.....a..........
0012fbe8 3c 01 00 00 90 61 13 00 - 00 00 00 00 01 00 00 00
<....a..........
0012fbf8 94 61 13 00 00 00 00 00 - 01 00 00 00 d0 42 13 00
.a...........B..
0012fc08 00 00 00 00 00 00 00 00 - dc fb 12 00 04 00 00 00
................
0012fc18 b0 ff 12 00 c4 10 de 77 - d8 de de 77 ff ff ff ff
.......w...w....
0012fc28 4c fc 12 00 9e 82 dd 77 - 5c 00 00 00 90 61 13 00
L......w\....a..
0012fc38 1a 02 00 00 bd fd 12 00 - 01 00 00 00 03 00 00 00
................
0012fc48 5c 00 00 00 01 00 00 00 - d3 23 77 65 70 fc 12 00
\........#wep...
0012fc58 50 3e f1 77 c0 ff 12 00 - 00 f0 fd 7f 00 00 00 00
P>.w............

State Dump for Thread Id 0x13c

eax=00000022 ebx=00000000 ecx=00eef8c0 edx=00000000 esi=0000003c
edi=00000000
eip=77f682db esp=00eefa54 ebp=00eefa78 iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: NtWaitForSingleObject
77f682d0 b8c5000000 mov eax,0xc5
77f682d5 8d542404 lea edx,[esp+0x4]
ss:01e3e45b=????????
77f682d9 cd2e int 2e
77f682db c20c00 ret 0xc
77f682de 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00eefa78 77f04f37 0000003c ffffffff 00000000 6577224e
ntdll!NtWaitForSingleObject
001341a8 4e415341 725f7359 00717365 0072005f 00730065
kernel32!WaitForSingleObject

*----> Raw Stack Dump <----*
00eefa54 a0 cc f1 77 3c 00 00 00 - 00 00 00 00 00 00 00 00
...w<...........
00eefa64 01 00 00 00 45 c6 f1 77 - 00 00 00 00 ac fa ee 00
....E..w........
00eefa74 04 00 00 00 a8 41 13 00 - 37 4f f0 77 3c 00 00 00
.....A..7O.w<...
00eefa84 ff ff ff ff 00 00 00 00 - 4e 22 77 65 3c 00 00 00
........N"we<...
00eefa94 ff ff ff ff ff ff ff ff - a0 41 13 00 ec ff ee 00
.........A......
00eefaa4 a0 41 13 00 07 00 00 00 - 53 75 63 63 65 73 73 66
.A......Successf
00eefab4 75 6c 6c 79 20 73 74 61 - 72 74 65 64 20 73 65 72 ully started
ser
00eefac4 76 69 63 65 20 41 53 41 - 4e 59 73 5f 72 65 73 71 vice
ASANYs_resq
00eefad4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefae4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefaf4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb04 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb14 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb24 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb34 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb44 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb54 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb64 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb74 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb84 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................

State Dump for Thread Id 0x39

eax=00001110 ebx=77e85f88 ecx=0000040a edx=00000000 esi=00fefc24
edi=00fefc24
eip=77e72397 esp=00fefbc4 ebp=00fefbe8 iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: InvalidateRect
77e7237e b89e110000 mov eax,0x119e
77e72383 8d542404 lea edx,[esp+0x4]
ss:01f3e5cb=????????
77e72387 cd2e int 2e
77e72389 c20c00 ret 0xc
77e7238c b885110000 mov eax,0x1185
77e72391 8d542404 lea edx,[esp+0x4]
ss:01f3e5cb=????????
77e72395 cd2e int 2e
77e72397 c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00fefbe8 656df251 00fefc24 00000000 00000000 00000000 user32!InvalidateRect
77e71c02 01e80824 c2fffff4 8b550004 0cec83ec fc458d53 !DF_Value_copy_set

*----> Raw Stack Dump <----*
00fefbc4 15 27 e7 77 24 fc fe 00 - 00 00 00 00 00 00 00 00
.'.w$...........
00fefbd4 00 00 00 00 e4 fb fe 00 - e5 26 e7 77 24 fc fe 00
.........&.w$...
00fefbe4 24 fc fe 00 02 1c e7 77 - 51 f2 6d 65 24 fc fe 00
$......wQ.me$...
00fefbf4 00 00 00 00 00 00 00 00 - 00 00 00 00 f4 42 e7 77
.............B.w
00fefc04 00 00 00 00 c4 fd fe 00 - f2 f3 6d 65 00 00 00 00
..........me....
00fefc14 f8 2a 00 00 88 26 a5 00 - b0 f2 6d 65 c4 fd fe 00
.*...&....me....
00fefc24 e6 00 28 00 e1 04 00 00 - 00 00 00 00 00 00 00 00
..(.............
00fefc34 b5 ae 12 16 f6 01 00 00 - 8d 00 00 00 72 65 73 71
............resq
00fefc44 73 65 72 76 65 72 20 2d - 20 41 64 61 70 74 69 76 server -
Adaptiv
00fefc54 65 20 53 65 72 76 65 72 - 20 41 6e 79 77 68 65 72 e Server
Anywher
00fefc64 65 00 00 00 b0 fc fe 00 - 00 10 00 00 04 00 00 00
e...............
00fefc74 18 2a a5 00 70 27 a5 00 - 20 05 a5 00 ff ff fe 7f .*..p'..
.......
00fefc84 88 26 a5 00 00 10 00 00 - dc 28 80 65 a8 ff fe 00
.&.......(.e....
00fefc94 44 b9 f3 77 84 fc fe 00 - ff ff ff ff 42 4c f0 77
D..w........BL.w
00fefca4 90 4c f0 77 ff ff ff ff - d4 fc fe 00 d0 fc fe 00
.L.w............
00fefcb4 04 01 00 00 c8 fc fe 00 - 88 26 a5 00 38 99 13 00
.........&..8...
00fefcc4 dc 28 80 65 04 00 00 00 - 00 00 00 00 00 10 00 00
.(.e............
00fefcd4 00 e0 77 01 0c fd fe 00 - 9a db f1 77 4c 99 13 00
..w........wL...
00fefce4 e0 22 a5 00 c0 f3 67 65 - 00 00 78 01 88 26 a5 00
."....ge..x..&..
00fefcf4 76 c2 f0 77 a8 00 00 00 - 00 00 00 00 20 23 a5 00 v..w........
#..

