Unhandled win32 exception
Posted: 08 Aug 2007, 15:00
Hello,
I've encountered another application error. I thougth it was TortoiseSVN (I'm using 1.4.4 r9706), but this time it looks different.
The minidump follows.
I've encountered another application error. I thougth it was TortoiseSVN (I'm using 1.4.4 r9706), but this time it looks different.
The minidump follows.
Code: Select all
Microsoft (R) Windows Debugger Version 6.7.0005.0
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\work\SALAMAND.dmp]
User Mini Dump File: Only registers, stack and portions of memory are available
Symbol search path is: SRV*c:\windows\symbols*http://msdl.microsoft.com/download/symbols;C:\windows\symbols
Executable search path is:
Windows XP Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: SingleUserTS
Debug session time: Wed Aug 8 14:46:00.000 2007 (GMT+2)
System Uptime: not available
Process Uptime: 2 days 5:33:44.000
................................................................................................
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
eax=02c276d0 ebx=0017db20 ecx=9f3f001b edx=9f3e001a esi=0017db08 edi=00000000
eip=7c902f48 esp=00129390 ebp=0019f920 iopl=0 nv up ei pl zr ac po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000252
ntdll!RtlpInterlockedPushEntrySList+0x19:
7c902f48 75f1 jne ntdll!RtlpInterlockedPushEntrySList+0xc (7c902f3b) [br=0]
0:000> !analyze -v
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
*** ERROR: Module load completed but symbols could not be loaded for SALAMAND.exe
*** ERROR: Symbol file could not be found. Defaulted to export symbols for salrtl.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for tortoisesvn.dll -
FAULTING_IP:
ntdll!RtlpInterlockedPushEntrySList+19
7c902f48 75f1 jne ntdll!RtlpInterlockedPushEntrySList+0xc (7c902f3b)
EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 7c902f48 (ntdll!RtlpInterlockedPushEntrySList+0x00000019)
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 3
Parameter[0]: 00000000
Parameter[1]: 9f3f001b
Parameter[2]: 9f3e001a
DEFAULT_BUCKET_ID: HEAP_CORRUPTION
PROCESS_NAME: SALAMAND.exe
ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached.
FAULTING_THREAD: 00000dc4
LAST_CONTROL_TRANSFER: from 7c932124 to 7c902f48
STACK_TEXT:
00129394 7c932124 0024da78 00000000 00150000 ntdll!RtlpInterlockedPushEntrySList+0x19
001293cc 7c931c7c 00000000 00000000 00000000 ntdll!RtlpLowFragHeapFree+0x384
00129490 7c801be6 00150000 00000000 0024da78 ntdll!RtlFreeHeap+0x55
001294f4 7c801d6e 7ffdfc00 00000000 00000000 kernel32!LoadLibraryExW+0x1e9
00129508 7c801da4 0052e658 00000000 00000000 kernel32!LoadLibraryExA+0x1f
00129524 0040671c 0052e658 00000111 00000000 kernel32!LoadLibraryA+0x94
WARNING: Stack unwind information not available. Following frames may be wrong.
00129c20 0048fbb4 0012f274 0103b218 00000000 SALAMAND+0x671c
0012f1ec 00509a52 00000113 000003ad 00000000 SALAMAND+0x8fbb4
0012f20c 7e418734 000202b2 00000113 000003ad SALAMAND+0x109a52
0012f238 7e418816 005099fb 000202b2 00000113 user32!InternalCallWinProc+0x28
0012f2a0 7e4189cd 00000000 005099fb 000202b2 user32!UserCallWinProcCheckWow+0x150
0012f300 7e4196c7 0012fe90 00000001 0012fee4 user32!DispatchMessageWorker+0x306
0012f310 004c413c 0012fe90 00320038 00152343 user32!DispatchMessageA+0xf
0012fee4 004c496c ffffffff 00000000 773d0000 SALAMAND+0xc413c
0012ff24 0050c056 00400000 00000000 00152343 SALAMAND+0xc496c
0012ffc0 7c816fd7 00320038 00350030 7ffd9000 SALAMAND+0x10c056
0012fff0 00000000 0050bf22 00000000 00000000 kernel32!BaseProcessStart+0x23
STACK_COMMAND: ~0s; .ecxr ; kb
FOLLOWUP_IP:
SALAMAND+671c
0040671c 8bd8 mov ebx,eax
SYMBOL_STACK_INDEX: 6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: heap_corruption
IMAGE_NAME: heap_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
ADDITIONAL_DEBUG_TEXT: Enable Pageheap/AutoVerifer
PRIMARY_PROBLEM_CLASS: HEAP_CORRUPTION
BUGCHECK_STR: APPLICATION_FAULT_HEAP_CORRUPTION
SYMBOL_NAME: heap_corruption!heap_corruption
FAILURE_BUCKET_ID: APPLICATION_FAULT_HEAP_CORRUPTION_heap_corruption!heap_corruption
BUCKET_ID: APPLICATION_FAULT_HEAP_CORRUPTION_heap_corruption!heap_corruption
Followup: MachineOwner
---------