Access Violation calling GetMethodId

Hi !
I'm getting an access violation on the jvm.dll when trying to execute a call from the native side. Well, in fact, the exception is raised when a try to get the method reference, by calling GetMethodId ().
The _javaClass variable is a class attribute and is correctly initialized since I'm being able to execute other calls.
Can somebody help me, please ?
This is the code:
void JavaBridge::pushJava (const char* str)
// To java push
// Get some variables
jmethodID javaMethod;
jstring javaString;
// Get the string     
javaString = _env->NewStringUTF(str);
if (javaString == 0) {
JCB_ERROR ("JavaBridge::pushJava: Out of memory...");
return;
// Get the process() method
javaMethod = env->GetMethodID(javaClass, "process", "(Ljava/lang/String;)V");
if (javaMethod == 0) {
JCB_ERROR ("Can't find CppBridge's process() method.");
return;
// Call it
env->CallVoidMethod (javaObject, javaMethod, javaString);

I think your class reference is null.

Similar Messages

  • ACCESS VIOLATION calling SQLPEX - SQLLIBSHRA.EXE

    This is a problem for OpenVMS / Oracle Experts
    I have quit an old large legacy system to integrate - actually migrating away from a CORBA based communication backbone to a webservice AXIS2/Java based backbone using HP's WSIT e all, and yes - this legacy uses an old Oracle 7.3
    The OS is HP OpenVMS / Alpha V 7.3-n,
    When I link all my native code together the process launched through Java JNI is a "NETWORK" detached process which should do a DB_Connect via SQLPEX (ctx, sqlstm );
    The layers involved are like that; AXIS2/J webservice -> WSIT-javaBean ->
    JVM -> JNI -> SPg-Server.c (an wsit outer-wrapper) -> SPg-Legacy.c(my inner wrapper) -> SPS_WRAPPER.PAS (the inner-most wrapper / dispatcher) -> Business-logic-*.PAS -> DataBaseAccess.PAS
    (the database access code was generated by LNPROPAS from statements like EXEC SQL CONNECT .... etc.)
    When I exchange my SPS_WRAPPER.PAS WRAP() by a TestWrapper.PAS WRAP() which bypasses all business logic, SQLPEX(ctx, sqlstm); works perfectly and the database opens, in fact, a new detached second process is launched as ORA_nnnnn and my detached integrated web service process communicates nicely via MailBox Devices.
    However when I link in my original legacy code, LINK is fine, and all my business code runs fine when it gets called from the WRAP(), BUT I get an ACCESS VIOLATION as soon as SQLPEX() is called to connect to the Database.
    I can not debug because the code which does the access violation, for what ever reason, is in SQLLIBSHRA.EXE, and invoked when I call sqlpex( ctx, sqlstm )
    Maybe there is ONLY a resource problem, but why then an ACCESS VIOLAITION and yes, which resource to we have to make bigger. SYSGEN Parameters, autogen feedback did not help.
    I am not an Oracle Expert, so I do not know what and how I can make ORACLE tracing and logging and show me why I get this acess violation in a pice of code which runs nicely since 10 years in a CORBA environment, also runs nicely when my business logic is bypassed.
    And yes: ORA_ROOT:[000000.NETWORK.ADMIN]ORASRV_BEQ_A.COM
    is not hit / called when it comes to the access violation.
    Any hints are welcome before I have to jump into machine code debugging without a source listing.
    [email protected]

    This problem was caused by a user-stack-heap-code-collision
    PTHREAD applications may not do aoutomatic stack size expansions on a per thread basis and hence an access violation deep in long-time-running code is very likely to occure. (code which does not belong to YOU, for which you know it runs basically since 10 years, which migth not be supported any longer by the vendor)
    solution: WSIT (webservice integration toolkit) by default assignes 30000 bytes for each threads user-stack-size, can be adjusted in the .WSI deployment descriptor file; Now running at 60'000. WSIT V3.0 will allow for single threaded legacy server integration and have a automatic stack size expansion supported when running in this mode. (as per HP)
    [email protected]

  • Access Violation in LibSQLDBC

    With LIBSQLDBC 7.7.07.33
    Hello
    LibSQLDBC throw an access violation in this following case.
    My process opens a recordset an for each record, it applies a function, this treatment can take more than 900 s. The default connection timeout.
    When treatment take more than 900, LibSQLDBC throw an acces violation.
    The reason is that next fonction calls dropGarbageLongDescriptors, and it close the connection. The calling sqlaexecute continue BUT the m_requestpacket connection member is NULL and the next call to getRequestPacket failed.
    I workaround the issue by increasing connection timeout.
    The call to next close the connection :
    libSQLDBC!IFR_Connection::close
    libSQLDBC!IFR_Connection::sqlaexecute+0x4ea
    libSQLDBC!IFR_Connection::sqlaexecute+0x1b1
    libSQLDBC!IFR_Connection::dropGarbageLongDescriptors+0x1da
    libSQLDBC!IFR_Connection::sqlaexecute+0xd5
    libSQLDBC!IFR_FetchInfo::executeFetchCommand+0x43c
    libSQLDBC!IFR_FetchInfo::executeFetchRelative+0x1a1
    libSQLDBC!IFR_ResultSet::fetchNextChunk+0xb3
    libSQLDBC!IFR_ResultSet::mfNext+0x15c
    libSQLDBC!IFR_ResultSet::next+0x2c5
    libSQLDBC!SQLDBC::SQLDBC_ResultSet::next+0x3a
    DBManage35!CMaxDBRowset::GetRows+0xc5
    DBManage35!CMaxDBRowset::GetNextRows+0x1d
    DBManage35!CStorageRecordset::MoveNext+0xab
    DBManage35!virtualRecordset::MoveNext+0x40
    DBManage35!CDBRecordset::MoveNext+0xa8
    ArcTools!IDBRecordset::MoveNext+0xa
    ArcTools!CArcCompress::CompressRecordsInternal+0x84f
    ArcTools!CArcCompress::Compress+0x784
    ArcTools!CEskerArchive::ExportMessagesInternal+0x16b
    Access violation call stack :
    libSQLDBC!IFRPacket_RequestPacket::assign+0x17
    libSQLDBC!IFR_Connection::getRequestPacket+0x3bd
    libSQLDBC!IFR_Connection::sqlaexecute+0x12a
    libSQLDBC!IFR_FetchInfo::executeFetchCommand+0x43c
    libSQLDBC!IFR_FetchInfo::executeFetchRelative+0x1a1
    libSQLDBC!IFR_ResultSet::fetchNextChunk+0xb3
    libSQLDBC!IFR_ResultSet::mfNext+0x15c
    libSQLDBC!IFR_ResultSet::next+0x2c5
    libSQLDBC!SQLDBC::SQLDBC_ResultSet::next+0x3a
    DBManage35!CMaxDBRowset::GetRows+0xc5
    DBManage35!CMaxDBRowset::GetNextRows+0x1d
    DBManage35!CStorageRecordset::MoveNext+0xab
    DBManage35!virtualRecordset::MoveNext+0x40
    DBManage35!CDBRecordset::MoveNext+0xa8
    ArcTools!IDBRecordset::MoveNext+0xa
    ArcTools!CArcCompress::CompressRecordsInternal+0x84f
    ArcTools!CArcCompress::Compress+0x784
    ArcTools!CEskerArchive::ExportMessagesInternal+0x16b
    ArcTools!CEskerArchive::ExportMessagesEx+0xb2
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0x451d7d3
    mscorlib_ni+0x2c0bdc
    0x451d057
    System_Core_ni+0x1a8ab1
    clr!PreStubWorker+0x15d
    Yann.

    Hello Yann,
    thanks for reporting this bug I have made an error entry in our bug tracking system.
    After replication you can check the state by this link
    http://sapdb.org/webpts?wptsdetail=yes&ErrorType=0&ErrorID=1240790
    Regards,
    Burkhard

  • Access violation (0xC0000005) at EIP=0x012B60E6 within a dynamically called VI

    Hi
    I have been seeing Access violation (0xC0000005) at EIP=0x012B60E6 within a dynamically called VI.
    The VI is called by reference and is strictly typed.
    The VI controls a function generator, a robot and a microcontroller device.
    All of the above are synchronised using functional globals.
    If I let the code run the FG will operate so I know the top level dynamic VI has defiantly been called and successfully entered, however within that VI as other VI’s are called (there are many) LV crashes with access violation.
    The VI's within the top level VI are using HiD communicatiuoins over USB with the peripheral instrumants.
    The LV crashes are totally random and sometimes the code will operate until the end and close down successfully.
    I can only seem to guarantee smooth operation if I set a breakpoint within the top level VI, then the entire system runs perfectly.
    In fact it seems that even if I remove the breakpoint (after the first break) and close the VI the system will continue to run until close.
    Has anyone any ideas? I have run out!

    Hi MAC1,
    I have been looking at your issue and wanted to ask if you are calling the VI's into Teststand, using the LabVIEW adapter?
    If this is the case, it may be worth looking at another forum post regarding the issue.
    LabVIEW Access Violations- Teststand
    I am currently looking into what could have caused this access violation. 
    If you could provide any further information in regards to the top level VI or if you could post it on here, that would be really useful.
    Regards,
    Dom C

  • Skype crashes on call. Access violation

    Whenever I call with skype, at random times It woll crash and give me the error Access Violation at adrress 685c78a0. Write at Address 685c78a0. Admin mode on the program seems to work. Although not even an uninstall and reinstall is working. 

    FYI...
    We have been investigating the crash with Skype. If you are interested in helping verify the fix by testing a beta for us, please send an email to '[email protected]' with the subject line 'Hear betas', containing the following:
    - Full name
    - desired contact email address (if different from email addr used for email)
    - System Profile report (zipped up *.spx file)
    thanks!
    dEVoN
    Prosoft Engineering

  • Error Occuring While Processing Data With DIAdem 8.1Excepti​on EAccessVio​lation in module ntdll.dll at 000111DE. Access violation at address 7C9111DE in module 'ntdll.dll​". Read address 37363430

    Hello,
    We are having an issue running Diadem 8.1 on a new HP XW 9400 with Windows XP SP2. 3 errors have been occuring with frequent crashes, they are:
    1) "1Exception EAccessViolation in module ntdll.dll at 000111DE. Access violation at address 7C9111DE in module 'ntdll.dll". Read address 37363430.
    2) The instruction at "0x7c9111de" referenced memory at "0x352e302d". The memory could not be "read".
     3) ---Error---   DIAdem
    Error in Autosequence - processing in line: 74 (IARV_VAR_GET)
    Runtime Error while executing command "Iarv2Txt$ := FR(T9,L1)"
    Error type: ACCESS VIOLATION
    Error address: 000101DE
    Module name:ntdll.dll
    We are using the same scripts and version 8.1 on a variety of Dell desktop computers (W2K and XP SP2) without any issue, looking for suggestions as this affects no other software on the HP XW 9400 other than DIAdem. Appreciate any suggestions.
    Message Edited by swillh on 06-25-2007 08:55 AM

    Christian,
    I will answer your questions in the text below. Thanks for your help.
    Hi swillh,
    I also would like to help you.
    Unfortunately, The reported access violation in the central Windows ntdll.dll is very unspecific.
    May be the following questions will help you to provide me more info.
    1. You mentioned that the aut's and - I think - also the accessed text file reside on a server.
    Is there a stable network connection?
    The server can sometimes be a little slow but the connection is good. This computer is using the same connection that the prior computer utilized without issue.
    Are the files accessed by multiple clients simultaneously?
    It is possible that more than one computer can be accessing the same file, but again, this has never been an issue. We are reading the files only, not writing to them.
    The processing routines we are running have used for over 5 years without any issues until adding this computer.
    Is the text file read by one client while another client is writing the same file?
    No, files are "read only"
    2. Have you already tested opening the file with the FileOpen command before calling FR?
    Yes
    Do you see any chance to convert the aut to a vbs file? This gives you more alternatives in accessing text files.
    3. What do you mean with "processing ATD's with 30 or more channels of data"? Where is the relation between ATD files and data channels?
    Processing Crash Dummy data with file sets low in channel count (15 channels) result in successful processing without any crashes or access errors.  When processing dummies with more than 20 channels we sometimes encounter these issues. The higher channel count may be the only common factor I can find in these faults.
    Steve
    Message Edited by swillh on 07-09-2007 08:44 AM

  • Error while executing "" command Error type ACCESS VIOLATION Error Address: 0006898E Module name:gfsdesk.DLL

    Hi All,
    I'm using diadem from .net Program. While on the run I'm getting the following error.
    Error While executing "" Command
    Error type ACCESS VIOLATION
    Error Address: 0006898E
    Module name:gfsdesk.DLL
    Anyone have any idea why this is happening?
    regards,
    Swaroop

    Hi Swaroop,
    It would be helpful to better understand what your code really does. The information that you called DIAdem from your enviroenment is not yet sufficient to understand what the problem might be.
    Andreas

