Project

General

Profile

Bug #15852 ยป ruby_freeing_active_critsec.TXT

 
1

    
2
Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
3
Copyright (c) Microsoft Corporation. All rights reserved.
4

    
5
CommandLine: C:\Ruby26-x64\bin\ruby.exe  -x "C:\Ruby26-x64\bin\irb.cmd" 
6
Starting directory: C:\Users\Lucius Riccio
7

    
8
************* Path validation summary **************
9
Response                         Time (ms)     Location
10
Deferred                                       symsrv*symsrv.dll*C:\symbols*http://msdl.microsoft.com/download/symbols
11
Symbol search path is: symsrv*symsrv.dll*C:\symbols*http://msdl.microsoft.com/download/symbols
12
Executable search path is: 
13
ModLoad: 00000000`00400000 00000000`00410000   image00000000`00400000
14
ModLoad: 00007ff9`8d870000 00007ff9`8da51000   ntdll.dll
15
ModLoad: 00007ff9`5d3c0000 00007ff9`5d430000   C:\WINDOWS\System32\verifier.dll
16
Page heap: pid 0x4458: page heap enabled with flags 0x183.
17
AVRF: ruby.exe: pid 0x4458: flags 0x81643027: application verifier enabled
18
ModLoad: 00007ff9`84d10000 00007ff9`84d4e000   C:\WINDOWS\SYSTEM32\vrfcore.dll
19
ModLoad: 00007ff9`83600000 00007ff9`8366f000   C:\WINDOWS\SYSTEM32\vfbasics.dll
20
ModLoad: 00007ff9`8b120000 00007ff9`8b1d1000   C:\WINDOWS\System32\KERNEL32.DLL
21
ModLoad: 00007ff9`8a560000 00007ff9`8a7d3000   C:\WINDOWS\System32\KERNELBASE.dll
22
ModLoad: 00007ff9`8d7a0000 00007ff9`8d83e000   C:\WINDOWS\System32\msvcrt.dll
23
ModLoad: 00000000`6a440000 00000000`6a77f000   C:\Ruby26-x64\bin\x64-msvcrt-ruby260.dll
24
ModLoad: 00007ff9`8d6d0000 00007ff9`8d771000   C:\WINDOWS\System32\ADVAPI32.dll
25
ModLoad: 00000000`6acc0000 00000000`6ad45000   C:\Ruby26-x64\bin\ruby_builtin_dlls\libgmp-10.dll
26
ModLoad: 00007ff9`8d670000 00007ff9`8d6cb000   C:\WINDOWS\System32\sechost.dll
27
ModLoad: 00007ff9`8b350000 00007ff9`8b474000   C:\WINDOWS\System32\RPCRT4.dll
28
ModLoad: 00007ff9`8d780000 00007ff9`8d79d000   C:\WINDOWS\System32\imagehlp.dll
29
ModLoad: 00007ff9`8a910000 00007ff9`8aa08000   C:\WINDOWS\System32\ucrtbase.dll
30
ModLoad: 00007ff9`8c010000 00007ff9`8d450000   C:\WINDOWS\System32\SHELL32.dll
31
ModLoad: 00007ff9`88e20000 00007ff9`88e58000   C:\WINDOWS\SYSTEM32\IPHLPAPI.DLL
32
ModLoad: 00007ff9`89e00000 00007ff9`89e49000   C:\WINDOWS\System32\cfgmgr32.dll
33
ModLoad: 00007ff9`8bcf0000 00007ff9`8bd99000   C:\WINDOWS\System32\shcore.dll
34
ModLoad: 00007ff9`8adf0000 00007ff9`8b112000   C:\WINDOWS\System32\combase.dll
35
ModLoad: 00007ff9`8a7e0000 00007ff9`8a85a000   C:\WINDOWS\System32\bcryptPrimitives.dll
36
ModLoad: 00007ff9`89e50000 00007ff9`8a55d000   C:\WINDOWS\System32\windows.storage.dll
37
ModLoad: 00007ff9`8bc90000 00007ff9`8bce1000   C:\WINDOWS\System32\shlwapi.dll
38
ModLoad: 00007ff9`8d640000 00007ff9`8d668000   C:\WINDOWS\System32\GDI32.dll
39
ModLoad: 00007ff9`89c40000 00007ff9`89dd2000   C:\WINDOWS\System32\gdi32full.dll
40
