TLB 4.2.2 Vista 64 explorer.exe crashes
Started by CrazyCoder


Rate this topic
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5


15 posts in this topic
CrazyCoder
Junior Member
**


0
5 posts 1 threads Joined: Sep 2007
09-30-2007, 08:59 AM -
#5
4.2 crashes in the similar way:

Code:
Microsoft (R) Windows Debugger  Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Serge\AppData\Local\Temp\WER15E6.tmp\minidump.mdmp]
User Mini Dump File: Only registers, stack and portions of memory are available

Windows Vista Version 6000 MP (4 procs) Free x64
Product: WinNt, suite: SingleUserTS
Debug session time: Sun Sep 30 20:49:38.000 2007 (GMT+4)
System Uptime: 0 days 5:33:43.787
Process Uptime: 0 days 1:15:44.000
Symbol search path is: srv*d:\dev\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
...........................................................................................................................................................
Loading unloaded module list
...............................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(16ac.1694): Access violation - code c0000005 (first/second chance not available)
00000000`04248d83 4a8b1409        mov     rdx,qword ptr [rcx+r9] ds:00000001`76e13da4=????????????????
0:032> !analyze -v
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for tlb.dll -

FAULTING_IP:
+4248d83
00000000`04248d83 4a8b1409        mov     rdx,qword ptr [rcx+r9]

EXCEPTION_RECORD:  ffffffffffffffff -- (.exr ffffffffffffffff)
ExceptionAddress: 0000000004248d83
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000176e13da4
Attempt to read from address 0000000176e13da4

DEFAULT_BUCKET_ID:  CODE_RUNNING_ON_HEAP

PROCESS_NAME:  explorer.exe

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

READ_ADDRESS:  0000000176e13da4

BUGCHECK_STR:  ACCESS_VIOLATION

IP_ON_HEAP:  0000000004215978
The fault address in not in any loaded module, please check your build's rebase
log at <releasedir>\bin\build_logs\timebuild\ntrebase.log for module which may
contain the address if it were loaded.