  • Access violation error with 1.4.0

    Our client/server application (RMI) ran fine in 1.3.1. When we compiled and deployed with 1.4.0, an error of "access violation" were thrown by Windows NT or Windown 2000 at run time. Stack trace posted as below. Anyone has any ideas on the cause of it. Thanks you very much.
    Application exception occurred:
    App: (pid=346)
    When: 6/18/2002 @ 17:18:40.166
    Exception number: c0000005 (access violation)
    ----> System Information <----
    Computer Name: PAUL
    User Name: paul
    Number of Processors: 1
    Processor Type: x86 Family 6 Model 4 Stepping 2
    Windows Version: 4.0
    Current Build: 1381
    Service Pack: 6
    Current Type: Uniprocessor Free
    Registered Organization: Quarry Technologies
    Registered Owner: Quarry Technologies
    ----> Task List <----
    0 Idle.exe
    2 System.exe
    20 SMSS.exe
    24 CSRSS.exe
    34 winlogon.exe
    40 SERVICES.exe
    43 LSASS.exe
    68 SPOOLSS.exe
    81 defwatch.exe
    86 inetd32.exe
    93 MGABG.exe
    94 mgasc.exe
    97 mgactrl.exe
    99 rtvscan.exe
    45 rtsserv.exe
    112 RPCSS.exe
    117 portserv.exe
    127 wtxregds.exe
    130 WinVNC.exe
    137 PSTORES.exe
    140 mstask.exe
    144 NOPDB.exe
    200 NDDEAGNT.exe
    122 explorer.exe
    186 systray.exe
    187 mgaqdesk.exe
    44 vptray.exe
    113 point32.exe
    91 realplay.exe
    209 winampa.exe
    211 loadqm.exe
    213 aim.exe
    215 msmsgs.exe
    218 wftpd32.exe
    192 OSA.exe
    238 esserver.exe
    240 vpexrt.exe
    241 CMD.exe
    63 vncviewer.exe
    255 JBuilder.exe
    277 DDHELP.exe
    274 CMD.exe
    287 CMD.exe
    293 SYSLOGD.exe
    313 SYSLOGD.exe
    270 P4Win.exe
    310 javaw.exe
    346 javaw.exe
    443 javaw.exe
    433 javaw.exe
    354 DRWTSN32.exe
    0 _Total.exe
    (00400000 - 00406000)
    (77f60000 - 77fbe000) dll\ntdll.dbg
    (77dc0000 - 77dff000) dll\advapi32.dbg
    (77f00000 - 77f5e000) dll\kernel32.dbg
    (77e70000 - 77ec5000) dll\user32.dbg
    (77ed0000 - 77efc000) dll\gdi32.dbg
    (77e10000 - 77e67000) dll\rpcrt4.dbg
    (78000000 - 78046000)
    (6d330000 - 6d330000)
    (77fd0000 - 77ffa000) dll\winmm.dbg
    (6bd00000 - 6bd14000) K:\DDK\lib\i386\free\cm-pci.dll
    (6d1d0000 - 6d1d7000)
    (6d300000 - 6d30d000)
    (6d210000 - 6d228000)
    (6d320000 - 6d32d000)
    (6d2d0000 - 6d2dd000)
    (776d0000 - 776d8000) dll\wsock32.dbg
    (776b0000 - 776c4000) dll\ws2_32.dbg
    (776a0000 - 776a7000) dll\ws2help.dbg
    (74ff0000 - 74ffe000) dll\rnr20.dbg
    (77bf0000 - 77bf7000) dll\rpcltc1.dbg
    (77660000 - 7766f000) dll\msafd.dbg
    (77690000 - 77699000) dll\wshtcpip.dbg
    (6d2f0000 - 6d2f5000)
    (6d000000 - 6d0f6000)
    (77c00000 - 77c18000) drv\winspool.dbg
    (76ab0000 - 76ab5000) dll\imm32.dbg
    (77b20000 - 77bd7000) dll\ole32.dbg
    (6d180000 - 6d1d0000)
    State Dump for Thread Id 0x18b
    eax=6d3fb8cc ebx=00000000 ecx=00762700 edx=00000000 esi=0000012c edi=00000000
    eip=77f682db esp=0006fc10 ebp=0006fc34 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:00f6e617=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    0006fc34 77f04f37 0000012c ffffffff 00000000 6d38b719 ntdll!NtWaitForSingleObject
    0006fc7c 6d3b14c0 00000000 ffffffff 0076219c 007e0330 kernel32!WaitForSingleObject
    ----> Raw Stack Dump <----
    0006fc10 a0 cc f1 77 2c 01 00 00 - 00 00 00 00 00 00 00 00 ...w,...........
    0006fc20 50 05 7e 00 10 2f 76 00 - 30 03 7e 00 00 30 00 00 P.~../v.0.~..0..
    0006fc30 04 01 00 00 7c fc 06 00 - 37 4f f0 77 2c 01 00 00 ....|...7O.w,...
    0006fc40 ff ff ff ff 00 00 00 00 - 19 b7 38 6d 2c 01 00 00 ..........8m,...
    0006fc50 ff ff ff ff 9c 21 76 00 - 10 2f 76 00 a0 21 76 00 .....!v../v..!v.
    0006fc60 00 00 00 00 02 00 00 00 - 00 00 00 00 30 03 7e 00 ............0.~.
    0006fc70 30 03 7e 00 10 2f 76 00 - 01 00 00 00 c0 fc 06 00 0.~../v.........
    0006fc80 c0 14 3b 6d 00 00 00 00 - ff ff ff ff 9c 21 76 00 ..;m.........!v.
    0006fc90 30 03 7e 00 30 03 7e 00 - 00 00 00 00 30 03 7e 00 0.~.0.~.....0.~.
    0006fca0 d0 fc 06 00 05 86 36 6d - 5c 05 41 6d d8 fc 06 00 ......6m\.Am....
    0006fcb0 00 00 00 00 00 00 00 00 - 75 85 36 6d 30 03 7e 00 ........u.6m0.~.
    0006fcc0 d0 fc 06 00 b7 85 36 6d - 50 9c 77 00 30 03 7e 00 ......6mP.w.0.~.
    0006fcd0 14 ff 06 00 d2 14 40 00 - bc 03 7e 00 56 00 00 00 ......@...~.V...
    0006fce0 10 28 07 00 00 00 00 00 - 43 3a 5c 6a 32 73 64 6b .(......C:\j2sdk
    0006fcf0 31 2e 34 2e 30 5c 6a 72 - 65 00 6a 61 76 61 77 2e 1.4.0\jre.javaw.
    0006fd00 65 78 65 00 12 00 00 00 - a0 fe 06 00 00 e0 fd 7f exe.............
    0006fd10 00 00 00 00 a9 a0 f6 77 - 9c fe 06 00 00 00 00 80 .......w........
    0006fd20 70 fe 06 00 00 e0 fd 7f - 00 f0 fd 7f 00 00 00 00 p...............
    0006fd30 5c 00 52 00 65 00 67 00 - 69 00 73 00 74 00 72 00 \.R.e.g.i.s.t.r.
    0006fd40 79 00 5c 00 4d 00 61 00 - 63 00 68 00 69 00 6e 00 y.\.M.a.c.h.i.n.
    State Dump for Thread Id 0x156
    eax=02c29d90 ebx=007648d0 ecx=02c29d90 edx=00000009 esi=02c29d90 edi=26dbfd64
    eip=6d3318d5 esp=26dbfc6c ebp=26dbfc88 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: <nosymbols>
    6d3318c0 8d4df0 lea ecx,[ebp-0x10] ss:27cbe68e=????????
    6d3318c3 e875000000 call 6d33193d
    6d3318c8 5f pop edi
    6d3318c9 5e pop esi
    6d3318ca c9 leave
    6d3318cb c3 ret
    6d3318cc 56 push esi
    6d3318cd 8bf1 mov esi,ecx
    6d3318cf 8b5604 mov edx,[esi+0x4] ds:03b28796=????????
    6d3318d2 83c208 add edx,0x8
    FAULT ->6d3318d5 8b4210 mov eax,[edx+0x10] ds:00efea0f=????????
    6d3318d8 85c0 test eax,eax
    6d3318da 7f25 jg 6d331901
    6d3318dc 7d1b jge 6d3318f9
    6d3318de 83c9ff or ecx,0xff
    6d3318e1 6a04 push 0x4
    6d3318e3 2bc8 sub ecx,eax
    6d3318e5 8b4608 mov eax,[esi+0x8] ds:03b28796=????????
    6d3318e8 d3e0 shl eax,cl
    6d3318ea 8b4a4c mov ecx,[edx+0x4c] ds:00efea0f=????????
    6d3318ed 8d440807 lea eax,[eax+ecx+0x7] ds:03b28797=????????
    6d3318f1 59 pop ecx
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26dbfc88 6d34d03a 02c29d90 02c37c48 22fc8df4 02c37c48 <nosymbols>
    State Dump for Thread Id 0x160
    eax=00000004 ebx=00000000 ecx=052c2748 edx=00000000 esi=00000320 edi=00000000
    eip=77f682db esp=26dffc10 ebp=26dffc34 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27cfe617=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26dffc34 77f04f37 00000320 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    26dffc7c 6d39ead0 00000000 00000000 00000001 00767d30 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x11a
    eax=00000004 ebx=00000000 ecx=052c2a60 edx=00000000 esi=00000430 edi=00000000
    eip=77f682db esp=26e3fbd4 ebp=26e3fbf8 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27d3e5db=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26e3fbf8 77f04f37 00000430 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    26e3fc40 6d39ead0 00000000 00000000 00000001 007670b0 kernel32!WaitForSingleObject
    ----> Raw Stack Dump <----
    26e3fbd4 a0 cc f1 77 30 04 00 00 - 00 00 00 00 00 00 00 00 ...w0...........
    26e3fbe4 b0 70 76 00 4c b3 75 00 - 10 87 76 00 30 04 00 00 .pv.L.u...v.0...
    26e3fbf4 2a 14 39 6d 40 fc e3 26 - 37 4f f0 77 30 04 00 00 *.9m@..&7O.w0...
    26e3fc04 ff ff ff ff 00 00 00 00 - fe d2 38 6d 30 04 00 00 ..........8m0...
    26e3fc14 ff ff ff ff 00 00 00 00 - 40 27 2c 05 b0 70 76 00 ........@',..pv.
    26e3fc24 00 00 00 00 b0 70 76 00 - 30 04 00 00 00 00 00 00 .....pv.0.......
    26e3fc34 f4 8f 76 00 02 00 00 00 - 00 00 00 00 64 fc e3 26 ..v.........d..&
    26e3fc44 d0 ea 39 6d 00 00 00 00 - 00 00 00 00 01 00 00 00 ..9m............
    26e3fc54 b0 70 76 00 40 27 2c 05 - b0 70 76 00 70 3c b3 22 .pv.@',..pv.p<."
    26e3fc64 84 fc e3 26 aa e7 36 6d - 00 88 76 00 00 00 00 00 ...&..6m..v.....
    26e3fc74 00 00 00 00 b0 70 76 00 - b0 70 76 00 ac 3c b3 22 .....pv..pv..<."
    26e3fc84 b8 fc e3 26 0d 96 ab 00 - b0 70 76 00 d0 fc e3 26 ...&.....pv....&
    26e3fc94 00 00 00 00 00 00 00 00 - 9c fc e3 26 00 00 00 00 ...........&....
    26e3fca4 d0 fc e3 26 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 ...&.R."....p<."
    26e3fcb4 c8 fc e3 26 f8 fc e3 26 - 9f 2d ab 00 00 00 00 00 ...&...&.-......
    26e3fcc4 51 76 ab 00 00 00 00 00 - 00 00 00 00 40 27 2c 05 Qv..........@',.
    26e3fcd4 03 00 00 00 40 27 2c 05 - d4 fc e3 26 34 0a b8 22 ....@',....&4.."
    26e3fce4 20 fd e3 26 78 0c b8 22 - 00 00 00 00 c8 09 b8 22 ..&x.."......."
    26e3fcf4 18 fd e3 26 40 fd e3 26 - 76 2e ab 00 00 00 00 00 ...&@..&v.......
    26e3fd04 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1ca
    eax=00000000 ebx=00000000 ecx=00000001 edx=00000000 esi=26e7ff28 edi=00000000
    eip=77f6791f esp=26e7ff14 ebp=26e7ff30 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtDelayExecution
    77f67914 b827000000 mov eax,0x27
    77f67919 8d542404 lea edx,[esp+0x4] ss:27d7e91b=????????
    77f6791d cd2e int 2e
    77f6791f c20800 ret 0x8
    77f67922 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26e7ff30 77f1cebe 0000000a 00000000 6d39138c 0000000a ntdll!NtDelayExecution
    26e7ff5c 6d3af3f5 0076a380 0000000a 00000000 00000000 kernel32!Sleep
    State Dump for Thread Id 0x1c8
    eax=78002432 ebx=00000000 ecx=6d38ac38 edx=00000000 esi=00000120 edi=00000000
    eip=77f682db esp=26ebfef4 ebp=26ebff18 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27dbe8fb=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26ebff18 77f04f37 00000120 ffffffff 00000000 6d38b6bf ntdll!NtWaitForSingleObject
    26ebff60 6d3af53e 00000001 ffffffff 22b40f78 0076a210 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x15e
    eax=78002432 ebx=00000000 ecx=0006fa28 edx=00000000 esi=0000069c edi=00000000
    eip=77f682db esp=26effe3c ebp=26effe60 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27dfe843=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26effe60 77f04f37 0000069c ffffffff 00000000 6d390d49 ntdll!NtWaitForSingleObject
    26effea0 6d390d8d 00000001 6d38e927 0076b370 0076b2c0 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x1c4
    eax=00000001 ebx=00000000 ecx=26f3fc28 edx=00000000 esi=000001f4 edi=00000000
    eip=77f682db esp=26f3fe80 ebp=26f3fea4 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27e3e887=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26f3fea4 77f04f37 000001f4 ffffffff 00000000 6d38b719 ntdll!NtWaitForSingleObject
    26f3feec 6d3c1f67 00000000 ffffffff 0076b190 01e37000 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    26f3fe80 a0 cc f1 77 f4 01 00 00 - 00 00 00 00 00 00 00 00 ...w............
    26f3fe90 10 c3 76 00 50 29 76 00 - 30 b0 76 00 30 b0 76 00 ..v.P)v.0.v.0.v.
    26f3fea0 e0 c3 76 00 ec fe f3 26 - 37 4f f0 77 f4 01 00 00 ..v....&7O.w....
    26f3feb0 ff ff ff ff 00 00 00 00 - 19 b7 38 6d f4 01 00 00 ..........8m....
    26f3fec0 ff ff ff ff 90 b1 76 00 - 90 b1 76 00 50 29 76 00 ......v...v.P)v.
    26f3fed0 00 00 00 00 02 00 00 00 - cc 03 00 00 30 b0 76 00 ............0.v.
    26f3fee0 30 b0 76 00 50 29 76 00 - 01 00 00 00 00 00 00 00 0.v.P)v.........
    26f3fef0 67 1f 3c 6d 00 00 00 00 - ff ff ff ff 90 b1 76 00 g.<m..........v.
    26f3ff00 00 70 e3 01 40 ff f3 26 - 00 00 00 00 46 29 3c 6d .p..@..&....F)<m
    26f3ff10 e0 b0 76 00 30 b0 76 00 - 80 c2 76 00 30 b0 76 00 ..v.0.v...v.0.v.
    26f3ff20 e0 c3 76 00 00 d8 76 00 - 08 d8 76 00 f4 db 76 00 ..v...v...v...v.
    26f3ff30 54 ff f3 26 30 b0 76 00 - 30 b0 76 00 08 d8 76 00 T..&0.v.0.v...v.
    26f3ff40 6c ff f3 26 02 f9 3a 6d - 30 b0 76 00 30 b0 76 00 l..&..:m0.v.0.v.
    26f3ff50 30 b0 76 00 30 b0 76 00 - e0 c3 76 00 00 d8 76 00 0.v.0.v...v...v.
    26f3ff60 08 d8 76 00 f4 db 76 00 - c0 c3 76 00 84 ff f3 26 ..v...v...v....&
    26f3ff70 d2 f8 3a 6d 18 88 b5 02 - 30 b0 76 00 cb fe 38 6d ..:m....0.v...8m
    26f3ff80 80 c2 76 00 b8 ff f3 26 - 8d 24 00 78 30 b0 76 00 ..v....&.$.x0.v.
    26f3ff90 18 88 b5 02 d0 f8 06 00 - 80 c2 76 00 ff ff ff ff ..........v.....
    26f3ffa0 90 ff f3 26 91 76 11 80 - dc ff f3 26 6a f5 00 78 ...&.v.....&j..x
    26f3ffb0 d0 33 03 78 00 00 00 00 - ec ff f3 26 de 4e f0 77 .3.x.......&.N.w
    State Dump for Thread Id 0x1ac