ModLoad: 00007ff9`8ac60000 00007ff9`8acff000   C:\WINDOWS\System32\msvcp_win.dll
41
ModLoad: 00007ff9`8bda0000 00007ff9`8bf30000   C:\WINDOWS\System32\USER32.dll
42
ModLoad: 00007ff9`89de0000 00007ff9`89e00000   C:\WINDOWS\System32\win32u.dll
43
ModLoad: 00007ff9`89be0000 00007ff9`89bf1000   C:\WINDOWS\System32\kernel.appcore.dll
44
ModLoad: 00007ff9`89c20000 00007ff9`89c3f000   C:\WINDOWS\System32\profapi.dll
45
ModLoad: 00007ff9`89b90000 00007ff9`89bdc000   C:\WINDOWS\System32\powrprof.dll
46
ModLoad: 00007ff9`89b80000 00007ff9`89b8a000   C:\WINDOWS\System32\FLTLIB.DLL
47
ModLoad: 00007ff9`8b280000 00007ff9`8b2ec000   C:\WINDOWS\System32\WS2_32.dll
48
(4458.3ca4): Break instruction exception - code 80000003 (first chance)
49
ntdll!LdrpDoDebuggerBreak+0x30:
50
00007ff9`8d93c93c cc              int     3
51
0:000> g
52
ModLoad: 00007ff9`8b680000 00007ff9`8b6ad000   C:\WINDOWS\System32\IMM32.DLL
53
ModLoad: 00007ff9`898a0000 00007ff9`898b7000   C:\WINDOWS\SYSTEM32\CRYPTSP.dll
54
ModLoad: 00007ff9`88c80000 00007ff9`88cb3000   C:\WINDOWS\system32\rsaenh.dll
55
ModLoad: 00007ff9`896a0000 00007ff9`896c5000   C:\WINDOWS\SYSTEM32\bcrypt.dll
56
ModLoad: 00007ff9`892a0000 00007ff9`892ab000   C:\WINDOWS\SYSTEM32\CRYPTBASE.dll
57
ModLoad: 00000000`6f280000 00000000`6f28e000   C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\encdb.so
58
ModLoad: 00000000`68080000 00000000`6808e000   C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\trans\transdb.so
59
ModLoad: 00000000`6d0c0000 00000000`6d0cd000   C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\windows_1252.so
60
ModLoad: 00000000`6d9c0000 00000000`6d9d2000   C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\stringio.so
61
ModLoad: 00000000`63d80000 00000000`63d99000   C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\fiddle.so
62
ModLoad: 00000000`6b740000 00000000`6b750000   C:\Ruby26-x64\bin\ruby_builtin_dlls\libffi-6.dll
63
ModLoad: 00000000`6e6c0000 00000000`6e6cd000   C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\utf_16le.so
64
ModLoad: 00000000`6a400000 00000000`6a40f000   C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\trans\utf_16_32.so
65
ModLoad: 00000000`65900000 00000000`6590f000   C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\euc_jp.so
66
ModLoad: 00000000`64700000 00000000`6470f000   C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\windows_31j.so
67
ModLoad: 00000000`6d100000 00000000`6d10e000   C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\etc.so
68
ModLoad: 00000000`6a340000 00000000`6a365000   C:\Ruby26-x64\lib\ruby\2.6.0\x64-mingw32\enc\trans\single_byte.so
69
(4458.3ca4): Invalid handle - code c0000008 (first chance)
70
First chance exceptions are reported before any exception handling.
71
This exception may be expected and handled.
72
ntdll!KiRaiseUserExceptionDispatcher+0x3a:
73
00007ff9`8d90e78a 8b8424c0000000  mov     eax,dword ptr [rsp+0C0h] ss:00000000`0060c920=c0000008
74
0:000> gh
75

