<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Crash Dump Analysis Patterns (Part 16b)</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2008/06/10/crash-dump-analysis-patterns-part-16b/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Thu, 07 May 2026 03:48:52 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: sergmat</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2008/06/10/crash-dump-analysis-patterns-part-16b/#comment-249343</link>
		<dc:creator>sergmat</dc:creator>
		<pubDate>Fri, 04 Mar 2011 17:03:01 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2008/06/10/crash-dump-analysis-patterns-part-16b/#comment-249343</guid>
		<description>void func1(void);
void __cdecl main(void)
{
	func1();
}
void func1(void)
{
	func1();
}

0:000&#62; .lastevent
Last event: d0c.e94: Stack overflow - code c00000fd (first chance)

0:000&#62; k L50
ChildEBP RetAddr  
00103000 002a18e8 test!func1+0x3
00103008 002a18e8 test!func1+0x8
00103010 002a18e8 test!func1+0x8
00103018 002a18e8 test!func1+0x8
...

0:000&#62; !teb
TEB at 7ffdf000
    ExceptionList:        001ffa1c
    StackBase:            00200000
    StackLimit:           00101000
...

0:000&#62;dds 101000 200000
...[ebp][ret addr].. minframe... 
001ff9d4  002a18e8 test!func1+0x8
001ff9d8  001ff9e0
001ff9dc  002a18e8 test!func1+0x8
001ff9e0  001ff9e8
001ff9e4  002a18f8 test!main+0x8
001ff9e8  001ffa2c
001ff9ec  002a1174 test!__tmainCRTStartup+0x122
001ff9f0  00000001
001ff9f4  00651388
001ff9f8  00651928
001ff9fc  bc2792b1
001ffa00  00000000
001ffa04  00000000
001ffa08  7ffdc000
001ffa0c  00000000
001ffa10  00000000
001ffa14  001ff9fc
001ffa18  b33a09b6
001ffa1c  001ffa68
001ffa20  002a1619 test!_except_handler4
001ffa24  bc124925
001ffa28  00000000
001ffa2c  001ffa38
001ffa30  75911194 kernel32!BaseThreadInitThunk+0xe
001ffa34  7ffdc000
001ffa38  001ffa78
001ffa3c  7747b495 ntdll!__RtlUserThreadStart+0x70
001ffa40  7ffdc000
001ffa44  774f7154 ntdll!RtlpSecMemListHead
001ffa48  00000000
001ffa4c  00000000
001ffa50  7ffdc000
001ffa54  00000000
001ffa58  00000000
001ffa5c  00000000
001ffa60  001ffa44
001ffa64  00000000
001ffa68  ffffffff
001ffa6c  7743d75d ntdll!_except_handler4
001ffa70  00178d24
001ffa74  00000000
001ffa78  001ffa90
001ffa7c  7747b468 ntdll!_RtlUserThreadStart+0x1b
001ffa80  002a12dc test!mainCRTStartup
001ffa84  7ffdc000
001ffa88  00000000
001ffa8c  00000000
001ffa90  00000000
001ffa94  00000000
001ffa98  002a12dc test!mainCRTStartup
...

0:000&#62; r
eax=00651928 ebx=00000000 ecx=6ca33714 edx=00000000 esi=00000001 edi=002a3378
eip=002a18e3 esp=00103000 ebp=00103000 iopl=0         nv up ei pl zr na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00010246
test!func1+0x3:
002a18e3 e8f8ffffff      call    test!func1 (002a18e0)

0:000&#62; k 1ff9d8 103000 2a18e3
Requested number of stack frames (0x1ff9d8) is too large! The maximum number is 0xffff.
              ^ Range error in 'k 1ff9d8 103000 2a18e3'

0:000&#62; :)

