1 2 Previous Next 10 Replies Latest reply on Aug 7, 2015 10:25 AM by peter.mason

    jscript9 dead lock

    zhongyzh

      We have meet some cases, our program will call wininet.dll , but  MaCfee attach Script_sn_*.dll and at jscript9.dll dead lock.

      Untitled.pngUntitled1.pngUntitled2.png

      and we have some dead lock dump files, if need, we can upload.

      Could you help us how to solve this problem?

        • 1. Re: jscript9 dead lock
          zhongyzh

          We had requested Microsoft, but they thought this is MaCFee bug.

          • 2. Re: jscript9 dead lock
            exbrit

            Moved provisionally to Network Security Platform for faster attention.

            ---

            Peter

            Moderator

            • 3. Re: jscript9 dead lock
              zhongyzh

              • 4. Re: jscript9 dead lock
                peter.mason

                Hi Zhongyzh,

                 

                Is this an issue you are having with McAfee Network Security Platform?

                 

                When are you getting this error and under what circumstances?

                 

                Regards

                 

                Peter

                • 5. Re: jscript9 dead lock
                  zhongyzh

                  Hi, Peter:

                  Our customers use Webex meeting , and when start up our main client and the main exe load downloading dll, it will trigger the dead lock. If you need dump files, please let me know.

                  Thanks

                  • 6. Re: jscript9 dead lock
                    zhongyzh

                    Thread 0 ida4

                     

                    .  0  Id: 1ca8.1da4 Suspend: 0 Teb: 7efdb000 Unfrozen

                    ChildEBP RetAddr  Args to Child             

                    0040da0c 77db4886 00000228 00000000 00000000 ntdll_77d70000!NtWaitForSingleObject+0x15

                    0040da70 77db476a 00000000 00000000 77d9f9e4 ntdll_77d70000!RtlpWaitOnCriticalSection+0x13e

                    0040da98 77d9ff33 77e720c0 650ac685 00000001 ntdll_77d70000!RtlEnterCriticalSection+0x150

                    0040dc08 77d9fc8f 00000001 00000001 00000000 ntdll_77d70000!LdrGetDllHandleEx+0x2f7

                    0040dc24 772d1a51 00000001 00000000 0040dc94 ntdll_77d70000!LdrGetDllHandle+0x18

                    0040dc78 772d1c65 0040dc94 f77ad0f3 772d5894 KERNELBASE!GetModuleHandleForUnicodeString+0x22

                    0040e0f0 772d1d60 00000001 00000002 006e3728 KERNELBASE!BasepGetModuleHandleExW+0x181

                    0040e108 772d2eb6 006e3728 00000000 003e003c KERNELBASE!GetModuleHandleW+0x29

                    0040e120 73d32e1e 006e8270 006e8270 0040e1f0 KERNELBASE!GetModuleHandleA+0x34

                    0040e130 73d346c3 006e8270 0040e19c f768ba3b cryptsp!CSPInCacheCheck+0x11

                    0040e1f0 77684c2c 0040e298 00000000 77684cd8 cryptsp!CryptAcquireContextA+0x420

                    0040e20c 7768369e 02661be0 0040e380 00000000 wintrust!I_IsUnsignedPEFile+0x120

                    0040e324 77682702 ffffffff 00000000 00000000 wintrust!I_IsUnsignedPEFile+0x86f

                    0040e340 61bc937f ffffffff 0040e3d0 0040e380 wintrust!WinVerifyTrust+0x52

                    WARNING: Stack unwind information not available. Following frames may be wrong.

                    0040e3f0 61bc943b 0040e964 0040e430 0040e428 ieatgpc+0x937f

                    0040e548 61bc7a55 0040e964 61bc0000 61bfa51c ieatgpc+0x943b

                    00000000 00000000 00000000 00000000 00000000 ieatgpc+0x7a55

                     

                      

                    Thread 2 : 2288

                     

                       2  Id: 1ca8.2288 Suspend: 0 Teb: 7efd5000 Unfrozen

                    ChildEBP RetAddr  Args to Child             

                    03a5d614 77db4886 0000031c 00000000 00000000 ntdll_77d70000!NtWaitForSingleObject+0x15

                    03a5d678 77db476a 00000000 00000000 00000000 ntdll_77d70000!RtlpWaitOnCriticalSection+0x13e

                    03a5d6a0 73d346b2 73d43720 f48d8c97 03a5d790 ntdll_77d70000!RtlEnterCriticalSection+0x150

                    03a5d75c 73d3647f 03a5d7dc 00000000 00000000 cryptsp!CryptAcquireContextA+0x40f

                    03a5d7c0 616280ac 03a5d7dc 00000000 00000000 cryptsp!CryptAcquireContextW+0x97

                    03a5d7e0 616294b1 00000000 6162945d 03a5d854 jscript9!AutoSystemInfo::InitializeRandomNumber+0x1b

                    03a5d7e8 6162945d 03a5d854 614c94aa 614c0000 jscript9!ScriptEngine::RegisterNamedItem+0x150

                    03a5d7f0 614c94aa 614c0000 00000001 00000000 jscript9!DllMain+0x29

                    03a5d854 77da8a40 614c0000 00000001 00000000 jscript9!__CppXcptFilter+0x12c

                    03a5d874 77dad72b 614c9410 614c0000 00000001 ntdll_77d70000!LdrpCallInitRoutine+0x14

                    03a5d968 77dac3ad 00000000 66efc059 00000000 ntdll_77d70000!LdrpRunInitializeRoutines+0x26f

                    03a5dad4 77dac4c4 03a5db38 03a5db00 00000000 ntdll_77d70000!LdrpLoadDll+0x453

                    03a5db0c 772d2caa 03a5db00 03a5db58 03a5db38 ntdll_77d70000!LdrLoadDll+0xaa

                    03a5db48 75b14924 00000000 006ae6ac 00000000 KERNELBASE!LoadLibraryExW+0x1eb

                    03a5db5c 61e527bc 03a5e088 03a5eb74 00000000 kernel32!LoadLibraryW+0x11

                    WARNING: Stack unwind information not available. Following frames may be wrong.

