SkyLined / BugId

Detect, analyze and uniquely identify crashes in Windows applications
https://bugid.skylined.nl
Other
500 stars 90 forks source link

BugId internal crash on rundll32.exe test #102

Closed aaaaaaaaahhfhhfhf closed 1 year ago

aaaaaaaaahhfhhfhf commented 2 years ago

Cloned BugId with git clone --recurse-submodules https://github.com/SkyLined/BugId.git, testing it with method described in readme, getting internal error:

C:\Users\dev\Downloads\BugId>BugId.cmd -v %WinDir%\system32\rundll32.exe -- advapi32 CloseThreadWaitChainSession
┌───[ Warning ]──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
│ You are running an older version of Python (3.9.6) in which this version of
│ BugId was never tested.
│ The following Python versions have been tested:
│   3.8.5, 3.9.1, 3.9.7, and 3.10.0.
│ Please update Python to the latest version!
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
┌───[ Software license warning ]─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
│ ▲ You have no license for BugId and your trial period will expire on February 3th, 2022
│ ▲ You have no license for mBugId and your trial period will expire on February 3th, 2022
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
→ Command line: C:\Windows\system32\rundll32.exe advapi32 CloseThreadWaitChainSession
log>Starting utility process...
log>Started utility process (0x1ED0).
log>Started cdb.exe (Command line components: ['C:\\Program Files (x86)\\Windows Kits\\10\\Debuggers\\x64\\cdb.exe', '-o', '-sflags', '0x000B2A17', '-lines', '-y', 'cache*;srv*http://msdl.microsoft.com/download/symbols', '-p', '7888'])
log>helper thread started (Thread: Thread #3144 [cdb.exe stdin/out thread] <bound method cCdbWrapper_fCdbStdInOutHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>())
log>helper thread started (Thread: Thread #1988 [cdb.exe stderr thread] <bound method cCdbWrapper_fCdbStdErrHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>())
log>helper thread started (Thread: Thread #5068 [cleanup thread] <bound method cCdbWrapper_fCleanupHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>())
log>Starting application (Binary path: C:\Windows\system32\rundll32.exe, Arguments: advapi32 CloseThreadWaitChainSession)
log>Started process (Process id: 10592/0x2960, Binary name: rundll32.exe, Command line: C:\Windows\system32\rundll32.exe advapi32 CloseThreadWaitChainSession)
+ Sub process 10592/0x2960 (rundll32.exe, x64, IL:2): Started (C:\Windows\system32\rundll32.exe advapi32 CloseThreadWaitChainSession).
log>helper thread started (Thread: Thread #12204 [Application stdout thread for process 10592/0x2960] <bound method cCdbWrapper_fApplicationStdOutOrErrHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>(<mWindowsAPI.cConsoleProcess#26234E79EB0|pid = 0x2960|ISA = x64|command = C:\Windows\system32\rundll32.exe advapi32 CloseThreadWaitChainSession|access = PROCESS_ALL_ACCESS|piped = stdout | stderr>, <mWindowsAPI.cPipe.cPipe object at 0x0000026234E72B20>, 'stdout'))
log>helper thread started (Thread: Thread #11716 [Application stderr thread for process 10592/0x2960] <bound method cCdbWrapper_fApplicationStdOutOrErrHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>(<mWindowsAPI.cConsoleProcess#26234E79EB0|pid = 0x2960|ISA = x64|command = C:\Windows\system32\rundll32.exe advapi32 CloseThreadWaitChainSession|access = PROCESS_ALL_ACCESS|piped = stdout | stderr>, <mWindowsAPI.cPipe.cPipe object at 0x0000026234E72AC0>, 'stderr'))
stdout>
stdout>Microsoft (R) Windows Debugger Version 10.0.22000.194 AMD64
stdout>Copyright (c) Microsoft Corporation. All rights reserved.
stdout>
stdout>*** wait with pending attach
stdout>
stdout>************* Path validation summary **************
stdout>Response                         Time (ms)     Location
stdout>Deferred                                       cache*
stdout>Deferred                                       srv*http://msdl.microsoft.com/download/symbols
stdout>Deferred                                       SRV*C:\symbols*https://msdl.microsoft.com/download/symbols
stdout>Deferred                                       SRV*C:\symbols*https://chromium-browser-symsrv.commondatastorage.googleapis.com
stdout>Deferred                                       SRV*C:\symbols*https://download.amd.com/dir/bin
stdout>Deferred                                       SRV*C:\symbols*https://driver-symbols.nvidia.com/
stdout>Deferred                                       SRV*C:\symbols*https://software.intel.com/sites/downloads/symbols/
stdout>Symbol search path is: cache*;srv*http://msdl.microsoft.com/download/symbols;SRV*C:\symbols*https://msdl.microsoft.com/download/symbols;SRV*C:\symbols*https://chromium-browser-symsrv.commondatastorage.googleapis.com;SRV*C:\symbols*https://download.amd.com/dir/bin;SRV*C:\symbols*https://driver-symbols.nvidia.com/;SRV*C:\symbols*https://software.intel.com/sites/downloads/symbols/
stdout>Executable search path is:
stdout>ModLoad: 00007ff6`9c5b0000 00007ff6`9c5e0000   cdb.exe
stdout>ModLoad: 00007fff`0e710000 00007fff`0e905000   ntdll.dll
stdout>ModLoad: 00007fff`0c7f0000 00007fff`0c8ae000   C:\Windows\System32\KERNEL32.DLL
stdout>ModLoad: 00007fff`0c480000 00007fff`0c748000   C:\Windows\System32\KERNELBASE.dll
stdout>ModLoad: 00007fff`0dd80000 00007fff`0de1e000   C:\Windows\System32\msvcrt.dll
stdout>ModLoad: 00007ffe`ac540000 00007ffe`acde3000   C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\dbgeng.dll
stdout>ModLoad: 00007fff`0c2f0000 00007fff`0c3f0000   C:\Windows\System32\ucrtbase.dll
stdout>ModLoad: 00007fff`0cf30000 00007fff`0d05a000   C:\Windows\System32\RPCRT4.dll
stdout>ModLoad: 00007fff`0c750000 00007fff`0c7eb000   C:\Windows\System32\sechost.dll
stdout>ModLoad: 00007fff`0bf90000 00007fff`0bfb7000   C:\Windows\System32\bcrypt.dll
stdout>ModLoad: 00007ffe`ac460000 00007ffe`ac53e000   C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\dbgmodel.dll
stdout>ModLoad: 00007fff`0cc40000 00007fff`0cd0d000   C:\Windows\System32\OLEAUT32.dll
stdout>ModLoad: 00007ffe`adcf0000 00007ffe`adf11000   C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\dbghelp.dll
stdout>ModLoad: 00000239`73700000 00000239`737cd000   C:\Windows\System32\OLEAUT32.dll
stdout>ModLoad: 00007fff`06b70000 00007fff`06ba6000   C:\Windows\SYSTEM32\XmlLite.dll
stdout>ModLoad: 00007fff`0c120000 00007fff`0c1bd000   C:\Windows\System32\msvcp_win.dll
stdout>ModLoad: 00007fff`0d060000 00007fff`0d3b5000   C:\Windows\System32\combase.dll
