Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

Deciphering the .NET clr20r3 exception parameters P1..P10

I'm trying to decipher the meaning on the P1...P10 parameters associated with a clr20r3 that is written to the event log when my application experiences an exception.

The best I've been able to find is:

  • P1: the hosting process (e.g. w3wp.exe)
  • P2: the hosting process version (e.g. 6.0.3790.1830)
  • P3: ??? (e.g. 42435be1)
  • P4: the assembly from which the exception was raised (e.g. mrtables.webservice)
  • P5: the assembly version (e.g. 2.1.2.0)
  • P6: ??? (e.g. 4682617f)
  • P7: ??? (e.g. 129)
  • P8: ??? (e.g. 50)
  • P9: the exception type raised (e.g. system.argumentexception)
  • P10: ??? (e.g. NIL)

Googling for clr20r3 provides thousands of sample parameter values, from which someone can try to derive a pattern.

But I'm hoping for documentation on the parameter meanings, as opposed to educated guesses.


Edit: While I can hope for canonical documentation, really I'd be happy to see the exception being thrown, at what line, complete with a stack trace.

Bonus Reading

  • Unhandled exception that caused the application to crash with "EventType clr20r3, P1 w3wp.exe" in the log, but no details there (asking for help with a problem, while we're asking for a canonical explanation of what the parameters mean)
like image 396
Ian Boyd Avatar asked Oct 29 '10 14:10

Ian Boyd


2 Answers

P7 and P8 are the important ones to find out where the P9 exception was raised. Use P4 to know what assembly to look for. Run ildasm.exe and open that assembly. File + Dump, tick the "Token values" checkbox, OK and save the .il file somewhere.

Open the file in a text editor. P7 gives you the method token, it starts with 0x06, producing token value "06000129". Search for:

.method /*06000129*/ 

Which gives you the method name, look up from there to find the .class, that gives you the class name.

P8 gives you the IL offset. From the found .method, look for IL_0050 for the instruction that raised the exception. Mapping it back to your source code is a bit tricky but you'll probably figure it out. Use Reflector if necessary.

In general, write an event handler for AppDomain.UnhandledException to avoid the pain of reverse-engineering these Watson crash buckets. Log the value of e.ExceptionObject.ToString() to get both the exception message and a stack trace.

like image 93
Hans Passant Avatar answered Nov 14 '22 09:11

Hans Passant


Here is the information on Watson Buckets

  1. Exe File Name
  2. Exe File assembly version number
  3. Exe File Stamp
  4. Exe file full assembly name
  5. Faulting assembly version
  6. Faulting assembly timestamp
  7. Faulting assembly method def
  8. Faulting method IL Offset within the faulting method
  9. Exception type

And also here is a MSDN article on the same.

Sample:

  Problem Signature 01: devenv.exe   Problem Signature 02: 11.0.50727.1   Problem Signature 03: 5011ecaa   Problem Signature 04: Microsoft.VisualStudio.SharePoint.Project   Problem Signature 05: 11.0.60226.0   Problem Signature 06: 512c2dba   Problem Signature 07: 18a8   Problem Signature 08: 1d   Problem Signature 09: System.NullReferenceException 
like image 42
Naveen Avatar answered Nov 14 '22 10:11

Naveen