                    03a5e294 61e5153c 006c8d98 006c89ec 03a5e4bc ScriptSn_20140306175307!DllGetClassObject+0x39c

                    03a5e2a4 61e5243c 006c8d98 00000000 006d006f ScriptSn_20140306175307+0x153c

                    03a5e4bc 770daec6 006c8d98 770dee84 03a5e564 ScriptSn_20140306175307!DllGetClassObject+0x1c

                    03a5e4d8 770b91cd 006c8d98 770dee84 03a5e564 ole32!CClassCache::CDllPathEntry::DllGetClassObject+0x30 [d:\w7rtm\com\ole32\com\objact\dllcache.cxx @ 3324]

                    03a5e4f0 770b8e92 03a5e504 770dee84 03a5e564 ole32!CClassCache::CDllFnPtrMoniker::BindToObjectNoSwitch+0x1f [d:\w7rtm\com\ole32\com\objact\dllcache.cxx @ 3831]

                    03a5e528 770b8c37 03a5e56c 00000000 03a5eb74 ole32!CClassCache::GetClassObject+0x49 [d:\w7rtm\com\ole32\com\objact\dllcache.cxx @ 4582]

                    03a5e5a4 770d3170 771d6444 00000000 03a5eb74 ole32!CServerContextActivator::CreateInstance+0x110 [d:\w7rtm\com\ole32\com\objact\actvator.cxx @ 974]

                    03a5e5e4 770b8daa 03a5eb74 00000000 03a5f0e0 ole32!ActivationPropertiesIn::DelegateCreateInstance+0x108 [d:\w7rtm\com\ole32\actprops\actprops.cxx @ 1917]

                    03a5e638 770b8d1f 771d646c 00000000 03a5eb74 ole32!CApartmentActivator::CreateInstance+0x112 [d:\w7rtm\com\ole32\com\objact\actvator.cxx @ 2268]

                    03a5e658 770b8aa2 771d6494 00000001 00000000 ole32!CProcessActivator::CCICallback+0x6d [d:\w7rtm\com\ole32\com\objact\actvator.cxx @ 1737]

                    03a5e678 770b8a53 771d6494 03a5e9d0 00000000 ole32!CProcessActivator::AttemptActivation+0x2c [d:\w7rtm\com\ole32\com\objact\actvator.cxx @ 1630]

                    03a5e6b4 770b8e0d 771d6494 03a5e9d0 00000000 ole32!CProcessActivator::ActivateByContext+0x4f [d:\w7rtm\com\ole32\com\objact\actvator.cxx @ 1487]

                    03a5e6dc 770d3170 771d6494 00000000 03a5eb74 ole32!CProcessActivator::CreateInstance+0x49 [d:\w7rtm\com\ole32\com\objact\actvator.cxx @ 1377]

                    03a5e71c 770d2ef4 03a5eb74 00000000 03a5f0e0 ole32!ActivationPropertiesIn::DelegateCreateInstance+0x108 [d:\w7rtm\com\ole32\actprops\actprops.cxx @ 1917]

                    03a5e97c 770d3170 771d6448 00000000 03a5eb74 ole32!CClientContextActivator::CreateInstance+0xb0 [d:\w7rtm\com\ole32\com\objact\actvator.cxx @ 685]

                    03a5e9bc 770d3098 03a5eb74 00000000 03a5f0e0 ole32!ActivationPropertiesIn::DelegateCreateInstance+0x108 [d:\w7rtm\com\ole32\actprops\actprops.cxx @ 1917]

                    03a5f194 770d9e25 03a5f700 00000000 00000001 ole32!ICoCreateInstanceEx+0x404 [d:\w7rtm\com\ole32\com\objact\objact.cxx @ 1334]

                    03a5f1f4 770d9d86 03a5f700 00000000 00000001 ole32!CComActivator::DoCreateInstance+0xd9 [d:\w7rtm\com\ole32\com\objact\immact.hxx @ 343]

                    03a5f218 770d9d3f 03a5f700 00000000 00000001 ole32!CoCreateInstanceEx+0x38 [d:\w7rtm\com\ole32\com\objact\actapi.cxx @ 157]

                    03a5f248 61e757c3 03a5f700 00000000 00000001 ole32!CoCreateInstance+0x37 [d:\w7rtm\com\ole32\com\objact\actapi.cxx @ 110]

                    03a5f6a4 61e7262c 03a5f68c 03a5f68c 0098b180 jsproxy!IECoCreateScriptEngineToBeFreeable+0x2e1

                    03a5f92c 61e722ce 00702650 00000001 75fd5d20 jsproxy!CScriptSite::Init+0x128

                    03a5f958 61e7219d 00000001 75fd5d20 00000001 jsproxy!_CreateScriptSite+0x8e

                    03a5f994 7600f0c1 00030000 75fd5d20 006f9b68 jsproxy!InternetInitializeAutoProxyDllEx+0x65

