Login Page - Create Account

Support Board


Date/Time: Thu, 28 Nov 2024 14:48:08 +0000



Post From: Heap Corruption

[2013-11-25 20:01:41]
bfalk - Posts: 33
There seems to be some form of heap corruption, hard to say where without SC symbols.

I produced this bug by opening up 8 chartbooks with DOMs and intraday charts with no data behind them (all the data has to be fetched). Reproduces.

I have a full memory dump if the bug isn't obvious enough from the stack trace (which it probably isn't, yay heap corruption bugs).

APPLICATION_VERIFIER_HEAPS_CORRUPTED_HEAP_BLOCK_START_STAMP (10)
Corrupted start stamp for heap block.
This happens for buffer underruns.
Arguments:
Arg1: 07c71000, Heap handle used in the call.
Arg2: 255e0ec0, Heap block involved in the operation.
Arg3: 00064140, Size of the heap block.
Arg4: abcdbbbb, Corrupted stamp value.

FAULTING_IP:
verifier!VerifierStopMessage+1f8
6abbba58 cc int 3

EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 6abbba58 (verifier!VerifierStopMessage+0x000001f8)
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 1
Parameter[0]: 00000000

CONTEXT: 00000000 -- (.cxr 0x0;r)
eax=00000000 ebx=00000000 ecx=6abe8598 edx=00000000 esi=07c70000 edi=07c70000
eip=6abbba58 esp=0018edb8 ebp=0018edd4 iopl=0 nv up ei pl zr na pe nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000244
verifier!VerifierStopMessage+0x1f8:
6abbba58 cc int 3

DEFAULT_BUCKET_ID: WRONG_SYMBOLS

PROCESS_NAME: SierraChart.exe

ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached.

EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid

EXCEPTION_PARAMETER1: 00000000

NTGLOBALFLAG: 2000000

APPLICATION_VERIFIER_FLAGS: 0

APP: sierrachart.exe

ANALYSIS_VERSION: 6.3.9431.0 (debuggers(dbg).130615-1214) x86fre

MANAGED_STACK:
(TransitionMU)
0018F4AC 08879396 SierraChart!DomainBoundILStubClass.IL_STUB_PInvoke()+0x56
(TransitionUM)