stdout>(1ed0.1f94): Break instruction exception - code 80000003 (first chance)
stdout>ntdll!LdrpDoDebuggerBreak+0x30:
stdout>00007fff`0e7e06b0 cc              int     3
stdout>0:001>
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ .prompt_allow -dis -ea -reg -src -sym; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Display only the prompt
stdout><☺[☻{
stdout>Allow the following information to be displayed at the prompt:
stdout>(Other settings can affect whether the information is actually displayed)
stdout>  None
stdout>Do not allow the following information to be displayed at the prompt:
stdout>   sym - Symbol for current instruction
stdout>   dis - Disassembly of current instruction
stdout>    ea - Effective address for current instruction
stdout>   reg - Register state
stdout>   src - Source info for current instruction
stdout>}☻]☺>
stdout>0:001>
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ .pcmd -s ".printf \"\\r\\n\";"; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Output a CRLF after running the application
stdout><☺[☻{
stdout>Set prompt command
stdout>Per-prompt command is '.printf "\r\n";'
stdout>}☻]☺>
stdout>0:001>
log>Main loop #1
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ .lastevent; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Get information about last event
stdout><☺[☻{
stdout>Last event: 1ed0.1f94: Break instruction exception - code 80000003 (first chance)
stdout>  debugger time: Mon Jan  3 21:01:48.482 2022 (UTC + 1:00)
stdout>}☻]☺>
stdout>0:001>
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ sxd *; sxe cpr; sxe epr; sxe aph; sxe 0xC0000005; sxe 0x80000003; sxe 0xC000008C; sxe 0x80000002; sxe 0xC0000602; sxe 0x80000001; sxe 0xC000001D; sxe 0xC0000006; sxe 0xC0000096; sxe 0xC0000409; sxe 0xC00000FD; sxe 0x4000001F; sxe out; sxe 0x00000008; sxe 0x0000000E; sxe 0x0000046A; sxe 0x00003623; sxe 0xC0000017; sxe 0xE0000008; sxd 0xC0000420; sxi ibp; sxi ld; sxi ud; sxi 0x80000007; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Setup exception handling
stdout><☺[☻{
stdout>}☻]☺>
stdout>0:001>
log>Attached to utility process (Process id: 7888/0x1ED0)
log>Attaching to process (Process: 10592/0x2960)
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ .attach 0x2960; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Attach to process 10592
stdout><☺[☻{
stdout>Attach will occur on next execution
stdout>}☻]☺>
stdout>0:001>
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ .time; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Get debugger time
stdout><☺[☻{
stdout>Debug session time: Mon Jan  3 21:01:48.613 2022 (UTC + 1:00)
stdout>System Uptime: 4 days 8:10:03.413
stdout>Process Uptime: 0 days 0:00:00.730
stdout>  Kernel time: 0 days 0:00:00.078
stdout>  User time: 0 days 0:00:00.000
stdout>}☻]☺>
stdout>0:001>
<stdin<gh;
log>helper thread started (Thread: Thread #11516 [cdb.exe interrupt on timeout thread] <bound method cCdbWrapper_fCdbInterruptOnTimeoutHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>())
stdout>*** wait with pending attach
log>StdOut output (Line: b'*** wait with pending attach')
stdout>
stdout>************* Path validation summary **************
log>StdOut output (Line: b'************* Path validation summary **************')
stdout>Response                         Time (ms)     Location
log>StdOut output (Line: b'Response                         Time (ms)     Location')
stdout>Deferred                                       cache*
log>StdOut output (Line: b'Deferred                                       cache*')
stdout>Deferred                                       srv*http://msdl.microsoft.com/download/symbols
log>Interrupting application to fire timeout (Timeout: Attaching to process 10592/0x2960)
log>StdOut output (Line: b'Deferred                                       srv*http://msdl.microsoft.com/download/symbols')
log>helper thread terminated (Thread: Thread #11516 [cdb.exe interrupt on timeout thread] <bound method cCdbWrapper_fCdbInterruptOnTimeoutHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>())
stdout>Deferred                                       SRV*C:\symbols*https://msdl.microsoft.com/download/symbols
log>StdOut output (Line: b'Deferred                                       SRV*C:\\symbols*https://msdl.microsoft.com/download/symbols')
stdout>Deferred                                       SRV*C:\symbols*https://chromium-browser-symsrv.commondatastorage.googleapis.com
log>StdOut output (Line: b'Deferred                                       SRV*C:\\symbols*https://chromium-browser-symsrv.commondatastorage.googleapis.com')
stdout>Deferred                                       SRV*C:\symbols*https://download.amd.com/dir/bin
log>StdOut output (Line: b'Deferred                                       SRV*C:\\symbols*https://download.amd.com/dir/bin')
stdout>Deferred                                       SRV*C:\symbols*https://driver-symbols.nvidia.com/
log>StdOut output (Line: b'Deferred                                       SRV*C:\\symbols*https://driver-symbols.nvidia.com/')
stdout>Deferred                                       SRV*C:\symbols*https://software.intel.com/sites/downloads/symbols/
log>StdOut output (Line: b'Deferred                                       SRV*C:\\symbols*https://software.intel.com/sites/downloads/symbols/')
stdout>Symbol search path is: cache*;srv*http://msdl.microsoft.com/download/symbols;SRV*C:\symbols*https://msdl.microsoft.com/download/symbols;SRV*C:\symbols*https://chromium-browser-symsrv.commondatastorage.googleapis.com;SRV*C:\symbols*https://download.amd.com/dir/bin;SRV*C:\symbols*https://driver-symbols.nvidia.com/;SRV*C:\symbols*https://software.intel.com/sites/downloads/symbols/
log>StdOut output (Line: b'Symbol search path is: cache*;srv*http://msdl.microsoft.com/download/symbols;SRV*C:\\symbols*https://msdl.microsoft.com/download/symbols;SRV*C:\\symbols*https://chromium-browser-symsrv.commondatastorage.googleapis.com;SRV*C:\\symbols*https://download.amd.com/dir/bin;SRV*C:\\symbols*https://driver-symbols.nvidia.com/;SRV*C:\\symbols*https://software.intel.com/sites/downloads/symbols/')
stdout>Executable search path is:
log>StdOut output (Line: b'Executable search path is: ')
stdout>
stdout>1:005>
<stdin<
stdout>1:005>
log>Main loop #2
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ .lastevent; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Get information about last event