    
76

    
77
=======================================
78
VERIFIER STOP 0000000000000202: pid 0x4458: Freeing heap block containing an active critical section. 
79

    
80
	0000000007C34E70 : Critical section address. Run !cs -s <address> to get more information.
81
	000000000076E2E0 : Critical section initialization stack trace. Run dps <address> to dump the stack trace.
82
	0000000007C34DE0 : Heap block address.
83
	0000000000000220 : Heap block size.
84

    
85

    
86
=======================================
87
This verifier stop is continuable.
88
After debugging it use `go' to continue.
89

    
90
=======================================
91

    
92
(4458.3ca4): Break instruction exception - code 80000003 (first chance)
93
vrfcore!VerifierStopMessageEx+0x7d9:
94
00007ff9`84d12639 cc              int     3
95
*** WARNING: Unable to verify timestamp for C:\Ruby26-x64\bin\x64-msvcrt-ruby260.dll
96
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Ruby26-x64\bin\x64-msvcrt-ruby260.dll - 
97
*** WARNING: Unable to verify timestamp for image00000000`00400000
98
*** ERROR: Module load completed but symbols could not be loaded for image00000000`00400000
99
0:000> !cs -s 0000000007C34E70 
100
-----------------------------------------
101
Critical section   = 0x0000000007c34e70 (+0x7C34E70)
102
DebugInfo          = 0x000000000a66bfd0
103
NOT LOCKED
104
LockSemaphore      = 0x0
105
SpinCount          = 0x00000000020007d0
106

    
107

    
108
Stack trace for DebugInfo = 0x000000000a66bfd0:
109

    
110
0x00007ff98d92b815: ntdll!RtlInitializeCriticalSectionAndSpinCount+0x542E5
111
0x00007ff98360576c: vfbasics!AVrfpInitializeCriticalSectionCommon+0x11C
112
0x000000006a6088a2: x64_msvcrt_ruby260!rb_exec_recursive_paired_outer+0x7D2
113
0x000000006a4f5861: x64_msvcrt_ruby260!rb_call_inits+0xD1
114
0x000000006a4ccd71: x64_msvcrt_ruby260!ruby_setup+0x171
115
0x000000006a4ccdd9: x64_msvcrt_ruby260!ruby_init+0x9
116
0x0000000000402d71: image00000000_00400000+0x2D71
117
0x00000000004013a5: image00000000_00400000+0x13A5
118
0x000000000040150b: image00000000_00400000+0x150B
119
0x00007ff98b134034: KERNEL32!BaseThreadInitThunk+0x14
120
0x00007ff98d8e3691: ntdll!RtlUserThreadStart+0x21
121
0:000> dps 000000000076E2E0 
122
00000000`0076e2e0  00000000`006827c0
123
00000000`0076e2e8  000b00af`00005801
124
00000000`0076e2f0  00007ff9`8d92b815 ntdll!RtlInitializeCriticalSectionAndSpinCount+0x542e5
125
00000000`0076e2f8  00007ff9`8360576c vfbasics!AVrfpInitializeCriticalSectionCommon+0x11c
126
00000000`0076e300  00000000`6a6088a2 x64_msvcrt_ruby260!rb_exec_recursive_paired_outer+0x7d2
127
00000000`0076e308  00000000`6a4f5861 x64_msvcrt_ruby260!rb_call_inits+0xd1
128
00000000`0076e310  00000000`6a4ccd71 x64_msvcrt_ruby260!ruby_setup+0x171
129
00000000`0076e318  00000000`6a4ccdd9 x64_msvcrt_ruby260!ruby_init+0x9
130
00000000`0076e320  00000000`00402d71 image00000000_00400000+0x2d71
131
00000000`0076e328  00000000`004013a5 image00000000_00400000+0x13a5
132
00000000`0076e330  00000000`0040150b image00000000_00400000+0x150b
133
00000000`0076e338  00007ff9`8b134034 KERNEL32!BaseThreadInitThunk+0x14
134
00000000`0076e340  00007ff9`8d8e3691 ntdll!RtlUserThreadStart+0x21
135
00000000`0076e348  00000000`00000000
136
00000000`0076e350  00000000`00000000
137
00000000`0076e358  000f0000`00007801
138
0:000> !analyze -v
139
*******************************************************************************
140
*                                                                             *
141
*                        Exception Analysis                                   *
142
*                                                                             *
143
*******************************************************************************
144