State Dump for Thread Id 0xaa

eax=10000000 ebx=77f05f7d ecx=00000000 edx=00000000 esi=ffffffff
edi=16280589
eip=77f67f77 esp=0117fe20 ebp=0117fe4c iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: ZwRemoveIoCompletion
77f67f6c b88d000000 mov eax,0x8d
77f67f71 8d542404 lea edx,[esp+0x4]
ss:020ce827=????????
77f67f75 cd2e int 2e
77f67f77 c21400 ret 0x14
77f67f7a 8bc0 mov eax,eax

*******************next dr watson.

Application exception occurred:
App: (pid=327)
When: 6/29/2003 @ 10:36:44.622
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: DSCNTS10
User Name: SYSTEM
Number of Processors: 2
Processor Type: x86 Family 6 Model 7 Stepping 2
Windows Version: 4.0
Current Build: 1381
Service Pack: 6
Current Type: Multiprocessor Free
Registered Organization: DSCH
Registered Owner: Computer Services

*----> Task List <----*
0 Idle.exe
2 System.exe
28 smss.exe
40 csrss.exe
46 winlogon.exe
50 services.exe
53 lsass.exe
78 spoolss.exe
88 RpcSs.exe
101 msdtc.exe
122 AfaAgent.exe
127 amgrsrvc.exe
145 AWHOST32.exe
156 MCSHIELD.exe
160 VsTskMgr.exe
178 mnmsrvc.exe
186 sqlservr.exe
173 naimas32.exe
195 pstores.exe
199 MSTask.exe
205 timeserv.exe
213 winmgmt.exe
222 WinVNC.exe
245 beremote.exe
249 inetinfo.exe
315 LOCATOR.exe
242 nddeagnt.exe
337 explorer.exe
143 rundll32.exe
327 DBSRV8.exe
331 drwtsn32.exe
0 _Total.exe

(00400000 - 00414000)
(77f60000 - 77fbe000) dll\ntdll.dbg
(65560000 - 65b26000)
(77dc0000 - 77dff000) dll\advapi32.dbg
(77f00000 - 77f5e000) dll\kernel32.dbg
(77e70000 - 77ec5000) dll\user32.dbg
(77ed0000 - 77efc000) dll\gdi32.dbg
(77e10000 - 77e67000) dll\rpcrt4.dbg
(776d0000 - 776d8000) dll\wsock32.dbg
(776b0000 - 776c4000) dll\ws2_32.dbg
(78000000 - 78040000)
(776a0000 - 776a7000) dll\ws2help.dbg
(77d80000 - 77db2000) dll\comdlg32.dbg
(70970000 - 70b18000) SHELL32.dbg
(70bd0000 - 70c1c000) SHLWAPI.dbg
(71700000 - 7178a000) COMCTL32.dbg
(10000000 - 1000e000)
(77b20000 - 77bd7000) dll\ole32.dbg
(00c60000 - 00cd6000)
(77bf0000 - 77bf7000) dll\rpcltc1.dbg
(21440000 - 21440000)
(77660000 - 7766f000) dll\msafd.dbg
(77690000 - 77699000) dll\wshtcpip.dbg
(74ff0000 - 74ffe000) dll\rnr20.dbg

State Dump for Thread Id 0x148

eax=77de0065 ebx=0012fc08 ecx=00000032 edx=00000000 esi=0000005c
edi=00000000
eip=77f67f07 esp=0012fb28 ebp=0012fb90 iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: ZwReadFile
77f67efc b886000000 mov eax,0x86
77f67f01 8d542404 lea edx,[esp+0x4]
ss:0107e52f=????????
77f67f05 cd2e int 2e
77f67f07 c22400 ret 0x24
77f67f0a 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012fb90 77dd8a35 0000005c 00136190 0000021a 0012fbc0 ntdll!ZwReadFile
0012fbc4 77dd8481 0000005c 00136190 0000021a 0012fc08
advapi32!RegisterServiceCtrlHandlerA
0012fc28 77dd829e 0000005c 00136190 0000021a 0012fdbd
advapi32!StartServiceCtrlDispatcherW
0012fc4c 657723d3 0012fc70 77f13e50 0012ffc0 7ffdf000
advapi32!StartServiceCtrlDispatcherA
00000001 00000000 00000000 00000000 00000000 00000000 !TestWndProc

*----> Raw Stack Dump <----*
0012fb28 a6 d2 f0 77 5c 00 00 00 - 00 00 00 00 00 00 00 00
...w\...........
0012fb38 00 00 00 00 64 fb 12 00 - 90 61 13 00 1a 02 00 00
....d....a......
0012fb48 00 00 00 00 00 00 00 00 - 00 00 00 00 90 61 13 00
.............a..
0012fb58 08 fc 12 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0012fb68 90 fb 12 00 d8 fb 12 00 - 04 00 00 00 00 00 00 00
................
0012fb78 50 fb 12 00 00 00 00 00 - 18 fc 12 00 44 b9 f3 77
P...........D..w
0012fb88 40 ca f3 77 ff ff ff ff - c4 fb 12 00 35 8a dd 77
@..w........5..w
0012fb98 5c 00 00 00 90 61 13 00 - 1a 02 00 00 c0 fb 12 00
\....a..........
0012fba8 00 00 00 00 00 00 00 00 - a0 41 13 00 ac 41 13 00
.........A...A..
0012fbb8 5c 00 00 00 d8 fb 12 00 - 00 00 00 00 28 fc 12 00
\...........(...
0012fbc8 81 84 dd 77 5c 00 00 00 - 90 61 13 00 1a 02 00 00
...w\....a......
0012fbd8 08 fc 12 00 90 61 13 00 - 00 00 00 00 1a 02 00 00
.....a..........
0012fbe8 57 01 00 00 90 61 13 00 - 00 00 00 00 01 00 00 00
W....a..........
0012fbf8 94 61 13 00 00 00 00 00 - 01 00 00 00 d0 42 13 00
.a...........B..
0012fc08 00 00 00 00 00 00 00 00 - dc fb 12 00 04 00 00 00
................
0012fc18 b0 ff 12 00 c4 10 de 77 - d8 de de 77 ff ff ff ff
.......w...w....
0012fc28 4c fc 12 00 9e 82 dd 77 - 5c 00 00 00 90 61 13 00
L......w\....a..
0012fc38 1a 02 00 00 bd fd 12 00 - 01 00 00 00 03 00 00 00
................
0012fc48 5c 00 00 00 01 00 00 00 - d3 23 77 65 70 fc 12 00
\........#wep...
0012fc58 50 3e f1 77 c0 ff 12 00 - 00 f0 fd 7f 00 00 00 00
P>.w............

State Dump for Thread Id 0x157

eax=00000022 ebx=00000000 ecx=00eef8c0 edx=00000000 esi=0000003c
edi=00000000
eip=77f682db esp=00eefa54 ebp=00eefa78 iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: NtWaitForSingleObject
77f682d0 b8c5000000 mov eax,0xc5
77f682d5 8d542404 lea edx,[esp+0x4]
ss:01e3e45b=????????
77f682d9 cd2e int 2e
77f682db c20c00 ret 0xc
77f682de 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00eefa78 77f04f37 0000003c ffffffff 00000000 6577224e
ntdll!NtWaitForSingleObject
001341a8 4e415341 725f7359 00717365 0072005f 00730065
kernel32!WaitForSingleObject

*----> Raw Stack Dump <----*
00eefa54 a0 cc f1 77 3c 00 00 00 - 00 00 00 00 00 00 00 00
...w<...........
00eefa64 01 00 00 00 45 c6 f1 77 - 00 00 00 00 ac fa ee 00
....E..w........
00eefa74 04 00 00 00 a8 41 13 00 - 37 4f f0 77 3c 00 00 00
.....A..7O.w<...
00eefa84 ff ff ff ff 00 00 00 00 - 4e 22 77 65 3c 00 00 00
........N"we<...
00eefa94 ff ff ff ff ff ff ff ff - a0 41 13 00 ec ff ee 00
.........A......
00eefaa4 a0 41 13 00 07 00 00 00 - 53 75 63 63 65 73 73 66
.A......Successf
00eefab4 75 6c 6c 79 20 73 74 61 - 72 74 65 64 20 73 65 72 ully started
ser
00eefac4 76 69 63 65 20 41 53 41 - 4e 59 73 5f 72 65 73 71 vice
ASANYs_resq
00eefad4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefae4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefaf4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb04 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb14 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb24 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb34 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb44 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb54 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb64 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb74 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
00eefb84 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................