stdout><☺[☻{
stdout>Last event: 2960.3b74: Create process 1:2960
stdout>  debugger time: Mon Jan  3 21:01:48.627 2022 (UTC + 1:00)
stdout>}☻]☺>
stdout>1:005>
log>Process attached (Is main process: yes, Process Id: 0x2960, Binary name: rundll32.exe, Command line: C:\Windows\system32\rundll32.exe advapi32 CloseThreadWaitChainSession)
+ Main process 10592/0x2960 (rundll32.exe, x64, IL:2): Attached (C:\Windows\system32\rundll32.exe advapi32 CloseThreadWaitChainSession).
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ ~*m }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Resume threads for process 0x2960
stdout><☺[☻{
stdout>}☻]☺>
stdout>1:005>
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ .childdbg 1; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Debug child processes
stdout><☺[☻{
stdout>Processes created by the current process will be debugged
stdout>}☻]☺>
stdout>1:005>
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ .time; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Get debugger time
stdout><☺[☻{
stdout>Debug session time: Mon Jan  3 21:01:48.725 2022 (UTC + 1:00)
stdout>System Uptime: 4 days 8:10:03.524
stdout>Process Uptime: 0 days 0:00:00.791
stdout>  Kernel time: 0 days 0:00:00.000
stdout>  User time: 0 days 0:00:00.000
stdout>}☻]☺>
stdout>1:005>
<stdin<gh;
log>helper thread started (Thread: Thread #9192 [cdb.exe interrupt on timeout thread] <bound method cCdbWrapper_fCdbInterruptOnTimeoutHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>())
stdout>(1ed0.2c0): Access violation - code c0000005 (first chance)
log>StdOut output (Line: b'(1ed0.2c0): Access violation - code c0000005 (first chance)')
stdout>First chance exceptions are reported before any exception handling.
log>StdOut output (Line: b'First chance exceptions are reported before any exception handling.')
stdout>This exception may be expected and handled.
log>StdOut output (Line: b'This exception may be expected and handled.')
stdout>
stdout>0:001>
log>helper thread terminated (Thread: Thread #9192 [cdb.exe interrupt on timeout thread] <bound method cCdbWrapper_fCdbInterruptOnTimeoutHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>())
<stdin<
stdout>0:001>
log>Main loop #3
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ .lastevent; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Get information about last event
stdout><☺[☻{
stdout>Last event: 1ed0.2c0: Access violation - code c0000005 (first chance)
stdout>  debugger time: Mon Jan  3 21:01:48.736 2022 (UTC + 1:00)
stdout>}☻]☺>
stdout>0:001>
log>Application interrupted
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ .time; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Get debugger time
stdout><☺[☻{
stdout>Debug session time: Mon Jan  3 21:01:48.782 2022 (UTC + 1:00)
stdout>System Uptime: 4 days 8:10:03.581
stdout>Process Uptime: 0 days 0:00:00.899
stdout>  Kernel time: 0 days 0:00:00.078
stdout>  User time: 0 days 0:00:00.000
stdout>}☻]☺>
stdout>0:001>
<stdin<gh;
log>helper thread started (Thread: Thread #9296 [cdb.exe interrupt on timeout thread] <bound method cCdbWrapper_fCdbInterruptOnTimeoutHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>())
stdout>Page heap: pid 0x2960: page heap enabled with flags 0x2.
log>StdOut output (Line: b'Page heap: pid 0x2960: page heap enabled with flags 0x2.')
stdout>
stdout>1:006>
log>helper thread terminated (Thread: Thread #9296 [cdb.exe interrupt on timeout thread] <bound method cCdbWrapper_fCdbInterruptOnTimeoutHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>())
<stdin<
stdout>1:006>
log>Main loop #4
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ .lastevent; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Get information about last event
stdout><☺[☻{
stdout>Last event: <no event>
stdout>  debugger time: Mon Jan  3 21:01:48.792 2022 (UTC + 1:00)
stdout>}☻]☺>
stdout>1:006>
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ r @$tpid; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Get current process id
stdout><☺[☻{
stdout>$tpid=0000000000002960
stdout>}☻]☺>
stdout>1:006>
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ r @$tid; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Get current thread id
stdout><☺[☻{
stdout>$tid=0000000000001a28
stdout>}☻]☺>
stdout>1:006>
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ .time; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Get debugger time
stdout><☺[☻{
stdout>Debug session time: Mon Jan  3 21:01:48.826 2022 (UTC + 1:00)
stdout>System Uptime: 4 days 8:10:03.626
stdout>Process Uptime: 0 days 0:00:00.893
stdout>  Kernel time: 0 days 0:00:00.000
stdout>  User time: 0 days 0:00:00.000
stdout>}☻]☺>
stdout>1:006>
<stdin<gh;
log>helper thread started (Thread: Thread #5448 [cdb.exe interrupt on timeout thread] <bound method cCdbWrapper_fCdbInterruptOnTimeoutHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>())
stdout>(2960.3b74): Access violation - code c0000005 (first chance)
log>StdOut output (Line: b'(2960.3b74): Access violation - code c0000005 (first chance)')
stdout>First chance exceptions are reported before any exception handling.
log>StdOut output (Line: b'First chance exceptions are reported before any exception handling.')
stdout>This exception may be expected and handled.
log>StdOut output (Line: b'This exception may be expected and handled.')
stdout>
stdout>1:005>
log>helper thread terminated (Thread: Thread #5448 [cdb.exe interrupt on timeout thread] <bound method cCdbWrapper_fCdbInterruptOnTimeoutHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>())
<stdin<
stdout>1:005>
log>Main loop #5
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ .lastevent; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Get information about last event
stdout><☺[☻{
stdout>Last event: 2960.3b74: Access violation - code c0000005 (first chance)
stdout>  debugger time: Mon Jan  3 21:01:48.855 2022 (UTC + 1:00)
stdout>}☻]☺>
stdout>1:005>
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ .exr -1; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Get exception record
stdout><☺[☻{
stdout>ExceptionAddress: 00007fff0d420dd4 (advapi32!WctRemoveEntry+0x0000000000000068)
stdout>   ExceptionCode: c0000005 (Access violation)
stdout>  ExceptionFlags: 00000000
stdout>NumberParameters: 2
stdout>   Parameter[0]: 0000000000000000
stdout>   Parameter[1]: 0000000000000000
stdout>Attempt to read from address 0000000000000000