MANAGED_STACK_COMMAND: _EFN_StackTrace

PRIMARY_PROBLEM_CLASS: WRONG_SYMBOLS

BUGCHECK_STR: APPLICATION_FAULT_WRONG_SYMBOLS

LAST_CONTROL_TRANSFER: from 6abb9e69 to 6abbba58

STACK_TEXT:
0018edd4 6abb9e69 00000010 6abb15dc 07c71000 verifier!VerifierStopMessage+0x1f8
0018ee38 6abba22a 07c71000 00000004 255e0ec0 verifier!AVrfpDphReportCorruptedBlock+0x239
0018ee94 6abba742 07c71000 255e0ec0 00000004 verifier!AVrfpDphCheckNormalHeapBlock+0x11a
0018eeb4 6abb90d3 07c71000 00230000 01001002 verifier!AVrfpDphNormalHeapFree+0x22
0018eed8 77561464 07c70000 01001002 255e0ec0 verifier!AVrfDebugPageHeapFree+0xe3
0018ef20 7751ab3a 07c70000 01001002 255e0ec0 ntdll!RtlDebugFreeHeap+0x2f
0018f014 774c3472 00000000 255e0ec0 13a188d0 ntdll!RtlpFreeHeap+0x5d
0018f034 755614dd 07c70000 00000000 255e0ec0 ntdll!RtlFreeHeap+0x142
0018f048 72f5016a 07c70000 00000000 255e0ec0 kernel32!HeapFree+0x14
0018f05c 005a8749 255e0ec0 00000000 00170eee msvcr100!free+0x1c
WARNING: Stack unwind information not available. Following frames may be wrong.
0018f138 760162fa 00170eee 0000801b 00000000 SierraChart+0x1a8749
0018f164 76016d3a 00409ad0 00170eee 0000801b user32!InternalCallWinProc+0x23
0018f1dc 76020d27 00000000 00409ad0 00170eee user32!UserCallWinProcCheckWow+0x109
0018f214 7602794a 00409ad0 00170eee 0000801b user32!CallWindowProcAorW+0xab
0018f234 65b2da57 00409ad0 00170eee 0000801b user32!CallWindowProcA+0x1b
0018f2b8 760162fa 00170eee 0000801b 00000000 mfc100!_AfxActivationWndProc+0x139
0018f2e4 76016d3a 65b2d91e 00170eee 0000801b user32!InternalCallWinProc+0x23
0018f35c 760177c4 00000000 65b2d91e 00170eee user32!UserCallWinProcCheckWow+0x109
0018f3bc 76017bca 65b2d91e 00000001 0018f3fc user32!DispatchMessageWorker+0x3bc
0018f3cc 65b1bdf4 07bd5f28 00000000 009e5e38 user32!DispatchMessageA+0xf
0018f3dc 65b1c47c 009e5e38 009e5e38 ffffffff mfc100!AfxInternalPumpMessage+0x40
0018f3fc 65b41c4c 009ecd60 0032cffe 00000000 mfc100!CWinThread::Run+0x5b
0018f410 0075b36f 00400000 00000000 0032cffe mfc100!AfxWinMain+0x6a
0018f4d8 65252652 08c6ead0 0018f538 6526264f SierraChart+0x35b36f
0018f4e4 6526264f 0018f584 0018f528 65374d4e clr!CallDescrWorkerInternal+0x34
0018f538 65262e95 0018f680 00000001 00000000 clr!CallDescrWorkerWithHandler+0x6b
0018f5b8 653ea887 0018f6b4 57de377f 057134dc clr!MethodDescCallSite::CallTargetWorker+0x152
0018f6e4 65317610 00000000 00000001 57de3763 clr!RunMain+0x196
0018f958 653a1dc4 00000000 57de38f3 00400000 clr!Assembly::ExecuteMainMethod+0x124
0018fe5c 653a1e67 57de3f23 00000000 00000000 clr!SystemDomain::ExecuteMainMethod+0x614
0018feb8 653a1f7a 57de3f63 00000000 00000000 clr!ExecuteEXE+0x4c
0018fef8 653a416a 57de3eaf 00000000 00000000 clr!_CorExeMainInternal+0xdc
0018ff34 6701f5a3 57dd746e 00000000 75561222 clr!_CorExeMain+0x4d
0018ff70 6ac47f16 00000000 67010000 0018ff94 mscoreei!_CorExeMain+0x10a
0018ff80 6ac44de3 00000000 755633ca fffde000 mscoree!ShellShim__CorExeMain+0x99
0018ff88 755633ca fffde000 0018ffd4 774c9ed2 mscoree!_CorExeMain_Exported+0x8
0018ff94 774c9ed2 fffde000 493cca52 00000000 kernel32!BaseThreadInitThunk+0xe
0018ffd4 774c9ea5 6ac44ddb fffde000 00000000 ntdll!__RtlUserThreadStart+0x70
0018ffec 00000000 6ac44ddb fffde000 00000000 ntdll!_RtlUserThreadStart+0x1b


STACK_COMMAND: ~0s; .ecxr ; kb

FOLLOWUP_IP:
SierraChart+1a8749
005a8749 83c404 add esp,4

SYMBOL_STACK_INDEX: a

SYMBOL_NAME: sierrachart+1a8749

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: SierraChart

IMAGE_NAME: SierraChart.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 5292ca63

FAILURE_BUCKET_ID: WRONG_SYMBOLS_80000003_SierraChart.exe!Unknown

BUCKET_ID: APPLICATION_FAULT_WRONG_SYMBOLS_sierrachart+1a8749

ANALYSIS_SOURCE: UM

FAILURE_ID_HASH_STRING: um:wrong_symbols_80000003_sierrachart.exe!unknown

FAILURE_ID_HASH: {b81c6cf6-12ca-fe14-7272-6dc5fbf1685f}

Followup: MachineOwner
---------