    
145
APPLICATION_VERIFIER_LOCKS_LOCK_IN_FREED_HEAP (202)
146
Freeing heap block containing an active critical section.
147
This stop is generated if a heap allocation contains a critical section,
148
the allocation is freed and the critical section has not been deleted.
149
To debug this stop use the following debugger commands:
150
$ !cs -s parameter1 - dump information about this critical section.
151
$ ln parameter1 - to show symbols near the address of the critical section.
152
This should help identify the leaked critical section.
153
$ dps parameter2 - to dump the stack trace for this critical section initialization.
154
$ parameter3 and parameter4 might help understand where this heap block was
155
allocated (the size of the allocation is probably significant). 
156
Arguments:
157
Arg1: 0000000007c34e70, Critical section address. Run !cs -s <address> to get more information. 
158
Arg2: 000000000076e2e0, Critical section initialization stack trace. Run dps <address> to dump the stack trace. 
159
Arg3: 0000000007c34de0, Heap block address. 
160
Arg4: 0000000000000220, Heap block size. 
161
GetUrlPageData2 (WinHttp) failed: 12002.
162

    
163
KEY_VALUES_STRING: 1
164

    
165

    
166
STACKHASH_ANALYSIS: 1
167

    
168
TIMELINE_ANALYSIS: 1
169

    
170
Timeline: !analyze.Start
171
    Name: <blank>
172
    Time: 2019-05-15T20:33:58.750Z
173
    Diff: 750 mSec
174

    
175
Timeline: Dump.Current
176
    Name: <blank>
177
    Time: 2019-05-15T20:33:58.0Z
178
    Diff: 0 mSec
179

    
180
Timeline: Process.Start
181
    Name: <blank>
182
    Time: 2019-05-15T20:27:32.0Z
183
    Diff: 386000 mSec
184

    
185
Timeline: OS.Boot
186
    Name: <blank>
187
    Time: 2019-05-09T19:48:18.0Z
188
    Diff: 521140000 mSec
189

    
190

    
191
DUMP_CLASS: 2
192

    
193
DUMP_QUALIFIER: 0
194

    
195
FAULTING_IP: 
196
vrfcore!VerifierStopMessageEx+7d9
197
00007ff9`84d12639 cc              int     3
198

    
199
EXCEPTION_RECORD:  (.exr -1)
200
ExceptionAddress: 00007ff984d12639 (vrfcore!VerifierStopMessageEx+0x00000000000007d9)
201
   ExceptionCode: 80000003 (Break instruction exception)
202
  ExceptionFlags: 00000000
203
NumberParameters: 1
204
   Parameter[0]: 0000000000000000
205

    
206
FAULTING_THREAD:  00003ca4
207

    
208
BUGCHECK_STR:  BREAKPOINT_AVRF
209

    
210
DEFAULT_BUCKET_ID:  BREAKPOINT_AVRF
211

    
212
CRITICAL_SECTION:  0000000007c34e70 -- (!cs -s 0000000007c34e70)
213

    
214
ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION}  Breakpoint  A breakpoint has been reached.
215