    eax=00000004 ebx=00000000 ecx=02b73c40 edx=00000000 esi=00000500 edi=2717fbfc
    eip=77f682db esp=2717fbe0 ebp=2717fc04 iopl=0 ov up ei pl nz na pe cy
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000a03
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2807e5e7=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2717fc04 77f04f37 00000500 000493e0 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2717fc4c 6d39ead0 000493e0 00000000 00000001 0077f5e0 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    2717fbe0 a0 cc f1 77 00 05 00 00 - 00 00 00 00 fc fb 17 27 ...w...........'
    2717fbf0 e0 f5 77 00 ec b2 75 00 - f0 f4 77 00 00 a2 2f 4d ..w...u...w.../M
    2717fc00 ff ff ff ff 4c fc 17 27 - 37 4f f0 77 00 05 00 00 ....L..'7O.w....
    2717fc10 e0 93 04 00 00 00 00 00 - fe d2 38 6d 00 05 00 00 ..........8m....
    2717fc20 e0 93 04 00 00 00 00 00 - 38 b1 32 05 e0 f5 77 00 ........8.2...w.
    2717fc30 00 00 00 00 e0 f5 77 00 - 00 05 00 00 00 00 00 00 ......w.........
    2717fc40 02 00 00 00 02 00 00 00 - 00 00 00 00 70 fc 17 27 ............p..'
    2717fc50 d0 ea 39 6d e0 93 04 00 - 00 00 00 00 01 00 00 00 ..9m............
    2717fc60 e0 f5 77 00 38 b1 32 05 - e0 f5 77 00 70 3c b3 22 ..w.8.2...w.p<."
    2717fc70 90 fc 17 27 aa e7 36 6d - a0 e3 76 00 e0 93 04 00 ...'..6m..v.....
    2717fc80 00 00 00 00 e0 f5 77 00 - e0 f5 77 00 ac 3c b3 22 ......w...w..<."
    2717fc90 c4 fc 17 27 0d 96 ab 00 - e0 f5 77 00 dc fc 17 27 ...'......w....'
    2717fca0 e0 93 04 00 00 00 00 00 - a8 fc 17 27 ac 3c b3 22 ...........'.<."
    2717fcb0 dc fc 17 27 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 ...'.R."....p<."
    2717fcc0 d4 fc 17 27 0c fd 17 27 - 9f 2d ab 00 00 00 00 00 ...'...'.-......
    2717fcd0 51 76 ab 00 e0 93 04 00 - 00 00 00 00 c0 ae 32 05 Qv............2.
    2717fce0 01 00 00 00 00 00 00 00 - 01 00 00 00 c0 ae 32 05 ..............2.
    2717fcf0 e0 fc 17 27 b9 c8 d6 22 - 3c fd 17 27 60 ca d6 22 ...'..."<..'`.."
    2717fd00 00 00 00 00 b0 c7 d6 22 - 3c fd 17 27 5c fd 17 27 ......."<..'\..'
    2717fd10 9f 2d ab 00 00 00 00 00 - 00 00 00 00 e8 a7 66 05 .-............f.
    State Dump for Thread Id 0x1be
    eax=02b621d8 ebx=7766b100 ecx=00000001 edx=00000000 esi=0007b2b8 edi=00000568
    eip=77f682db esp=271bf6a4 ebp=271bf6f8 iopl=0 nv up ei ng nz ac pe cy
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000293
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:280be0ab=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    271bf6f8 77661202 00000568 0000052c 00000002 00000004 ntdll!NtWaitForSingleObject
    271bfb60 776bb101 0000052c 271bfc00 271bfc10 00000000 msafd!<nosymbols>
    271bfb98 776bb08c 0000052c 271bfc00 271bfc10 00000000 ws2_32!WSAAccept
    271bfc14 00ab960d 0076fe84 271bfc58 271bfc54 271bfc28 ws2_32!accept
    *----> Raw Stack Dump <----*
    271bf6a4 ce 89 66 77 68 05 00 00 - 01 00 00 00 d0 f6 1b 27 ..fwh..........'
    271bf6b4 d4 b2 07 00 bc b2 07 00 - 1a 00 00 00 00 44 be ab .............D..
    271bf6c4 0d 17 c2 01 ff ff ff ff - ff ff ff 7f ff ff ff ff ................
    271bf6d4 ff ff ff 7f 00 00 00 00 - 58 ae 07 00 ad 1f 6a 77 ........X.....jw
    271bf6e4 d8 11 66 77 2c 05 00 00 - 00 00 00 00 00 00 00 00 ..fw,...........
    271bf6f4 00 00 00 00 60 fb 1b 27 - 02 12 66 77 68 05 00 00 ....`..'..fwh...
    271bf704 2c 05 00 00 02 00 00 00 - 04 00 00 00 00 00 00 00 ,...............
    271bf714 18 69 07 00 28 88 07 00 - 66 00 02 00 00 00 00 00 .i..(...f.......
    271bf724 00 00 00 00 00 00 00 00 - 08 00 00 00 00 00 00 00 ................
    271bf734 00 00 00 00 00 00 00 00 - 00 00 00 00 e9 03 00 00 ................
    271bf744 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf754 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf764 00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf774 01 00 00 00 06 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf784 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf794 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7a4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7b4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7c4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7d4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1ce
    eax=00ab017d ebx=7766b100 ecx=00000011 edx=00000000 esi=0007b548 edi=000005cc
    eip=77f682db esp=271ff6a4 ebp=271ff6f8 iopl=0 nv up ei ng nz ac pe cy
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000293
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:280fe0ab=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    271ff6f8 77661202 000005cc 00000590 00000002 00000004 ntdll!NtWaitForSingleObject
    271ffb60 776bb101 00000590 271ffc00 271ffc10 00000000 msafd!<nosymbols>
    271ffb98 776bb08c 00000590 271ffc00 271ffc10 00000000 ws2_32!WSAAccept
    271ffc14 00ab960d 00777e44 271ffc58 271ffc54 271ffc28 ws2_32!accept
    *----> Raw Stack Dump <----*
    271ff6a4 ce 89 66 77 cc 05 00 00 - 01 00 00 00 d0 f6 1f 27 ..fw...........'
    271ff6b4 64 b5 07 00 4c b5 07 00 - 1a 00 00 00 f0 7a 09 b5 d...L........z..
    271ff6c4 0d 17 c2 01 ff ff ff ff - ff ff ff 7f ff ff ff ff ................
    271ff6d4 ff ff ff 7f 00 00 00 00 - 84 ae 07 00 ad 1f 6a 77 ..............jw
    271ff6e4 d8 11 66 77 90 05 00 00 - 00 00 00 00 00 00 00 00 ..fw............
    271ff6f4 00 00 00 00 60 fb 1f 27 - 02 12 66 77 cc 05 00 00 ....`..'..fw....
    271ff704 90 05 00 00 02 00 00 00 - 04 00 00 00 00 00 00 00 ................
    271ff714 50 aa 07 00 28 88 07 00 - 66 00 02 00 00 00 00 00 P...(...f.......
    271ff724 00 00 00 00 00 00 00 00 - 08 00 00 00 00 00 00 00 ................
    271ff734 00 00 00 00 00 00 00 00 - 00 00 00 00 e9 03 00 00 ................
    271ff744 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff754 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff764 00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff774 01 00 00 00 06 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff784 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff794 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7a4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7b4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7c4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7d4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1c2
    eax=00ab017d ebx=00000000 ecx=00000019 edx=00000000 esi=000005b0 edi=00000000
    eip=77f682db esp=2723fba0 ebp=2723fbc4 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2813e5a7=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2723fbc4 77f04f37 000005b0 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2723fc0c 6d39ead0 00000000 00000000 00000001 00780730 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    2723fba0 a0 cc f1 77 b0 05 00 00 - 00 00 00 00 00 00 00 00 ...w............
    2723fbb0 30 07 78 00 2c b3 75 00 - 00 07 78 00 b0 05 00 00 0.x.,.u...x.....
    2723fbc0 2a 14 39 6d 0c fc 23 27 - 37 4f f0 77 b0 05 00 00 *.9m..#'7O.w....
    2723fbd0 ff ff ff ff 00 00 00 00 - fe d2 38 6d b0 05 00 00 ..........8m....
    2723fbe0 ff ff ff ff 00 00 00 00 - 38 ae b5 02 30 07 78 00 ........8...0.x.
    2723fbf0 00 00 00 00 30 07 78 00 - b0 05 00 00 00 00 00 00 ....0.x.........
    2723fc00 2c b3 75 00 02 00 00 00 - 00 00 00 00 30 fc 23 27 ,.u.........0.#'
    2723fc10 d0 ea 39 6d 00 00 00 00 - 00 00 00 00 01 00 00 00 ..9m............
    2723fc20 30 07 78 00 38 ae b5 02 - 30 07 78 00 70 3c b3 22 0.x.8...0.x.p<."
    2723fc30 50 fc 23 27 aa e7 36 6d - 20 14 78 00 00 00 00 00 P.#'..6m .x.....
    2723fc40 00 00 00 00 30 07 78 00 - 30 07 78 00 ac 3c b3 22 ....0.x.0.x..<."
    2723fc50 84 fc 23 27 0d 96 ab 00 - 30 07 78 00 9c fc 23 27 ..#'....0.x...#'
    2723fc60 00 00 00 00 00 00 00 00 - 68 fc 23 27 ac 3c b3 22 ........h.#'.<."
    2723fc70 9c fc 23 27 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 ..#'.R."....p<."
    2723fc80 94 fc 23 27 c4 fc 23 27 - 9f 2d ab 00 00 00 00 00 ..#'..#'.-......
    2723fc90 51 76 ab 00 00 00 00 00 - 00 00 00 00 08 ac 32 05 Qv............2.
    2723fca0 01 00 00 00 08 ac 32 05 - a0 fc 23 27 34 0a b8 22 ......2...#'4.."
    2723fcb0 ec fc 23 27 78 0c b8 22 - 00 00 00 00 c8 09 b8 22 ..#'x.."......."
    2723fcc0 e4 fc 23 27 0c fd 23 27 - 76 2e ab 00 00 00 00 00 ..#'..#'v.......
    2723fcd0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1cd
    eax=00000004 ebx=00000000 ecx=22d8b980 edx=00000000 esi=000005c0 edi=2727fc48
    eip=77f682db esp=2727fc2c ebp=2727fc50 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2817e633=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2727fc50 77f04f37 000005c0 0000ea60 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2727fc98 6d39ead0 0000ea60 00000000 00000001 00781270 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    2727fc2c a0 cc f1 77 c0 05 00 00 - 00 00 00 00 48 fc 27 27 ...w........H.''
    2727fc3c 70 12 78 00 6c b3 75 00 - c0 11 78 00 00 ba 3c dc p.x.l.u...x...<.
    2727fc4c ff ff ff ff 98 fc 27 27 - 37 4f f0 77 c0 05 00 00 ......''7O.w....
    2727fc5c 60 ea 00 00 00 00 00 00 - fe d2 38 6d c0 05 00 00 `.........8m....
    2727fc6c 60 ea 00 00 00 00 00 00 - 98 d3 32 05 70 12 78 00 `.........2.p.x.
    2727fc7c 00 00 00 00 70 12 78 00 - c0 05 00 00 00 00 00 00 ....p.x.........
    2727fc8c 4b 96 34 6d 02 00 00 00 - 00 00 00 00 bc fc 27 27 K.4m..........''
    2727fc9c d0 ea 39 6d 60 ea 00 00 - 00 00 00 00 01 00 00 00 ..9m`...........
    2727fcac 70 12 78 00 98 d3 32 05 - 70 12 78 00 70 3c b3 22 p.x...2.p.x.p<."
    2727fcbc dc fc 27 27 aa e7 36 6d - 20 28 78 00 60 ea 00 00 ..''..6m (x.`...
    2727fccc 00 00 00 00 70 12 78 00 - 70 12 78 00 ac 3c b3 22 ....p.x.p.x..<."
    2727fcdc 10 fd 27 27 0d 96 ab 00 - 70 12 78 00 28 fd 27 27 ..''....p.x.(.''
    2727fcec 60 ea 00 00 00 00 00 00 - f4 fc 27 27 00 00 00 00 `.........''....
    2727fcfc 28 fd 27 27 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 (.''.R."....p<."
    2727fd0c 20 fd 27 27 50 fd 27 27 - 9f 2d ab 00 00 00 00 00 .''P.''.-......
    2727fd1c 51 76 ab 00 60 ea 00 00 - 00 00 00 00 98 d3 32 05 Qv..`.........2.
    2727fd2c 03 00 00 00 98 d3 32 05 - 2c fd 27 27 92 ea d8 22 ......2.,.''..."
    2727fd3c 74 fd 27 27 28 ed d8 22 - 00 00 00 00 20 ea d8 22 t.''(..".... .."
    2727fd4c 74 fd 27 27 84 fd 27 27 - 7d 01 ab 00 00 00 00 00 t.''..''}.......
    2727fd5c 00 00 00 00 00 00 00 00 - 00 00 00 00 98 d3 32 05 ..............2.
    State Dump for Thread Id 0x1b8
    eax=00000004 ebx=00000000 ecx=2323ba90 edx=00000000 esi=00000924 edi=276cfc38
    eip=77f682db esp=276cfc1c ebp=276cfc40 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:285ce623=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    276cfc40 77f04f37 00000924 00007530 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    276cfc88 6d39ead0 00007530 00000000 00000001 007dc330 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x18a
    eax=00000004 ebx=00000000 ecx=02bbf9a0 edx=00000000 esi=000009b0 edi=00000000
    eip=77f682db esp=2770fbe0 ebp=2770fc04 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2860e5e7=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2770fc04 77f04f37 000009b0 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2770fc4c 6d39ead0 00000000 00000000 00000001 007dda00 kernel32!WaitForSingleObject
    ----> Raw Stack Dump <----
    2770fbe0 a0 cc f1 77 b0 09 00 00 - 00 00 00 00 00 00 00 00 ...w............
    2770fbf0 00 da 7d 00 ec b3 75 00 - 80 c1 7d 00 b0 09 00 00 ..}...u...}.....
    2770fc00 2a 14 39 6d 4c fc 70 27 - 37 4f f0 77 b0 09 00 00 *.9mL.p'7O.w....
    2770fc10 ff ff ff ff 00 00 00 00 - fe d2 38 6d b0 09 00 00 ..........8m....
    2770fc20 ff ff ff ff 00 00 00 00 - e8 ef bb 02 00 da 7d 00 ..............}.
    2770fc30 00 00 00 00 00 da 7d 00 - b0 09 00 00 00 00 00 00 ......}.........
    2770fc40 ec b3 75 00 02 00 00 00 - 00 00 00 00 70 fc 70 27 ..u.........p.p'
    2770fc50 d0 ea 39 6d 00 00 00 00 - 00 00 00 00 01 00 00 00 ..9m............
    2770fc60 00 da 7d 00 e8 ef bb 02 - 00 da 7d 00 70 3c b3 22 ..}.......}.p<."
    2770fc70 90 fc 70 27 aa e7 36 6d - 20 dc 7d 00 00 00 00 00 ..p'..6m .}.....
    2770fc80