State Dump for Thread Id 0x145

eax=00fef730 ebx=77e85f88 ecx=00fef740 edx=00000000 esi=00fefc24
edi=00fefc24
eip=77e72397 esp=00fefbc4 ebp=00fefbe8 iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: InvalidateRect
77e7237e b89e110000 mov eax,0x119e
77e72383 8d542404 lea edx,[esp+0x4]
ss:01f3e5cb=????????
77e72387 cd2e int 2e
77e72389 c20c00 ret 0xc
77e7238c b885110000 mov eax,0x1185
77e72391 8d542404 lea edx,[esp+0x4]
ss:01f3e5cb=????????
77e72395 cd2e int 2e
77e72397 c21400 ret 0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00fefbe8 656df251 00fefc24 00000000 00000000 00000000 user32!InvalidateRect
77e71c02 01e80824 c2fffff4 8b550004 0cec83ec fc458d53 !DF_Value_copy_set

*----> Raw Stack Dump <----*
00fefbc4 15 27 e7 77 24 fc fe 00 - 00 00 00 00 00 00 00 00
.'.w$...........
00fefbd4 00 00 00 00 e4 fb fe 00 - e5 26 e7 77 24 fc fe 00
.........&.w$...
00fefbe4 24 fc fe 00 02 1c e7 77 - 51 f2 6d 65 24 fc fe 00
$......wQ.me$...
00fefbf4 00 00 00 00 00 00 00 00 - 00 00 00 00 f4 42 e7 77
.............B.w
00fefc04 00 00 00 00 c4 fd fe 00 - f2 f3 6d 65 00 00 00 00
..........me....
00fefc14 f8 2a 00 00 88 26 a5 00 - b0 f2 6d 65 c4 fd fe 00
.*...&....me....
00fefc24 0c 01 0e 00 e1 04 00 00 - 00 00 00 00 00 00 00 00
................
00fefc34 b5 83 1e 17 7f 01 00 00 - 6f 01 00 00 72 65 73 71
........o...resq
00fefc44 73 65 72 76 65 72 20 2d - 20 41 64 61 70 74 69 76 server -
Adaptiv
00fefc54 65 20 53 65 72 76 65 72 - 20 41 6e 79 77 68 65 72 e Server
Anywher
00fefc64 65 00 00 00 b0 fc fe 00 - 00 10 00 00 04 00 00 00
e...............
00fefc74 18 2a a5 00 70 27 a5 00 - 20 05 a5 00 ff ff fe 7f .*..p'..
.......
00fefc84 88 26 a5 00 00 10 00 00 - dc 28 80 65 a8 ff fe 00
.&.......(.e....
00fefc94 44 b9 f3 77 84 fc fe 00 - ff ff ff ff 42 4c f0 77
D..w........BL.w
00fefca4 90 4c f0 77 ff ff ff ff - d4 fc fe 00 d0 fc fe 00
.L.w............
00fefcb4 04 01 00 00 c8 fc fe 00 - 88 26 a5 00 38 99 13 00
.........&..8...
00fefcc4 dc 28 80 65 04 00 00 00 - 00 00 00 00 00 10 00 00
.(.e............
00fefcd4 00 e0 77 01 0c fd fe 00 - 9a db f1 77 4c 99 13 00
..w........wL...
00fefce4 70 23 a5 00 c0 f3 67 65 - 00 00 78 01 88 26 a5 00
p#....ge..x..&..
00fefcf4 76 c2 f0 77 a8 00 00 00 - 00 00 00 00 b0 23 a5 00
v..w.........#..

State Dump for Thread Id 0x14a

eax=0000081e ebx=77f05f7d ecx=10511168 edx=00000000 esi=ffffffff
edi=1736ac47
eip=77f67f77 esp=0117fe20 ebp=0117fe4c iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: ZwRemoveIoCompletion
77f67f6c b88d000000 mov eax,0x8d
77f67f71 8d542404 lea edx,[esp+0x4]
ss:020ce827=????????
77f67f75 cd2e int 2e
77f67f77 c21400 ret 0x14
77f67f7a 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0117fe4c 6567e9a4 000000a8 0117fe80 0117fe84 0117fe78
ntdll!ZwRemoveIoCompletion
00000000 00000000 00000000 00000000 00000000 00000000 !WntTask::soak_body

State Dump for Thread Id 0x94

eax=65788d50 ebx=00a52d50 ecx=00a50520 edx=00000000 esi=77f0c289
edi=77f0178b
eip=77f67f77 esp=0127ff2c ebp=0127ff58 iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: ZwRemoveIoCompletion
77f67f6c b88d000000 mov eax,0x8d
77f67f71 8d542404 lea edx,[esp+0x4]
ss:021ce933=????????
77f67f75 cd2e int 2e
77f67f77 c21400 ret 0x14
77f67f7a 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0127ff58 6567eae0 000000ac 0127ff80 0127ff84 0127ff7c
ntdll!ZwRemoveIoCompletion
0127ffb8 77f04ede 00a52d50 00000038 00000020 00a52d50 !WntTask::bg_soak_body
0127ffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW
00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>

State Dump for Thread Id 0x155

eax=00001cfe ebx=77f05f7d ecx=10511168 edx=00000000 esi=00000064
edi=1736c945
eip=77f67f77 esp=0137fe20 ebp=0137fe4c iopl=0 nv up ei pl nz na pe
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000202


function: ZwRemoveIoCompletion
77f67f6c b88d000000 mov eax,0x8d
77f67f71 8d542404 lea edx,[esp+0x4]
ss:022ce827=????????
77f67f75 cd2e int 2e
77f67f77 c21400 ret 0x14
77f67f7a 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0137fe4c 6567e9a4 000000a8 0137fe80 0137fe84 0137fe78
ntdll!ZwRemoveIoCompletion
00000000 00000000 00000000 00000000 00000000 00000000 !WntTask::soak_body

State Dump for Thread Id 0x8b

eax=65788d50 ebx=00a52d50 ecx=00a50520 edx=00000000 esi=77f0c289
edi=77f0178b
eip=77f67f77 esp=0147ff2c ebp=0147ff58 iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: ZwRemoveIoCompletion
77f67f6c b88d000000 mov eax,0x8d
77f67f71 8d542404 lea edx,[esp+0x4]
ss:023ce933=????????
77f67f75 cd2e int 2e
77f67f77 c21400 ret 0x14
77f67f7a 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0147ff58 6567eae0 000000ac 0147ff80 0147ff84 0147ff7c
ntdll!ZwRemoveIoCompletion
0147ffb8 77f04ede 00a52d50 00000038 00000020 00a52d50 !WntTask::bg_soak_body
0147ffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW
00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>

