<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Debugging the Debugger</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2006/10/20/debugging-the-debugger/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Tue, 05 May 2026 23:07:11 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Debugging the Debugger (16-bit)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/10/20/debugging-the-debugger/#comment-144873</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Debugging the Debugger (16-bit)</dc:creator>
		<pubDate>Fri, 16 Apr 2010 22:39:32 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/10/20/debugging-the-debugger/#comment-144873</guid>
		<description>[...] it looks like WinDbg double debugging is much more robust despite it bigger file size (debug.exe is [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] it looks like WinDbg double debugging is much more robust despite it bigger file size (debug.exe is [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/10/20/debugging-the-debugger/#comment-59255</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Thu, 11 Dec 2008 21:45:51 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/10/20/debugging-the-debugger/#comment-59255</guid>
		<description>Two years ago when I wrote this post I didn't know that :-)</description>
		<content:encoded><![CDATA[<p>Two years ago when I wrote this post I didn&#8217;t know that <img src='https://www.dumpanalysis.org/blog/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' /></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: rr</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2006/10/20/debugging-the-debugger/#comment-59224</link>
		<dc:creator>rr</dc:creator>
		<pubDate>Thu, 11 Dec 2008 16:56:15 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2006/10/20/debugging-the-debugger/#comment-59224</guid>
		<description>i dont believe you dont know either ctrl+p enter in cdb or .dbgdbg command in windbag 

0:002&#62; ~*k;.shell -ci "version" findstr "command"

   0  Id: 880.81c Suspend: 1 Teb: 7ffde000 Unfrozen
ChildEBP RetAddr
0006cf24 7c90e306 ntdll!KiFastSystemCallRet
0006cf28 7c80c8d8 ntdll!ZwReleaseSemaphore+0xc
0006cf3c 020bf9e8 kernel32!ReleaseSemaphore+0x14
0006cf94 0102acd0 dbgeng!DebugClient::ExitDispatch+0xd8
0006cfa4 01027915 windbg!UpdateEngine+0x30
0006cfac 01027a0f windbg!FinishCommand+0x15
0006cfd0 01014994 windbg!AddStringCommand+0xef
0006cfe8 01012569 windbg!CmdExecuteCmd+0xa4
0006d044 01018f77 windbg!WinCommand::OnNotify+0x469
0006d1a8 77d48709 windbg!WinBase::BaseProc+0xc87
0006d1d4 77d487eb USER32!InternalCallWinProc+0x28
0006d23c 77d4b743 USER32!UserCallWinProcCheckWow+0x150
0006d278 77d4b7ab USER32!SendMessageWorker+0x4a5
0006d298 74e8abfa USER32!SendMessageW+0x7f
0006d4d0 74e4fe1d RICHED20!CW32System::SendMessage+0x3d
0006d50c 74e50d60 RICHED20!CTxtWinHost::TxNotify+0xd0
0006ddf4 77d48709 RICHED20!RichEditWndProc+0x19b
0006de20 77d487eb USER32!InternalCallWinProc+0x28
0006de88 77d489a5 USER32!UserCallWinProcCheckWow+0x150
0006dee8 77d489e8 USER32!DispatchMessageWorker+0x306

   1  Id: 880.5b8 Suspend: 1 Teb: 7ffdd000 Unfrozen
ChildEBP RetAddr
00d7ff98 7c90d85c ntdll!KiFastSystemCallRet
00d7ff9c 7c9279d4 ntdll!NtDelayExecution+0xc
00d7ffb4 7c80b50b ntdll!RtlpTimerThread+0x47
00d7ffec 00000000 kernel32!BaseThreadStart+0x37

#  2  Id: 880.8e4 Suspend: 1 Teb: 7ffda000 Unfrozen
ChildEBP RetAddr
00f6d238 02141299 ext!analyze
00f6d2c4 021414d9 dbgeng!ExtensionInfo::CallA+0x2e9
00f6d454 021415a2 dbgeng!ExtensionInfo::Call+0x129
00f6d470 0213feb1 dbgeng!ExtensionInfo::CallAny+0x72
00f6d8e8 02181698 dbgeng!ParseBangCmd+0x661
00f6d9d8 02182b29 dbgeng!ProcessCommands+0x508
00f6da1c 020c9049 dbgeng!ProcessCommandsAndCatch+0x49
00f6deb4 020c92aa dbgeng!Execute+0x2b9
00f6dee4 010283bf dbgeng!DebugClient::ExecuteWide+0x6a
00f6df84 0102883b windbg!ProcessCommand+0xff
00f6ffa0 0102aabc windbg!ProcessEngineCommands+0x8b
00f6ffb4 7c80b50b windbg!EngineLoop+0x3dc
00f6ffec 00000000 kernel32!BaseThreadStart+0x37
command line: 'F:\windbgwithdbgengsym\cdb.exe  -server npipe:icfenable,pipe=cdb_
pipe -p 2176'  Debugger Process 0x8EC
.shell: Process exited
0:002&#62;



the crashdump i was looking at while i posted this

BugCheck 35, {85e14008, 0, 0, 0}

*** WARNING: Unable to verify timestamp for HDAudBus.sys
*** ERROR: Module load completed but symbols could not be loaded for HDAudBus.sys
Probably caused by : HDAudBus.sys ( HDAudBus+13bb0 )

Followup: MachineOwner
---------

kd&#62; .dbgdbg
Debugger spawned, connect with
    "-remote npipe:icfenable,pipe=cdb_pipe,server=PRV"


kd&#62; !analyze -v
[...]