    I am seeing exactly the same error. I started seeing it after we started making extensive use of introspection in our code. It happens repeatably when we are load testing our software.

  • Adobe Acrobat 8 Professional Random Crash (Access Violation)

    hi all. first time poster. long time reader.
    i have encountered an odd access violation problem - 'ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "blah" referenced memory at "blah". The memory could not be "blah" - in 'acrobat.dll' recently with a customer who is experiencing seemingly random crashes with adobe acrobat 8 professional.
    they are running the application off a citrix presnetation server 4.5 server (windows server 2003 R2 with service pack 2). each server is hosting about 8 or more users per server per day. every now and then, ie once a day, adobe acrobat crashes during use. there doesn't appear to be anything consistent in so far as the action the user is performing. they will be mid-way through marking up a document and it will just crash for one of them. all the others will continue working fine.
    i have access to numerous crash dumps and nothing seems to really stand out...other than 'Acrobat_3000000!AVAcroALM_Destroy'. For example...
    STACK_TEXT:
    WARNING: Stack unwind information not available. Following frames may be wrong.
    0012f96c 0343c3e1 46e4e58d 0839ce58 0012faa0 Acrobat_3000000!PDDocCreateWordFinderEx+0x59641
    0012f9a0 0343c479 0000004d 00000000 46e4e5f5 Acrobat_3000000!AVAcroALM_Destroy+0x30afe
    0012f9d8 0343c94a 08650e08 0000004d 0012f9fc Acrobat_3000000!AVAcroALM_Destroy+0x30b96
    0012fa68 0343cea2 08650e08 0000004d 0012fab0 Acrobat_3000000!AVAcroALM_Destroy+0x31067
    0012faf8 0343d0a3 08650e08 0000004d 0bbf6748 Acrobat_3000000!AVAcroALM_Destroy+0x315bf
    0012fb4c 0343d8da 08650e08 00000000 46e4e7e5 Acrobat_3000000!AVAcroALM_Destroy+0x317c0
    0012fbc8 03182465 08e6e808 0012fc48 00000000 Acrobat_3000000!AVAcroALM_Destroy+0x31ff7
    0012fc1c 0309eeba 0bbf6748 0012fc48 00000000 Acrobat_3000000!PDPageGetFlippedMatrix+0x471d
    0012fc88 030ae925 00000000 08dd9798 03098f43 Acrobat_3000000!PDDocCreateWordFinderEx+0x378ef
    0012fce8 0300e9f7 0003007a 0300d5c9 000004d3 Acrobat_3000000!PDDocCreateWordFinderEx+0x4735a
    0012fd04 7739b6e3 0003007a 00000113 000004d3 Acrobat_3000000!WinMain+0x24a4
    0012fd30 7739b874 0300d1bf 0003007a 00000113 user32!InternalCallWinProc+0x28
    0012fda8 7739ba92 00000000 0300d1bf 0003007a user32!UserCallWinProcCheckWow+0x151
    0012fe10 7739bad0 0012fe54 00000000 0012fe90 user32!DispatchMessageWorker+0x327
    0012fe20 0300a597 0012fe54 0012fe70 03ca2d20 user32!DispatchMessageW+0xf
    0012fe90 0300aece 46e4e2e5 00d40068 03ca2d20 Acrobat_3000000+0xa597
    0012fec8 0300c517 00000000 0012ff2c 00000000 Acrobat_3000000!AXWasInitViaPDFL+0x76a
    0012fedc 0300c649 00000005 0040a77c 0012ff2c Acrobat_3000000!AXWasInitViaPDFL+0x1db3
    0012fefc 00402d5f 03000000 00400000 001524e0 Acrobat_3000000!WinMain+0xf6
    0012ff30 00403281 00400000 00000000 001524e0 Acrobat+0x2d5f
    0012ffc0 77e6f23b 00000000 00000000 7ffd4000 Acrobat+0x3281
    0012fff0 00000000 00403402 00000000 00000000 kernel32!BaseProcessStart+0x23
    ...or another...
    STACK_TEXT:
    WARNING: Stack unwind information not available. Following frames may be wrong.
    0012f6e0 222cb7ad ad0d64ee 00000000 1398c0d8 Annots!PlugInMain+0xa9198
    0012f830 2091b7db 0012f934 0012f9f4 56433230 Annots!PlugInMain+0x1ca425
    0012f8d4 20913957 0850f3a0 0340f043 0850f3a0 AcroForm!DllUnregisterServer+0x10798b
    0012f900 0340f385 00000001 51ab7765 000000df AcroForm!DllUnregisterServer+0xffb07
    0012f940 034dda17 0850f3a0 00000001 51ab77d1 Acrobat_3000000!AVAcroALM_Destroy+0x3aa2
    0012f9f4 034454fa 00000000 084ce5c8 ffffff84 Acrobat_3000000!AVAcroALM_Destroy+0xd2134
    0012fa14 034451cb 084ce5c8 ffffff84 000000df Acrobat_3000000!AVAcroALM_Destroy+0x39c17
    0012fa3c 034451f0 084ce5c8 ffffff84 000000df Acrobat_3000000!AVAcroALM_Destroy+0x398e8
    0012fa5c 033e4a92 00fd0540 084ce5c8 ffffff84 Acrobat_3000000!AVAcroALM_Destroy+0x3990d
    0012fadc 033e6c01 084ce5c8 00000000 00000001 Acrobat_3000000!PDDocSetXAPMetadata+0xf227f
    0012fb24 033b0fbf 00000065 000000e3 00000001 Acrobat_3000000!
    ...continued in next post 'cause it keeps getting truncated ?!

    0012fbb4 030abb9e 00000065 000000e3 00000201 Acrobat_3000000!PDDocSetXAPMetadata+0xd9998
    0012fbd4 030abd6f 00000201 00000001 00e30065 Acrobat_3000000!PDDocCreateWordFinderEx+0x445d3
    0012fbf0 7739b6e3 000200ca 00000201 00000001 Acrobat_3000000!PDDocCreateWordFinderEx+0x447a4
    0012fc1c 7739b874 030abd08 000200ca 00000201 user32!InternalCallWinProc+0x28
    0012fc94 7739bfce 00000000 030abd08 000200ca user32!UserCallWinProcCheckWow+0x151
    0012fcc4 773b0463 030abd08 000200ca 00000201 user32!CallWindowProcAorW+0x98
    0012fce4 20b8e182 030abd08 000200ca 00000201 user32!CallWindowProcA+0x1b
    0012fd04 7739b6e3 000200ca 00000201 00000001 AcroForm!DllUnregisterServer+0x37a332
    0012fd30 7739b874 20b8e132 000200ca 00000201 user32!InternalCallWinProc+0x28
    0012fda8 7739ba92 00000000 20b8e132 000200ca user32!UserCallWinProcCheckWow+0x151
    0012fe10 7739bad0 0012fe54 00000000 0012fe90 user32!DispatchMessageWorker+0x327
    0012fe20 0300a597 0012fe54 0012fe70 03ca2d20 user32!DispatchMessageW+0xf
    0012fe90 0300aece 51ab70ed 00d40068 03ca2d20 Acrobat_3000000+0xa597
    0012fec8 0300c517 00000000 0012ff2c 00000000 Acrobat_3000000!AXWasInitViaPDFL+0x76a
    0012fedc 0300c649 00000005 0040a77c 0012ff2c Acrobat_3000000!AXWasInitViaPDFL+0x1db3
    0012fefc 00402d5f 03000000 00400000 001524e0 Acrobat_3000000!WinMain+0xf6
    0012ff30 00403281 00400000 00000000 001524e0 Acrobat+0x2d5f
    0012ffc0 77e6f23b 00000000 00000000 7ffde000 Acrobat+0x3281
    0012fff0 00000000 00403402 00000000 00000000 kernel32!BaseProcessStart+0x23
    is 'AVAcroALM' to do with licensing?
    other than advising them to bring citrix presentation server 4.5 up to date (HRP2) i'm at a loss what to advise. citrix often have issues with seamless published applications when spread across multiple monitors (as in this case), hence, my reason to ask them to bring their software up to date. often the funtion called will be different - often times 'Acrobat.dll!PDDocCreateWordFinderEx', other times 'Acrobat.dll!PDDocAcquirePage' and there are others.
    i can post more of the mini-dump if required. any - and ALL - assitance appreciated.
    thanks.

  • Access Violation while initialising WEBUTIL on Ora9iDS

    Hello,
    as part of an urgent evaluation I installed WEBUTIL as described in the documentation, did the additional steps described in the readme and added WEBUTIL as described to an existing form. Now the form raises an access violation error while executing trigger WHEN-CUSTOM-ITEM-EVENT on item WEBUTIL.WEBUTIL_FILETRANSFER_FUNCTIONS exactly when calling procedure WEBUTIL_CORE.CustomEventHandler while registering the beans.
    Did anybody experience the like? Any guess what's going wrong or what could help?
    The crash is documented in the log as follows:
    [09/09/03 08:38:46 Westeuropäische Sommerzeit]::Client Status [ConnId=0, PID=3048]
         >> ERROR: Abnormal termination, Error Code: C0000005 ACCESS_VIOLATION
    ======================= STACK DUMP =======================
    Fault address: 60A98D4D 01:00097D4D
    Module: E:\Programme\OraHome1\bin\orapls9.dll
    System Information:
    Operating System: Windows NT Version 5.0 Build 2195 Service Pack 4
    Command line: ifweb90 server webfile=HTTP-0,0,1,53.147.33.61
    FORM/BLOCK/FIELD: DOKUMENTE:DOKUMENTE.KLARTEXT
    Last Trigger: WHEN-CUSTOM-ITEM-EVENT - (In Progress)
    Msg: <NULL>
    Last Builtin: NAME_IN - (Successfully Completed)
    Registers:
    EAX:00000000
    EBX:0012D9C0
    ECX:00000000
    EDX:0012D9C0
    ESI:0777C6E4
    EDI:02A26C78
    CS:EIP:001B:60A98D4D
    SS:ESP:0023:0012D978 EBP:0012D998
    DS:0023 ES:0023 FS:003B GS:0000
    Flags:00010246
    ------------------- Call Stack Trace ---------------------
    Frameptr RetAddr Param#1 Param#2 Param#3 Param#4 Function Name
    0x0012d998 60a3d308 0777c6e4 00000001 0012d9c0 070468a8 pfrb1assign_aad2va
    0x0012d9ec 60a92b11 0777c6e4 00000001 66020030 070468a8 pevmGBVAR+d8
    0x0012e0f0 60a1ce7d 0777c6e4 02a26c78 0776dd6c 00000002 _pfrrun+6841       
    0x0012e158 6601ea45 02a26c78 0777c6e4 02a46f00 029de3b4 _peicnt+ed         
    0x02a26874 029de3b4 65fdb2a0 65fdb2e0 65da1f30 00000000 0x6601ea45
    0x02a46f00 00000001 0000000a 02a46fd8 0026181f 65d51752 0x029de3b4
    ------------------- End of Stack Trace -------------------
    WebUtil-Logfile is not very verbose (despite detailed logging enabled):
    53.147.33.61:ZSCHAU: Connection from Form=E:\ISAP_ASP4\isap\websourcen\Doktestweb.fmx Client O/S=Windows 2000 locale=de
    53.147.33.61:ZSCHAU: 2003-Sep-09 08:38:00.889 WUF[VBeanCommon.getIPAddress()] 53.147.33.61
    53.147.33.61:ZSCHAU: 2003-Sep-09 08:38:00.929 WUH[VBeanCommon.getIPAddress()] 53.147.33.61
    53.147.33.61:ZSCHAU: 2003-Sep-09 08:38:00.949 WUS[VBeanCommon.getIPAddress()] 53.147.33.61
    Java Console prints:
    JInitiator: Version 1.3.1.9
    Verwendung der JRE-Version 1.3.1.9 Java HotSpot(TM) Client VM
    Home-Verzeichnis des Benutzers = C:\Dokumente und Einstellungen\zschau
    Proxy-Konfiguration:Automatische Proxy-Konfiguration
    JAR cache enabled
    Location: C:\Dokumente und Einstellungen\zschau\Oracle Jar Cache
    Maximum size: 50 MB
    Compression level: 0
    c: clear console window
    f: finalize objects on finalization queue
    g: garbage collect
    h: display this help message
    l: dump classloader list
    m: print memory usage
    q: hide console
    s: dump system properties
    t: dump thread list
    x: clear classloader cache
    0-5: set trace level to <n>
    Loading http://localhost:8888/forms90/webutil/webutil.jar from JAR cache
    Loading http://localhost:8888/forms90/webutil/jacob.jar from JAR cache
    Loading http://localhost:8888/forms90/java/f90all_jinit.jar from JAR cache
    RegisterWebUtil - Loading Webutil Version 1.0.2 Beta
    connectMode=HTTP, native.
    Forms Applet-Version : 90290
    2003-Sep-09 08:38:00.819 WUI[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:00.839 WUI[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:00.879 WUF[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:00.889 WUF[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:00.909 WUH[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:00.929 WUH[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:00.939 WUS[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:00.949 WUS[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:00.969 WUT[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:00.969 WUT[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:01.460 WUO[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:01.470 WUO[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:01.500 WUL[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:01.510 WUL[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:01.550 WUB[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:01.560 WUB[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:48.268 WUB[VBeanCommon.destroy()] WebUtil Browser Functions being removed..
    2003-Sep-09 08:38:48.298 WUL[VBeanCommon.destroy()] WebUtil C API Functions being removed..
    2003-Sep-09 08:38:49.59 WUO[VBeanCommon.destroy()] WebUtil Client Side Ole Functions being removed..
    2003-Sep-09 08:38:49.89 WUT[VBeanCommon.destroy()] WebUtil File Transfer Bean being removed..
    2003-Sep-09 08:38:49.89 WUS[VBeanCommon.destroy()] WebUtil Session Monitoring Facilities being removed..
    2003-Sep-09 08:38:49.89 WUH[VBeanCommon.destroy()] WebUtil Client Side Host Commands being removed..
    2003-Sep-09 08:38:49.99 WUF[VBeanCommon.destroy()] WebUtil Client Side File Functions being removed..
    2003-Sep-09 08:38:49.99 WUI[VBeanCommon.destroy()] WebUtil GetClientInfo Utility being removed..
    I run Ora9iDS on a Windows2000 system.
    Thanks to anybody who tries to help.

