Open bobsummerwill opened 8 years ago
!analyze output after hitting a crash running eip8/test_handshake_eip8_auth1
with Application Verifier basic checks enabled:
0:000> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
APPLICATION_VERIFIER_HEAPS_FIRST_CHANCE_ACCESS_VIOLATION (13)
First chance access violation for current stack trace.
This is the most common application verifier stop. Typically it is caused by a
buffer overrun error. The heap verifier places a non-accessible page at the end
of a heap allocation and a buffer overrun will cause an exception by
touching this page. To debug this stop identify the access address that caused
the exception and then use the following debugger command:
!heap -p -a ACCESS_ADDRESS
This command will give details about the nature of the error and what heap block is
overrun. It will also give the stack trace for the block allocation.
There are several other causes for this stop. For example accessing a heap block
after being freed. The same debugger command will be useful for this case too.
Arguments:
Arg1: 00000176fc8c5fe8, Invalid address causing the exception.
Arg2: 00007ffc90f65d42, Code address executing the invalid access.
Arg3: 00000043763fcc30, Exception record.
Arg4: 00000043763fc740, Context record.
KEY_VALUES_STRING: 1
TIMELINE_ANALYSIS: 1
Timeline: !analyze.Start
Name: <blank>
Time: 2019-02-02T04:53:02.90Z
Diff: 909 mSec
Timeline: Dump.Current
Name: <blank>
Time: 2019-02-02T04:53:03.0Z
Diff: 0 mSec
Timeline: Process.Start
Name: <blank>
Time: 2019-02-02T04:52:29.0Z
Diff: 34000 mSec
Timeline: OS.Boot
Name: <blank>
Time: 2019-01-27T04:44:15.0Z
Diff: 518928000 mSec
DUMP_CLASS: 2
DUMP_QUALIFIER: 0
FAULTING_IP:
vfbasics!AVrfpCheckStaticInitializedCriticalSection+6
00007ffc`90f65d42 488b4120 mov rax,qword ptr [rcx+20h]
EXCEPTION_RECORD: 00000043763fcc30 -- (.exr 0x43763fcc30)
ExceptionAddress: 00007ffc90f65d42 (vfbasics!AVrfpCheckStaticInitializedCriticalSection+0x0000000000000006)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000176fc8c5fe8
Attempt to read from address 00000176fc8c5fe8
FAULTING_THREAD: 00006cc4
DEFAULT_BUCKET_ID: BREAKPOINT_AVRF
PROCESS_NAME: testeth.exe
CONTEXT: 00000043763fc740 -- (.cxr 0x43763fc740)
rax=0000000000000000 rbx=00000176fc8c5fc8 rcx=00000176fc8c5fc8
rdx=0000000000000ece rsi=0000004375336000 rdi=0000000000006cc4
rip=00007ffc90f65d42 rsp=00000043763fced0 rbp=0000000000000000
r8=0000000000000615 r9=0000000000000002 r10=00000043763f6000
r11=00000043763fcf08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202
vfbasics!AVrfpCheckStaticInitializedCriticalSection+0x6:
00007ffc`90f65d42 488b4120 mov rax,qword ptr [rcx+20h] ds:00000176`fc8c5fe8=????????????????
Resetting default scope
ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached.
EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid
EXCEPTION_CODE_STR: 80000003
EXCEPTION_PARAMETER1: 0000000000000000
WATSON_BKT_PROCSTAMP: 5c5521ed
WATSON_BKT_MODULE: vrfcore.dll
WATSON_BKT_MODSTAMP: ac2e4c50
WATSON_BKT_MODOFFSET: 25f7
WATSON_BKT_MODVER: 10.0.17134.12
MODULE_VER_PRODUCT: Microsoft® Windows® Operating System
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
MODLIST_WITH_TSCHKSUM_HASH: ea5fccd1d6646a7a3cc6ebc04d4fa5e5c4063b35
MODLIST_SHA1_HASH: 7994ab5b7bd9bdeacc96db004919819ec7f78b84
NTGLOBALFLAG: 2000100
PROCESS_BAM_CURRENT_THROTTLED: 0
PROCESS_BAM_PREVIOUS_THROTTLED: 0
APPLICATION_VERIFIER_FLAGS: 81643027
PRODUCT_TYPE: 1
SUITE_MASK: 272
DUMP_TYPE: fe
APPLICATION_VERIFIER_LOADED: 1
ANALYSIS_SESSION_HOST: EVANSTON
ANALYSIS_SESSION_TIME: 02-01-2019 20:53:02.0090
ANALYSIS_VERSION: 10.0.17134.12 amd64fre
THREAD_ATTRIBUTES:
OS_LOCALE: ENU
PROBLEM_CLASSES:
ID: [0n317]
Type: [@APPLICATION_FAULT_STRING]
Class: Primary
Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
BUCKET_ID
Name: Omit
Data: Add
String: [BREAKPOINT]
PID: [Unspecified]
TID: [Unspecified]
Frame: [0]
ID: [0n96]
Type: [AVRF]
Class: Addendum
Scope: DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
BUCKET_ID
Name: Add
Data: Omit
PID: [0x11ba8]
TID: [0x6cc4]
Frame: [0] : vrfcore!VerifierStopMessageEx
BUGCHECK_STR: BREAKPOINT_AVRF
PRIMARY_PROBLEM_CLASS: BREAKPOINT
LAST_CONTROL_TRANSFER: from 00007ffc9ebe7e70 to 00007ffc9ebe25f7
STACK_TEXT:
00000043`763fbe30 00007ffc`9ebe7e70 : 00000025`00000000 00000043`763ffab0 00000000`00000005 00007ffc`da1d45c7 : vrfcore!VerifierStopMessageEx+0x827
00000043`763fc180 00007ffc`8f236439 : 00000043`763fc740 00007ffc`90f65d42 00000043`763fcc30 00000176`fc8c5fe8 : vrfcore!VfCoreRedirectedStopMessage+0x90
00000043`763fc210 00007ffc`da2acf56 : 00000043`763fcc30 00007ffc`90f827f0 00000000`00000000 00007ffc`90f827d0 : verifier!VerifierStopMessage+0xb9
00000043`763fc2c0 00007ffc`90f625e5 : 00007ff6`65906eac 00000043`00000000 00007ff6`65bead23 00007ff6`00000001 : ntdll!RtlApplicationVerifierStop+0x96
00000043`763fc330 00007ffc`90f6322e : 00000043`763fcc30 00000176`81827ff0 00000000`00000000 00007ffc`da1d477c : vfbasics!VerifierStopMessage+0x245
00000043`763fc390 00007ffc`90f628da : 00000043`763fc4b0 00000000`00000000 00000000`00000024 0053002b`00000001 : vfbasics!AVrfpCheckFirstChanceException+0x136
00000043`763fc420 00007ffc`da236b06 : 00007ffc`90f628c0 00000000`00000000 00000000`00000000 00000000`6771ca14 : vfbasics!AVrfpVectoredExceptionHandler+0x1a
00000043`763fc470 00007ffc`da1d4849 : 00000043`763fcc30 00000043`763fc740 00007ff6`6728a000 0053002b`002b0033 : ntdll!RtlpCallVectoredHandlers+0x106
00000043`763fc510 00007ffc`da2733ee : 00000000`00000000 00000000`00000000 00000176`fc8c5fc8 00000000`00000000 : ntdll!RtlDispatchException+0x69
00000043`763fc740 00007ffc`90f65d42 : 00000043`763fcef8 00007ff6`65e35d3c 00000043`763fcf40 00007ff6`658c67fd : ntdll!KiUserExceptionDispatch+0x2e
00000043`763fced0 00007ffc`90f65e05 : 00000043`763fd4d0 00007ffc`90f65efe 00000000`00000000 00000176`fc8c5fc8 : vfbasics!AVrfpCheckStaticInitializedCriticalSection+0x6
00000043`763fcf00 00007ff6`65aec617 : 00007ffc`d65cc570 00000043`763fd5b0 00000000`00000020 00007ff6`6592a2d1 : vfbasics!AVrfpRtlEnterCriticalSection2+0x3d
00000043`763fcf40 00007ff6`65ad601c : 00000176`fc8c5fc8 00000043`763fd4d0 00000043`763fd5b0 00007ff6`65e47420 : testeth!boost::asio::detail::win_mutex::lock+0x17
00000043`763fcf70 00007ff6`6592a4a3 : 00000043`763fcfd0 00000176`fc8c5fc8 00000043`763fd5b0 00007ff6`65e47332 : testeth!boost::asio::detail::scoped_lock<boost::asio::detail::win_mutex>::scoped_lock<boost::asio::detail::win_mutex>+0x3c
