09-30-2007, 08:59 AM -
4.2 crashes in the similar way:
Code:
Microsoft (R) Windows Debugger Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Serge\AppData\Local\Temp\WER15E6.tmp\minidump.mdmp]
User Mini Dump File: Only registers, stack and portions of memory are available
Windows Vista Version 6000 MP (4 procs) Free x64
Product: WinNt, suite: SingleUserTS
Debug session time: Sun Sep 30 20:49:38.000 2007 (GMT+4)
System Uptime: 0 days 5:33:43.787
Process Uptime: 0 days 1:15:44.000
Symbol search path is: srv*d:\dev\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
...........................................................................................................................................................
Loading unloaded module list
...............................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(16ac.1694): Access violation - code c0000005 (first/second chance not available)
00000000`04248d83 4a8b1409 mov rdx,qword ptr [rcx+r9] ds:00000001`76e13da4=????????????????
0:032> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
*** ERROR: Symbol file could not be found. Defaulted to export symbols for tlb.dll -
FAULTING_IP:
+4248d83
00000000`04248d83 4a8b1409 mov rdx,qword ptr [rcx+r9]
EXCEPTION_RECORD: ffffffffffffffff -- (.exr ffffffffffffffff)
ExceptionAddress: 0000000004248d83
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000176e13da4
Attempt to read from address 0000000176e13da4
DEFAULT_BUCKET_ID: CODE_RUNNING_ON_HEAP
PROCESS_NAME: explorer.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
READ_ADDRESS: 0000000176e13da4
BUGCHECK_STR: ACCESS_VIOLATION
IP_ON_HEAP: 0000000004215978
The fault address in not in any loaded module, please check your build's rebase
log at <releasedir>\bin\build_logs\timebuild\ntrebase.log for module which may
contain the address if it were loaded.
FRAME ONE INVALID: 1800200000000a
LAST_CONTROL_TRANSFER: from 0000000004215978 to 0000000004248d83
STACK_TEXT:
00000000`058ff048 00000000`04215978 : 00000000`04280a70 00000000`00000022 00000000`43b3d25c 00000000`76e90000 : 0x4248d83
00000000`058ff050 00000000`04280a70 : 00000000`00000022 00000000`43b3d25c 00000000`76e90000 00000000`051f0000 : 0x4215978
00000000`058ff058 00000000`00000022 : 00000000`43b3d25c 00000000`76e90000 00000000`051f0000 00000000`04202733 : 0x4280a70
00000000`058ff060 00000000`43b3d25c : 00000000`76e90000 00000000`051f0000 00000000`04202733 00000000`00000000 : 0x22
00000000`058ff068 00000000`76e90000 : 00000000`051f0000 00000000`04202733 00000000`00000000 000000bf`00000099 : 0x43b3d25c
00000000`058ff070 00000000`051f0000 : 00000000`04202733 00000000`00000000 000000bf`00000099 00000000`000000ac : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`058ff078 00000000`04202733 : 00000000`00000000 000000bf`00000099 00000000`000000ac 00000000`00110010 : 0x51f0000
00000000`058ff080 00000000`00000000 : 000000bf`00000099 00000000`000000ac 00000000`00110010 00000000`04cd54d9 : 0x4202733
00000000`058ff088 000000bf`00000099 : 00000000`000000ac 00000000`00110010 00000000`04cd54d9 00000000`04215b00 : 0x0
00000000`058ff090 00000000`000000ac : 00000000`00110010 00000000`04cd54d9 00000000`04215b00 00000000`76e90000 : 0xbf`00000099
00000000`058ff098 00000000`00110010 : 00000000`04cd54d9 00000000`04215b00 00000000`76e90000 00000000`044f8ba0 : 0xac
00000000`058ff0a0 00000000`04cd54d9 : 00000000`04215b00 00000000`76e90000 00000000`044f8ba0 00000000`04280a01 : 0x110010
00000000`058ff0a8 00000000`04215b00 : 00000000`76e90000 00000000`044f8ba0 00000000`04280a01 00000000`00000000 : 0x4cd54d9
00000000`058ff0b0 00000000`76e90000 : 00000000`044f8ba0 00000000`04280a01 00000000`00000000 00000000`770d6fa0 : 0x4215b00
