On Tue, 29 Sep 2009, CLEMENT Francis wrote:

> Here is WinDBG result (some change in cmd line to mask sensitive data) :
> 
> CommandLine: C:\XMail\Bin\CtrlClnt.exe -s www.xxx.yyy.zzz -n 6017 -u
> myusername -p mypassword userlist somehandleddomainname
> Starting directory: C:\XMail\Bin
> Symbol search path is:
> SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
> Executable search path is: 
> ModLoad: 00400000 0047e000   CtrlClnt.exe
> ModLoad: 78460000 784e2000   ntdll.dll
> ModLoad: 10000000 100fd000   C:\XMail\Bin\LIBEAY32.dll
> ModLoad: 74fd0000 74fd9000   C:\WINNT\system32\WSOCK32.dll
> ModLoad: 77e70000 77f2f000   C:\WINNT\system32\KERNEL32.DLL
> ModLoad: 74fb0000 74fc4000   C:\WINNT\system32\WS2_32.DLL
> ModLoad: 78000000 78045000   C:\WINNT\system32\MSVCRT.DLL
> ModLoad: 78ed0000 78f35000   C:\WINNT\system32\ADVAPI32.DLL
> ModLoad: 770c0000 7712f000   C:\WINNT\system32\RPCRT4.dll
> ModLoad: 74fa0000 74fa8000   C:\WINNT\system32\WS2HELP.DLL
> ModLoad: 77f40000 77f7d000   C:\WINNT\system32\GDI32.dll
> ModLoad: 77e00000 77e5f000   C:\WINNT\system32\USER32.dll
> ModLoad: 78130000 781cb000   C:\WINNT\system32\MSVCR80.dll
> ModLoad: 00230000 00261000   C:\XMail\Bin\SSLEAY32.dll
> (ad8.aac): Break instruction exception - code 80000003 (first chance)
> eax=00000000 ebx=00131f04 ecx=00000000 edx=00132c48 esi=7ffdf000
> edi=00131f78
> eip=7847193c esp=0012f984 ebp=0012fc98 iopl=0         nv up ei pl nz na po
> nc
> cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000
> efl=00000202
> ntdll!DbgBreakPoint:
> 7847193c cc              int     3
> 0:000> g
> ModLoad: 74f50000 74f6d000   C:\WINNT\system32\msafd.dll
> ModLoad: 74f90000 74f97000   C:\WINNT\System32\wshtcpip.dll
> (ad8.888): Access violation - code c0000005 (first chance)
> First chance exceptions are reported before any exception handling.
> This exception may be expected and handled.
> eax=00000000 ebx=00000000 ecx=0047a410 edx=00000ae4 esi=0047a400
> edi=00000000
> eip=7846f281 esp=00b2fba0 ebp=00b2fc00 iopl=0         nv up ei pl zr na pe
> nc
> cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000
> efl=00010246
> ntdll!RtlpWaitForCriticalSection+0x8a:
> 7846f281 ff4010          inc     dword ptr [eax+10h]
> ds:0023:00000010=????????
> 
> I'm not a windbg specialist ;) What do you mean with "enable just in time
> debugging" ?
> Should I do somethink more with Windbg at this point ? 

Thank you Francis.
Do you have a debug version of CtrlClnt to run (like the ones included in 
the recent -pre releases)?
If you run the CtrlClnt and you have the corresponding PDB file in the 
same directory, WinDBG should resolve the symbols.
Also, can you show a Call Stack (in the View menu) from the point of 
fault?



- Davide


_______________________________________________
xmail mailing list
xmail@xmailserver.org
http://xmailserver.org/mailman/listinfo/xmail

Reply via email to