0:000&#62; k L=1ff9d8 103000 2a18e3
ChildEBP RetAddr  
001ff9d8 002a18e8 test!func1+0x3
001ff9e0 002a18f8 test!func1+0x8
001ff9e8 002a1174 test!main+0x8
001ffa2c 75911194 test!__tmainCRTStartup+0x122
001ffa38 7747b495 kernel32!BaseThreadInitThunk+0xe
001ffa78 7747b468 ntdll!__RtlUserThreadStart+0x70
001ffa90 00000000 ntdll!_RtlUserThreadStart+0x1b
....</description>
		<content:encoded><![CDATA[<p>void func1(void);<br />
void __cdecl main(void)<br />
{<br />
	func1();<br />
}<br />
void func1(void)<br />
{<br />
	func1();<br />
}</p>
<p>0:000&gt; .lastevent<br />
Last event: d0c.e94: Stack overflow - code c00000fd (first chance)</p>
<p>0:000&gt; k L50<br />
ChildEBP RetAddr<br />
00103000 002a18e8 test!func1+0&#215;3<br />
00103008 002a18e8 test!func1+0&#215;8<br />
00103010 002a18e8 test!func1+0&#215;8<br />
00103018 002a18e8 test!func1+0&#215;8<br />
&#8230;</p>
<p>0:000&gt; !teb<br />
TEB at 7ffdf000<br />
    ExceptionList:        001ffa1c<br />
    StackBase:            00200000<br />
    StackLimit:           00101000<br />
&#8230;</p>
<p>0:000&gt;dds 101000 200000<br />
&#8230;[ebp][ret addr].. minframe&#8230;<br />
001ff9d4  002a18e8 test!func1+0&#215;8<br />
001ff9d8  001ff9e0<br />
001ff9dc  002a18e8 test!func1+0&#215;8<br />
001ff9e0  001ff9e8<br />
001ff9e4  002a18f8 test!main+0&#215;8<br />
001ff9e8  001ffa2c<br />
001ff9ec  002a1174 test!__tmainCRTStartup+0&#215;122<br />
001ff9f0  00000001<br />
001ff9f4  00651388<br />
001ff9f8  00651928<br />
001ff9fc  bc2792b1<br />
001ffa00  00000000<br />
001ffa04  00000000<br />
001ffa08  7ffdc000<br />
001ffa0c  00000000<br />
001ffa10  00000000<br />
001ffa14  001ff9fc<br />
001ffa18  b33a09b6<br />
001ffa1c  001ffa68<br />
001ffa20  002a1619 test!_except_handler4<br />
001ffa24  bc124925<br />
001ffa28  00000000<br />
001ffa2c  001ffa38<br />
001ffa30  75911194 kernel32!BaseThreadInitThunk+0xe<br />
001ffa34  7ffdc000<br />
001ffa38  001ffa78<br />
001ffa3c  7747b495 ntdll!__RtlUserThreadStart+0&#215;70<br />
001ffa40  7ffdc000<br />
001ffa44  774f7154 ntdll!RtlpSecMemListHead<br />
001ffa48  00000000<br />
001ffa4c  00000000<br />
001ffa50  7ffdc000<br />
001ffa54  00000000<br />
001ffa58  00000000<br />
001ffa5c  00000000<br />
001ffa60  001ffa44<br />
001ffa64  00000000<br />
001ffa68  ffffffff<br />
001ffa6c  7743d75d ntdll!_except_handler4<br />
001ffa70  00178d24<br />
001ffa74  00000000<br />
001ffa78  001ffa90<br />
001ffa7c  7747b468 ntdll!_RtlUserThreadStart+0&#215;1b<br />
001ffa80  002a12dc test!mainCRTStartup<br />
001ffa84  7ffdc000<br />
001ffa88  00000000<br />
001ffa8c  00000000<br />
001ffa90  00000000<br />
001ffa94  00000000<br />
001ffa98  002a12dc test!mainCRTStartup<br />
&#8230;</p>
<p>0:000&gt; r<br />
eax=00651928 ebx=00000000 ecx=6ca33714 edx=00000000 esi=00000001 edi=002a3378<br />
eip=002a18e3 esp=00103000 ebp=00103000 iopl=0         nv up ei pl zr na pe nc<br />
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00010246<br />
test!func1+0&#215;3:<br />
002a18e3 e8f8ffffff      call    test!func1 (002a18e0)</p>
<p>0:000&gt; k 1ff9d8 103000 2a18e3<br />
Requested number of stack frames (0&#215;1ff9d8) is too large! The maximum number is 0xffff.<br />
              ^ Range error in &#8216;k 1ff9d8 103000 2a18e3&#8242;</p>
<p>0:000&gt; <img src='https://www.dumpanalysis.org/blog/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>0:000&gt; k L=1ff9d8 103000 2a18e3<br />
ChildEBP RetAddr<br />
001ff9d8 002a18e8 test!func1+0&#215;3<br />
001ff9e0 002a18f8 test!func1+0&#215;8<br />
001ff9e8 002a1174 test!main+0&#215;8<br />
001ffa2c 75911194 test!__tmainCRTStartup+0&#215;122<br />
001ffa38 7747b495 kernel32!BaseThreadInitThunk+0xe<br />
001ffa78 7747b468 ntdll!__RtlUserThreadStart+0&#215;70<br />
001ffa90 00000000 ntdll!_RtlUserThreadStart+0&#215;1b<br />
&#8230;.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Incorrect stack trace, stack overflow, early crash dump, nested exception, problem exception handler and same vendor: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2008/06/10/crash-dump-analysis-patterns-part-16b/#comment-198591</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Incorrect stack trace, stack overflow, early crash dump, nested exception, problem exception handler and same vendor: pattern cooperation</dc:creator>
		<pubDate>Sat, 30 Oct 2010 23:19:09 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2008/06/10/crash-dump-analysis-patterns-part-16b/#comment-198591</guid>
		<description>[...] The default analysis command detected stack overflow pattern:  [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] The default analysis command detected stack overflow pattern:  [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Icons for Memory Dump Analysis Patterns (Part 32)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2008/06/10/crash-dump-analysis-patterns-part-16b/#comment-149972</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Icons for Memory Dump Analysis Patterns (Part 32)</dc:creator>
		<pubDate>Wed, 05 May 2010 13:00:19 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2008/06/10/crash-dump-analysis-patterns-part-16b/#comment-149972</guid>
		<description>[...] we introduce an icon for Stack Overflow (user mode) [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] we introduce an icon for Stack Overflow (user mode) [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; WOW64 process, NULL data pointer, stack overflow, main thread, incorrect stack trace, nested exceptions, hidden exception, manual dump, multiple exceptions and virtualized system: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2008/06/10/crash-dump-analysis-patterns-part-16b/#comment-97624</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; WOW64 process, NULL data pointer, stack overflow, main thread, incorrect stack trace, nested exceptions, hidden exception, manual dump, multiple exceptions and virtualized system: pattern cooperation</dc:creator>
		<pubDate>Mon, 05 Oct 2009 22:14:05 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2008/06/10/crash-dump-analysis-patterns-part-16b/#comment-97624</guid>
		<description>[...] looks like a stack overflow. Usually it manifests via a PUSH instruction or a data access violation when ESP/RSP &#60; [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] looks like a stack overflow. Usually it manifests via a PUSH instruction or a data access violation when ESP/RSP &lt; [&#8230;]</p>
]]></content:encoded>
	</item>
</channel>
</rss>