                    03a5f9d4 7600cef2 75fd5d20 006f9b68 006e76a0 wininet!ScriptHandler::ProxyDllInit+0x94

                    03a5fa2c 7600d141 75fd5d20 006d1e20 006c0888 wininet!CompileScript+0x155

                    03a5fa68 7600d022 00000000 75fd5d20 006c0888 wininet!DownloadProxyInfo+0xb5

                    03a5fa9c 7600c952 00000000 75fd5d20 03a5fac8 wininet!DownloadAutoConfigUrl+0x75

                    03a5fae8 75fa3926 006e3188 00000000 006d2240 wininet!AutoProxyConfigUrlDownloadThread+0x122

                    03a5fb00 77dd7e03 006dbd50 66efe1f9 006d2240 wininet! ?? ::FNODOBFM::`string'+0x22b97

                    03a5fb74 77db6c75 006dbd50 006d2240 66efe649 ntdll_77d70000!RtlpTpWorkCallback+0x11d

                    03a5fcc4 75b133aa 006cfee0 03a5fd10 77da8fe2 ntdll_77d70000!TppWorkerThread+0x562

                    03a5fcd0 77da8fe2 006cfee0 66efe79d 00000000 kernel32!BaseThreadInitThunk+0xe

                    03a5fd10 77da8fb5 77db6790 006cfee0 00000000 ntdll_77d70000!__RtlUserThreadStart+0x70

                    03a5fd28 00000000 77db6790 006cfee0 00000000 ntdll_77d70000!_RtlUserThreadStart+0x1b

                     

                     

                     

                    0:000:x86> !cs 77e720c0

                    -----------------------------------------

                    Critical section   = 0x0000000077e720c0 (ntdll_77d70000!LdrpLoaderLock+0x0)

                    DebugInfo          = 0x0000000077e74380

                    LOCKED

                    LockCount          = 0x4

                    WaiterWoken        = No

                    OwningThread       = 0x0000000000002288

                    RecursionCount     = 0x1

                    LockSemaphore      = 0x228

                    SpinCount          = 0x0000000000000000

                     

                     

                     

                    0:000:x86> !cs 73d43720

                    -----------------------------------------

                    Critical section   = 0x0000000073d43720 (cryptsp!l_DllLoadCritSec+0x0)

                    DebugInfo          = 0x00000000006e8680

                    LOCKED

                    LockCount          = 0x1

                    WaiterWoken        = No

                    OwningThread       = 0x0000000000001da4

                    RecursionCount     = 0x1

                    LockSemaphore      = 0x31C

                    SpinCount          = 0x0000000000000000

                    • 7. Re: jscript9 dead lock
                      zhongyzh

                      0  Id: 42a8.5bec Suspend: 0 Teb: 7efdb000 Unfrozen

                      ChildEBP RetAddr  Args to Child             

                      0054d810 77944886 000001a8 00000000 00000000 ntdll_77900000!NtWaitForSingleObject+0x15

                      0054d874 7794476a 00000000 00000000 00000001 ntdll_77900000!RtlpWaitOnCriticalSection+0x13e

                      0054d89c 7793c279 77a020c0 7d40d1bc 00000000 ntdll_77900000!RtlEnterCriticalSection+0x150

                      0054da08 7793c4c4 0054da6c 0054da34 00000000 ntdll_77900000!LdrpLoadDll+0x28a

                      0054da40 774b2caa 0054da34 0054da8c 0054da6c ntdll_77900000!LdrLoadDll+0xaa

                      0054da7c 774b2d07 00000000 0069d894 00000000 KERNELBASE!LoadLibraryExW+0x1eb

                      0054da9c 773a49f0 6e056604 00000000 00000000 KERNELBASE!LoadLibraryExA+0x26

                      0054dabc 6e037fc0 6e056604 a571c13e 0054ef8c kernel32!LoadLibraryA+0xba

                      WARNING: Stack unwind information not available. Following frames may be wrong.

                      0054daec 6e038092 0054dc8c 00000104 0054db18 ieatgpc!GpcCheckDigitalSignature+0x222e

                      0054dc20 6e0373bf 0054dc8c 00000104 00000000 ieatgpc!GpcCheckDigitalSignature+0x2300

                      0054dd10 77933140 032a0138 7793311c 7d40d5b4 ieatgpc!GpcCheckDigitalSignature+0x162d

                      0054ddf0 00000000 00000000 00000000 00000000 ntdll_77900000!RtlpFreeHeap+0xbb1

                       

                         1  Id: 42a8.42a4 Suspend: 0 Teb: 7efd8000 Unfrozen

                      ChildEBP RetAddr  Args to Child             

                      02bcf7d4 77945965 0000000b 006adc80 00000001 ntdll_77900000!ZwWaitForMultipleObjects+0x15

                      02bcf968 773a33aa 00000000 02bcf9b4 77938fe2 ntdll_77900000!TppWaiterpThread+0x32e

                      02bcf974 77938fe2 006adc50 7fa8f200 00000000 kernel32!BaseThreadInitThunk+0xe

                      02bcf9b4 77938fb5 77945839 006adc50 00000000 ntdll_77900000!__RtlUserThreadStart+0x70

                      02bcf9cc 00000000 77945839 006adc50 00000000 ntdll_77900000!_RtlUserThreadStart+0x1b

                       