FRAME ONE INVALID: 1800200000000a

LAST_CONTROL_TRANSFER:  from 0000000004215978 to 0000000004248d83

STACK_TEXT:  
00000000`058ff048 00000000`04215978 : 00000000`04280a70 00000000`00000022 00000000`43b3d25c 00000000`76e90000 : 0x4248d83
00000000`058ff050 00000000`04280a70 : 00000000`00000022 00000000`43b3d25c 00000000`76e90000 00000000`051f0000 : 0x4215978
00000000`058ff058 00000000`00000022 : 00000000`43b3d25c 00000000`76e90000 00000000`051f0000 00000000`04202733 : 0x4280a70
00000000`058ff060 00000000`43b3d25c : 00000000`76e90000 00000000`051f0000 00000000`04202733 00000000`00000000 : 0x22
00000000`058ff068 00000000`76e90000 : 00000000`051f0000 00000000`04202733 00000000`00000000 000000bf`00000099 : 0x43b3d25c
00000000`058ff070 00000000`051f0000 : 00000000`04202733 00000000`00000000 000000bf`00000099 00000000`000000ac : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`058ff078 00000000`04202733 : 00000000`00000000 000000bf`00000099 00000000`000000ac 00000000`00110010 : 0x51f0000
00000000`058ff080 00000000`00000000 : 000000bf`00000099 00000000`000000ac 00000000`00110010 00000000`04cd54d9 : 0x4202733
00000000`058ff088 000000bf`00000099 : 00000000`000000ac 00000000`00110010 00000000`04cd54d9 00000000`04215b00 : 0x0
00000000`058ff090 00000000`000000ac : 00000000`00110010 00000000`04cd54d9 00000000`04215b00 00000000`76e90000 : 0xbf`00000099
00000000`058ff098 00000000`00110010 : 00000000`04cd54d9 00000000`04215b00 00000000`76e90000 00000000`044f8ba0 : 0xac
00000000`058ff0a0 00000000`04cd54d9 : 00000000`04215b00 00000000`76e90000 00000000`044f8ba0 00000000`04280a01 : 0x110010
00000000`058ff0a8 00000000`04215b00 : 00000000`76e90000 00000000`044f8ba0 00000000`04280a01 00000000`00000000 : 0x4cd54d9
00000000`058ff0b0 00000000`76e90000 : 00000000`044f8ba0 00000000`04280a01 00000000`00000000 00000000`770d6fa0 : 0x4215b00
00000000`058ff0b8 00000000`044f8ba0 : 00000000`04280a01 00000000`00000000 00000000`770d6fa0 00000000`058ff140 : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`058ff0c0 00000000`04280a01 : 00000000`00000000 00000000`770d6fa0 00000000`058ff140 00000000`771b9a98 : tlb!SelfInstall+0x93200
00000000`058ff0c8 00000000`00000000 : 00000000`770d6fa0 00000000`058ff140 00000000`771b9a98 00000000`04215d48 : 0x4280a01
00000000`058ff0d0 00000000`770d6f9f : 00000000`058ff140 00000000`771b9a98 00000000`04215d48 00000000`76e90000 : 0x0
00000000`058ff0d8 00000000`058ff140 : 00000000`771b9a98 00000000`04215d48 00000000`76e90000 00000000`044f8ba0 : ntdll!RtlpPopulateListIndex+0x1fc
00000000`058ff0e0 00000000`771b9a98 : 00000000`04215d48 00000000`76e90000 00000000`044f8ba0 00000000`00000100 : 0x58ff140
00000000`058ff0e8 00000000`04215d48 : 00000000`76e90000 00000000`044f8ba0 00000000`00000100 00000000`000002d8 : ntdll!RtlpInterceptorRoutines
00000000`058ff0f0 00000000`76e90000 : 00000000`044f8ba0 00000000`00000100 00000000`000002d8 00000000`00000000 : 0x4215d48
00000000`058ff0f8 00000000`044f8ba0 : 00000000`00000100 00000000`000002d8 00000000`00000000 00000000`0427b450 : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`058ff100 00000000`00000100 : 00000000`000002d8 00000000`00000000 00000000`0427b450 00000000`00000000 : tlb!SelfInstall+0x93200
00000000`058ff108 00000000`000002d8 : 00000000`00000000 00000000`0427b450 00000000`00000000 00000000`0427bd70 : 0x100
00000000`058ff110 00000000`00000000 : 00000000`0427b450 00000000`00000000 00000000`0427bd70 00000000`0427bb88 : 0x2d8
00000000`058ff118 00000000`0427b450 : 00000000`00000000 00000000`0427bd70 00000000`0427bb88 00000000`770f714b : 0x0
00000000`058ff120 00000000`00000000 : 00000000`0427bd70 00000000`0427bb88 00000000`770f714b 65636f72`50746553 : 0x427b450
00000000`058ff128 00000000`0427bd70 : 00000000`0427bb88 00000000`770f714b 65636f72`50746553 6e696b72`6f577373 : 0x0
00000000`058ff130 00000000`0427bb88 : 00000000`770f714b 65636f72`50746553 6e696b72`6f577373 657a6953`74655367 : 0x427bd70
00000000`058ff138 00000000`770f714b : 65636f72`50746553 6e696b72`6f577373 657a6953`74655367 00000000`058ff100 : 0x427bb88
00000000`058ff140 00000000`00000002 : 00000000`739946bc 00000000`76e90000 00000000`00000003 00000000`771af9a0 : ntdll!LdrGetProcedureAddressEx+0x488
00000000`058ff2b0 00000000`739946bc : 00000000`76e90000 00000000`00000003 00000000`771af9a0 00000000`00000000 : 0x2
00000000`058ff2b8 00000000`76e90000 : 00000000`00000003 00000000`771af9a0 00000000`00000000 00000000`044c2d76 : 0x739946bc
00000000`058ff2c0 00000000`00000003 : 00000000`771af9a0 00000000`00000000 00000000`044c2d76 00000000`045dec10 : kernel32!_imp_memcpy <PERF> (kernel32+0x0)
00000000`058ff2c8 00000000`771af9a0 : 00000000`00000000 00000000`044c2d76 00000000`045dec10 00000000`76ec8d30 : 0x3
00000000`058ff2d0 00000000`00000000 : 00000000`044c2d76 00000000`045dec10 00000000`76ec8d30 000007ff`fffa3258 : ntdll!PebLdr+0x20
00000000`058ff2d8 00000000`044c2d76 : 00000000`045dec10 00000000`76ec8d30 000007ff`fffa3258 00000000`00341be0 : 0x0
00000000`058ff2e0 00000000`045dec10 : 00000000`76ec8d30 000007ff`fffa3258 00000000`00341be0 00000000`00000000 : tlb!SelfInstall+0x5d3d6
00000000`058ff2e8 00000000`76ec8d30 : 000007ff`fffa3258 00000000`00341be0 00000000`00000000 00000000`00000018 : tlb!SelfInstall+0x179270
00000000`058ff2f0 00000000`00000000 : 00000000`00000002 00000000`043e0000 00000000`04953a90 00000000`00000000 : kernel32!GetProcAddress+0x60


FAULTING_THREAD:  0000000000001694

FOLLOWUP_IP:
tlb!SelfInstall+93200
00000000`044f8ba0 44              ???

SYMBOL_STACK_INDEX:  f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tlb

IMAGE_NAME:  tlb.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  46269ff1

SYMBOL_NAME:  tlb!SelfInstall+93200

STACK_COMMAND:  ~32s; .ecxr ; kb

FAILURE_BUCKET_ID:  X64_ACCESS_VIOLATION_tlb!SelfInstall+93200

BUCKET_ID:  X64_ACCESS_VIOLATION_tlb!SelfInstall+93200

Followup: MachineOwner
---------


Messages In This Thread
[No subject] - by CrazyCoder - 09-23-2007, 05:19 AM
[No subject] - by Yuri Kobets - 09-26-2007, 09:07 AM
[No subject] - by CrazyCoder - 09-26-2007, 10:57 AM
[No subject] - by CrazyCoder - 09-30-2007, 08:59 AM
[No subject] - by FlyingHorse - 11-01-2007, 12:03 PM
[No subject] - by FlyingHorse - 11-01-2007, 12:26 PM
[No subject] - by CrazyCoder - 11-01-2007, 12:43 PM
[No subject] - by FlyingHorse - 11-01-2007, 01:04 PM
[No subject] - by FlyingHorse - 11-06-2007, 02:53 PM
[No subject] - by FlyingHorse - 11-17-2007, 07:40 AM
[No subject] - by Yuri Kobets - 11-18-2007, 11:29 AM
[No subject] - by FlyingHorse - 11-18-2007, 12:19 PM
[No subject] - by FlyingHorse - 11-19-2007, 09:44 AM

Forum Jump:


Users browsing this thread: 1 Guest(s)