stdout>}☻]☺>
stdout>1:005>
<stdin<.printf "%c%c%c%c%c\r\n", 0x3C, 0x1, 0x5B, 0x2, 0x7B; .block{ lmov m advapi32; }; .printf "%c%c%c%c%c\r\n", 0x7D, 0x2, 0x5D, 0x1, 0x3E; $$ Get module information
stdout><☺[☻{
stdout>start             end                 module name
stdout>00007fff`0d3c0000 00007fff`0d46c000   advapi32   (pdb symbols)          C:\ProgramData\dbg\sym\advapi32.pdb\91DD02B3506AE1A9359AA29C417AEE731\advapi32.pdb
stdout>    Loaded symbol image file: C:\Windows\System32\advapi32.DLL
stdout>    Image path: C:\Windows\System32\advapi32.DLL
stdout>    Image name: advapi32.DLL
stdout>    Image was built with /Brepro flag.
stdout>    Timestamp:        1BFDEC59 (This is a reproducible build file hash, not a timestamp)
stdout>    CheckSum:         000B05CC
stdout>    ImageSize:        000AC000
stdout>    File version:     10.0.19041.1052
stdout>    Product version:  10.0.19041.1052
stdout>    File flags:       0 (Mask 3F)
stdout>    File OS:          40004 NT Win32
stdout>    File type:        2.0 Dll
stdout>    File date:        00000000.00000000
stdout>    Translations:     0409.04b0
stdout>    Information from resource tables:
stdout>        CompanyName:      Microsoft Corporation
stdout>        ProductName:      Microsoft® Windows® Operating System
stdout>        InternalName:     advapi32.dll
stdout>        OriginalFilename: advapi32.dll
stdout>        ProductVersion:   10.0.19041.1052
stdout>        FileVersion:      10.0.19041.1052 (WinBuild.160101.0800)
stdout>        FileDescription:  Advanced Windows 32 Base API
stdout>        LegalCopyright:   © Microsoft Corporation. All rights reserved.
stdout>}☻]☺>
stdout>1:005>
┌───[ Fatal builtins.AttributeError Exception in thread 3144/0xC48 (cThread#26234E72DF0{main = __fRun, #3144, running}) ]────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
│ cProcess instance has no attribute fs0GetBinaryPathForModuleAddress:
│
│ Local variables:
│   oSelf = <mBugId.cProcess.cProcess.cProcess object at 0x0000026234EBA4C0>#26234EBA4C0
│   uAddress = 140733415424000
│
│ Stack for thread 3144/0xC48 (cThread#26234E72DF0{main = __fRun, #3144, running}):
│ ─┐ __fRun @ C:\Users\dev\Downloads\BugId\modules\mBugId\cCdbWrapper\cCdbWrapper_cHelperThread.py/66
│  │ 65:      try:
│  │ 66:        oSelf.__fActivity(*oSelf.__axActivityArguments);
│  ├─┐ cCdbWrapper_fCdbStdInOutHelperThread @ C:\Users\dev\Downloads\BugId\modules\mBugId\cCdbWrapper\cCdbWrapper_fCdbStdInOutHelperThread.py/54
│  ╷ │ 53:    oCdbWrapper.fbFireCallbacks("Log message", "Main loop #%d" % uMainLoopCounter);
│  ╷ │ 54:    (bEventIsFatal, bEventHasBeenHandled) = oCdbWrapper.ftbHandleLastCdbEvent(asbOutputWhileRunningApplication);
│  ╷ ├─┐ cCdbWrapper_ftbHandleLastCdbEvent @ C:\Users\dev\Downloads\BugId\modules\mBugId\cCdbWrapper\cCdbWrapper_ftbHandleLastCdbEvent.py/175
│  ╷ ╷ │ 174:  bApplicationCannotHandleException = sbExceptionChance == b"second";
│  ╷ ╷ │ 175:  oException = cException.foCreateForLastExceptionInProcess(
│  ╷ ╷ ├─┐ cException?.foCreateForLastExceptionInProcess @ C:\Users\dev\Downloads\BugId\modules\mBugId\cException.py/36
│  ╷ ╷ ╷ │ 35:  def foCreateForLastExceptionInProcess(cException, oProcess, uExpectedCode, bApplicationCannotHandleException):
│  ╷ ╷ ╷ │ 36:    return cException(oProcess, None, bApplicationCannotHandleException);
│  ╷ ╷ ╷ ├─┐ cException?.__init__ @ C:\Users\dev\Downloads\BugId\modules\mBugId\cException.py/150
│  ╷ ╷ ╷ ╷ │ 149:        oSelf.o0Function, oSelf.i0OffsetFromStartOfFunction
│  ╷ ╷ ╷ ╷ │ 150:      ) = oProcess.ftxSplitSymbolOrAddress(sb0AddressSymbol);
│  ╷ ╷ ╷ ╷ ├─┐ cProcess_ftxSplitSymbolOrAddress @ C:\Users\dev\Downloads\BugId\modules\mBugId\cProcess\cProcess_ftxSplitSymbolOrAddress.py/39
│  ╷ ╷ ╷ ╷ ╷ │ 38:    elif sb0FunctionSymbol is not None:
│  ╷ ╷ ╷ ╷ ╷ │ 39:      o0Function = o0Module.foGetOrCreateFunctionForSymbol(sb0FunctionSymbol);
│  ╷ ╷ ╷ ╷ ╷ ├─┐ cModule?.foGetOrCreateFunctionForSymbol @ C:\Users\dev\Downloads\BugId\modules\mBugId\cModule\cModule.py/77
│  ╷ ╷ ╷ ╷ ╷ ╷ │ 76:    if sbSymbol not in oSelf.__doFunction_by_sbSymbol:
│  ╷ ╷ ╷ ╷ ╷ ╷ │ 77:      oSelf.__doFunction_by_sbSymbol[sbSymbol] = cFunction(oSelf, sbSymbol);
│  ╷ ╷ ╷ ╷ ╷ ╷ ├─┐ cFunction?.__init__ @ C:\Users\dev\Downloads\BugId\modules\mBugId\cFunction.py/6
│  ╷ ╷ ╷ ╷ ╷ ╷ ╷ │ 5:    oSelf.sbCdbId = b"%s!%s" % (oModule.sbCdbId, sbSymbol);
│  ╷ ╷ ╷ ╷ ╷ ╷ ╷ │ 6:    oSelf.sbName = b"%s!%s" % (oModule.sb0BinaryName or "<unknown module>", sbSymbol);
│  ╷ ╷ ╷ ╷ ╷ ╷ ╷ ├─┐ sb0BinaryName @ C:\Users\dev\Downloads\BugId\modules\mBugId\cModule\cModule.py/132
│  ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ │ 131:  def sb0BinaryName(oSelf):
│  ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ │ 132:    s0BinaryName = oSelf.s0BinaryName;
│  ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ├─┐ s0BinaryName @ C:\Users\dev\Downloads\BugId\modules\mBugId\cModule\cModule.py/128
│  ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ │ 127:  def s0BinaryName(oSelf):
│  ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ │ 128:    s0BinaryPath = oSelf.s0BinaryPath;
│  ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ├─┐ s0BinaryPath @ C:\Users\dev\Downloads\BugId\modules\mBugId\cModule\cModule.py/123
│  ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ │ 122:    if oSelf.__s0BinaryPath is None:
│  ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ │ 123:      oSelf.__s0BinaryPath = oSelf.oProcess.fs0GetBinaryPathForModuleAddress(oSelf.uStartAddress);
│  ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ├─┐ cProcess?.fs0GetBinaryPathForModuleAddress @ C:\Users\dev\Downloads\BugId\modules\mBugId\cProcess\cProcess.py/165
│  ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ │ 164:  def fs0GetBinaryPathForModuleAddress(oSelf, uAddress):
│  ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ ╷ │ 165:    return oSelf.oWindowsAPIProcess.fs0GetBinaryPathForModuleAddress(uAddress);
│  ╒═════════════════════╛ ▲ AttributeError("'cProcess' object has no attribute 'fs0GetBinaryPathForModuleAddress'")
│  │ __fRun @ C:\Users\dev\Downloads\BugId\modules\mBugId\cCdbWrapper\cCdbWrapper_cHelperThread.py/74
│  │ 73:        cException, oException, oTraceBack = sys.exc_info();
│  │ 74:        if not oSelf.__oCdbWrapper.fbFireCallbacks("Internal exception", oSelf.__oThread, oException, oTraceBack):
│ ═╛ ▲ Application terminated because exception was not handled.
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────