    Hello, Grant,
    the crash occurs before I try to do anything vital. There is some init stuff in the form (initialising items, global variables etc.), query execution for initial displaying of database entries and a sychronize statement. After that the triggers in the WEBUTIL section fire, as I understand to initialise the beans (registering). As part of this registering the crash occurs - before I call any of the WEBUTIL functionality from my own code.

  • Urgent problem: JRE Crashes with Access violation (c0000005)

    I have a problem where the JRE crashes with an Access violation (c0000005) at address (6d4218ce).
    The JVM is:
    java version "1.3.1_01"
    Java(TM) 2 Runtime Environment, Standard Edition (build 1.3.1_01)
    Java HotSpot(TM) Client VM (build 1.3.1_01, mixed mode)The application is swing based, and I have my suspicions that the problem occurs when exec'ing (Runtime.exec()) a script file (deletes data files and FTP's data files around an internal network), but I cannot categorically prove it as yet.
    The lack of a .map file does not help in analysing the Dr Watson log file. Does anyone know if a map file is available for 1.3.1?
    I have tried to raise this as a bug but as we cannot reproduce it on demand, I cannot get Sun to look into it.
    The Dr Watson log file shows:
    State Dump for Thread Id 0x13e
    eax=bf800000 ebx=0336b770 ecx=02b72168 edx=bf800008 esi=02b72168 edi=06ffd12c
    eip=6d4218ce esp=08d0fdbc ebp=08d0fddc iopl=0         nv up ei ng nz na pe nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000282
    function: <nosymbols>
            6d4218b9 8d4df0           lea     ecx,[ebp-0x10]         ss:09c0e7e2=00000000
            6d4218bc e875000000       call    6d421936
            6d4218c1 5f               pop     edi
            6d4218c2 5e               pop     esi
            6d4218c3 c9               leave
            6d4218c4 c3               ret
            6d4218c5 56               push    esi
            6d4218c6 8bf1             mov     esi,ecx
            6d4218c8 8b5604           mov     edx,[esi+0x4]          ds:03a70b6e=????????
            6d4218cb 83c208           add     edx,0x8
    FAULT ->6d4218ce 8b4210           mov     eax,[edx+0x10]         ds:c06fea0e=????????
            6d4218d1 85c0             test    eax,eax
            6d4218d3 7f25             jg      6d4218fa
            6d4218d5 7d1b             jge     6d4218f2
            6d4218d7 83c9ff           or      ecx,0xff
            6d4218da 6a04             push    0x4
            6d4218dc 2bc8             sub     ecx,eax
            6d4218de 8b4608           mov     eax,[esi+0x8]          ds:03a70b6e=????????
            6d4218e1 d3e0             shl     eax,cl
            6d4218e3 8b4a44           mov     ecx,[edx+0x44]         ds:c06fea0e=????????
            6d4218e6 8d440807         lea     eax,[eax+ecx+0x7]      ds:03a70b6f=????????
            6d4218ea 59               pop     ecx
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
    08d0fddc 6d4710ee 0336b734 0336b734 6d4381b7 0336b734 <nosymbols>
    State Dump for Thread Id 0x140
    eax=06a82398 ebx=00000000 ecx=06ab34f0 edx=00000000 esi=0000017c edi=00000000
    eip=77f682db esp=08d4fc24 ebp=08d4fc48 iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246
    function: NtWaitForSingleObject
            77f682d0 b8c5000000       mov     eax,0xc5
            77f682d5 8d542404         lea     edx,[esp+0x4]          ss:09c4e62b=00000000
            77f682d9 cd2e             int     2e
            77f682db c20c00           ret     0xc
            77f682de 8bc0             mov     eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
    08d4fc48 77f04f37 0000017c ffffffff 00000000 6d466097 ntdll!NtWaitForSingleObject
    08d4fc90 6d476550 00000000 00000000 00000001 00765d80 kernel32!WaitForSingleObject Any help would be much appreciated.
    Regards,
    Dave Jackson

    Probably nothing to do with it but I had some dodgy memory, and windows would complain that there was an error to do with that exact memory location: c0000005

  • Re: (forte-users) access violation caught in debugmode

    Eric,
    There has been a problem with Forte debug mode for sometime now when the app
    is silent. If you attempt to inspect the variables when the app is in the
    'silent' mode, i.e., waiting on an event loop for a user input or a system
    event, then you get the "Access violation caught ..." exception message and
    the workspace including the launch server crashes.
    If you are getting this problem in the 'step-through' mode, you should look
    at the lauch server immediately after you get the exception before
    everything disappears. There could be a stack backtrace due to some illegal
    reference. We have faced a similar situation before but the error appeared
    both in the 'debug' and 'run' modes.
    Hope this helps.
    Braja K Chattaraj.
    From: Eric Decossaux <[email protected]>
    To: forte mailing <[email protected]>
    Subject: (forte-users) access violation caught in debug mode
    Date: Thu, 23 Sep 1999 17:31:39 +0200
    Hello,
    I have a problem using Forte in debug mode. If I run my program on my NT
    machine from the partition workshop (distributed run), the program works
    fine except that some object does not display what I'm expecting. So I
    want to use the debug mode to inspect the objets of this window. When I
    choose the "local variables" option to see the content of my window, I
    have a "access violation caught" and forte disappears. If I just let my
    program run without choosing this option, everything is the same than
    with the distributed run.
    Does somebody have an idea what to look for ? I really want to look the
    inside the attributes of this window.
    We recently upgraded from release 30G2 to release 30L2. Could it be the
    problem ?
    Eric Decossaux
    Cliniques Universitaires St Luc
    Informatique des Laboratoires
    av Hippocrate 10 / 1730
    1200 Bruxelles
    +32+2+764 17 53
    For the archives, go to: http://lists.sageit.com/forte-users and use
    the login: forte and the password: archive. To unsubscribe, send in a new
    email the word: 'Unsubscribe' to: [email protected]

    Eric,
    Another possibility has to do with the repository. You said you recently
    migrated 30G2 to release 30L2.
    Many strange problems have been traced to release migrations with old
    repositories. If the repository was properly migrated another thing you can try
    is to export the project(s) to PEX files, delete them from the repository, and
    then re-import. I know this can be time consuming but I have solved more than
    one unexplained problem in the IDE by doing it.
    ---------------------- Forwarded by Charlie Shell/Bsg/MetLife/US on 09/23/99
    01:19 PM ---------------------------
    "Ajith Kallambella" <[email protected]> on 09/23/99 12:08:54 PM
    To: [email protected], [email protected]
    cc: (bcc: Charlie Shell/Bsg/MetLife/US)
    Subject: Re: (forte-users) access violation caught in debug mode
    Eric,
    Sometimes( 90% ) you can solve this problem by
    checking out the class that is causing the crash
    and force-compiling it.
    If it doesn't help, run through this checklist.
    1. Do you have enough memory resources.?
    2. Is the object you are inspecting held in a lock ?
    ( mutex, transaction lock etc )
    3. Does it work when you wait for sometime at the
    breakpoint before inspecting the values? I mean
    are you interrupting some process thread?
    4. Does it work if you log the attributes using logmgr?
    5. Are you using any call-outs/call-ins? Any external
    systems integration? Sometimes( for reasons beyond
    my comprehension ) the objects allocated outside
    Forte gets corrupted when its passed back and forth.
    6. ...finally...Santa Clause, help me!
    Ajith Kallambella M.
    Forte Systems Consultant.
    From: Eric Decossaux <[email protected]>
    To: forte mailing <[email protected]>
    Subject: (forte-users) access violation caught in debug mode
    Date: Thu, 23 Sep 1999 17:31:39 +0200
    Hello,
    I have a problem using Forte in debug mode. If I run my program on my NT
    machine from the partition workshop (distributed run), the program works
    fine except that some object does not display what I'm expecting. So I
    want to use the debug mode to inspect the objets of this window. When I
    choose the "local variables" option to see the content of my window, I
    have a "access violation caught" and forte disappears. If I just let my
    program run without choosing this option, everything is the same than
    with the distributed run.
    Does somebody have an idea what to look for ? I really want to look the
    inside the attributes of this window.
    We recently upgraded from release 30G2 to release 30L2. Could it be the
    problem ?
    Eric Decossaux
    Cliniques Universitaires St Luc
    Informatique des Laboratoires
    av Hippocrate 10 / 1730
    1200 Bruxelles
    +32+2+764 17 53
    For the archives, go to: http://lists.sageit.com/forte-users and use
    the login: forte and the password: archive. To unsubscribe, send in a new
    email the word: 'Unsubscribe' to: [email protected]
    For the archives, go to: http://lists.sageit.com/forte-users and use
    the login: forte and the password: archive. To unsubscribe, send in a new
    email the word: 'Unsubscribe' to: [email protected]

  • Access Violation when trying to read from Open Hub in BW

    Hi,
    Can someone help me out. I use BODS version 14.1.1.210. I have setup the connection to BW source and imported metadata for my OpenHub - no problem.
    Then created DTP and processchain to load Open hub data in BW.
    Made dataflow in BODS with Open Hub Tables as source and maintained processchain to be executed. When executing BODS job I get the following error:
    6800 10580 JOB 17-03-2014 13:10:34 Job <Test_OpenHub> is terminated due to error <170101>.
    6800 10580 SYS-170101 17-03-2014 13:10:34 |Session Test_OpenHub|Data flow Test Openhub
    6800 10580 SYS-170101 17-03-2014 13:10:34 System Exception <ACCESS_VIOLATION> occurred. Process dump option is off. Process is not dumped.
    6800 10580 SYS-170101 17-03-2014 13:10:34 Call stack:
    6800 10580 SYS-170101 17-03-2014 13:10:34 (null)
    6800 10580 SYS-170101 17-03-2014 13:10:34 Registers:
    6800 10580 SYS-170101 17-03-2014 13:10:34 RAX=00000000747E1648  RBX=0000000000209AB8  RCX=0000000000209AB8  RDX=0000000000000160  RSI=000000000231DAC0
    6800 10580 SYS-170101 17-03-2014 13:10:34 RDI=0000000008BEBAC0  RBP=0000000000000000  RSP=00000000002099C0  RIP=000000007477730A  FLG=0000000000010206
    6800 10580 SYS-170101 17-03-2014 13:10:34 R8=0000000000000000   R9=00000000FFFFFFFF  R10=0000000000620064  R11=0000000008C93600  R12=000000000033D390
    6800 10580 SYS-170101 17-03-2014 13:10:34 R13=0000000081D6FEC0  R14=000000000020A008  R15=000000000020A030
    6800 10580 SYS-170101 17-03-2014 13:10:34 Exception code: C0000005 ACCESS_VIOLATION
    6800 10580 SYS-170101 17-03-2014 13:10:34 Fault address:  000000007477730A 01:000000000002630A
    6800 10580 SYS-170101 17-03-2014 13:10:34 C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_88df89932faf0bf6\MSVCP80.dll
    6800 10580 SYS-170101 17-03-2014 13:10:34 ==========================================================
    6800 10580 SYS-170101 17-03-2014 13:10:34 Collect the following and send to Customer Support:
    6800 10580 SYS-170101 17-03-2014 13:10:34 1. Log files(error_*, monitor_*, trace_*) associated with this failed job.
    6800 10580 SYS-170101 17-03-2014 13:10:34 2. Exported ATL file of this failed job.
    6800 10580 SYS-170101 17-03-2014 13:10:34 3. DDL statements of tables referenced in this failed job.
    6800 10580 SYS-170101 17-03-2014 13:10:34 4. Data to populate the tables referenced in the failed job. If not possible, get the last few rows (or sample of them) when
    6800 10580 SYS-170101 17-03-2014 13:10:34 the job failed.
    6800 10580 SYS-170101 17-03-2014 13:10:34 5. Core dump, if any, generated from this failed job.
    6800 10580 SYS-170101 17-03-2014 13:10:34 ==========================================================
    Any good ideas?