State Dump for Thread Id 0x165

eax=00000000 ebx=00000012 ecx=1fd84ab0 edx=657a2178 esi=1fe77c50
edi=1fe77674
eip=655d65c7 esp=20e0fc78 ebp=00000000 iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: PageListIter::is_finished
655d65af 90 nop
655d65b0 56 push esi
655d65b1 8b742408 mov esi,[esp+0x8]
ss:21d5e67f=????????
655d65b5 f6461004 test byte ptr [esi+0x10],0x4
ds:20dc6656=??
655d65b9 7415 jz PageListIter::is_finished+0x260
(655d65d0)
655d65bb 8b4e08 mov ecx,[esi+0x8]
ds:20dc6656=????????
655d65be ff4904 dec dword ptr [ecx+0x4]
ds:20cd34b6=????????
655d65c1 7506 jnz PageListIter::is_finished+0x259
(655d65c9)
655d65c3 8b01 mov eax,[ecx]
ds:1fd84ab0=00000000
655d65c5 6a01 push 0x1
FAULT ->655d65c7 ff10 call dword ptr [eax]
ds:00000000=????????
655d65c9 816610fbfffbff
ds:20dc6656=????????
and dword ptr [esi+0x10],0xfffbfffb
655d65d0 8b4e10 mov ecx,[esi+0x10]
ds:20dc6656=????????
655d65d3 83e1fd and ecx,0xfd
655d65d6 83c901 or ecx,0x1
655d65d9 c7460800000000 mov dword ptr [esi+0x8],0x0
ds:20dc6656=????????
655d65e0 894e10 mov [esi+0x10],ecx
ds:20dc6656=????????
655d65e3 5e pop esi
655d65e4 c20400 ret 0x4
655d65e7 90 nop
655d65e8 90 nop
655d65e9 90 nop

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00000000 00000000 00000000 00000000 00000000 00000000
!PageListIter::is_finished

State Dump for Thread Id 0xa9

eax=00000000 ebx=00a52d50 ecx=0167ffa8 edx=00000000 esi=77f0c289
edi=77f0178b
eip=77f67f77 esp=0167ff2c ebp=0167ff58 iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246


function: ZwRemoveIoCompletion
77f67f6c b88d000000 mov eax,0x8d
77f67f71 8d542404 lea edx,[esp+0x4]
ss:025ce933=????????
77f67f75 cd2e int 2e
77f67f77 c21400 ret 0x14
77f67f7a 8bc0 mov eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0167ff58 6567eae0 000000ac 0167ff80 0167ff84 0167ff7c
ntdll!ZwRemoveIoCompletion
0167ffb8 77f04ede 00a52d50 00000038 00000020 00a52d50 !WntTask::bg_soak_body
0167ffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW
00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>

****************end dr watson log.


Nick Elson Posted on 2003-07-07 17:06:13.0Z
From: "Nick Elson" <no_spam_nicelson@sybase.com>
References: <OlZYsFMQDHA.348@forums-2-dub>
Subject: Re: Reading a Dr. Watson Log Generated by ASA 8
Date: Mon, 7 Jul 2003 13:06:13 -0400
Lines: 345
X-Priority: 3
X-MSMail-Priority: Normal
X-Newsreader: Microsoft Outlook Express 6.00.2800.1158
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
Message-ID: <O7SH1sKRDHA.71@forums-2-dub>
Newsgroups: ianywhere.public.general
NNTP-Posting-Host: nicelson-xp.sybase.com 172.31.140.167
Path: forums-1-dub!forums-master.sybase.com!forums-2-dub.sybase.com
Xref: forums-1-dub ianywhere.public.general:1283
Article PK: 3524

Working from just the Dr. Watson log alone is often a futile
exercise without a lot of additional information (some specifics
from your installation for one) and will often require access to
source code.

If this posting does not help, and you are having serious issues,
you will need to gather the exact version and build (hopefully
something that matches a build for which we have recent
compilation info for) AND you will need to get technical support
involved.

About all I can see from the Dr. Watson info. provided is the
following:

The Access Violation is just a standard memory access
violation (SEH 0xc0000005 is classic!). So much could
be ascertained without generating a Dr. Watson log. This
could be due to a broken installation, a bug in the app, or
even a bug in the OS.

You seem to be running as a NT service (from the call to
advapi32!StartServiceCtrlDispatcherA in the stack trace)
and it may be faulting inside the OS. Running it as a
non-service would eliminate that possibility.

Since the failure is in the call to
advapi32!RegisterServiceCtrlHandlerA
and specifically in it's call to ntdll!ZwReadFile
it is possible that the registry entries for that service
are incorrect (drop and recreating the service again may
correct for this). The programming is most likely just
starting up at this point and trying to connect to the
Service Control Manager at that point, which could indicate
a problem with NT itself.

You may just be hitting a problem with NT4.0SP6 on a dual
processor machine. Some recent bug fixes may apply so if
you are not running 8.0.2 latest ebf, upgrade and try again.
You may also want to check out the fixes in SP6a (or later if
one exists).

I see a number of other services and 'significant' system applications
running, including MS SQL Server, MS DTC, VNC, mnmsrvc,
beremote (possibly) amongst others. If there are any interactions,
checking if the startup order matters may tell you more.


Of course I could just be reading too much into this.