Please report the above details at the below web-page so it can be addressed:
    https://github.com/SkyLined/BugId/issues/new
If you do not have a github account, or you want to report this issue
privately, you can also send an email to:
    BugId@skylined.nl

In your report, please copy ALL the information about the exception reported
above, as well as the stack trace and BugId version information. This makes
it easier to determine the cause of this issue and makes for faster fixes.

  ____________________________________________________________________________
                              __
   ││▌║█▐▐║▌▌█│║║│      _,siSP**YSis,_       ╒╦╦══╦╗             ╒╦╦╕    ╔╦╕
   ││▌║█▐▐║▌▌█│║║│    ,SP*'`    . `'*YS,      ║╠══╬╣ ╔╗ ╔╗ ╔╦═╦╗  ║║  ╔╦═╬╣
   ╵2808197631337╵   dS'  _    |    _ 'Sb    ╘╩╩══╩╝ ╚╩═╩╝ ╚╩═╬╣ ╘╩╩╛ ╚╩═╩╝
                    dP     \,-` `-<` `  Y;                 ╚╩═╩╝    ╮╷╭
      ╮╷╭          ,S`  \+' \      \    `Sissssssssssssssssssss,   :O()    ╲ö╱
     :O()          (S   (   | --====)   :SSSSSSSSSSSSSSSSSSSSSSD    ╯╵╰    ─O─
      ╯╵╰  ╮╷╭     'S,  /+, /      /    ,S?********************'           ╱O╲
           ()O:     Yb    _/'-_ _-<._.  dP
           ╯╵╰       YS,       |      ,SP         https://bugid.skylined.nl
  ____________________`Sbs,_    ' _,sdS`______________________________________
                        `'*YSissiSY*'`
                              ``
┌───[ Version information ]──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
│ ▲ BugId version: 2021-11-04 13:39 (in trial period).
│ ▲ mBugId version: 2021-11-04 13:39 (in trial period).
│ √ mConsole version: 2021-11-04 13:38.
│ √ mDateTime version: 2021-11-04 13:38.
│ √ mDebugOutput version: 2021-11-04 13:38.
│ √ mFileSystemItem version: 2021-11-04 13:38.
│ √ mHumanReadable version: 2021-11-04 13:38.
│ √ mMultiThreading version: 2021-11-04 13:38.
│ √ mNotProvided version: 2021-11-04 13:38.
│ √ mProductDetails version: 2021-11-04 13:38.
│ √ mRegistry version: 2021-11-04 13:38.
│ √ mWindowsAPI version: 2021-11-04 13:38.
│ √ mWindowsSDK version: 2021-11-04 13:38.
│ • Windows version: Windows 10 Pro release 2009, build 19044 x64.
│ • Python version: 3.9.6 x64.
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
Thank you in advance for helping to improve BugId!
√ A copy of the error report can be found in C:\Users\dev\Downloads\BugId\Internal error reports\BugId error report #3.txt.
log>helper thread terminated (Thread: Thread #3144 [cdb.exe stdin/out thread] <bound method cCdbWrapper_fCdbStdInOutHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>())
log>Failed to read from cdb.exe stderr
log>helper thread terminated (Thread: Thread #12204 [Application stdout thread for process 10592/0x2960] <bound method cCdbWrapper_fApplicationStdOutOrErrHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>(<mWindowsAPI.cConsoleProcess#26234E79EB0|pid = 0x2960|ISA = x64|command = C:\Windows\system32\rundll32.exe advapi32 CloseThreadWaitChainSession|access = PROCESS_ALL_ACCESS|piped = stdout | stderr>, <mWindowsAPI.cPipe.cPipe object at 0x0000026234E72B20>, 'stdout'))
log>cdb stdin/out closed
log>helper thread terminated (Thread: Thread #11716 [Application stderr thread for process 10592/0x2960] <bound method cCdbWrapper_fApplicationStdOutOrErrHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>(<mWindowsAPI.cConsoleProcess#26234E79EB0|pid = 0x2960|ISA = x64|command = C:\Windows\system32\rundll32.exe advapi32 CloseThreadWaitChainSession|access = PROCESS_ALL_ACCESS|piped = stdout | stderr>, <mWindowsAPI.cPipe.cPipe object at 0x0000026234E72AC0>, 'stderr'))
log>helper thread terminated (Thread: Thread #1988 [cdb.exe stderr thread] <bound method cCdbWrapper_fCdbStdErrHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>())
log>cdb.exe terminated unexpectedly
┌───[ Fatal builtins.AssertionError Exception in thread 5068/0x13CC (cThread#26234E79F70{main = __fRun, #5068, running}) ]───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
│ cdb.exe terminated with exit code 0x0
│
│ Local variables:
│   oCdbWrapper = <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>#26234E5E280
│
│ Stack for thread 5068/0x13CC (cThread#26234E79F70{main = __fRun, #5068, running}):
│ ─┐ __fRun @ C:\Users\dev\Downloads\BugId\modules\mBugId\cCdbWrapper\cCdbWrapper_cHelperThread.py/66
│  │ 65:      try:
│  │ 66:        oSelf.__fActivity(*oSelf.__axActivityArguments);
│  ├─┐ cCdbWrapper_fCleanupHelperThread @ C:\Users\dev\Downloads\BugId\modules\mBugId\cCdbWrapper\cCdbWrapper_fCleanupHelperThread.py/16
│  ╷ │ 15:      oCdbWrapper.fbFireCallbacks("Log message", "cdb.exe terminated unexpectedly");
│  ╷ │ 16:      raise AssertionError("cdb.exe terminated with exit code 0x%X" % oCdbWrapper.oCdbConsoleProcess.uExitCode);
│  ╒═╛ ▲ Assertion failed: 'cdb.exe terminated with exit code 0x0'
│  │ __fRun @ C:\Users\dev\Downloads\BugId\modules\mBugId\cCdbWrapper\cCdbWrapper_cHelperThread.py/74
│  │ 73:        cException, oException, oTraceBack = sys.exc_info();
│  │ 74:        if not oSelf.__oCdbWrapper.fbFireCallbacks("Internal exception", oSelf.__oThread, oException, oTraceBack):
│ ═╛ ▲ Application terminated because exception was not handled.
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────