                         2  Id: 42a8.42ec Suspend: 0 Teb: 7efd5000 Unfrozen

                      ChildEBP RetAddr  Args to Child             

                      02ebf6f4 77944886 000001a8 00000000 00000000 ntdll_77900000!NtWaitForSingleObject+0x15

                      02ebf758 7794476a 00000000 00000000 00421d28 ntdll_77900000!RtlpWaitOnCriticalSection+0x13e

                      02ebf780 7794c787 77a020c0 7ffff3ac 00000000 ntdll_77900000!RtlEnterCriticalSection+0x150

                      02ebf818 7794ca00 00000000 00000000 02ebf834 ntdll_77900000!LdrShutdownThread+0x50

                      02ebf828 773a33b1 00000000 02ebf874 77938fe2 ntdll_77900000!RtlExitUserThread+0x2a

                      02ebf834 77938fe2 00421d28 7ffff3c0 00000000 kernel32!BaseThreadInitThunk+0x15

                      02ebf874 77938fb5 00095050 00421d28 00000000 ntdll_77900000!__RtlUserThreadStart+0x70

                      02ebf88c 00000000 00095050 00421d28 00000000 ntdll_77900000!_RtlUserThreadStart+0x1b

                       

                         3  Id: 42a8.3c10 Suspend: 0 Teb: 7efad000 Unfrozen

                      ChildEBP RetAddr  Args to Child             

                      0316d524 774b14b9 0000030c 00000000 00000000 ntdll_77900000!NtWaitForSingleObject+0x15

                      0316d590 773a1194 0000030c ffffffff 00000000 KERNELBASE!WaitForSingleObjectEx+0x98

                      0316d5a8 773a1148 0000030c ffffffff 00000000 kernel32!WaitForSingleObjectExImplementation+0x75

                      0316d5bc 76c17a63 0000030c ffffffff 006c44a8 kernel32!WaitForSingleObject+0x12

                      0316d60c 76bac124 006f04e8 00000000 00000000 wininet!WxGetProxyForUrl+0x2a0

                      0316d638 76bac073 006f04e8 00000000 00000000 wininet!INTERNET_HANDLE_OBJECT::SessionGetProxyForUrl+0x96

                      0316d664 76bac19e 006f04e8 006c44a8 00000000 wininet!HTTP_REQUEST_HANDLE_OBJECT::HttpGetProxyForUrl+0x3e

                      0316d6a8 76babf87 006fe3d0 0316d6c4 006d2070 wininet!HTTP_REQUEST_HANDLE_OBJECT::HttpSendRequest_WindowsGetProxyForUrl+0xb4

                      0316d6c8 76babebd 006fe3d0 0316d6fc 006d2070 wininet!HTTP_REQUEST_HANDLE_OBJECT::HttpSendRequest_GetProxyForUrl+0x74

                      0316d714 76baa718 006fe3d0 76baa740 0316d738 wininet!HTTP_REQUEST_HANDLE_OBJECT::HttpSendRequest_Start+0x38f

                      0316d72c 76baa4e1 006fe3d0 006ac540 00000000 wininet!CFsm_HttpSendRequest::RunSM+0x77

                      0316d780 76baa8d9 006ac540 00000000 00000000 wininet!CFsm::Run+0x161

                      0316d7a8 76c31b2e 0000002e 00000000 006ddf28 wininet!DoFsm+0x5e

                      0316d804 76ba886a 0000002e 0057e7a8 0000023a wininet!HttpWrapSendRequest+0x23a

                      0316d888 000b1f74 00cc000c 001300b0 0000002e wininet!HttpSendRequestW+0xd0

                      0316fa68 000b238f 0057a554 0057e7a8 0000023a atmgr!CMCJMFErrorReport::SynSendURL+0x454 [d:\ecld\ecmd\workspace\build_train_t29l10nsp13ep31_allinone_133669_20150610004 6\029\src\windows\mc\comm\mcjmfreport.cpp @ 662]

                      0316fa80 773a33aa 001521ec 0316facc 77938fe2 atmgr!CMCJMFErrorReport::SendURLProc+0x2f [d:\ecld\ecmd\workspace\build_train_t29l10nsp13ep31_allinone_133669_20150610004 6\029\src\windows\mc\comm\mcjmfreport.cpp @ 788]

                      0316fa8c 77938fe2 001521ec 7e02f178 00000000 kernel32!BaseThreadInitThunk+0xe

                      0316facc 77938fb5 000b2360 001521ec 00000000 ntdll_77900000!__RtlUserThreadStart+0x70

                      0316fae4 00000000 000b2360 001521ec 00000000 ntdll_77900000!_RtlUserThreadStart+0x1b

                       

                        

                       

                         4  Id: 42a8.4418 Suspend: 0 Teb: 7efaa000 Unfrozen

                      ChildEBP RetAddr  Args to Child             

                      0329df68 77944886 000001a8 00000000 00000000 ntdll_77900000!NtWaitForSingleObject+0x15

                      0329dfcc 7794476a 00000000 00000000 7792f9e4 ntdll_77900000!RtlpWaitOnCriticalSection+0x13e

                      0329dff4 7792ff33 77a020c0 7e3dead0 00000001 ntdll_77900000!RtlEnterCriticalSection+0x150

                      0329e164 7792fc8f 00000001 0069d894 00000000 ntdll_77900000!LdrGetDllHandleEx+0x2f7