00000043`763fcfb0 00007ff6`658cdb94 : 00000176`fc8c5fa8 00000176`fcd6cf90 ffffffff`fffffffe 00007ff6`659147e5 : testeth!boost::asio::detail::win_iocp_socket_service_base::destroy+0x33
00000043`763fcff0 00007ff6`658c58c8 : 00000176`fc8c5f80 00000176`fcd6cf90 00000043`763fd090 00000000`00006cc4 : testeth!boost::asio::stream_socket_service<boost::asio::ip::tcp>::destroy+0x24
00000043`763fd020 00007ff6`65e35564 : 00000176`fcd6cf90 00000043`763fd0a0 00000176`00000002 00000043`763fd090 : testeth!boost::asio::basic_io_object<boost::asio::stream_socket_service<boost::asio::ip::tcp>,1>::~basic_io_object<boost::asio::stream_socket_service<boost::asio::ip::tcp>,1>+0x28
00000043`763fd060 00007ff6`65e355b3 : 00000176`fcd6cf90 00007ff6`675d1be0 00000000`00002719 00007ff6`675d1be0 : testeth!boost::asio::basic_socket<boost::asio::ip::tcp,boost::asio::stream_socket_service<boost::asio::ip::tcp> >::~basic_socket<boost::asio::ip::tcp,boost::asio::stream_socket_service<boost::asio::ip::tcp> >+0x24
00000043`763fd090 00007ff6`658c783e : 00000176`fcd6cf90 00000000`00000000 ffffffff`fffffffe 00000000`00000001 : testeth!boost::asio::basic_stream_socket<boost::asio::ip::tcp,boost::asio::stream_socket_service<boost::asio::ip::tcp> >::~basic_stream_socket<boost::asio::ip::tcp,boost::asio::stream_socket_service<boost::asio::ip::tcp> >+0x13
00000043`763fd0c0 00007ff6`658db2d7 : 00000176`fcd6cf80 00000176`fca2fff8 00000043`763fd5b0 00000043`763fd4d0 : testeth!dev::p2p::RLPXSocket::~RLPXSocket+0x2e
00000043`763fd100 00007ff6`65e39587 : 00000176`fcd6cf80 00007ff6`00000000 00000176`fcd64fa8 00007ff6`65998f44 : testeth!dev::p2p::RLPXSocket::`scalar deleting destructor'+0x17
00000043`763fd130 00007ff6`659a54c2 : 00000176`fcd6cf70 00000176`fcd64f98 00000176`fcd64fd0 00007ff6`66d0d669 : testeth!std::_Ref_count_obj<dev::p2p::RLPXSocket>::_Destroy+0x27
00000043`763fd170 00007ff6`658c69e3 : 00000176`fcd6cf70 00000176`fcd64f98 00000176`fcd64fd0 00007ff6`66d0d669 : testeth!std::_Ref_count_base::_Decref+0x32
00000043`763fd1a0 00007ff6`65e35cdc : 00000176`fcd64f80 00007ff6`65e354b3 00000176`fcd64f90 00007ff6`66d0cb08 : testeth!std::_Ptr_base<dev::p2p::RLPXSocket>::_Decref+0x23
00000043`763fd1d0 00007ff6`658fe7d2 : 00000176`fcd64f80 00007ff6`6762b160 00007ff6`67026796 00007ff6`66d0cb08 : testeth!std::shared_ptr<dev::p2p::RLPXSocket>::~shared_ptr<dev::p2p::RLPXSocket>+0x1c
00000043`763fd210 00007ff6`65e363a3 : 00000176`fcd64d70 00007ff6`66d0cb08 00007ff6`67642f00 00007ff6`6762b160 : testeth!dev::p2p::RLPXHandshake::~RLPXHandshake+0x42
00000043`763fd240 00007ff6`658db437 : 00000176`fcd64d70 00000000`00000000 00000000`0000000f 00000176`fca7af00 : testeth!eip8::TestHandshake::~TestHandshake+0x13
00000043`763fd270 00007ff6`6590013d : 00000176`fcd64d70 00000176`00000001 00007ff6`66d0d66a 00000000`00000000 : testeth!eip8::TestHandshake::`scalar deleting destructor'+0x17
00000043`763fd2a0 00007ff6`659a54c2 : 00000176`fca33fe0 0853fb3d`fe397519 eac6d73e`f864ce6a 80cc81f3`f741c7be : testeth!std::_Ref_count<eip8::TestHandshake>::_Destroy+0x3d
00000043`763fd2f0 00007ff6`658c6d13 : 00000176`fca33fe0 772884f1`06a45c00 7a579cb6`44104d65 3a520912`1af0e544 : testeth!std::_Ref_count_base::_Decref+0x32
00000043`763fd320 00007ff6`65e35d0c : 00000043`763fd420 e68fa515`0a334d55 c610b344`058e8a1f 8d8a52a7`8d0c7bde : testeth!std::_Ptr_base<eip8::TestHandshake>::_Decref+0x23
00000043`763fd350 00007ff6`6596077f : 00000043`763fd420 00000000`00000004 00000043`763fd488 00000000`000000ca : testeth!std::shared_ptr<eip8::TestHandshake>::~shared_ptr<eip8::TestHandshake>+0x1c