00000000`058ff0b8 00000000`044f8ba0 : 00000000`04280a01 00000000`00000000 00000000`770d6fa0 00000000`058ff140 : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`058ff0c0 00000000`04280a01 : 00000000`00000000 00000000`770d6fa0 00000000`058ff140 00000000`771b9a98 : tlb!SelfInstall+0x93200
00000000`058ff0c8 00000000`00000000 : 00000000`770d6fa0 00000000`058ff140 00000000`771b9a98 00000000`04215d48 : 0x4280a01
00000000`058ff0d0 00000000`770d6f9f : 00000000`058ff140 00000000`771b9a98 00000000`04215d48 00000000`76e90000 : 0x0
00000000`058ff0d8 00000000`058ff140 : 00000000`771b9a98 00000000`04215d48 00000000`76e90000 00000000`044f8ba0 : ntdll!RtlpPopulateListIndex+0x1fc
00000000`058ff0e0 00000000`771b9a98 : 00000000`04215d48 00000000`76e90000 00000000`044f8ba0 00000000`00000100 : 0x58ff140
00000000`058ff0e8 00000000`04215d48 : 00000000`76e90000 00000000`044f8ba0 00000000`00000100 00000000`000002d8 : ntdll!RtlpInterceptorRoutines
00000000`058ff0f0 00000000`76e90000 : 00000000`044f8ba0 00000000`00000100 00000000`000002d8 00000000`00000000 : 0x4215d48
00000000`058ff0f8 00000000`044f8ba0 : 00000000`00000100 00000000`000002d8 00000000`00000000 00000000`0427b450 : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`058ff100 00000000`00000100 : 00000000`000002d8 00000000`00000000 00000000`0427b450 00000000`00000000 : tlb!SelfInstall+0x93200
00000000`058ff108 00000000`000002d8 : 00000000`00000000 00000000`0427b450 00000000`00000000 00000000`0427bd70 : 0x100
00000000`058ff110 00000000`00000000 : 00000000`0427b450 00000000`00000000 00000000`0427bd70 00000000`0427bb88 : 0x2d8
00000000`058ff118 00000000`0427b450 : 00000000`00000000 00000000`0427bd70 00000000`0427bb88 00000000`770f714b : 0x0
00000000`058ff120 00000000`00000000 : 00000000`0427bd70 00000000`0427bb88 00000000`770f714b 65636f72`50746553 : 0x427b450
00000000`058ff128 00000000`0427bd70 : 00000000`0427bb88 00000000`770f714b 65636f72`50746553 6e696b72`6f577373 : 0x0
00000000`058ff130 00000000`0427bb88 : 00000000`770f714b 65636f72`50746553 6e696b72`6f577373 657a6953`74655367 : 0x427bd70
00000000`058ff138 00000000`770f714b : 65636f72`50746553 6e696b72`6f577373 657a6953`74655367 00000000`058ff100 : 0x427bb88
00000000`058ff140 00000000`00000002 : 00000000`739946bc 00000000`76e90000 00000000`00000003 00000000`771af9a0 : ntdll!LdrGetProcedureAddressEx+0x488
00000000`058ff2b0 00000000`739946bc : 00000000`76e90000 00000000`00000003 00000000`771af9a0 00000000`00000000 : 0x2
00000000`058ff2b8 00000000`76e90000 : 00000000`00000003 00000000`771af9a0 00000000`00000000 00000000`044c2d76 : 0x739946bc
00000000`058ff2c0 00000000`00000003 : 00000000`771af9a0 00000000`00000000 00000000`044c2d76 00000000`045dec10 : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`058ff2c8 00000000`771af9a0 : 00000000`00000000 00000000`044c2d76 00000000`045dec10 00000000`76ec8d30 : 0x3
00000000`058ff2d0 00000000`00000000 : 00000000`044c2d76 00000000`045dec10 00000000`76ec8d30 000007ff`fffa3258 : ntdll!PebLdr+0x20
00000000`058ff2d8 00000000`044c2d76 : 00000000`045dec10 00000000`76ec8d30 000007ff`fffa3258 00000000`00341be0 : 0x0
00000000`058ff2e0 00000000`045dec10 : 00000000`76ec8d30 000007ff`fffa3258 00000000`00341be0 00000000`00000000 : tlb!SelfInstall+0x5d3d6
00000000`058ff2e8 00000000`76ec8d30 : 000007ff`fffa3258 00000000`00341be0 00000000`00000000 00000000`00000018 : tlb!SelfInstall+0x179270
00000000`058ff2f0 00000000`00000000 : 00000000`00000002 00000000`043e0000 00000000`04953a90 00000000`00000000 : kernel32!GetProcAddress+0x60
FAULTING_THREAD: 0000000000001694
FOLLOWUP_IP:
tlb!SelfInstall+93200
00000000`044f8ba0 44 ???
SYMBOL_STACK_INDEX: f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tlb
IMAGE_NAME: tlb.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 46269ff1
SYMBOL_NAME: tlb!SelfInstall+93200
STACK_COMMAND: ~32s; .ecxr ; kb
FAILURE_BUCKET_ID: X64_ACCESS_VIOLATION_tlb!SelfInstall+93200
BUCKET_ID: X64_ACCESS_VIOLATION_tlb!SelfInstall+93200
Followup: MachineOwner
---------