    Hello Erik,
    not sure about it, but did you see this post some hours after yours?
    DS 4.1 job aborts with Access Violation
    Also, did you check ST22 to see if it generates any dump?
    And if you're able to check the BODS log files, it might me helpful. They're located at %LINK_DIR%\log directory. Check the names with the execution of the job.
    Hope it helps!
    Regards.
    Bruna Dupim

  • Server JVM(1.4.2_11-b06 mixed mode) crashed suddenly by an Access violation

    We are running a Servlet/JSP application on Tomcat5 (Windows service) and
    WindowsNT4 Workstation(SP6a).
    JVM has crashed suddenly by an Access Violation while it was in its idle state,
    and it happened only once.
    (No access log was left in Apache's access log at the time of the crach, so it
    doesn't seem any Http access has triggered the crash.)
    We are having a trouble finding causes and solution to this problem.
    Could anyone please help us solve this problem? Thank you in advance.
    Attatched below are our environment status, Dr.Watson log and JVM's last
    GC log. (When JVM crashed, hs_err_pid<pid>.log was not generated.)
    [Apache's access log]
    #JVM crashed at 11:45:22.501, while there's no Http access according to Apache's
    #access log.
    127.0.0.1 - - [08/Aug/2006:11:45:00 +0900] "POST /Manage/mode/CNMOD00205Action.do HTTP/1.1" 200 4651
    127.0.0.1 - - [08/Aug/2006:11:45:47 +0900] "POST /Manage/change/CNCHG00601Action.do HTTP/1.1" 503 430
    [Environment]
    OS: Windows NT Workstation 4 SP6a (Japanese Edition)
    CPU: Intel Celeron 566MHz
    Memory: 256MB
    J2SDK: Sun J2SDK 1.4.2_11-b06
    Servlet Containar: Tomcat 5.0.28
    Web Server: Apache 2.0.54
    Tomcat Connector: mod_jk2 2.0.5
    Database: MS-Access
    *Tomcat5.exe run as a service, with jre\bin\server\jvm.dll.
    JVM settings is as follows.
    -XX:NewSize=32m -XX:MaxNewSize=32m -XX:SurvivorRatio=1 -XX:TargetSurvivorRatio=100
    -XX:MaxPermSize=64m -XX:PermSize=32m -XX:+UseCompilerSafepoints -XX:+UseOnStackReplacement
    -Xnoclassgc -XX:+PrintGCDetails -XX:+PrintGCTimeStamps -XX:+PrintHeapAtGC
    -Xloggc:F:\var\log\system\tomcat\gc.log -Xrs -Xms72m -Xmx72m
    [Dr. Watson's log]
    Microsoft(R) Windows NT(R) Version 4.00 DrWtsn32
    Copyright (C) 1985-1996 Microsoft Corp. All rights reserved.
    Application exception occurred:
    App: (pid=305)
    When: 8/8/2006 @ 11:45:22.501
    Exception number: c0000005 (access violation)
    ----> System Information <----*
    Computer Name: TEST-A08
    User Name: SYSTEM
    Number of Processors: 1
    Processor Type: x86 Family 6 Model 8 Stepping 10
    Windows Version: 4.0
    Current Build: 1381
    Service Pack: 6
    Current Type: Uniprocessor Free
    Registered Organization: xxxxxxxx
    Registered Owner: xxxxxxxx
    ----> Task List <----
    0 Idle.exe
    2 System.exe
    26 smss.exe
    34 csrss.exe
    40 winlogon.exe
    46 services.exe
    49 lsass.exe
    61 nddeagnt.exe
    80 X_AAA.exe
    84 Explorer.exe
    87 XBBB.exe
    94 XCCC.exe
    99 RpcSs.exe
    103 ups.exe
    110 SysTray.exe
    111 loadwc.exe
    115 PROMon.exe
    119 smctrlw.exe
    125 pstores.exe
    117 MSTask.exe
    148 conime.exe
    150 xxmanage.exe
    152 XCC.exe
    155 XDD.exe
    78 XEE.exe
    88 XFF.exe
    159 XGG.exe
    164 XHH.exe
    169 XII.exe
    142 XJJ.exe
    213 XKK.exe
    236 XLL.exe
    239 XMM.exe
    242 XNN.exe
    247 XOO.exe
    250 XPP.exe
    254 XQQ.exe
    248 XRR.exe
    258 XSS.exe
    261 XTT.exe
    265 XUU.exe
    269 XVV.exe
    271 XWW.exe
    280 XXX.exe
    283 XYY.exe
    286 XZZ.exe
    232 XMain.exe
    288 XXXMAIN.exe
    294 XWWWW.exe
    292 CMD.exe
    301 XXXXProc.exe
    305 tomcat5.exe
    45 Apache.exe
    328 rotatelogs.exe
    330 rotatelogs.exe
    333 Apache.exe
    323 rotatelogs.exe
    334 rotatelogs.exe
    340 XXMop.exe
    347 XX800.exe
    227 ddhelp.exe
    342 XXXX_XXXX.exe
    418 drwtsn32.exe
    0 _Total.exe
    (00400000 - 00400000)
    (77f50000 - 77fbd000) dll\ntdll.dbg
    (77ed0000 - 77f41000) dll\kernel32.dbg
    (77e40000 - 77e9b000) dll\user32.dbg
    (76680000 - 76698000) dll\imm32.dbg
    (77ea0000 - 77ecc000) dll\gdi32.dbg
    (77d90000 - 77dd0000) dll\advapi32.dbg
    (77de0000 - 77e37000) dll\rpcrt4.dbg
    (70bd0000 - 70c34000)
    (78000000 - 78046000)
    (77c10000 - 77d4f000) dll\shell32.dbg
    (71780000 - 7180a000) COMCTL32.dbg
    (77bc0000 - 77bc7000) dll\rpcltc1.dbg
    (08000000 - 082b8000)
    (77fd0000 - 77ffa000) dll\winmm.dbg
    (6bc00000 - 6bc11000) auddrive.dll
    (6bd00000 - 6bd14000) cm-pci.dll
    (10000000 - 10007000)
    (00c70000 - 00c7e000)
    (00c80000 - 00c99000)
    (00ca0000 - 00cae000)
    (193b0000 - 193bf000)
    (77640000 - 77654000) dll\ws2_32.dbg
    (77630000 - 77637000) dll\ws2help.dbg
    (73f20000 - 73f2e000) dll\rnr20.dbg
    (775f0000 - 775ff000) dll\msafd.dbg
    (77620000 - 77629000) dll\wshtcpip.dbg
    (77660000 - 7766a000) dll\wsock32.dbg
    (1d9d0000 - 1d9dc000)
    (1f7d0000 - 1f804000) dll\ODBC32.dbg
    (77d50000 - 77d83000) dll\comdlg32.dbg
    (1f8c0000 - 1f8c0000)
    (0f9a0000 - 0f9ab000) vbajet32.dbg
    (77b00000 - 77bb7000) dll\ole32.dbg
    (65340000 - 653db000) oleaut32.dll
    (23c40000 - 23c79000) dll\msjtes40.dbg
    (24090000 - 240f2000) expsrv.DBG
    State Dump for Thread Id 0x130
    eax=77bc4030 ebx=0012fe60 ecx=77bc0000 edx=00000000 esi=00000064 edi=00000000
    eip=77f57f07 esp=0012fd80 ebp=0012fde8 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: ZwReadFile
    77f57efc b886000000 mov eax,0x86
    77f57f01 8d542404 lea edx,[esp+0x4] ss:00f7e787=00021000
    77f57f05 cd2e int 2e
    77f57f07 c22400 ret 0x24
    77f57f0a 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 ���������
    0012fd7c 77edd3f5 00000064 00000000 00000000 00000000 ntdll!ZwReadFile (FPO: [9,0,0])
    0012fde8 77da8aef 00000064 00132108 0000021a 0012fe18 kernel32!ReadFile (FPO: Non-FPO [5,14,3])
    0012fe1c 77da853b 00000064 00132108 0000021a 0012fe60 advapi32!RegisterServiceCtrlHandlerA (FPO: Non-FPO [4,4,3])
    0012fe80 77da84d4 00000064 00132108 0000021a 00000000 advapi32!StartServiceCtrlDispatcherW (FPO: Non-FPO [3,17,3])
    0012fec4 004026c8 00415724 00ad1ed8 0040280a 00ad1ed8 advapi32!StartServiceCtrlDispatcherW (FPO: Non-FPO [1,10,3])
    ----> Raw Stack Dump <----
    0012fd80 f5 d3 ed 77 64 00 00 00 - 00 00 00 00 00 00 00 00 ...wd...........
    0012fd90 00 00 00 00 bc fd 12 00 - 08 21 13 00 1a 02 00 00 .........!......
    0012fda0 00 00 00 00 00 00 00 00 - 00 00 00 00 08 21 13 00 .............!..
    0012fdb0 60 fe 12 00 00 00 00 00 - 00 00 00 00 00 00 00 00 `...............
    0012fdc0 e8 fd 12 00 30 fe 12 00 - 04 00 00 00 00 00 00 00 ....0...........
    0012fdd0 a8 fd 12 00 00 00 00 00 - 70 fe 12 00 10 c7 f0 77 ........p......w
    0012fde0 50 da f0 77 ff ff ff ff - 1c fe 12 00 ef 8a da 77 P..w...........w
    0012fdf0 64 00 00 00 08 21 13 00 - 1a 02 00 00 18 fe 12 00 d....!..........
    0012fe00 00 00 00 00 00 00 00 00 - a0 52 13 00 1a 02 00 00 .........R......
    0012fe10 64 00 00 00 30 fe 12 00 - 00 00 00 00 80 fe 12 00 d...0...........
    0012fe20 3b 85 da 77 64 00 00 00 - 08 21 13 00 1a 02 00 00 ;..wd....!......
    0012fe30 60 fe 12 00 00 00 00 00 - 08 21 13 00 1a 02 00 00 `........!......
    0012fe40 32 01 00 00 00 00 00 00 - 08 21 13 00 1a 02 00 00 2........!......
    0012fe50 0c 21 13 00 00 00 00 00 - 01 00 00 00 b8 40 13 00 .!...........@..
    0012fe60 00 00 00 00 00 00 00 00 - 34 fe 12 00 04 00 00 00 ........4.......
    0012fe70 b4 fe 12 00 04 11 db 77 - d8 de db 77 ff ff ff ff .......w...w....
    0012fe80 c4 fe 12 00 d4 84 da 77 - 64 00 00 00 08 21 13 00 .......wd....!..
    0012fe90 1a 02 00 00 00 00 00 00 - d8 1e ad 00 a0 56 41 00 .............VA.
    0012fea0 8c fe 12 00 00 00 00 00 - 64 00 00 00 94 fe 12 00 ........d.......
    0012feb0 8c 6f 3c d2 b0 ff 12 00 - 04 11 db 77 c8 de db 77 .o<........w...w
    State Dump for Thread Id 0x132
    eax=001353b8 ebx=00000000 ecx=00135428 edx=00000000 esi=00000390 edi=00000000
    eip=77f582db esp=00bdff28 ebp=00bdff4c iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f582d0 b8c5000000 mov eax,0xc5
    77f582d5 8d542404 lea edx,[esp+0x4] ss:01a2e92f=????????
    77f582d9 cd2e int 2e
    77f582db c20c00 ret 0xc
    77f582de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    00bdff24 77eecfd4 00000390 00000000 00000000 77da6ad2 ntdll!NtWaitForSingleObject (FPO: [3,0,0])
    00bdff4c 77ed4f5e 00000390 ffffffff 00000000 004069d8 kernel32!WaitForSingleObjectEx (FPO: Non-FPO [3,3,3])
    00bdffa8 77da8cac 00000001 001352a8 ffffffff 77ed4f05 kernel32!WaitForSingleObject (FPO: [2,0,0])
    00bdffb8 77ed4f05 001352a0 77f8e870 ffffffff 001352a0 advapi32!RegisterServiceCtrlHandlerA (FPO: [1,0,1])
    77ee2bdc 8b550000 68ff6aec 77f0ddc8 f0c71068 89645077 kernel32!lstrcmpiW (FPO: Non-FPO [2,8,3])
    ----> Raw Stack Dump <----
    00bdff28 d4 cf ee 77 90 03 00 00 - 00 00 00 00 00 00 00 00 ...w............
    00bdff38 d2 6a da 77 e8 2e ad 00 - 01 00 00 00 88 df db 77 .j.w...........w
    00bdff48 ac e0 db 77 dc 2b ee 77 - 5e 4f ed 77 90 03 00 00 ...w.+.w^O.w....
    00bdff58 ff ff ff ff 00 00 00 00 - d8 69 40 00 90 03 00 00 .........i@.....
    00bdff68 ff ff ff ff d2 6a da 77 - 00 00 00 00 3e 25 40 00 .....j.w....>%@.
    00bdff78 e8 2e ad 00 ff ff ff ff - 00 00 00 00 00 00 00 00 ................
    00bdff88 00 00 00 00 01 00 00 00 - 44 06 41 00 cf 03 00 00 ........D.A.....
    00bdff98 74 0b 41 00 70 e8 f8 77 - a0 52 13 00 ec ff bd 00 t.A.p..w.R......
    00bdffa8 a0 52 13 00 ac 8c da 77 - 01 00 00 00 a8 52 13 00 .R.....w.....R..
    00bdffb8 ff ff ff ff 05 4f ed 77 - a0 52 13 00 70 e8 f8 77 .....O.w.R..p..w
    00bdffc8 ff ff ff ff a0 52 13 00 - ff ff ff ff c4 ff bd 00 .....R..........
    00bdffd8 dc 4d f5 77 ff ff ff ff - 10 c7 f0 77 48 e2 f0 77 .M.w.......wH..w
    00bdffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 9e 8c da 77 ...............w
    00bdfff8 a0 52 13 00 00 00 00 00 - 03 00 00 00 18 7a 13 00 .R...........z..
    00be0008 10 00 be 00 00 00 00 00 - 18 00 be 00 00 00 00 00 ................
    00be0018 20 00 be 00 00 00 00 00 - 28 00 be 00 00 00 00 00 .......(.......
    00be0028 30 00 be 00 00 00 00 00 - 38 00 be 00 00 00 00 00 0.......8.......
    00be0038 40 00 be 00 00 00 00 00 - 48 00 be 00 00 00 00 00 @.......H.......
    00be0048 50 00 be 00 00 00 00 00 - 58 00 be 00 00 00 00 00 P.......X.......
    00be0058 60 00 be 00 00 00 00 00 - 68 00 be 00 00 00 00 00 `.......h.......
    State Dump for Thread Id 0x135
    eax=00000000 ebx=00000000 ecx=008a86f0 edx=00000000 esi=0000010c edi=189afe84
    eip=77f582db esp=189afe68 ebp=189afe8c iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtWaitForSingleObject
    77f582d0 b8c5000000 mov eax,0xc5
    77f582d5 8d542404 lea edx,[esp+0x4] ss:197fe86f=00000019
    77f582d9 cd2e int 2e
    77f582db c20c00 ret 0xc
    77f582de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    189afe64 77eecfd4 0000010c 00000000 189afe84 00000000 ntdll!NtWaitForSingleObject (FPO: [3,0,0])
    189afe8c 77ed4f5e 0000010c 000003e8 00000000 08170894 kernel32!WaitForSingleObjectEx (FPO: Non-FPO [3,3,3])
    189afe9c 08170894 0000010c 000003e8 008a15e0 00000001 kernel32!WaitForSingleObject (FPO: [2,0,0])
    189afee8 081ed3a3 00000001 000003e8 008a1510 008ab040 !JVM_FindSignal
    008ab040 00000000 00000000 00000000 00000000 008acf90 !JVM_RegisterUnsafeMethods
    0823703c 081ed120 081ed160 0806e710 0806e620 0806e620 !<nosymbols>
    0803a810 90909090 90909090 90909090 0424448b 7c8b5756 !JVM_RegisterUnsafeMethods
    State Dump for Thread Id 0x136
    eax=00000004 ebx=00000000 ecx=125bce20 edx=00000000 esi=000001c0 edi=00000000
    eip=77f582db esp=18aafbb4 ebp=18aafbd8 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f582d0 b8c5000000 mov eax,0xc5
    77f582d5 8d542404 lea edx,[esp+0x4] ss:198fe5bb=????????
    77f582d9 cd2e int 2e
    77f582db c20c00 ret 0xc
    77f582de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    18aafbb0 77eecfd4 000001c0 00000000 00000000 00d71254 ntdll!NtWaitForSingleObject (FPO: [3,0,0])
    18aafbd8 77ed4f5e 000001c0 ffffffff 00000000 08177e73 kernel32!WaitForSingleObjectEx (FPO: Non-FPO [3,3,3])
    18aafbe8 08177e73 000001c0 ffffffff 18aafc78 00000000 kernel32!WaitForSingleObject (FPO: [2,0,0])
    18aafc38 081be7b0 00000000 00000000 00000001 008ac5b0 !JVM_FindSignal
    008ac5b0 00000000 00000000 00000000 00000000 008ac950 !JVM_RegisterPerfMethods
    08236450 08126b20 081cfc10 0806e620 0806e710 0806e620 !<nosymbols>
    0803a810 90909090 90909090 90909090 0424448b 7c8b5756 !JVM_FindSignal
    ----> Raw Stack Dump <----
    18aafbb4 d4 cf ee 77 c0 01 00 00 - 00 00 00 00 00 00 00 00 ...w............
    18aafbc4 54 12 d7 00 b0 c5 8a 00 - 50 c5 8a 00 c2 2e ed 77 T.......P......w
    18aafbd4 c0 01 00 00 00 00 00 00 - 5e 4f ed 77 c0 01 00 00 ........^O.w....
    18aafbe4 ff ff ff ff 00 00 00 00 - 73 7e 17 08 c0 01 00 00 ........s~......
    18aafbf4 ff ff ff ff 78 fc aa 18 - 00 00 00 00 00 00 00 00 ....x...........
    18aafc04 00 00 00 00 ff ff ff ff - 00 00 00 00 29 31 86 14 ............)1..
    18aafc14 02 00 00 00 00 00 00 00 - b0 c5 8a 00 c0 01 00 00 ................
    18aafc24 00 00 00 00 80 fc aa 18 - 00 00 00 00 ac fc aa 18 ................
    18aafc34 ed 85 db 00 b0 c5 8a 00 - b0 e7 1b 08 00 00 00 00 ................
    18aafc44 00 00 00 00 01 00 00 00 - b0 c5 8a 00 e8 ca 5b 12 ..............[.
    18aafc54 b0 c5 8a 00 3b 3c 11 08 - 20 a8 8a 00 00 00 00 00 ....;<.. .......
    18aafc64 00 00 00 00 b0 c5 8a 00 - b0 c5 8a 00 20 44 81 14 ............ D..
    18aafc74 c8 43 81 14 ac fc aa 18 - 03 86 db 00 4c c6 8a 00 .C..........L...
    18aafc84 c4 fc aa 18 00 00 00 00 - 00 00 00 00 90 fc aa 18 ................
    18aafc94 00 00 00 00 c4 fc aa 18 - 58 73 85 14 00 00 00 00 ........Xs......
    18aafca4 c8 43 81 14 bc fc aa 18 - e4 fc aa 18 33 2d db 00 .C..........3-..
    18aafcb4 00 00 00 00 59 65 db 00 - 00 00 00 00 00 00 00 00 ....Ye..........