Please report the above details at the below web-page so it can be addressed:
    https://github.com/SkyLined/BugId/issues/new
If you do not have a github account, or you want to report this issue
privately, you can also send an email to:
    BugId@skylined.nl

In your report, please copy ALL the information about the exception reported
above, as well as the stack trace and BugId version information. This makes
it easier to determine the cause of this issue and makes for faster fixes.

  ____________________________________________________________________________
                              __
   ││▌║█▐▐║▌▌█│║║│      _,siSP**YSis,_       ╒╦╦══╦╗             ╒╦╦╕    ╔╦╕
   ││▌║█▐▐║▌▌█│║║│    ,SP*'`    . `'*YS,      ║╠══╬╣ ╔╗ ╔╗ ╔╦═╦╗  ║║  ╔╦═╬╣
   ╵2808197631337╵   dS'  _    |    _ 'Sb    ╘╩╩══╩╝ ╚╩═╩╝ ╚╩═╬╣ ╘╩╩╛ ╚╩═╩╝
                    dP     \,-` `-<` `  Y;                 ╚╩═╩╝    ╮╷╭
      ╮╷╭          ,S`  \+' \      \    `Sissssssssssssssssssss,   :O()    ╲ö╱
     :O()          (S   (   | --====)   :SSSSSSSSSSSSSSSSSSSSSSD    ╯╵╰    ─O─
      ╯╵╰  ╮╷╭     'S,  /+, /      /    ,S?********************'           ╱O╲
           ()O:     Yb    _/'-_ _-<._.  dP
           ╯╵╰       YS,       |      ,SP         https://bugid.skylined.nl
  ____________________`Sbs,_    ' _,sdS`______________________________________
                        `'*YSissiSY*'`
                              ``
┌───[ Version information ]──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
│ ▲ BugId version: 2021-11-04 13:39 (in trial period).
│ ▲ mBugId version: 2021-11-04 13:39 (in trial period).
│ √ mConsole version: 2021-11-04 13:38.
│ √ mDateTime version: 2021-11-04 13:38.
│ √ mDebugOutput version: 2021-11-04 13:38.
│ √ mFileSystemItem version: 2021-11-04 13:38.
│ √ mHumanReadable version: 2021-11-04 13:38.
│ √ mMultiThreading version: 2021-11-04 13:38.
│ √ mNotProvided version: 2021-11-04 13:38.
│ √ mProductDetails version: 2021-11-04 13:38.
│ √ mRegistry version: 2021-11-04 13:38.
│ √ mWindowsAPI version: 2021-11-04 13:38.
│ √ mWindowsSDK version: 2021-11-04 13:38.
│ • Windows version: Windows 10 Pro release 2009, build 19044 x64.
│ • Python version: 3.9.6 x64.
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
Thank you in advance for helping to improve BugId!
√ A copy of the error report can be found in C:\Users\dev\Downloads\BugId\Internal error reports\BugId error report #4.txt.
log>helper thread terminated (Thread: Thread #5068 [cleanup thread] <bound method cCdbWrapper_fCleanupHelperThread of <mBugId.cCdbWrapper.cCdbWrapper.cCdbWrapper object at 0x0000026234E5E280>>())
SkyLined commented 2 years ago

Hi, thank you for the report!