"Doug Stone" <nospamdstone@res-q.com> wrote in message
news:OlZYsFMQDHA.348@forums-2-dub...
> Hi. I'm wondering if there is a way for non-assembly language programmers
> to glean useful information from a Dr. Watson log file.
> For instance, a customer of Sybase and my company just sent me the Dr.
> Watson information below. I see that the App pid is 326--which one finds
> later in this text is the number assigned to dbsrv8. The text below also
> indicates that dbsrv8 was responsible for two Dr. Watsons on 6/29/2003.
> I've only pasted a couple of hundred lines from each error. The full text
> of these events is over 10k lines.
>
> Does anyone know how to obtain other useful information from a Dr. Watson
> log of dbsrv8?
>
> Thanks,
> Doug
>
> *************begin dr watson log
>
> Application exception occurred:
> App: (pid=326)
> When: 6/29/2003 @ 5:41:3.417
> Exception number: c0000005 (access violation)
>
> *----> System Information <----*
> Computer Name: DSCNTS10
> User Name: SYSTEM
> Number of Processors: 2
> Processor Type: x86 Family 6 Model 7 Stepping 2
> Windows Version: 4.0
> Current Build: 1381
> Service Pack: 6
> Current Type: Multiprocessor Free
> Registered Organization: DSCH
> Registered Owner: Computer Services
>
> *----> Task List <----*
> 0 Idle.exe
> 2 System.exe
> 28 smss.exe
> 40 csrss.exe
> 46 winlogon.exe
> 50 services.exe
> 53 lsass.exe
> 78 spoolss.exe
> 88 RpcSs.exe
> 101 msdtc.exe
> 122 AfaAgent.exe
> 127 amgrsrvc.exe
> 145 AWHOST32.exe
> 156 MCSHIELD.exe
> 160 VsTskMgr.exe
> 178 mnmsrvc.exe
> 186 sqlservr.exe
> 173 naimas32.exe
> 195 pstores.exe
> 199 MSTask.exe
> 205 timeserv.exe
> 213 winmgmt.exe
> 222 WinVNC.exe
> 245 beremote.exe
> 249 inetinfo.exe
> 315 LOCATOR.exe
> 242 nddeagnt.exe
> 337 explorer.exe
> 143 rundll32.exe
> 326 DBSRV8.exe
> 343 drwtsn32.exe
> 0 _Total.exe
>
> (00400000 - 00414000)
> (77f60000 - 77fbe000) dll\ntdll.dbg
> (65560000 - 65b26000)
> (77dc0000 - 77dff000) dll\advapi32.dbg
> (77f00000 - 77f5e000) dll\kernel32.dbg
> (77e70000 - 77ec5000) dll\user32.dbg
> (77ed0000 - 77efc000) dll\gdi32.dbg
> (77e10000 - 77e67000) dll\rpcrt4.dbg
> (776d0000 - 776d8000) dll\wsock32.dbg
> (776b0000 - 776c4000) dll\ws2_32.dbg
> (78000000 - 78040000)
> (776a0000 - 776a7000) dll\ws2help.dbg
> (77d80000 - 77db2000) dll\comdlg32.dbg
> (70970000 - 70b18000) SHELL32.dbg
> (70bd0000 - 70c1c000) SHLWAPI.dbg
> (71700000 - 7178a000) COMCTL32.dbg
> (10000000 - 1000e000)
> (77b20000 - 77bd7000) dll\ole32.dbg
> (00c60000 - 00cd6000)
> (77bf0000 - 77bf7000) dll\rpcltc1.dbg
> (21440000 - 21440000)
> (77660000 - 7766f000) dll\msafd.dbg
> (77690000 - 77699000) dll\wshtcpip.dbg
> (74ff0000 - 74ffe000) dll\rnr20.dbg
>
> State Dump for Thread Id 0x96
> eax=77de0065 ebx=0012fc08 ecx=00000032 edx=00000000 esi=0000005c
edi=00000000
> eip=77f67f07 esp=0012fb28 ebp=0012fb90 iopl=0 nv up ei pl zr na po
nc
> cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
>
> function: ZwReadFile
> 77f67efc b886000000 mov eax,0x86
> 77f67f01 8d542404 lea edx,[esp+0x4]
ss:0107e52f=????????
> 77f67f05 cd2e int 2e
> 77f67f07 c22400 ret 0x24
> 77f67f0a 8bc0 mov eax,eax
>
> *----> Stack Back Trace <----*
> FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
> 0012fb90 77dd8a35 0000005c 00136190 0000021a 0012fbc0 ntdll!ZwReadFile
> 0012fbc4 77dd8481 0000005c 00136190 0000021a 0012fc08
advapi32!RegisterServiceCtrlHandlerA
> 0012fc28 77dd829e 0000005c 00136190 0000021a 0012fdbd
advapi32!StartServiceCtrlDispatcherW
> 0012fc4c 657723d3 0012fc70 77f13e50 0012ffc0 7ffdf000
advapi32!StartServiceCtrlDispatcherA
> 00000001 00000000 00000000 00000000 00000000 00000000 !TestWndProc
>
> *----> Raw Stack Dump <----*
> 0012fb28 a6 d2 f0 77 5c 00 00 00 - 00 00 00 00 00 00 00 00
...w\...........
> 0012fb38 00 00 00 00 64 fb 12 00 - 90 61 13 00 1a 02 00 00
....d....a......
> 0012fb48 00 00 00 00 00 00 00 00 - 00 00 00 00 90 61 13 00
.............a..
> 0012fb58 08 fc 12 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
> 0012fb68 90 fb 12 00 d8 fb 12 00 - 04 00 00 00 00 00 00 00
................
> 0012fb78 50 fb 12 00 00 00 00 00 - 18 fc 12 00 44 b9 f3 77
P...........D..w
> 0012fb88 40 ca f3 77 ff ff ff ff - c4 fb 12 00 35 8a dd 77
@..w........5..w
> 0012fb98 5c 00 00 00 90 61 13 00 - 1a 02 00 00 c0 fb 12 00
\....a..........
> 0012fba8 00 00 00 00 00 00 00 00 - a0 41 13 00 ac 41 13 00
.........A...A..
> 0012fbb8 5c 00 00 00 d8 fb 12 00 - 00 00 00 00 28 fc 12 00
\...........(...
> 0012fbc8 81 84 dd 77 5c 00 00 00 - 90 61 13 00 1a 02 00 00
...w\....a......
> 0012fbd8 08 fc 12 00 90 61 13 00 - 00 00 00 00 1a 02 00 00
.....a..........
> 0012fbe8 3c 01 00 00 90 61 13 00 - 00 00 00 00 01 00 00 00
<....a..........
> 0012fbf8 94 61 13 00 00 00 00 00 - 01 00 00 00 d0 42 13 00
.a...........B..
> 0012fc08 00 00 00 00 00 00 00 00 - dc fb 12 00 04 00 00 00
................
> 0012fc18 b0 ff 12 00 c4 10 de 77 - d8 de de 77 ff ff ff ff
.......w...w....
> 0012fc28 4c fc 12 00 9e 82 dd 77 - 5c 00 00 00 90 61 13 00
L......w\....a..
> 0012fc38 1a 02 00 00 bd fd 12 00 - 01 00 00 00 03 00 00 00
................
> 0012fc48 5c 00 00 00 01 00 00 00 - d3 23 77 65 70 fc 12 00
\........#wep...
> 0012fc58 50 3e f1 77 c0 ff 12 00 - 00 f0 fd 7f 00 00 00 00
P>.w............
>
> State Dump for Thread Id 0x13c
> eax=00000022 ebx=00000000 ecx=00eef8c0 edx=00000000 esi=0000003c
edi=00000000
> eip=77f682db esp=00eefa54 ebp=00eefa78 iopl=0 nv up ei pl zr na po
nc
> cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
>
> function: NtWaitForSingleObject
> 77f682d0 b8c5000000 mov eax,0xc5
> 77f682d5 8d542404 lea edx,[esp+0x4]
ss:01e3e45b=????????
> 77f682d9 cd2e int 2e
> 77f682db c20c00 ret 0xc
> 77f682de 8bc0 mov eax,eax
>
> *----> Stack Back Trace <----*
> FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
> 00eefa78 77f04f37 0000003c ffffffff 00000000 6577224e
ntdll!NtWaitForSingleObject
> 001341a8 4e415341 725f7359 00717365 0072005f 00730065
kernel32!WaitForSingleObject
>
> *----> Raw Stack Dump <----*
> 00eefa54 a0 cc f1 77 3c 00 00 00 - 00 00 00 00 00 00 00 00
...w<...........
> 00eefa64 01 00 00 00 45 c6 f1 77 - 00 00 00 00 ac fa ee 00
....E..w........
> 00eefa74 04 00 00 00 a8 41 13 00 - 37 4f f0 77 3c 00 00 00
.....A..7O.w<...
> 00eefa84 ff ff ff ff 00 00 00 00 - 4e 22 77 65 3c 00 00 00
........N"we<...
> 00eefa94 ff ff ff ff ff ff ff ff - a0 41 13 00 ec ff ee 00
.........A......
> 00eefaa4 a0 41 13 00 07 00 00 00 - 53 75 63 63 65 73 73 66
.A......Successf
> 00eefab4 75 6c 6c 79 20 73 74 61 - 72 74 65 64 20 73 65 72 ully started
ser
> 00eefac4 76 69 63 65 20 41 53 41 - 4e 59 73 5f 72 65 73 71 vice
ASANYs_resq
> 00eefad4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00