00000043`763fd390 00007ff6`65960abe : 00000043`763fd640 00000043`763fd768 00000000`000000b9 00000043`763fd758 : testeth!eip8::test_handshake_eip8_auth1::test_method+0x2bf
00000043`763fd620 00007ff6`659c01aa : 00000176`fc130000 00007ffc`da33d564 00000176`fc130000 00000000`00000000 : testeth!eip8::test_handshake_eip8_auth1_invoker+0x2fe
00000043`763fdd30 00007ff6`65bac7c2 : 00000176`85928fe0 00000043`763fde10 00000000`0000001d 00007ffc`da2e7056 : testeth!boost::detail::function::void_function_invoker0<void (__cdecl*)(void),void>::invoke+0x1a
00000043`763fdd70 00007ff6`65bad426 : 00000176`85928fd8 00007ffc`da2cd987 0000001d`00000000 00000043`763ffcf0 : testeth!boost::function0<void>::operator()+0x72
00000043`763fdde0 00007ff6`65bead23 : 00000043`763fe478 00007ffc`da1d0000 0000ddc4`001ed000 00000176`fa930000 : testeth!boost::detail::forward::operator()+0x16
00000043`763fde10 00007ff6`65bac722 : 00000043`763fe478 00007ffc`da33d564 00000043`763fe460 00007ffc`da2cdd5d : testeth!boost::detail::function::function_obj_invoker0<boost::detail::forward,int>::invoke+0x33
00000043`763fde50 00007ff6`65b7c023 : 00000043`763fe470 00007ffc`d6501b89 00000000`00000000 00000000`00000000 : testeth!boost::function0<int>::operator()+0x72
00000043`763fdec0 00007ff6`65b19c8d : 00007ff6`67644848 00000043`763fe470 00000043`763ff6c8 00000000`00000000 : testeth!boost::detail::do_invoke<boost::shared_ptr<boost::detail::translator_holder_base>,boost::function<int __cdecl(void)> >+0x53
00000043`763fdf00 00007ff6`65b19aad : 00007ff6`67644838 00000043`763fe470 00000000`00000004 00007ff6`65bad252 : testeth!boost::execution_monitor::catch_signals+0xbd
00000043`763fdfb0 00007ff6`65b19ba5 : 00007ff6`67644838 00000043`763fe470 00007ff6`00000000 00007ff6`65b85a7c : testeth!boost::execution_monitor::execute+0x9d
00000043`763fe440 00007ff6`65b23c14 : 00007ff6`67644838 00000176`85928fd8 00007ff6`67644640 00007ff6`65bb9a36 : testeth!boost::execution_monitor::vexecute+0x55
00000043`763fe4b0 00007ff6`65be3a68 : 00007ff6`67644838 00000176`85928fd8 00000176`00000000 00007ff6`658c7900 : testeth!boost::unit_test::unit_test_monitor_t::execute_and_translate+0x174
00000043`763fe5b0 00007ff6`65be35b0 : 00007ff6`67642fb0 00000043`00010182 00000000`00000000 00000000`00000000 : testeth!boost::unit_test::framework::state::execute_test_tree+0x1368
00000043`763fea60 00007ff6`65be35b0 : 00007ff6`67642fb0 00000043`00000030 00000000`00000000 00000000`00000000 : testeth!boost::unit_test::framework::state::execute_test_tree+0xeb0
00000043`763fef10 00007ff6`65b17335 : 00007ff6`67642fb0 00007ff6`00000001 00000176`00000000 00000000`00000000 : testeth!boost::unit_test::framework::state::execute_test_tree+0xeb0
00000043`763ff3c0 00007ff6`65b2b09f : 00000043`00000001 00007ff6`67640b01 00000176`8470afb0 00000000`00006cc4 : testeth!boost::unit_test::framework::run+0xa95
00000043`763ff830 00007ff6`65b31565 : 00007ff6`65b38b00 00007ff6`00000003 00000176`8470afb0 00007ff6`658c1aba : testeth!boost::unit_test::unit_test_main+0x42f
00000043`763ffab0 00007ff6`66a87699 : 00007ff6`00000003 00000176`8470afb0 00000000`00000000 00000000`00000000 : testeth!main+0x595
00000043`763ffc80 00007ffc`d7527e94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : testeth!__scrt_common_main_seh+0x11d
00000043`763ffcc0 00007ffc`da23a251 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x14
00000043`763ffcf0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21
STACK_COMMAND: ~0s ; .cxr ; kb
THREAD_SHA1_HASH_MOD_FUNC: 081cc498ab6ae9b027fc1664c6fea7a05a0627e2