It seems the mWindowsAPI module it is using is outdated because it is missing a recently added method.

I am now running an update that pulls in the latest version of mWindowsAPI. I will let you know once that's done.

SkyLined commented 2 years ago

This is taking a bit longer since I have some unfinished improvements that are causing the tests to fail.

aaaaaaaaahhfhhfhf commented 2 years ago

Thanks for the update!

SkyLined commented 2 years ago

The changes I was working on should now be stable: I ran an update and all tests passed. This means all modules should now be up-to-date. Please try cloning again and testing it.

Thank you for reporting this. Feel free to close this bug if you can confirm it works with the latest version. If I do not hear back from you, I will close the bug out myself.

aaaaaaaaahhfhhfhf commented 2 years ago

Thanks! Now it seems to be working, although another error kicks in when report is being created:

PS C:\Users\dev\Downloads\BugId> C:\Python310\python.exe .\BugId.py C:\Windows\system32\rundll32.exe -- advapi32 CloseThreadWaitChainSession
┌───[ Software license warning ]─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
│ ▲ You have no license for BugId and your trial period will expire on February 3rd, 2022
│ ▲ You have no license for mBugId and your trial period will expire on February 3rd, 2022
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
→ Command line: C:\Windows\system32\rundll32.exe advapi32 CloseThreadWaitChainSession
+ Main process 10524/0x291C (rundll32.exe, x64, IL:2): Attached (C:\Windows\system32\rundll32.exe advapi32 CloseThreadWaitChainSession).
┌───[ A bug was detected ]───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
│ Id @ Location:    AVR:NULL 810.20c @ rundll32.exe!advapi32.dll!WctRemoveEntry
│ Description:      An Access Violation exception happened at 0x0 while attempting to read memory at 0x0 using a NULL pointer.
│ Security impact:  None
│ Version:          rundll32.exe 10.0.19041.746 (x64)
│                   advapi32.DLL 10.0.19041.1052 (x64)
┌───[ Fatal builtins.NameError Exception in thread 15064/0x3AD8 (cThread#28F09A322C0{main = __fRun, #15064, running}) ]──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
│ Undefined variable u0NumberOfRepeats.
│
│ Local variables:
│   bCountBugs = False
│   oBugId = <mBugId.cBugId.cBugId object at 0x0000028F09A01C90>#28F09A01C90
│   oBugReport = <mBugId.cBugReport.cBugReport.cBugReport object at 0x0000028F09A83280>#28F09A83280
│   sBugIdAndLocation = 'AVR:NULL 810.20c @ rundll32.exe!advapi32.dll!WctRemoveEntry'
│   sOutputFileNamesHeader = 'AVR:NULL 810.20c @ rundll32.exe!advapi32.dll!WctRemoveEntry'
│   sVersionInformation = 'advapi32.DLL 10.0.19041.1052 (x64)'
│
│ Stack for thread 15064/0x3AD8 (cThread#28F09A322C0{main = __fRun, #15064, running}):
│ ─┐ __fRun @ C:\Users\dev\Downloads\BugId\modules\mBugId\cCdbWrapper\cCdbWrapper_cHelperThread.py/66
│  │ 65:      try:
│  │ 66:        oSelf.__fActivity(*oSelf.__axActivityArguments);
│  ├─┐ cCdbWrapper_fCdbStdInOutHelperThread @ C:\Users\dev\Downloads\BugId\modules\mBugId\cCdbWrapper\cCdbWrapper_fCdbStdInOutHelperThread.py/54
│  ╷ │ 53:    oCdbWrapper.fbFireCallbacks("Log message", "Main loop #%d" % uMainLoopCounter);
│  ╷ │ 54:    (bEventIsFatal, bEventHasBeenHandled) = oCdbWrapper.ftbHandleLastCdbEvent(asbOutputWhileRunningApplication);
│  ╷ ├─┐ cCdbWrapper_ftbHandleLastCdbEvent @ C:\Users\dev\Downloads\BugId\modules\mBugId\cCdbWrapper\cCdbWrapper_ftbHandleLastCdbEvent.py/220
│  ╷ ╷ │ 219:  ### Report bug and see if the collateral bug handler can ignore it #################################################
│  ╷ ╷ │ 220:  o0BugReport.fReport();
│  ╷ ╷ ├─┐ cBugReport?.fReport @ C:\Users\dev\Downloads\BugId\modules\mBugId\cBugReport\cBugReport.py/329
│  ╷ ╷ ╷ │ 328:
│  ╷ ╷ ╷ │ 329:    assert oCdbWrapper.fbFireCallbacks("Bug report", oSelf), \
│  ╷ ╷ ╷ ├─┐ <lambda> @ C:\Users\dev\Downloads\BugId\modules\mBugId\cBugId.py/193
│  ╷ ╷ ╷ ╷ │ 192:      sEventName,
│  ╷ ╷ ╷ ╷ │ 193:      lambda oCdbWrapper, *txArguments: fCallback(oBugId, *txArguments), # replace oCdbWrapper with oBugId
│  ╷ ╷ ╷ ╷ ├─┐ fBugReportCallback @ C:\Users\dev\Downloads\BugId\BugId.py/407
│  ╷ ╷ ╷ ╷ ╷ │ 406:            # In JIT mode and when counting bugs we prefix the report with the date and time.
│  ╷ ╷ ╷ ╷ ╷ │ 407:            bPrefixWithBugIdStartDateTime = gbRunningAsJITDebugger or bCountBugs or u0NumberOfRepeats is not None,
│  ╷ ╷ ╷ ╷ ╷ │ ▲ NameError("name 'u0NumberOfRepeats' is not defined")
│  ╷ ╷ ╷ ╷ ╷ │ fBugReportCallback @ C:\Users\dev\Downloads\BugId\BugId.py/484
│  ╷ ╷ ╷ ╷ ╷ │ 483:      finally:
│  ╷ ╷ ╷ ╷ ╷ │ 484:        oConsole.fUnlock();
│  ╒═════════╛
│  │ __fRun @ C:\Users\dev\Downloads\BugId\modules\mBugId\cCdbWrapper\cCdbWrapper_cHelperThread.py/74
│  │ 73:        cException, oException, oTraceBack = sys.exc_info();
│  │ 74:        if not oSelf.__oCdbWrapper.fbFireCallbacks("Internal exception", oSelf.__oThread, oException, oTraceBack):
│ ═╛ ▲ Application terminated because exception was not handled.
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────

Please report the above details at the below web-page so it can be addressed:
    https://github.com/SkyLined/BugId/issues/new
If you do not have a github account, or you want to report this issue
privately, you can also send an email to:
    BugId@skylined.nl

In your report, please copy ALL the information about the exception reported
above, as well as the stack trace and BugId version information. This makes
it easier to determine the cause of this issue and makes for faster fixes.