                      0329e180 774b1a82 0069d894 00000000 0329e1f0 ntdll_77900000!LdrGetDllHandle+0x18

                      0329e1d4 774b1c65 0329e1f0 a60e75b7 774b5894 KERNELBASE!GetModuleHandleForUnicodeString+0x53

                      0329e64c 774b1d60 00000001 00000002 006e4f60 KERNELBASE!BasepGetModuleHandleExW+0x181

                      0329e664 774b2eb6 006e4f60 00000000 003e003c KERNELBASE!GetModuleHandleW+0x29

                      0329e67c 74742e1e 0071a0d8 0071a0d8 0329e74c KERNELBASE!GetModuleHandleA+0x34

                      0329e68c 747446c3 0071a0d8 0329e6f8 a6029b8a cryptsp!CSPInCacheCheck+0x11

                      0329e74c 7474647f 0329e7d4 00000000 006f0df0 cryptsp!CryptAcquireContextA+0x420

                      0329e7b0 7554e9ad 0329e7d4 00000000 7554e9d0 cryptsp!CryptAcquireContextW+0x97

                      0329e7d8 7554b50f 75569af4 0329e81c 7554af41 ole32!CRandomNumberGenerator::Initialize+0x2e [d:\w7rtm\com\ole32\common\rng.cxx @ 71]

                      0329e7e4 7554af41 0329e808 00000010 80004002 ole32!CRandomNumberGenerator::GenerateRandomNumber+0xd [d:\w7rtm\com\ole32\common\rng.cxx @ 31]

                      0329e81c 7554b48f 00000000 0329e85c 7556f100 ole32!CStdMarshal::AddIPIDEntry+0x48 [d:\w7rtm\com\ole32\com\dcomrem\marshal.cxx @ 5937]

                      0329e870 7554bef5 7556f100 00000005 00000004 ole32!CStdMarshal::MarshalServerIPID+0x5a [d:\w7rtm\com\ole32\com\dcomrem\marshal.cxx @ 1137]

                      0329e8c8 7554d10c 0329e924 7556f100 00000004 ole32!CStdMarshal::MarshalObjRef+0xb9 [d:\w7rtm\com\ole32\com\dcomrem\marshal.cxx @ 759]

                      0329e8fc 7554d460 0329e924 7556f100 006eb250 ole32!MarshalInternalObjRef+0x8c [d:\w7rtm\com\ole32\com\dcomrem\marshal.cxx @ 587]

                      0329e980 7554d2cf 0329e9a8 0329e9ac 00000000 ole32!CRemoteUnknown::CRemoteUnknown+0x3b [d:\w7rtm\com\ole32\com\dcomrem\remoteu.cxx @ 55]

                      0329e9c0 7554d369 756669b0 00000000 7565d6ee ole32!CComApartment::InitRemoting+0x19c [d:\w7rtm\com\ole32\com\dcomrem\aprtmnt.cxx @ 977]

                      0329e9cc 7565d6ee 0329eea4 006ff240 0329e9ec ole32!CComApartment::StartServer+0x13 [d:\w7rtm\com\ole32\com\dcomrem\aprtmnt.cxx @ 1204]

                      0329e9dc 75554731 00000000 0329eea4 0329ea50 ole32!InitChannelIfNecessary+0x1e [d:\w7rtm\com\ole32\com\dcomrem\channelb.cxx @ 1021]

                      0329e9ec 75555c1e 00000000 00000000 0329eea4 ole32!CRpcResolver::BindToSCMProxy+0xe [d:\w7rtm\com\ole32\com\dcomrem\resolver.cxx @ 1491]

                      0329ea50 7555637b 0329eea4 0329f40c 00000000 ole32!CRpcResolver::CreateInstance+0x74 [d:\w7rtm\com\ole32\com\dcomrem\resolver.cxx @ 2385]

                      0329ecac 75563170 75666448 00000000 0329eea4 ole32!CClientContextActivator::CreateInstance+0x11f [d:\w7rtm\com\ole32\com\objact\actvator.cxx @ 711]

                      0329ecec 75563098 0329eea4 00000000 0329f40c ole32!ActivationPropertiesIn::DelegateCreateInstance+0x108 [d:\w7rtm\com\ole32\actprops\actprops.cxx @ 1917]

                      0329f4c0 75569e25 63232644 00000000 00000004 ole32!ICoCreateInstanceEx+0x404 [d:\w7rtm\com\ole32\com\objact\objact.cxx @ 1334]

                      0329f520 75569d86 63232644 00000000 00000004 ole32!CComActivator::DoCreateInstance+0xd9 [d:\w7rtm\com\ole32\com\objact\immact.hxx @ 343]

                      0329f544 75569d3f 63232644 00000000 00000004 ole32!CoCreateInstanceEx+0x38 [d:\w7rtm\com\ole32\com\objact\actapi.cxx @ 157]

                      0329f574 63232505 63232644 00000000 00000004 ole32!CoCreateInstance+0x37 [d:\w7rtm\com\ole32\com\objact\actapi.cxx @ 110]

                      0329f5a0 632333fd 0329f5c8 632323e8 00000000 netprofm!CPubINetworkListManager::EnsureNLPConnected+0x58

                      0329f5b4 76cbdab4 00229f40 00000001 0329f5f4 netprofm!CPubINetworkListManager::GetNetworks+0x39

                      0329f644 76c947f6 00000000 006ffa94 006ffa98 wininet!NETWORK_MANAGER::ReadGuidsForConnectedNetworks+0x16b