    
216
EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid
217

    
218
EXCEPTION_CODE_STR:  80000003
219

    
220
EXCEPTION_PARAMETER1:  0000000000000000
221

    
222
WATSON_BKT_PROCSTAMP:  0
223

    
224
WATSON_BKT_PROCVER:  2.6.3.62
225

    
226
PROCESS_VER_PRODUCT:  Ruby interpreter 2.6.3p62 [x64-mingw32]
227

    
228
WATSON_BKT_MODULE:  vrfcore.dll
229

    
230
WATSON_BKT_MODSTAMP:  ee620e2b
231

    
232
WATSON_BKT_MODOFFSET:  2639
233

    
234
WATSON_BKT_MODVER:  10.0.17763.132
235

    
236
MODULE_VER_PRODUCT:  Microsoft? Windows? Operating System
237

    
238
BUILD_VERSION_STRING:  17134.1.amd64fre.rs4_release.180410-1804
239

    
240
MODLIST_WITH_TSCHKSUM_HASH:  3a36178f0f980aa2bf2cd013708689f05e511817
241

    
242
MODLIST_SHA1_HASH:  c1a0e368887b68e0efa0bcc0e64665bc2c5a9609
243

    
244
NTGLOBALFLAG:  2000100
245

    
246
PROCESS_BAM_CURRENT_THROTTLED: 0
247

    
248
PROCESS_BAM_PREVIOUS_THROTTLED: 0
249

    
250
APPLICATION_VERIFIER_FLAGS:  81643027
251

    
252
PRODUCT_TYPE:  1
253

    
254
SUITE_MASK:  272
255

    
256
DUMP_TYPE:  fe
257

    
258
APPLICATION_VERIFIER_LOADED: 1
259

    
260
PROCESS_NAME:  unknown
261

    
262
ANALYSIS_SESSION_HOST:  PK1Y1FE-LJR14
263

    
264
ANALYSIS_SESSION_TIME:  05-15-2019 16:33:58.0750
265

    
266
ANALYSIS_VERSION: 10.0.17763.132 amd64fre
267

    
268
THREAD_ATTRIBUTES: 
269
OS_LOCALE:  ENU
270

    
271
PRIMARY_PROBLEM_CLASS:  BREAKPOINT
272

    
273
PROBLEM_CLASSES: 
274

    
275
    ID:     [0n321]
276
    Type:   [@APPLICATION_FAULT_STRING]
277
    Class:  Primary
278
    Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
279
            BUCKET_ID
280
    Name:   Omit
281
    Data:   Add
282
            String: [BREAKPOINT]
283
    PID:    [Unspecified]
284
    TID:    [Unspecified]
285
    Frame:  [0]
286

    
287
    ID:     [0n98]
288
    Type:   [AVRF]
289
    Class:  Addendum
290
    Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
291
            BUCKET_ID
292
    Name:   Add
293
    Data:   Omit
294
    PID:    [0x4458]
295
    TID:    [0x3ca4]
296
    Frame:  [0] : vrfcore!VerifierStopMessageEx
297

    
298
LAST_CONTROL_TRANSFER:  from 00007ff9836050d6 to 00007ff984d12639
299

    
300
STACK_TEXT:  
301
00000000`0060f5b0 00007ff9`836050d6 : 00000000`01001002 00000000`07a60000 00000000`07a61000 00007ff9`5d3c26dd : vrfcore!VerifierStopMessageEx+0x7d9
302
00000000`0060f910 00007ff9`836037a0 : 00000000`00000220 00000000`00000000 00000000`00000000 00000000`00003ca4 : vfbasics!AVrfpFreeMemLockChecks+0xf2
303
00000000`0060f970 00007ff9`83618948 : 00000000`07c34de0 00000000`07c42de0 00000000`00000220 00000000`07a60000 : vfbasics!AVrfpFreeMemNotify+0x38
304
00000000`0060f9a0 00007ff9`8d7b98bc : 00000000`07a60000 00007ff9`00000000 00000000`07c34de0 00000000`6a4e7b21 : vfbasics!AVrfpRtlFreeHeap+0x98
305
00000000`0060fa50 00007ff9`836198fd : 00000000`07c34de0 00000000`07c42de0 00000000`07c42de0 00007ff9`8d7b98a0 : msvcrt!free+0x1c
306
00000000`0060fa80 00000000`6a4e7b21 : 00000000`07c34de0 00000000`07c34de0 00000000`07c42de0 00000000`07c34de0 : vfbasics!AVrfp_free+0x4d
307
00000000`0060fab0 00000000`6a64be53 : 00000000`00000001 00000000`00000002 00000000`00000000 00000000`00000000 : x64_msvcrt_ruby260!ruby_xfree+0x31
308
00000000`0060faf0 00000000`6a4cd41e : 00000000`6a4cd4a0 00000000`00000001 00000000`07c34de0 00000000`07c34de0 : x64_msvcrt_ruby260!ruby_vm_destruct+0x73
309
00000000`0060fb60 00000000`6a4cd6b0 : 00000000`00000000 00000000`07afcfe0 00000000`07afefe0 00000000`00000002 : x64_msvcrt_ruby260!ruby_cleanup+0x3ae
310
00000000`0060fde0 00000000`00402d87 : 00000000`00000003 00000000`07b22fa0 00000000`07ac9d20 00000000`07afcfe0 : x64_msvcrt_ruby260!ruby_run_node+0x60
311
00000000`0060fe20 00000000`004013a5 : 00000000`00000003 00000000`07b22fa0 00000000`00407970 00000000`00000000 : image00000000_00400000+0x2d87
312
00000000`0060fe60 00000000`0040150b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : image00000000_00400000+0x13a5
313
00000000`0060ff30 00007ff9`8b134034 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : image00000000_00400000+0x150b
314
00000000`0060ff60 00007ff9`8d8e3691 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x14
315
00000000`0060ff90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21
316