>
> State Dump for Thread Id 0x39
>
> eax=00001110 ebx=77e85f88 ecx=0000040a edx=00000000 esi=00fefc24
edi=00fefc24
> eip=77e72397 esp=00fefbc4 ebp=00fefbe8 iopl=0 nv up ei pl zr na po
nc
> cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
>
> function: InvalidateRect
> 77e7237e b89e110000 mov eax,0x119e
> 77e72383 8d542404 lea edx,[esp+0x4]
> ss:01f3e5cb=????????
> 77e72387 cd2e int 2e
> 77e72389 c20c00 ret 0xc
> 77e7238c b885110000 mov eax,0x1185
> 77e72391 8d542404 lea edx,[esp+0x4]
> ss:01f3e5cb=????????
> 77e72395 cd2e int 2e
> 77e72397 c21400 ret 0x14
>
> *----> Stack Back Trace <----*
>
> FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
> 00fefbe8 656df251 00fefc24 00000000 00000000 00000000
user32!InvalidateRect
> 77e71c02 01e80824 c2fffff4 8b550004 0cec83ec fc458d53 !DF_Value_copy_set
>
> *----> Raw Stack Dump <----*
> 00fefbc4 15 27 e7 77 24 fc fe 00 - 00 00 00 00 00 00 00 00
.'.w$...........
> 00fefbd4 00 00 00 00 e4 fb fe 00 - e5 26 e7 77 24 fc fe 00
.........&.w$...
> 00fefbe4 24 fc fe 00 02 1c e7 77 - 51 f2 6d 65 24 fc fe 00
$......wQ.me$...
> 00fefbf4 00 00 00 00 00 00 00 00 - 00 00 00 00 f4 42 e7 77
.............B.w
> 00fefc04 00 00 00 00 c4 fd fe 00 - f2 f3 6d 65 00 00 00 00
..........me....
> 00fefc14 f8 2a 00 00 88 26 a5 00 - b0 f2 6d 65 c4 fd fe 00
.*...&....me....
> 00fefc24 e6 00 28 00 e1 04 00 00 - 00 00 00 00 00 00 00 00
..(.............
> 00fefc34 b5 ae 12 16 f6 01 00 00 - 8d 00 00 00 72 65 73 71
............resq
> 00fefc44 73 65 72 76 65 72 20 2d - 20 41 64 61 70 74 69 76 server -
Adaptiv
> 00fefc54 65 20 53 65 72 76 65 72 - 20 41 6e 79 77 68 65 72 e Server
Anywher
> 00fefc64 65 00 00 00 b0 fc fe 00 - 00 10 00 00 04 00 00 00
e...............
> 00fefc74 18 2a a5 00 70 27 a5 00 - 20 05 a5 00 ff ff fe 7f
.*..p'.........
> 00fefc84 88 26 a5 00 00 10 00 00 - dc 28 80 65 a8 ff fe 00
.&.......(.e....
> 00fefc94 44 b9 f3 77 84 fc fe 00 - ff ff ff ff 42 4c f0 77
D..w........BL.w
> 00fefca4 90 4c f0 77 ff ff ff ff - d4 fc fe 00 d0 fc fe 00
.L.w............
> 00fefcb4 04 01 00 00 c8 fc fe 00 - 88 26 a5 00 38 99 13 00
.........&..8...
> 00fefcc4 dc 28 80 65 04 00 00 00 - 00 00 00 00 00 10 00 00
.(.e............
> 00fefcd4 00 e0 77 01 0c fd fe 00 - 9a db f1 77 4c 99 13 00
..w........wL...
> 00fefce4 e0 22 a5 00 c0 f3 67 65 - 00 00 78 01 88 26 a5 00
."....ge..x..&..
> 00fefcf4 76 c2 f0 77 a8 00 00 00 - 00 00 00 00 20 23 a5 00
v..w........ #..
>
> State Dump for Thread Id 0xaa

> eax=10000000 ebx=77f05f7d ecx=00000000 edx=00000000 esi=ffffffff
edi=16280589
> eip=77f67f77 esp=0117fe20 ebp=0117fe4c iopl=0 nv up ei pl zr na po
nc
> cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246

> function: ZwRemoveIoCompletion
> 77f67f6c b88d000000 mov eax,0x8d
> 77f67f71 8d542404 lea edx,[esp+0x4]
ss:020ce827=????????
> 77f67f75 cd2e int 2e
> 77f67f77 c21400 ret 0x14
> 77f67f7a 8bc0 mov eax,eax
>


Doug Stone Posted on 2003-07-08 18:52:01.0Z
From: "Doug Stone" <nospamdstone@res-q.com>
References: <OlZYsFMQDHA.348@forums-2-dub> <O7SH1sKRDHA.71@forums-2-dub>
Subject: Re: Reading a Dr. Watson Log Generated by ASA 8
Date: Tue, 8 Jul 2003 11:52:01 -0700
Lines: 363
X-Priority: 3
X-MSMail-Priority: Normal
X-Newsreader: Microsoft Outlook Express 6.00.2800.1158
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
Message-ID: <eRsvWLYRDHA.81@forums-2-dub>
Newsgroups: ianywhere.public.general
NNTP-Posting-Host: user-112vkdk.biz.mindspring.com 66.47.209.180
Path: forums-1-dub!forums-master.sybase.com!forums-2-dub.sybase.com
Xref: forums-1-dub ianywhere.public.general:1293
Article PK: 3532

Nick, thanks for the feedback. They upgraded from an ASA version 8 3x build
to a 4x build and we have not seen the problem reoccur.