                      0329f668 76cbdf8b 006ffa8c 006ffa90 00000000 wininet!InternalReadGuidsForConnectedNetworks+0x86

                      0329f690 76cbd36f 006bd098 006ffa8c 006ffa90 wininet!CSwpadSupport::ReadIdsForConnectedNetworks+0x2b

                      0329f6bc 76cbd0d9 0329f7c4 006ffa88 00000000 wininet!NETWORK_MANAGER::Init+0x4f

                      0329f718 76ccdec6 0329f764 0329f734 006ffa88 wininet!NETWORK_MANAGER::GetWpadInformationForConnectedNetworks+0x56

                      0329f76c 76cce1be 0329f7cc 0329f7a0 0329f7d8 wininet!SwpadGetDecisionForNetwork+0x10e

                      0329f7fc 76c63e28 006bab88 00000000 006c9c48 wininet!SwpadWpad+0x19e

                      0329f814 77967e03 006eb120 7e3df33c 006c9c48 wininet! ?? ::FNODOBFM::`string'+0x22b9a

                      0329f888 77946c75 006eb120 006c9c48 7e3df26c ntdll_77900000!RtlpTpWorkCallback+0x11d

                      0329f9d8 773a33aa 006ade88 0329fa24 77938fe2 ntdll_77900000!TppWorkerThread+0x562

                      0329f9e4 77938fe2 006ade88 7e3df190 00000000 kernel32!BaseThreadInitThunk+0xe

                      0329fa24 77938fb5 77946790 006ade88 00000000 ntdll_77900000!__RtlUserThreadStart+0x70

                      0329fa3c 00000000 77946790 006ade88 00000000 ntdll_77900000!_RtlUserThreadStart+0x1b

                       

                         5  Id: 42a8.1314 Suspend: 0 Teb: 7efa7000 Unfrozen

                      ChildEBP RetAddr  Args to Child             

                      050df8d4 77944886 000001a8 00000000 00000000 ntdll_77900000!NtWaitForSingleObject+0x15

                      050df938 7794476a 00000000 00000000 00010003 ntdll_77900000!RtlpWaitOnCriticalSection+0x13e

                      050df960 7794c787 77a020c0 7819f24c 006ad950 ntdll_77900000!RtlEnterCriticalSection+0x150

                      050df9f8 7794ca00 00000002 00000000 050dfb54 ntdll_77900000!LdrShutdownThread+0x50

                      050dfa08 7795f4da 00000000 7819f0e0 00000000 ntdll_77900000!RtlExitUserThread+0x2a

                      050dfb54 773a33aa 006ad950 050dfba0 77938fe2 ntdll_77900000!TppWorkerThread+0x846

                      050dfb60 77938fe2 006ad950 7819f014 00000000 kernel32!BaseThreadInitThunk+0xe

                      050dfba0 77938fb5 77946790 006ad950 00000000 ntdll_77900000!__RtlUserThreadStart+0x70

                      050dfbb8 00000000 77946790 006ad950 00000000 ntdll_77900000!_RtlUserThreadStart+0x1b

                       

                       

                       

                         8  Id: 42a8.3fd0 Suspend: 0 Teb: 7ef9e000 Unfrozen

                      ChildEBP RetAddr  Args to Child             

                      055af658 774b1605 00000002 055af6a8 00000001 ntdll_77900000!ZwWaitForMultipleObjects+0x15

                      055af6f4 773a1a3c 055af6a8 055af71c 00000000 KERNELBASE!WaitForMultipleObjectsEx+0x100

                      055af73c 76cc5926 00000002 7efde000 00000000 kernel32!WaitForMultipleObjectsExImplementation+0xe0

                      055af79c 76cc53f0 00000001 00000000 055af7cc wininet!AutoProxyResolver::DownloadAutoConfigUrl+0x16e

                      055af7f0 76cc6931 76b99fb0 006c9b48 006c3860 wininet!AutoProxyResolver::DetectAndDownloadProxyScript+0x231

                      055af814 76cc6370 055af834 76b99fb0 006c9b48 wininet!AutoProxyResolver::ProcessGetProxyForUrl+0x94

                      055af838 76cc6ae4 006c3860 00000000 006c3860 wininet!AutoProxyResolver::OnGetProxyForUrl+0x3b

                      055af878 76cc41e5 00000000 006c3860 00000000 wininet!AutoProxyResolver::ProcessMessages+0xf4

                      055af890 76cc4401 00000000 00000000 055af8ac wininet!AutoProxyResolver::AutoProxyThread+0x113

                      055af8a0 773a33aa 006c3860 055af8ec 77938fe2 wininet!AutoProxyResolver::AutoProxyThreadStart+0x11

                      055af8ac 77938fe2 006c3860 784ef358 00000000 kernel32!BaseThreadInitThunk+0xe

                      055af8ec 77938fb5 76cc43f0 006c3860 00000000 ntdll_77900000!__RtlUserThreadStart+0x70

                      055af904 00000000 76cc43f0 006c3860 00000000 ntdll_77900000!_RtlUserThreadStart+0x1b

                       

                       

                        11  Id: 42a8.5520 Suspend: 0 Teb: 7ef95000 Unfrozen

                      ChildEBP RetAddr  Args to Child             

                      05bbd0f4 77944886 000003f8 00000000 00000000 ntdll_77900000!NtWaitForSingleObject+0x15

                      05bbd158 7794476a 00000000 00000000 00000000 ntdll_77900000!RtlpWaitOnCriticalSection+0x13e