    
317

    
318
STACK_COMMAND:  ~0s ; .cxr ; kb
319

    
320
THREAD_SHA1_HASH_MOD_FUNC:  ac94edf8183e983e3bc2f2d4f9dd6e62e1bd719f
321

    
322
THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e013a3e3e0f370daf1a25eb9dcf9d08d23027b02
323

    
324
THREAD_SHA1_HASH_MOD:  3462ddc2570f74745c8bf62168ed52450c98a119
325

    
326
FOLLOWUP_IP: 
327
x64_msvcrt_ruby260!ruby_vm_destruct+73
328
00000000`6a64be53 488d8320020000  lea     rax,[rbx+220h]
329

    
330
FAULT_INSTR_CODE:  20838d48
331

    
332
SYMBOL_STACK_INDEX:  7
333

    
334
SYMBOL_NAME:  x64_msvcrt_ruby260!ruby_vm_destruct+73
335

    
336
FOLLOWUP_NAME:  MachineOwner
337

    
338
MODULE_NAME: x64_msvcrt_ruby260
339

    
340
IMAGE_NAME:  x64-msvcrt-ruby260.dll
341

    
342
DEBUG_FLR_IMAGE_TIMESTAMP:  0
343

    
344
BUCKET_ID:  BREAKPOINT_AVRF_x64_msvcrt_ruby260!ruby_vm_destruct+73
345

    
346
FAILURE_EXCEPTION_CODE:  80000003
347

    
348
FAILURE_IMAGE_NAME:  x64-msvcrt-ruby260.dll
349

    
350
BUCKET_ID_IMAGE_STR:  x64-msvcrt-ruby260.dll
351

    
352
FAILURE_MODULE_NAME:  x64_msvcrt_ruby260
353

    
354
BUCKET_ID_MODULE_STR:  x64_msvcrt_ruby260
355

    
356
FAILURE_FUNCTION_NAME:  ruby_vm_destruct
357

    
358
BUCKET_ID_FUNCTION_STR:  ruby_vm_destruct
359

    
360
BUCKET_ID_OFFSET:  73
361

    
362
BUCKET_ID_MODTIMEDATESTAMP:  0
363

    
364
BUCKET_ID_MODCHECKSUM:  334137
365

    
366
BUCKET_ID_MODVER_STR:  2.6.3.62
367

    
368
BUCKET_ID_PREFIX_STR:  BREAKPOINT_AVRF_
369

    
370
FAILURE_PROBLEM_CLASS:  BREAKPOINT
371

    
372
FAILURE_SYMBOL_NAME:  x64-msvcrt-ruby260.dll!ruby_vm_destruct
373

    
374
FAILURE_BUCKET_ID:  BREAKPOINT_AVRF_80000003_x64-msvcrt-ruby260.dll!ruby_vm_destruct
375

    
376
WATSON_STAGEONE_URL:  http://watson.microsoft.com/StageOne/unknown/2.6.3.62/       0/vrfcore.dll/10.0.17763.132/ee620e2b/80000003/00002639.htm?Retriage=1
377

    
378
TARGET_TIME:  2019-05-15T20:34:03.000Z
379

    
380
OSBUILD:  17134
381

    
382
OSSERVICEPACK:  706
383

    
384
SERVICEPACK_NUMBER: 0
385

    
386
OS_REVISION: 0
387

    
388
OSPLATFORM_TYPE:  x64
389

    
390
OSNAME:  Windows 10
391

    
392
OSEDITION:  Windows 10 WinNt SingleUserTS
393

    
394
USER_LCID:  0
395

    
396
OSBUILD_TIMESTAMP:  2031-08-18 15:21:13
397

    
398
BUILDDATESTAMP_STR:  180410-1804
399

    
400
BUILDLAB_STR:  rs4_release
401

    
402
BUILDOSVER_STR:  10.0.17134.1.amd64fre.rs4_release.180410-1804
403

    
404
ANALYSIS_SESSION_ELAPSED_TIME:  63b7
405

    
406
ANALYSIS_SOURCE:  UM
407

    
408
FAILURE_ID_HASH_STRING:  um:breakpoint_avrf_80000003_x64-msvcrt-ruby260.dll!ruby_vm_destruct
409

    
410
FAILURE_ID_HASH:  {b0223792-0bdb-1b78-fe77-f4d1ecf49007}
411

    
412
Followup:     MachineOwner
413
---------
414