I try analyse this dump with Windbg. But it can't show x86 callstack. symbol path configed as:
srv*D:\dev_head\win_symbols*
Some command result:
0:000> !teb
Wow64 TEB32 at 000000007efdd000
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: wow64!_TEB32 ***
*** ***
*************************************************************************
error InitTypeRead( wow64!_TEB32 )...
Wow64 TEB at 000000007efdb000
ExceptionList: 000000007efdd000
StackBase: 000000000016fcfc
StackLimit: 000000000016b000
SubSystemTib: 0000000000000000
FiberData: 0000000000001e00
ArbitraryUserPointer: 0000000000230bf0
Self: 000000007efdb000
EnvironmentPointer: 0000000000000000
ClientId: 00000000000007e0 . 0000000000000ecc
RpcHandle: 0000000000000000
Tls Storage: 0000000000000000
PEB Address: 000000007efdf000
LastErrorValue: 0
LastStatusValue: 0
Count Owned Locks: 0
HardErrorMode: 0
0:000> !load wow64exts
0:000> !sw
The current thread doesn't have an x86 context.
symbols file wow64.pdb, wow64win.pdb can download/load correctly, but only wow64cpu.pdb just can not download. Is this problem lead to analyse failure?