                      05bbd180 747446b2 74753720 a090aefa 05bbd270 ntdll_77900000!RtlEnterCriticalSection+0x150

                      05bbd23c 7474647f 05bbd2bc 00000000 00000000 cryptsp!CryptAcquireContextA+0x40f

                      05bbd2a0 0ff1183c 05bbd2bc 00000000 00000000 cryptsp!CryptAcquireContextW+0x97

                      05bbd2c0 0ff12c41 00000000 0ff12bed 05bbd334 jscript9!AutoSystemInfo::InitializeRandomNumber+0x1b

                      05bbd2c8 0ff12bed 05bbd334 0fda956a 0fda0000 jscript9!Js::DynamicObject::MarshalToScriptContext+0x5d

                      05bbd2d0 0fda956a 0fda0000 00000001 00000000 jscript9!DllMain+0x29

                      05bbd334 77938a40 0fda0000 00000001 00000000 jscript9!__CppXcptFilter+0x12c

                      05bbd354 7793d72b 0fda94d0 0fda0000 00000001 ntdll_77900000!LdrpCallInitRoutine+0x14

                      05bbd448 7793c3ad 00000000 78afde00 00000000 ntdll_77900000!LdrpRunInitializeRoutines+0x26f

                      05bbd5b4 7793c4c4 05bbd618 05bbd5e0 00000000 ntdll_77900000!LdrpLoadDll+0x453

                      05bbd5ec 774b2caa 05bbd5e0 05bbd638 05bbd618 ntdll_77900000!LdrLoadDll+0xaa

                      05bbd628 773a4924 00000000 0069d894 00000000 KERNELBASE!LoadLibraryExW+0x1eb

                      05bbd63c 136e27bc 05bbdb68 05bbe654 00000000 kernel32!LoadLibraryW+0x11

                      WARNING: Stack unwind information not available. Following frames may be wrong.

                      05bbdd74 136e153c 006e7da4 006e23c0 05bbdf9c ScriptSn_20141117231807!DllGetClassObject+0x39c

                      05bbdd84 136e243c 006e7da4 00000000 006d006f ScriptSn_20141117231807+0x153c

                      05bbdf9c 7556aec6 006e7da4 7556ee84 05bbe044 ScriptSn_20141117231807!DllGetClassObject+0x1c

                      05bbdfb8 755491ed 006e7da4 7556ee84 05bbe044 ole32!CClassCache::CDllPathEntry::DllGetClassObject+0x30 [d:\w7rtm\com\ole32\com\objact\dllcache.cxx @ 3324]

                      05bbdfd0 75548eb2 05bbdfe4 7556ee84 05bbe044 ole32!CClassCache::CDllFnPtrMoniker::BindToObjectNoSwitch+0x1f [d:\w7rtm\com\ole32\com\objact\dllcache.cxx @ 3831]

                      05bbe008 75548c57 05bbe04c 00000000 05bbe654 ole32!CClassCache::GetClassObject+0x49 [d:\w7rtm\com\ole32\com\objact\dllcache.cxx @ 4582]

                      05bbe084 75563170 75666444 00000000 05bbe654 ole32!CServerContextActivator::CreateInstance+0x110 [d:\w7rtm\com\ole32\com\objact\actvator.cxx @ 974]

                      05bbe0c4 75548dca 05bbe654 00000000 05bbebb8 ole32!ActivationPropertiesIn::DelegateCreateInstance+0x108 [d:\w7rtm\com\ole32\actprops\actprops.cxx @ 1917]

                      05bbe118 75548d3f 7566646c 00000000 05bbe654 ole32!CApartmentActivator::CreateInstance+0x112 [d:\w7rtm\com\ole32\com\objact\actvator.cxx @ 2268]

                      05bbe138 75548ac2 75666494 00000001 00000000 ole32!CProcessActivator::CCICallback+0x6d [d:\w7rtm\com\ole32\com\objact\actvator.cxx @ 1737]

                      05bbe158 75548a73 75666494 05bbe4b0 00000000 ole32!CProcessActivator::AttemptActivation+0x2c [d:\w7rtm\com\ole32\com\objact\actvator.cxx @ 1630]

                      05bbe194 75548e2d 75666494 05bbe4b0 00000000 ole32!CProcessActivator::ActivateByContext+0x4f [d:\w7rtm\com\ole32\com\objact\actvator.cxx @ 1487]

                      05bbe1bc 75563170 75666494 00000000 05bbe654 ole32!CProcessActivator::CreateInstance+0x49 [d:\w7rtm\com\ole32\com\objact\actvator.cxx @ 1377]

                      05bbe1fc 75562ef4 05bbe654 00000000 05bbebb8 ole32!ActivationPropertiesIn::DelegateCreateInstance+0x108 [d:\w7rtm\com\ole32\actprops\actprops.cxx @ 1917]

                      05bbe45c 75563170 75666448 00000000 05bbe654 ole32!CClientContextActivator::CreateInstance+0xb0 [d:\w7rtm\com\ole32\com\objact\actvator.cxx @ 685]

                      05bbe49c 75563098 05bbe654 00000000 05bbebb8 ole32!ActivationPropertiesIn::DelegateCreateInstance+0x108 [d:\w7rtm\com\ole32\actprops\actprops.cxx @ 1917]

                      05bbec6c 75569e25 05bbf1d8 00000000 00000001 ole32!ICoCreateInstanceEx+0x404 [d:\w7rtm\com\ole32\com\objact\objact.cxx @ 1334]