"Nick Elson" <no_spam_nicelson@sybase.com> wrote in message
news:O7SH1sKRDHA.71@forums-2-dub...
>
> Working from just the Dr. Watson log alone is often a futile
> exercise without a lot of additional information (some specifics
> from your installation for one) and will often require access to
> source code.
>
> If this posting does not help, and you are having serious issues,
> you will need to gather the exact version and build (hopefully
> something that matches a build for which we have recent
> compilation info for) AND you will need to get technical support
> involved.
>
> About all I can see from the Dr. Watson info. provided is the
> following:
>
> The Access Violation is just a standard memory access
> violation (SEH 0xc0000005 is classic!). So much could
> be ascertained without generating a Dr. Watson log. This
> could be due to a broken installation, a bug in the app, or
> even a bug in the OS.
>
> You seem to be running as a NT service (from the call to
> advapi32!StartServiceCtrlDispatcherA in the stack trace)
> and it may be faulting inside the OS. Running it as a
> non-service would eliminate that possibility.
>
> Since the failure is in the call to
> advapi32!RegisterServiceCtrlHandlerA
> and specifically in it's call to ntdll!ZwReadFile
> it is possible that the registry entries for that service
> are incorrect (drop and recreating the service again may
> correct for this). The programming is most likely just
> starting up at this point and trying to connect to the
> Service Control Manager at that point, which could indicate
> a problem with NT itself.
>
> You may just be hitting a problem with NT4.0SP6 on a dual
> processor machine. Some recent bug fixes may apply so if
> you are not running 8.0.2 latest ebf, upgrade and try again.
> You may also want to check out the fixes in SP6a (or later if
> one exists).
>
> I see a number of other services and 'significant' system applications
> running, including MS SQL Server, MS DTC, VNC, mnmsrvc,
> beremote (possibly) amongst others. If there are any interactions,
> checking if the startup order matters may tell you more.
>
>
> Of course I could just be reading too much into this.
>
>
>
>
> "Doug Stone" <nospamdstone@res-q.com> wrote in message
> news:OlZYsFMQDHA.348@forums-2-dub...
> > Hi. I'm wondering if there is a way for non-assembly language
programmers
> > to glean useful information from a Dr. Watson log file.
> > For instance, a customer of Sybase and my company just sent me the Dr.
> > Watson information below. I see that the App pid is 326--which one
finds
> > later in this text is the number assigned to dbsrv8. The text below
also
> > indicates that dbsrv8 was responsible for two Dr. Watsons on 6/29/2003.
> > I've only pasted a couple of hundred lines from each error. The full
text
> > of these events is over 10k lines.
> >
> > Does anyone know how to obtain other useful information from a Dr.
Watson
> > log of dbsrv8?
> >
> > Thanks,
> > Doug
> >
> > *************begin dr watson log
> >
> > Application exception occurred:
> > App: (pid=326)
> > When: 6/29/2003 @ 5:41:3.417
> > Exception number: c0000005 (access violation)
> >
> > *----> System Information <----*
> > Computer Name: DSCNTS10
> > User Name: SYSTEM
> > Number of Processors: 2
> > Processor Type: x86 Family 6 Model 7 Stepping 2
> > Windows Version: 4.0
> > Current Build: 1381
> > Service Pack: 6
> > Current Type: Multiprocessor Free
> > Registered Organization: DSCH
> > Registered Owner: Computer Services
> >
> > *----> Task List <----*
> > 0 Idle.exe
> > 2 System.exe
> > 28 smss.exe
> > 40 csrss.exe
> > 46 winlogon.exe
> > 50 services.exe
> > 53 lsass.exe
> > 78 spoolss.exe
> > 88 RpcSs.exe
> > 101 msdtc.exe
> > 122 AfaAgent.exe
> > 127 amgrsrvc.exe
> > 145 AWHOST32.exe
> > 156 MCSHIELD.exe
> > 160 VsTskMgr.exe
> > 178 mnmsrvc.exe
> > 186 sqlservr.exe
> > 173 naimas32.exe
> > 195 pstores.exe
> > 199 MSTask.exe
> > 205 timeserv.exe
> > 213 winmgmt.exe
> > 222 WinVNC.exe
> > 245 beremote.exe
> > 249 inetinfo.exe
> > 315 LOCATOR.exe
> > 242 nddeagnt.exe
> > 337 explorer.exe
> > 143 rundll32.exe
> > 326 DBSRV8.exe
> > 343 drwtsn32.exe
> > 0 _Total.exe
> >
> > (00400000 - 00414000)
> > (77f60000 - 77fbe000) dll\ntdll.dbg
> > (65560000 - 65b26000)
> > (77dc0000 - 77dff000) dll\advapi32.dbg
> > (77f00000 - 77f5e000) dll\kernel32.dbg
> > (77e70000 - 77ec5000) dll\user32.dbg
> > (77ed0000 - 77efc000) dll\gdi32.dbg
> > (77e10000 - 77e67000) dll\rpcrt4.dbg
> > (776d0000 - 776d8000) dll\wsock32.dbg
> > (776b0000 - 776c4000) dll\ws2_32.dbg
> > (78000000 - 78040000)
> > (776a0000 - 776a7000) dll\ws2help.dbg
> > (77d80000 - 77db2000) dll\comdlg32.dbg
> > (70970000 - 70b18000) SHELL32.dbg
> > (70bd0000 - 70c1c000) SHLWAPI.dbg
> > (71700000 - 7178a000) COMCTL32.dbg
> > (10000000 - 1000e000)
> > (77b20000 - 77bd7000) dll\ole32.dbg
> > (00c60000 - 00cd6000)
> > (77bf0000 - 77bf7000) dll\rpcltc1.dbg
> > (21440000 - 21440000)
> > (77660000 - 7766f000) dll\msafd.dbg
> > (77690000 - 77699000) dll\wshtcpip.dbg
> > (74ff0000 - 74ffe000) dll\rnr20.dbg
> >
> > State Dump for Thread Id 0x96
> > eax=77de0065 ebx=0012fc08 ecx=00000032 edx=00000000 esi=0000005c
> edi=00000000
> > eip=77f67f07 esp=0012fb28 ebp=0012fb90 iopl=0 nv up ei pl zr na
po
> nc
> > cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
> >
> > function: ZwReadFile
> > 77f67efc b886000000 mov eax,0x86
> > 77f67f01 8d542404 lea edx,[esp+0x4]
> ss:0107e52f=????????
> > 77f67f05 cd2e int 2e
> > 77f67f07 c22400 ret 0x24
> > 77f67f0a 8bc0 mov eax,eax
> >
> > *----> Stack Back Trace <----*
> > FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
> > 0012fb90 77dd8a35 0000005c 00136190 0000021a 0012fbc0 ntdll!ZwReadFile
> > 0012fbc4 77dd8481 0000005c 00136190 0000021a 0012fc08
> advapi32!RegisterServiceCtrlHandlerA
> > 0012fc28 77dd829e 0000005c 00136190 0000021a 0012fdbd
> advapi32!StartServiceCtrlDispatcherW
> > 0012fc4c 657723d3 0012fc70 77f13e50 0012ffc0 7ffdf000
> advapi32!StartServiceCtrlDispatcherA
> > 00000001 00000000 00000000 00000000 00000000 00000000 !TestWndProc
> >
> > *----> Raw Stack Dump <----*
> > 0012fb28 a6 d2 f0 77 5c 00 00 00 - 00 00 00 00 00 00 00 00