    18aafcc4 e8 ca 5b 12 c8 fc aa 18 - ba 43 81 14 ec fc aa 18 ..[......C......
    18aafcd4 58 73 85 14 00 00 00 00 - 60 43 81 14 ec fc aa 18 Xs......`C......
    18aafce4 14 fd aa 18 33 2d db 00 - e8 ca 5b 12 03 00 00 00 ....3-....[.....
    State Dump for Thread Id 0x137
    eax=00000004 ebx=00000000 ecx=125bce20 edx=00000000 esi=00000304 edi=00000000
    eip=77f582db esp=18bafb84 ebp=18bafba8 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f582d0 b8c5000000 mov eax,0xc5
    77f582d5 8d542404 lea edx,[esp+0x4] ss:199fe58b=00000900
    77f582d9 cd2e int 2e
    77f582db c20c00 ret 0xc
    77f582de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    18bafb80 77eecfd4 00000304 00000000 00000000 00d71274 ntdll!NtWaitForSingleObject (FPO: [3,0,0])
    18bafba8 77ed4f5e 00000304 ffffffff 00000000 08177e73 kernel32!WaitForSingleObjectEx (FPO: Non-FPO [3,3,3])
    18bafbb8 08177e73 00000304 ffffffff 18bafc48 00000000 kernel32!WaitForSingleObject (FPO: [2,0,0])
    18bafc08 081be7b0 00000000 00000000 00000001 008ac160 !JVM_FindSignal
    008ac160 00000000 00000000 00000000 00000000 008ac460 !JVM_RegisterPerfMethods
    08236450 08126b20 081cfc10 0806e620 0806e710 0806e620 !<nosymbols>
    0803a810 90909090 90909090 90909090 0424448b 7c8b5756 !JVM_FindSignal
    ----> Raw Stack Dump <----
    18bafb84 d4 cf ee 77 04 03 00 00 - 00 00 00 00 00 00 00 00 ...w............
    18bafb94 74 12 d7 00 60 c1 8a 00 - 30 c1 8a 00 c2 2e ed 77 t...`...0......w
    18bafba4 04 03 00 00 00 00 00 00 - 5e 4f ed 77 04 03 00 00 ........^O.w....
    18bafbb4 ff ff ff ff 00 00 00 00 - 73 7e 17 08 04 03 00 00 ........s~......
    18bafbc4 ff ff ff ff 48 fc ba 18 - 00 00 00 00 00 00 00 00 ....H...........
    18bafbd4 00 00 00 00 c0 da 8a 00 - 00 00 00 00 9c fb ba 18 ................
    18bafbe4 02 00 00 00 00 00 00 00 - 60 c1 8a 00 04 03 00 00 ........`.......
    18bafbf4 00 00 00 00 50 fc ba 18 - 00 00 00 00 7c fc ba 18 ....P.......|...
    18bafc04 ed 85 db 00 60 c1 8a 00 - b0 e7 1b 08 00 00 00 00 ....`...........
    18bafc14 00 00 00 00 01 00 00 00 - 60 c1 8a 00 18 ce 5b 12 ........`.....[.
    18bafc24 60 c1 8a 00 3b 3c 11 08 - 20 dc 8a 00 00 00 00 00 `...;<.. .......
    18bafc34 00 00 00 00 60 c1 8a 00 - 60 c1 8a 00 20 44 81 14 ....`...`... D..
    18bafc44 c8 43 81 14 7c fc ba 18 - 03 86 db 00 fc c1 8a 00 .C..|...........
    18bafc54 94 fc ba 18 00 00 00 00 - 00 00 00 00 60 fc ba 18 ............`...
    18bafc64 00 00 00 00 94 fc ba 18 - 58 73 85 14 00 00 00 00 ........Xs......
    18bafc74 c8 43 81 14 8c fc ba 18 - bc fc ba 18 33 2d db 00 .C..........3-..
    18bafc84 00 00 00 00 59 65 db 00 - 00 00 00 00 00 00 00 00 ....Ye..........
    18bafc94 18 ce 5b 12 03 00 00 00 - 18 ce 5b 12 98 fc ba 18 ..[.......[.....
    18bafca4 04 3c 86 14 d8 fc ba 18 - e0 3e 86 14 00 00 00 00 .<.......>......
    18bafcb4 80 3b 86 14 d0 fc ba 18 - f8 fc ba 18 0a 2e db 00 .;..............
    State Dump for Thread Id 0x138
    eax=7802a830 ebx=00000000 ecx=008af5f0 edx=00000000 esi=00000094 edi=00000000
    eip=77f582db esp=18cafeb8 ebp=18cafedc iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f582d0 b8c5000000 mov eax,0xc5
    77f582d5 8d542404 lea edx,[esp+0x4] ss:19afe8bf=000000ff
    77f582d9 cd2e int 2e
    77f582db c20c00 ret 0xc
    77f582de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    18cafeb4 77eecfd4 00000094 00000000 00000000 00000000 ntdll!NtWaitForSingleObject (FPO: [3,0,0])
    18cafedc 77ed4f5e 00000094 ffffffff 00000000 08170894 kernel32!WaitForSingleObjectEx (FPO: Non-FPO [3,3,3])
    18cafeec 08170894 00000094 ffffffff 7800139d 008afeb0 kernel32!WaitForSingleObject (FPO: [2,0,0])
    18caff38 081cf6e4 00000001 ffffffff 00000000 18caff84 !JVM_FindSignal
    78001d42 32a068ff 11687803 647800db 000000a1 89645000 !JVM_RegisterPerfMethods
    State Dump for Thread Id 0x139
    eax=0000000f ebx=00000000 ecx=010d8d29 edx=00000000 esi=0000015c edi=00000000
    eip=77f582db esp=18dafe24 ebp=18dafe48 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f582d0 b8c5000000 mov eax,0xc5
    77f582d5 8d542404 lea edx,[esp+0x4] ss:19bfe82b=26c89808
    77f582d9 cd2e int 2e
    77f582db c20c00 ret 0xc
    77f582de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    18dafe20 77eecfd4 0000015c 00000000 00000000 008b0710 ntdll!NtWaitForSingleObject (FPO: [3,0,0])
    18dafe48 77ed4f5e 0000015c ffffffff 00000000 0817091c kernel32!WaitForSingleObjectEx (FPO: Non-FPO [3,3,3])
    18dafe58 0817091c 0000015c ffffffff 008af220 008af5d0 kernel32!WaitForSingleObject (FPO: [2,0,0])
    18dafea4 0806f032 00000000 ffffffff 008af220 008a0dc0 !JVM_FindSignal
    00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>
    State Dump for Thread Id 0x13a
    eax=7ffad000 ebx=00000024 ecx=00000005 edx=28f40080 esi=28ef5e28 edi=19af5ec0
    eip=77eedbe3 esp=18eaf2bc ebp=77eedbdd iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: TlsGetValue
    77eedbdd 64a118000000 mov eax,fs:[00000018] fs:00000018=????????
    77eedbe3 8b4830 mov ecx,[eax+0x30] ds:80dfba06=????????
    77eedbe6 8b542404 mov edx,[esp+0x4] ss:19cfdcc3=26c89808
    77eedbea 8b4940 mov ecx,[ecx+0x40] ds:00e4ea0b=e006c0e0
    77eedbed 3911 cmp [ecx],edx ds:00000005=????????
    77eedbef 770e ja TlsGetValue+0x22 (77eedbff)
    77eedbf1 680d0000c0 push 0xc000000d
    77eedbf6 e8673bfeff call EnumResourceNamesW+0x37c (77ed1762)
    77eedbfb 33c0 xor eax,eax
    77eedbfd eb0e jmp TlsGetValue+0x30 (77eedc0d)
    77eedbff c7403400000000 mov dword ptr [eax+0x34],0x0 ds:80dfba06=????????
    77eedc06 8b8490100e0000 mov eax,[eax+edx*4+0xe10] ds:28f40e90=00000000
    77eedc0d c20400 ret 0x4
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    18eaf2b8 080c656f 00000005 00000024 18eaf308 00002460 kernel32!TlsGetValue (FPO: [1,0,0])
    77eedbdd 488b0000 24548b30 40498b04 0e771139 00000d68 !<nosymbols>
    ----> Raw Stack Dump <----
    18eaf2bc 6f 65 0c 08 05 00 00 00 - 24 00 00 00 08 f3 ea 18 oe......$.......
    18eaf2cc 60 24 00 00 f0 f3 ea 18 - ec 6a 0c 08 24 00 00 00 `$.......j..$...
    18eaf2dc 01 00 00 00 23 01 00 00 - 74 31 0c 08 fe ff 00 00 ....#...t1......
    18eaf2ec d4 f6 ea 18 60 24 00 00 - 00 00 00 00 f0 f3 ea 18 ....`$..........
    18eaf2fc 28 81 00 29 23 01 00 00 - 00 5e 0b 00 00 00 00 00 (..)#....^......
    18eaf30c 8f 17 00 00 05 00 00 00 - c0 5e af 19 18 00 00 00 .........^......
    18eaf31c d8 50 f6 19 32 00 00 00 - 28 5e ef 28 dc b5 04 08 .P..2...(^.(....
    18eaf32c 01 40 00 00 b8 c8 26 08 - d4 f6 ea 18 88 f3 ea 18 .@....&.........
    18eaf33c dd db ee 77 b0 3a e3 1a - 00 00 00 00 00 00 00 00 ...w.:..........
    18eaf34c 63 24 00 00 08 00 00 00 - a0 2a 17 1a 32 00 00 00 c$.......*..2...
    18eaf35c c0 54 f6 19 32 00 00 00 - b8 5f ef 28 28 11 00 00 .T..2...._.((...
    18eaf36c d4 f6 ea 18 6d b4 04 08 - 00 00 00 01 b8 c8 26 08 ....m.........&.
    18eaf37c d4 f6 ea 18 dd db ee 77 - 00 00 00 00 00 00 00 00 .......w........
    18eaf38c fd a8 04 08 00 00 00 00 - 24 fa ea 18 00 00 00 00 ........$.......
    18eaf39c c8 8f 20 1a b0 f3 ea 18 - 00 b4 2d 1d 08 b4 2d 1d .. .......-...-.
    18eaf3ac f4 b7 2d 1d 00 b4 2d 1d - 08 57 95 09 38 cc 95 09 ..-...-..W..8...
    18eaf3bc fc d6 95 09 74 ff ea 18 - 0c 00 00 00 24 fa ea 18 ....t.......$...
    18eaf3cc 10 10 2f 1b e8 84 5b 09 - 18 83 3e 09 48 5d 35 09 ../...[...>.H]5.
    18eaf3dc 08 25 2d 1b 38 f5 ea 18 - 40 f7 ea 18 22 31 00 00 .%-.8...@..."1..
    18eaf3ec b0 f3 ea 18 0d 00 00 00 - 24 fa ea 18 28 00 e4 28 ........$...(..(
    State Dump for Thread Id 0x13b
    eax=00000000 ebx=00000000 ecx=099c4b40 edx=0000edd5 esi=18faf354 edi=0000001b
    eip=080c6ad4 esp=18faf334 ebp=18faf3f0 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: <nosymbols>
    080c6ab3 8b4618 mov eax,[esi+0x18] ds:19dfdd5a=00000000
    080c6ab6 3bf8 cmp edi,eax
    080c6ab8 0f83d6000000 jnb 080c6b94
    080c6abe 8b4614 mov eax,[esi+0x14] ds:19dfdd5a=00000000
    080c6ac1 8b0cb8 mov ecx,[eax+edi*4] ds:0000001b=????????
    080c6ac4 81f998c82608 cmp ecx,0x826c898
    080c6aca 7420 jz 080c6aec
    080c6acc 894e0c mov [esi+0xc],ecx ds:19dfdd5a=00000000
    080c6acf 33c0 xor eax,eax
    080c6ad1 833900 cmp dword ptr [ecx],0x0 ds:099c4b40=00000000
    080c6ad4 7561 jnz 080c6b37
    080c6ad6 40 inc eax
    080c6ad7 83c104 add ecx,0x4
    080c6ada 83f808 cmp eax,0x8
    080c6add 72f2 jb 080c6ad1
    080c6adf 8b4e1c mov ecx,[esi+0x1c] ds:19dfdd5a=00000000
    080c6ae2 85c9 test ecx,ecx
    080c6ae4 7406 jz 080c6aec
    080c6ae6 57 push edi
    080c6ae7 e864faffff call 080c6550
    080c6aec 8b4618 mov eax,[esi+0x18] ds:19dfdd5a=00000000
    080c6aef 47 inc edi
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    18faf3f0 18fafa24 29050028 00000001 29170028 0000384e !<nosymbols>
    *----> Raw Stack Dump <----*
    18faf334 00 00 00 00 01 00 00 00 - cc 33 0c 08 f0 f3 fa 18 .........3......
    18faf344 c8 6d 1e 29 a0 6d 07 00 - 9c 15 00 00 04 00 00 00 .m.).m..........
    18faf354 00 00 00 00 a4 15 00 00 - 05 00 00 00 40 4b 9c 09 ............@K..
    18faf364 16 00 00 00 80 d9 30 09 - 39 00 00 00 e8 c0 0b 29 ......0.9......)
    18faf374 ee 2e 0c 08 01 00 00 00 - d4 f6 fa 18 00 00 00 00 ................
    18faf384 b8 c8 26 08 dd db ee 77 - 21 aa 04 08 00 00 00 00 ..&....w!.......
    18faf394 24 fa fa 18 00 00 00 00 - 28 f4 17 1a b0 f3 fa 18 $.......(.......
    18faf3a4 b0 c4 32 1d b8 c4 32 1d - a4 c8 32 1d b0 c4 32 1d ..2...2...2...2.
    18faf3b4 f8 57 a4 09 40 b1 a4 09 - ec d7 a4 09 74 ff fa 18 [email protected]...
    18faf3c4 0c 00 00 00 24 fa fa 18 - d0 e1 60 09 40 1b 68 09 ....$.....`[email protected].
    18faf3d4 20 55 76 09 c4 bf 76 09 - e0 3c 10 1a 38 f5 fa 18 Uv...v..<..8...
    18faf3e4 40 f7 fa 18 4e 38 00 00 - b0 f3 fa 18 0d 00 00 00 @...N8..........
    18faf3f4 24 fa fa 18 28 00 05 29 - 01 00 00 00 28 00 17 29 $...(..)....(..)
    18faf404 4e 38 00 00 b0 f3 fa 18 - b8 c4 32 1d 40 53 22 08 N8........2.@S".
    18faf414 0e 00 00 00 24 fa fa 18 - d4 f6 fa 18 5d 4f 00 00 ....$.......]O..
    18faf424 00 00 00 00 00 00 00 00 - 01 00 00 00 d4 f6 fa 18 ................
    18faf434 00 00 00 00 00 00 00 00 - d4 f4 fa 18 3c 2c 25 1a ............<,%.
    18faf444 00 00 00 00 d4 f6 fa 18 - 69 a4 04 08 70 0d 8a 00 ........i...p...
    18faf454 00 00 00 00 00 00 00 00 - 0c 00 00 00 95 d6 26 e8 ..............&.
    18faf464 0b 2e 11 3e f0 05 00 00 - db 02 00 00 1f 03 00 00 ...>............
    State Dump for Thread Id 0x13c
    eax=008b39b0 ebx=00000000 ecx=008a5010 edx=00000000 esi=190afeb8 edi=00000000
    eip=77f5791f esp=190afea4 ebp=190afec0 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtDelayExecution
    77f57914 b827000000 mov eax,0x27
    77f57919 8d542404 lea edx,[esp+0x4] ss:19efe8ab=00004f00
    77f5791d cd2e int 2e
    77f5791f c20800 ret 0x8
    77f57922 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    190afea0 77eed227 00000000 190afeb8 008b3040 00000032 ntdll!NtDelayExecution (FPO: [2,0,0])
    190afec0 77eed1f0 00000032 00000000 0817d087 00000032 kernel32!SleepEx (FPO: Non-FPO [2,3,2])
    190afecc 0817d087 00000032 00000032 00000000 008b3900 kernel32!Sleep (FPO: [1,0,0])
    190aff00 081cf47b 008b3900 00000032 008b3040 00000000 !JVM_FindSignal
    00000000 00000000 00000000 00000000 00000000 00000000 !JVM_RegisterPerfMethods
    State Dump for Thread Id 0x13d
    eax=191af53c ebx=775fb100 ecx=001304d0 edx=00000000 esi=0013df48 edi=0000096c
    eip=77f582db esp=191af2f0 ebp=191af344 iopl=0 nv up ei ng nz ac pe cy
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000293
    function: NtWaitForSingleObject
    77f582d0 b8c5000000 mov eax,0xc5
    77f582d5 8d542404 lea edx,[esp+0x4] ss:19ffdcf7=26c89808
    77f582d9 cd2e int 2e
    77f582db c20c00 ret 0xc
    77f582de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    191af2ec 775f89fa 0000096c 00000001 191af31c 0013df64 ntdll!NtWaitForSingleObject (FPO: [3,0,0])
    191af344 775f1202 0000096c 000008c0 00000002 00000004 msafd!<nosymbols> (FPO: Non-FPO [4,15,3])
    191af7ac 7764c1f3 000008c0 191af81c 191af82c 00000000 msafd!<nosymbols> (FPO: Non-FPO [6,274,3])
    191af7e4 7764c17e 000008c0 191af81c 191af82c 00000000 ws2_32!WSAAccept (FPO: Non-FPO [5,4,3])
    191af7fc 193b44a6 000008c0 191af81c 191af82c 008b6600 ws2_32!accept (FPO: [3,0,0])
    191af81c 08035288 00000014 191af7e4 00000010 191af860 !Java_java_net_PlainSocketImpl_socketAccept
    00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>
    ----> Raw Stack Dump <----
    191af2f0 fa 89 5f 77 6c 09 00 00 - 01 00 00 00 1c f3 1a 19 .._wl...........
    191af300 64 df 13 00 4c df 13 00 - 1a 00 00 00 c0 65 8d 78 d...L........e.x
    191af310 96 ba c6 01 ff ff ff ff - ff ff ff 7f ff ff ff ff ................
    191af320 ff ff ff 7f 00 00 00 00 - 80 c3 13 00 ad 1f 63 77 ..............cw
    191af330 d8 11 5f 77 c0 08 00 00 - 00 00 00 00 00 00 00 00 .._w............
    191af340 00 00 00 00 ac f7 1a 19 - 02 12 5f 77 6c 09 00 00 .........._wl...
    191af350 c0 08 00 00 02 00 00 00 - 04 00 00 00 00 00 00 00 ................
    191af360 28 e0 13 00 50 c0 13 00 - 60 7c 8b 00 70 7c 8b 00 (...P...`|..p|..
    191af370 74 7c 8b 00 80 7c 8b 00 - 00 00 00 00 00 66 8b 00 t|...|.......f..
    191af380 60 7c 8b 00 00 66 8b 00 - 54 7c 8b 00 f4 7f 8b 00 `|...f..T|......
    191af390 e0 65 8b 00 b0 6b 8b 00 - cc 6b 8b 00 a4 6f 8b 00 .e...k...k...o..
    191af3a0 3d ca 14 08 d4 f5 1a 19 - 74 7c 8b 00 60 7c 8b 00 =.......t|..`|..
    191af3b0 54 7c 8b 00 70 7c 8b 00 - 01 00 00 00 80 7c 8b 00 T|..p|.......|..
    191af3c0 00 66 8b 00 d0 e3 98 14 - 74 7c 8b 00 04 d7 14 08 .f......t|......
    191af3d0 d4 f5 1a 19 54 7c 8b 00 - 70 7c 8b 00 60 7c 8b 00 ....T|..p|..`|..
    191af3e0 64 7c 8b 00 68 7c 8b 00 - 6c 7c 8b 00 01 00 00 00 d|..h|..l|......
    191af3f0 24 f4 1a 19 8c 8f e8 00 - 59 f9 f7 77 23 00 00 00 $.......Y..w#...
    191af400 5c f4 1a 19 70 f4 1a 19 - 7a a1 83 14 98 1d 5d 12 \...p...z.....].
    191af410 e8 fb 1a 16 0c f7 1a 19 - 01 00 00 00 83 7d de 00 .............}..
    191af420 5c f4 1a 19 70 f4 1a 19 - 54 47 f5 77 34 f4 1a 19 \...p...TG.w4...
    State Dump for Thr