NO_MORE_IRP_STACK_LOCATIONS (35)
A higher level driver has attempted to call a lower level driver through
the IoCallDriver() interface, but there are no more stack locations in the
packet, hence, the lower level driver would not be able to access its</description>
		<content:encoded><![CDATA[<p>i dont believe you dont know either ctrl+p enter in cdb or .dbgdbg command in windbag </p>
<p>0:002&gt; ~*k;.shell -ci &#8220;version&#8221; findstr &#8220;command&#8221;</p>
<p>   0  Id: 880.81c Suspend: 1 Teb: 7ffde000 Unfrozen<br />
ChildEBP RetAddr<br />
0006cf24 7c90e306 ntdll!KiFastSystemCallRet<br />
0006cf28 7c80c8d8 ntdll!ZwReleaseSemaphore+0xc<br />
0006cf3c 020bf9e8 kernel32!ReleaseSemaphore+0&#215;14<br />
0006cf94 0102acd0 dbgeng!DebugClient::ExitDispatch+0xd8<br />
0006cfa4 01027915 windbg!UpdateEngine+0&#215;30<br />
0006cfac 01027a0f windbg!FinishCommand+0&#215;15<br />
0006cfd0 01014994 windbg!AddStringCommand+0xef<br />
0006cfe8 01012569 windbg!CmdExecuteCmd+0xa4<br />
0006d044 01018f77 windbg!WinCommand::OnNotify+0&#215;469<br />
0006d1a8 77d48709 windbg!WinBase::BaseProc+0xc87<br />
0006d1d4 77d487eb USER32!InternalCallWinProc+0&#215;28<br />
0006d23c 77d4b743 USER32!UserCallWinProcCheckWow+0&#215;150<br />
0006d278 77d4b7ab USER32!SendMessageWorker+0&#215;4a5<br />
0006d298 74e8abfa USER32!SendMessageW+0&#215;7f<br />
0006d4d0 74e4fe1d RICHED20!CW32System::SendMessage+0&#215;3d<br />
0006d50c 74e50d60 RICHED20!CTxtWinHost::TxNotify+0xd0<br />
0006ddf4 77d48709 RICHED20!RichEditWndProc+0&#215;19b<br />
0006de20 77d487eb USER32!InternalCallWinProc+0&#215;28<br />
0006de88 77d489a5 USER32!UserCallWinProcCheckWow+0&#215;150<br />
0006dee8 77d489e8 USER32!DispatchMessageWorker+0&#215;306</p>
<p>   1  Id: 880.5b8 Suspend: 1 Teb: 7ffdd000 Unfrozen<br />
ChildEBP RetAddr<br />
00d7ff98 7c90d85c ntdll!KiFastSystemCallRet<br />
00d7ff9c 7c9279d4 ntdll!NtDelayExecution+0xc<br />
00d7ffb4 7c80b50b ntdll!RtlpTimerThread+0&#215;47<br />
00d7ffec 00000000 kernel32!BaseThreadStart+0&#215;37</p>
<p>#  2  Id: 880.8e4 Suspend: 1 Teb: 7ffda000 Unfrozen<br />
ChildEBP RetAddr<br />
00f6d238 02141299 ext!analyze<br />
00f6d2c4 021414d9 dbgeng!ExtensionInfo::CallA+0&#215;2e9<br />
00f6d454 021415a2 dbgeng!ExtensionInfo::Call+0&#215;129<br />
00f6d470 0213feb1 dbgeng!ExtensionInfo::CallAny+0&#215;72<br />
00f6d8e8 02181698 dbgeng!ParseBangCmd+0&#215;661<br />
00f6d9d8 02182b29 dbgeng!ProcessCommands+0&#215;508<br />
00f6da1c 020c9049 dbgeng!ProcessCommandsAndCatch+0&#215;49<br />
00f6deb4 020c92aa dbgeng!Execute+0&#215;2b9<br />
00f6dee4 010283bf dbgeng!DebugClient::ExecuteWide+0&#215;6a<br />
00f6df84 0102883b windbg!ProcessCommand+0xff<br />
00f6ffa0 0102aabc windbg!ProcessEngineCommands+0&#215;8b<br />
00f6ffb4 7c80b50b windbg!EngineLoop+0&#215;3dc<br />
00f6ffec 00000000 kernel32!BaseThreadStart+0&#215;37<br />
command line: &#8216;F:\windbgwithdbgengsym\cdb.exe  -server npipe:icfenable,pipe=cdb_<br />
pipe -p 2176&#8242;  Debugger Process 0&#215;8EC<br />
.shell: Process exited<br />
0:002&gt;</p>
<p>the crashdump i was looking at while i posted this</p>
<p>BugCheck 35, {85e14008, 0, 0, 0}</p>
<p>*** WARNING: Unable to verify timestamp for HDAudBus.sys<br />
*** ERROR: Module load completed but symbols could not be loaded for HDAudBus.sys<br />
Probably caused by : HDAudBus.sys ( HDAudBus+13bb0 )</p>
<p>Followup: MachineOwner<br />
&#8212;&#8212;&#8212;</p>
<p>kd&gt; .dbgdbg<br />
Debugger spawned, connect with<br />
    &#8220;-remote npipe:icfenable,pipe=cdb_pipe,server=PRV&#8221;</p>
<p>kd&gt; !analyze -v<br />
[&#8230;]</p>
<p>NO_MORE_IRP_STACK_LOCATIONS (35)<br />
A higher level driver has attempted to call a lower level driver through<br />
the IoCallDriver() interface, but there are no more stack locations in the<br />
packet, hence, the lower level driver would not be able to access its</p>
]]></content:encoded>
	</item>
</channel>
</rss>