> ...w\...........
> > 0012fb38 00 00 00 00 64 fb 12 00 - 90 61 13 00 1a 02 00 00
> ....d....a......
> > 0012fb48 00 00 00 00 00 00 00 00 - 00 00 00 00 90 61 13 00
> .............a..
> > 0012fb58 08 fc 12 00 00 00 00 00 - 00 00 00 00 00 00 00 00
> ................
> > 0012fb68 90 fb 12 00 d8 fb 12 00 - 04 00 00 00 00 00 00 00
> ................
> > 0012fb78 50 fb 12 00 00 00 00 00 - 18 fc 12 00 44 b9 f3 77
> P...........D..w
> > 0012fb88 40 ca f3 77 ff ff ff ff - c4 fb 12 00 35 8a dd 77
> @..w........5..w
> > 0012fb98 5c 00 00 00 90 61 13 00 - 1a 02 00 00 c0 fb 12 00
> \....a..........
> > 0012fba8 00 00 00 00 00 00 00 00 - a0 41 13 00 ac 41 13 00
> .........A...A..
> > 0012fbb8 5c 00 00 00 d8 fb 12 00 - 00 00 00 00 28 fc 12 00
> \...........(...
> > 0012fbc8 81 84 dd 77 5c 00 00 00 - 90 61 13 00 1a 02 00 00
> ...w\....a......
> > 0012fbd8 08 fc 12 00 90 61 13 00 - 00 00 00 00 1a 02 00 00
> .....a..........
> > 0012fbe8 3c 01 00 00 90 61 13 00 - 00 00 00 00 01 00 00 00
> <....a..........
> > 0012fbf8 94 61 13 00 00 00 00 00 - 01 00 00 00 d0 42 13 00
> .a...........B..
> > 0012fc08 00 00 00 00 00 00 00 00 - dc fb 12 00 04 00 00 00
> ................
> > 0012fc18 b0 ff 12 00 c4 10 de 77 - d8 de de 77 ff ff ff ff
> .......w...w....
> > 0012fc28 4c fc 12 00 9e 82 dd 77 - 5c 00 00 00 90 61 13 00
> L......w\....a..
> > 0012fc38 1a 02 00 00 bd fd 12 00 - 01 00 00 00 03 00 00 00
> ................
> > 0012fc48 5c 00 00 00 01 00 00 00 - d3 23 77 65 70 fc 12 00
> \........#wep...
> > 0012fc58 50 3e f1 77 c0 ff 12 00 - 00 f0 fd 7f 00 00 00 00
> P>.w............
> >
> > State Dump for Thread Id 0x13c
> > eax=00000022 ebx=00000000 ecx=00eef8c0 edx=00000000 esi=0000003c
> edi=00000000
> > eip=77f682db esp=00eefa54 ebp=00eefa78 iopl=0 nv up ei pl zr na
po
> nc
> > cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
> >
> > function: NtWaitForSingleObject
> > 77f682d0 b8c5000000 mov eax,0xc5
> > 77f682d5 8d542404 lea edx,[esp+0x4]
> ss:01e3e45b=????????
> > 77f682d9 cd2e int 2e
> > 77f682db c20c00 ret 0xc
> > 77f682de 8bc0 mov eax,eax
> >
> > *----> Stack Back Trace <----*
> > FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
> > 00eefa78 77f04f37 0000003c ffffffff 00000000 6577224e
> ntdll!NtWaitForSingleObject
> > 001341a8 4e415341 725f7359 00717365 0072005f 00730065
> kernel32!WaitForSingleObject
> >
> > *----> Raw Stack Dump <----*
> > 00eefa54 a0 cc f1 77 3c 00 00 00 - 00 00 00 00 00 00 00 00
> ...w<...........
> > 00eefa64 01 00 00 00 45 c6 f1 77 - 00 00 00 00 ac fa ee 00
> ....E..w........
> > 00eefa74 04 00 00 00 a8 41 13 00 - 37 4f f0 77 3c 00 00 00
> .....A..7O.w<...
> > 00eefa84 ff ff ff ff 00 00 00 00 - 4e 22 77 65 3c 00 00 00
> ........N"we<...
> > 00eefa94 ff ff ff ff ff ff ff ff - a0 41 13 00 ec ff ee 00
> .........A......
> > 00eefaa4 a0 41 13 00 07 00 00 00 - 53 75 63 63 65 73 73 66
> .A......Successf
> > 00eefab4 75 6c 6c 79 20 73 74 61 - 72 74 65 64 20 73 65 72 ully
started
> ser
> > 00eefac4 76 69 63 65 20 41 53 41 - 4e 59 73 5f 72 65 73 71 vice
> ASANYs_resq
> > 00eefad4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
>
> >
> > State Dump for Thread Id 0x39
> >
> > eax=00001110 ebx=77e85f88 ecx=0000040a edx=00000000 esi=00fefc24
> edi=00fefc24
> > eip=77e72397 esp=00fefbc4 ebp=00fefbe8 iopl=0 nv up ei pl zr na
po
> nc
> > cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
> >
> > function: InvalidateRect
> > 77e7237e b89e110000 mov eax,0x119e
> > 77e72383 8d542404 lea edx,[esp+0x4]
> > ss:01f3e5cb=????????
> > 77e72387 cd2e int 2e
> > 77e72389 c20c00 ret 0xc
> > 77e7238c b885110000 mov eax,0x1185
> > 77e72391 8d542404 lea edx,[esp+0x4]
> > ss:01f3e5cb=????????
> > 77e72395 cd2e int 2e
> > 77e72397 c21400 ret 0x14
> >
> > *----> Stack Back Trace <----*
> >
> > FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
> > 00fefbe8 656df251 00fefc24 00000000 00000000 00000000
> user32!InvalidateRect
> > 77e71c02 01e80824 c2fffff4 8b550004 0cec83ec fc458d53 !DF_Value_copy_set
> >
> > *----> Raw Stack Dump <----*
> > 00fefbc4 15 27 e7 77 24 fc fe 00 - 00 00 00 00 00 00 00 00
> .'.w$...........
> > 00fefbd4 00 00 00 00 e4 fb fe 00 - e5 26 e7 77 24 fc fe 00
> .........&.w$...
> > 00fefbe4 24 fc fe 00 02 1c e7 77 - 51 f2 6d 65 24 fc fe 00
> $......wQ.me$...
> > 00fefbf4 00 00 00 00 00 00 00 00 - 00 00 00 00 f4 42 e7 77
> .............B.w
> > 00fefc04 00 00 00 00 c4 fd fe 00 - f2 f3 6d 65 00 00 00 00
> ..........me....
> > 00fefc14 f8 2a 00 00 88 26 a5 00 - b0 f2 6d 65 c4 fd fe 00
> .*...&....me....
> > 00fefc24 e6 00 28 00 e1 04 00 00 - 00 00 00 00 00 00 00 00
> ..(.............
> > 00fefc34 b5 ae 12 16 f6 01 00 00 - 8d 00 00 00 72 65 73 71
> ............resq
> > 00fefc44 73 65 72 76 65 72 20 2d - 20 41 64 61 70 74 69 76 server -
> Adaptiv
> > 00fefc54 65 20 53 65 72 76 65 72 - 20 41 6e 79 77 68 65 72 e Server
> Anywher
> > 00fefc64 65 00 00 00 b0 fc fe 00 - 00 10 00 00 04 00 00 00
> e...............
> > 00fefc74 18 2a a5 00 70 27 a5 00 - 20 05 a5 00 ff ff fe 7f
> .*..p'.........
> > 00fefc84 88 26 a5 00 00 10 00 00 - dc 28 80 65 a8 ff fe 00
> .&.......(.e....
> > 00fefc94 44 b9 f3 77 84 fc fe 00 - ff ff ff ff 42 4c f0 77
> D..w........BL.w
> > 00fefca4 90 4c f0 77 ff ff ff ff - d4 fc fe 00 d0 fc fe 00
> .L.w............
> > 00fefcb4 04 01 00 00 c8 fc fe 00 - 88 26 a5 00 38 99 13 00
> .........&..8...
> > 00fefcc4 dc 28 80 65 04 00 00 00 - 00 00 00 00 00 10 00 00
> .(.e............
> > 00fefcd4 00 e0 77 01 0c fd fe 00 - 9a db f1 77 4c 99 13 00
> ..w........wL...
> > 00fefce4 e0 22 a5 00 c0 f3 67 65 - 00 00 78 01 88 26 a5 00
> ."....ge..x..&..
> > 00fefcf4 76 c2 f0 77 a8 00 00 00 - 00 00 00 00 20 23 a5 00
> v..w........ #..
> >
> > State Dump for Thread Id 0xaa
>
> > eax=10000000 ebx=77f05f7d ecx=00000000 edx=00000000 esi=ffffffff
> edi=16280589
> > eip=77f67f77 esp=0117fe20 ebp=0117fe4c iopl=0 nv up ei pl zr na
po
> nc
> > cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
>
> > function: ZwRemoveIoCompletion
> > 77f67f6c b88d000000 mov eax,0x8d
> > 77f67f71 8d542404 lea edx,[esp+0x4]
> ss:020ce827=????????
> > 77f67f75 cd2e int 2e
> > 77f67f77 c21400 ret 0x14
> > 77f67f7a 8bc0 mov eax,eax
> >
>
>