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b314b11379497ff4c220b02a26a250a663302118
THREAD_SHA1_HASH_MOD: ae4f49432ef80a98045a1ee9427a9990cc3b19cf
FOLLOWUP_IP:
testeth!boost::asio::detail::win_mutex::lock+17 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\asio\detail\win_mutex.hpp @ 51]
00007ff6`65aec617 4883c428 add rsp,28h
FAULT_INSTR_CODE: 28c48348
FAULTING_SOURCE_LINE: c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\asio\detail\win_mutex.hpp
FAULTING_SOURCE_FILE: c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\asio\detail\win_mutex.hpp
FAULTING_SOURCE_LINE_NUMBER: 51
FAULTING_SOURCE_CODE:
47: // Lock the mutex.
48: void lock()
49: {
50: ::EnterCriticalSection(&crit_section_);
> 51: }
52:
53: // Unlock the mutex.
54: void unlock()
55: {
56: ::LeaveCriticalSection(&crit_section_);
SYMBOL_STACK_INDEX: c
SYMBOL_NAME: testeth!boost::asio::detail::win_mutex::lock+17
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: testeth
IMAGE_NAME: testeth.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5c5521ed
BUCKET_ID: BREAKPOINT_AVRF_testeth!boost::asio::detail::win_mutex::lock+17
FAILURE_EXCEPTION_CODE: 80000003
FAILURE_IMAGE_NAME: testeth.exe
BUCKET_ID_IMAGE_STR: testeth.exe
FAILURE_MODULE_NAME: testeth
BUCKET_ID_MODULE_STR: testeth
FAILURE_FUNCTION_NAME: boost::asio::detail::win_mutex::lock
BUCKET_ID_FUNCTION_STR: boost::asio::detail::win_mutex::lock
BUCKET_ID_OFFSET: 17
BUCKET_ID_MODTIMEDATESTAMP: 5c5521ed
BUCKET_ID_MODCHECKSUM: 0
BUCKET_ID_MODVER_STR: 0.0.0.0
BUCKET_ID_PREFIX_STR: BREAKPOINT_AVRF_
FAILURE_PROBLEM_CLASS: BREAKPOINT
FAILURE_SYMBOL_NAME: testeth.exe!boost::asio::detail::win_mutex::lock
FAILURE_BUCKET_ID: BREAKPOINT_AVRF_80000003_testeth.exe!boost::asio::detail::win_mutex::lock
TARGET_TIME: 2019-02-02T04:53:12.000Z
OSBUILD: 17763
OSSERVICEPACK: 1
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt SingleUserTS
USER_LCID: 0
OSBUILD_TIMESTAMP: 2023-11-24 17:28:01
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: 2a8f
ANALYSIS_SOURCE: UM
FAILURE_ID_HASH_STRING: um:breakpoint_avrf_80000003_testeth.exe!boost::asio::detail::win_mutex::lock
FAILURE_ID_HASH: {da664743-e1f3-dee5-b4f5-9d301e0f49a9}
Followup: MachineOwner
---------
0:000> !heap -p -a 00000176fc8c5fe8
address 00000176fc8c5fe8 found in
_DPH_HEAP_ROOT @ 176fc131000
in free-ed allocation ( DPH_HEAP_BLOCK: VirtAddr VirtSize)
176914426e8: 176fc8c5000 2000
00007ffcda2d7608 ntdll!RtlDebugFreeHeap+0x000000000000003c
00007ffcda27dd5e ntdll!RtlpFreeHeap+0x000000000009975e
00007ffcda1e286e ntdll!RtlFreeHeap+0x00000000000003ee
00007ffc9ebeb7b2 vrfcore!VfCoreRtlFreeHeap+0x0000000000000022
00007ffc90f77f1a vfbasics!AVrfpRtlFreeHeap+0x000000000000010a
00007ffcd64edf7b ucrtbase!_free_base+0x000000000000001b
00007ff665e38d11 testeth!boost::asio::stream_socket_service<boost::asio::ip::tcp>::`scalar deleting destructor'+0x0000000000000031
00007ff6658fd579 testeth!boost::asio::detail::service_registry::destroy+0x0000000000000039 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\asio\detail\impl\service_registry.ipp @ 101]
00007ff6658ff4c5 testeth!boost::asio::detail::service_registry::~service_registry+0x0000000000000075 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\asio\detail\impl\service_registry.ipp @ 45]
00007ff6658e4507 testeth!boost::asio::detail::service_registry::`scalar deleting destructor'+0x0000000000000017
00007ff665e365e8 testeth!boost::asio::io_service::~io_service+0x0000000000000038 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\asio\impl\io_service.ipp @ 53]