                      05bbeccc 75569d86 05bbf1d8 00000000 00000001 ole32!CComActivator::DoCreateInstance+0xd9 [d:\w7rtm\com\ole32\com\objact\immact.hxx @ 343]

                      05bbecf0 75569d3f 05bbf1d8 00000000 00000001 ole32!CoCreateInstanceEx+0x38 [d:\w7rtm\com\ole32\com\objact\actapi.cxx @ 157]

                      05bbed20 0f8d57c3 05bbf1d8 00000000 00000001 ole32!CoCreateInstance+0x37 [d:\w7rtm\com\ole32\com\objact\actapi.cxx @ 110]

                      05bbf17c 0f8d262c 05bbf164 05bbf164 02ede568 jsproxy!IECoCreateScriptEngineToBeFreeable+0x2e1

                      05bbf404 0f8d22ce 00737f70 00000001 76c95d00 jsproxy!CScriptSite::Init+0x128

                      05bbf430 0f8d219d 00000001 76c95d00 00000001 jsproxy!_CreateScriptSite+0x8e

                      05bbf46c 76ccef84 00030000 76c95d00 006a9628 jsproxy!InternetInitializeAutoProxyDllEx+0x65

                      05bbf4ac 76cccdb2 76c95d00 006a9628 006fd098 wininet!ScriptHandler::ProxyDllInit+0x94

                      05bbf504 76ccd001 76c95d00 0071ea28 006b9088 wininet!CompileScript+0x155

                      05bbf540 76cccee2 00000000 76c95d00 006b9088 wininet!DownloadProxyInfo+0xb5

                      05bbf574 76ccc812 00000000 76c95d00 05bbf5a0 wininet!DownloadAutoConfigUrl+0x75

                      05bbf5c0 76c63e28 006e4b70 00000000 006c9c88 wininet!AutoProxyConfigUrlDownloadThread+0x122

                      05bbf5d8 77967e03 006eb150 78affdf8 006c9c88 wininet! ?? ::FNODOBFM::`string'+0x22b9a

                      05bbf64c 77946c75 006eb150 006c9c88 78affc28 ntdll_77900000!RtlpTpWorkCallback+0x11d

                      05bbf79c 773a33aa 006ade88 05bbf7e8 77938fe2 ntdll_77900000!TppWorkerThread+0x562

                      05bbf7a8 77938fe2 006ade88 78affc5c 00000000 kernel32!BaseThreadInitThunk+0xe

                      05bbf7e8 77938fb5 77946790 006ade88 00000000 ntdll_77900000!__RtlUserThreadStart+0x70

                      05bbf800 00000000 77946790 006ade88 00000000 ntdll_77900000!_RtlUserThreadStart+0x1b

                       

                       

                       

                      0:000:x86> !cs 05bbd2bc

                      -----------------------------------------

                      Critical section   = 0x0000000005bbd2bc (+0x5BBD2BC)

                      DebugInfo          = 0x00000000774b19a9

                      LOCKED

                      LockCount          = 0xFE910B4B

                      WaiterWoken        = Yes

                      OwningThread       = 0x0000000000000000

                      RecursionCount     = 0xFF12C41

                      LockSemaphore      = 0xFF12BED

                      SpinCount          = 0x0000000005bbd334

                      0:000:x86> !cs 77a020c0

                      -----------------------------------------

                      Critical section   = 0x0000000077a020c0 (ntdll_77900000!LdrpLoaderLock+0x0)

                      DebugInfo          = 0x0000000077a04380

                      LOCKED

                      LockCount          = 0x7

                      WaiterWoken        = No

                      OwningThread       = 0x0000000000005520

                      RecursionCount     = 0x1

                      LockSemaphore      = 0x1A8

                      SpinCount          = 0x0000000000000000

                      0:000:x86> !cs 74753720

                      -----------------------------------------

                      Critical section   = 0x0000000074753720 (cryptsp!l_DllLoadCritSec+0x0)

                      DebugInfo          = 0x00000000006c6730

                      LOCKED

                      LockCount          = 0x1

                      WaiterWoken        = No

                      OwningThread       = 0x0000000000004418

                      RecursionCount     = 0x1

                      LockSemaphore      = 0x3F8

                      SpinCount          = 0x0000000000000000

                       

                       

                       

                       

                       

                       

                       

                      0:000:x86> !cs 77a020c0

                      -----------------------------------------

                      Critical section   = 0x0000000077a020c0 (ntdll_77900000!LdrpLoaderLock+0x0)

                      DebugInfo          = 0x0000000077a04380

                      LOCKED

                      LockCount          = 0x7

                      WaiterWoken        = No

                      OwningThread       = 0x0000000000005520

                      RecursionCount     = 0x1

                      LockSemaphore      = 0x1A8

                      SpinCount          = 0x0000000000000000

                       

                      • 8. Re: jscript9 dead lock
                        peter.mason

                        Hi Zhongyzh,

                         

                        I'm not clear on what application is giving you an issue here, where are these errors being generated?

                         

                        Is this just an Issue with Webex?

                        • 9. Re: jscript9 dead lock
                          zhongyzh

                          Hi, Peter:

                          These are our Webex customers using our Webex meeting, our program need to verify signature, then Macfee ScriptSn*.dll will trigger the dead lock. There are several customers report the deadlock, and if you have space to upload, I will upload the dump files of deadlock.

                          1 2 Previous Next