If you can reproduce the issue, it would help a lot if you can run BugId in
verbose mode by adding the --verbose command-line argument.
as in: BugId -v C:\Windows\system32\rundll32.exe -- advapi32 CloseThreadWaitChainSession

  ____________________________________________________________________________
                              __
   ││▌║█▐▐║▌▌█│║║│      _,siSP**YSis,_       ╒╦╦══╦╗             ╒╦╦╕    ╔╦╕
   ││▌║█▐▐║▌▌█│║║│    ,SP*'`    . `'*YS,      ║╠══╬╣ ╔╗ ╔╗ ╔╦═╦╗  ║║  ╔╦═╬╣
   ╵2808197631337╵   dS'  _    |    _ 'Sb    ╘╩╩══╩╝ ╚╩═╩╝ ╚╩═╬╣ ╘╩╩╛ ╚╩═╩╝
                    dP     \,-` `-<` `  Y;                 ╚╩═╩╝    ╮╷╭
      ╮╷╭          ,S`  \+' \      \    `Sissssssssssssssssssss,   :O()    ╲ö╱
     :O()          (S   (   | --====)   :SSSSSSSSSSSSSSSSSSSSSSD    ╯╵╰    ─O─
      ╯╵╰  ╮╷╭     'S,  /+, /      /    ,S?********************'           ╱O╲
           ()O:     Yb    _/'-_ _-<._.  dP
           ╯╵╰       YS,       |      ,SP         https://bugid.skylined.nl
  ____________________`Sbs,_    ' _,sdS`______________________________________
                        `'*YSissiSY*'`
                              ``
┌───[ Version information ]──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
│ ▲ BugId version: 2022-01-05 09:41 (in trial period).
│ ▲ mBugId version: 2022-01-05 09:40 (in trial period).
│ √ mConsole version: 2022-01-05 09:38.
│ √ mDateTime version: 2022-01-05 09:38.
│ √ mDebugOutput version: 2022-01-05 09:38.
│ √ mFileSystemItem version: 2022-01-05 09:38.
│ √ mHumanReadable version: 2022-01-05 09:38.
│ √ mMultiThreading version: 2022-01-05 09:38.
│ √ mNotProvided version: 2022-01-05 09:38.
│ √ mProductDetails version: 2022-01-05 09:39.
│ √ mRegistry version: 2022-01-05 09:38.
│ √ mWindowsAPI version: 2022-01-05 09:38.
│ √ mWindowsSDK version: 2022-01-05 09:38.
│ • Windows version: Windows 10 Pro release 2009, build 19044 x64.
│ • Python version: 3.10.0 x64.
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
Thank you in advance for helping to improve BugId!
┌───[ Fatal builtins.TypeError Exception in thread 15064/0x3AD8 (cThread#28F09A322C0{main = __fRun, #15064, running}) ]──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
│ 'NoneType' object is not iterable
│
│ Local variables:
│   oException = <instance builtins:NameError 'NameError("name \'u0NumberOfRepeats\' is not defined")'>#28F0AA970A0
│   oTraceBack = <traceback object at 0x0000028F0AA90A80>#28F0AA90A80
│   rErrorReportFileName = <instance re:Pattern "re.compile('\\\\A\\\\d{4}.\\\\d\\\\d.\\\\d\\\\d \\\\d\\\\d.\\\\d\\\\d.\\\\d\\\\d(?:.\\\\d+)? BugId error report #(\\\\d+)\\\\.txt\\\\Z')">#28F09B00F20
│   uIndex = 1
│
│ Stack for thread 15064/0x3AD8 (cThread#28F09A322C0{main = __fRun, #15064, running}):
│ ─┐ __fRun @ C:\Users\dev\Downloads\BugId\modules\mBugId\cCdbWrapper\cCdbWrapper_cHelperThread.py/74
│  │ 73:        cException, oException, oTraceBack = sys.exc_info();
│  │ 74:        if not oSelf.__oCdbWrapper.fbFireCallbacks("Internal exception", oSelf.__oThread, oException, oTraceBack):
│  ├─┐ <lambda> @ C:\Users\dev\Downloads\BugId\modules\mBugId\cBugId.py/193
│  ╷ │ 192:      sEventName,
│  ╷ │ 193:      lambda oCdbWrapper, *txArguments: fCallback(oBugId, *txArguments), # replace oCdbWrapper with oBugId
│  ╷ ├─┐ fInternalExceptionCallback @ C:\Users\dev\Downloads\BugId\BugId.py/195
│  ╷ ╷ │ 194:      gbAnInternalErrorOccured = True;
│  ╷ ╷ │ 195:      fSaveInternalExceptionReportAndExit(oException, oTraceBack);
│  ╷ ╷ ├─┐ fSaveInternalExceptionReportAndExit @ C:\Users\dev\Downloads\BugId\BugId.py/210
│  ╷ ╷ ╷ │ 209:        # Scan for previous error reports, so we can number them:
│  ╷ ╷ ╷ │ 210:        for oPotentialOlderErrorReport in goInternalErrorReportsFolder.faoGetChildren():
│  ╒═════╛ ▲ TypeError("'NoneType' object is not iterable")
│  │ __fRun @ C:\Users\dev\Downloads\BugId\modules\mBugId\cCdbWrapper\cCdbWrapper_cHelperThread.py/88
│  │ 87:              "Could not terminate cdb";
│  │ 88:        oSelf.__oCdbWrapper.bCdbIsRunning = False;
│ ═╛ ▲ Application terminated because exception was not handled.
└────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
P
SkyLined commented 2 years ago

I have been refactoring the underlying code to address this. This requires quite a bit of effort and I've found (or introduced) some issues in the .zip file handling that I want to fix as well but haven't tracked down to their origin.

Unfortunately, I am out sick with the flu at the moment.

SkyLined commented 1 year ago

I believe this issue was fixed a while ago. If not, please reopen.