00007ff66595eff7 testeth!eip8::TestHandshake::runWithInput+0x00000000000003d7 [c:\users\nilse\documents\code\aleth_ref\test\unittests\libp2p\eip-8.cpp @ 383]
00007ff6659605ed testeth!eip8::test_handshake_eip8_auth1::test_method+0x000000000000012d [c:\users\nilse\documents\code\aleth_ref\test\unittests\libp2p\eip-8.cpp @ 201]
00007ff665960abe testeth!eip8::test_handshake_eip8_auth1_invoker+0x00000000000002fe [c:\users\nilse\documents\code\aleth_ref\test\unittests\libp2p\eip-8.cpp @ 185]
00007ff6659c01aa testeth!boost::detail::function::void_function_invoker0<void (__cdecl*)(void),void>::invoke+0x000000000000001a [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\function\function_template.hpp @ 119]
00007ff665bac7c2 testeth!boost::function0<void>::operator()+0x0000000000000072 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\function\function_template.hpp @ 761]
00007ff665bad426 testeth!boost::detail::forward::operator()+0x0000000000000016 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\execution_monitor.ipp @ 1300]
00007ff665bead23 testeth!boost::detail::function::function_obj_invoker0<boost::detail::forward,int>::invoke+0x0000000000000033 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\function\function_template.hpp @ 139]
00007ff665bac722 testeth!boost::function0<int>::operator()+0x0000000000000072 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\function\function_template.hpp @ 761]
00007ff665b7c023 testeth!boost::detail::do_invoke<boost::shared_ptr<boost::detail::translator_holder_base>,boost::function<int __cdecl(void)> >+0x0000000000000053 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\execution_monitor.ipp @ 281]
00007ff665b19c8d testeth!boost::execution_monitor::catch_signals+0x00000000000000bd [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\execution_monitor.ipp @ 1139]
00007ff665b19aad testeth!boost::execution_monitor::execute+0x000000000000009d [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\execution_monitor.ipp @ 1203]
00007ff665b19ba5 testeth!boost::execution_monitor::vexecute+0x0000000000000055 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\execution_monitor.ipp @ 1309]
00007ff665b23c14 testeth!boost::unit_test::unit_test_monitor_t::execute_and_translate+0x0000000000000174 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\unit_test_monitor.ipp @ 46]
00007ff665be3a68 testeth!boost::unit_test::framework::state::execute_test_tree+0x0000000000001368 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\framework.ipp @ 771]
00007ff665be35b0 testeth!boost::unit_test::framework::state::execute_test_tree+0x0000000000000eb0 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\framework.ipp @ 717]
00007ff665be35b0 testeth!boost::unit_test::framework::state::execute_test_tree+0x0000000000000eb0 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\framework.ipp @ 717]
00007ff665b17335 testeth!boost::unit_test::framework::run+0x0000000000000a95 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\framework.ipp @ 1577]
00007ff665b2b09f testeth!boost::unit_test::unit_test_main+0x000000000000042f [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\unit_test_main.ipp @ 233]
00007ff665b31565 testeth!main+0x0000000000000595 [c:\users\nilse\documents\code\aleth_ref\test\tools\libtesteth\boosttest.cpp @ 175]
00007ff666a87699 testeth!__scrt_common_main_seh+0x000000000000011d [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 253]
00007ffcd7527e94 KERNEL32!BaseThreadInitThunk+0x0000000000000014
See https://ci.appveyor.com/project/ethereum/cpp-ethereum/build/1.0.106.