    user4815182 ,
    You should start a new thread. The thread you added to was posted in 2007.
    Also, what I would recommend is that you go to http://java.sun.com/webapps/bugreport/crash.jsp and follow the steps there, adding flags etc, to help identify or even solve the issue you are seeing.
    The initial post indicated that they are using 1.4.2, which is super old. Bugs are fixed in releases that have higher numbers. I recommend that you run, or at least try, to run with the latest 1.7 release. The downloads can be found here: http://www.oracle.com/technetwork/java/javase/downloads/index.html
    If you you are convinced that you need 1.4.2, or there are other issues seen with 1.7, a more recent 1.4.2 release can be found in the archive. Please note that security vulnerabilities are fixed with each release. As 1.4.2 has reached the End of Public Releases, there has not been a new public release in a long time. Current 1.4.2 releases with vulnerabilities fixes can be obtained through a support contract http://www.oracle.com/us/technologies/java/standard-edition/support/overview/index.html.
    That said, you can still access the Download Archive: http://www.oracle.com/technetwork/java/archive-139210.html .
    -Roger

  • JVM 1.4.2 crash "access violation" Tomcat

    Hi
    We're getting nasty crashes with JVM 1.4.2_03 (other versions not yet been able to test) and cannot seem to find any log file with more information. However, I do have a DrWatson log which states among other things "access violation".
    Situation: We're testing a webapplication on Tomcat (runs as a Windows service (Tomcat.exe) ). During testing the Tomcat-service suddenly ends, the Windows eventlog logs states something like: "...service ended unexpectedly..."
    Environment: Tomcat 4.1.29, JDK 1.4.2_03, Windows 2000ProSP4, bi-processor Xeon machine.
    While analyzing the DrWatson log file, I can always find the same important (I think) information in the same order:
    - function: NtReadFile
    - a bit further on: function: NtWaitForMultipleObjects
    - function: NtWaitForSingleObject
    - etc..
    Other snippets I can also find every time are texts like these, they appear in the so called "Stack Back Trace"-sections of the drwtsn32.log:
    !JVM_RegisterUnsafeMethods,
    !JVM_RegisterPerfMethods,
    ntdll!NtDelayExecution,
    kernel32!Sleep,
    !JVM_Sleep,
    msafd!WSPSetSockOpt,
    ws2_32!WSAAccept,
    ws2_32!accept,
    ws2_32!recv,
    !Java_java_net_SocketInputStream_socketRead0.
    If needed I can post the complete drwtsn32.log file, I only left it out because it's a bad practice to dump long texts. So if you want to take a look, please don't hesitate to ask !
    The problem only seems to occur when the servermachine is completely left alone (and not logged in or in locked state) Additionally, it usually occurs after between 30-60 minutes or so. When I keep monitoring (logged in) the machine while the tests are running the crash doesn't seem to occur ?! This makes me think it could be an issue with power-saving that kicks in, like e.g. with the network-adaptor ?
    If we don't use JNI, and "access violation"s are stated, does this mean it's a JVM-issue or ... ? Or is it more likely it's an issue of this Tomcat.exe ?
    On a sidenote, does anyone know why a logfile might not be produced, and if there is anything i could try to make the jvm produce some intelligable output upon crashing?
    Kind regards,
    David

    Hi again,
    First of all thanks for the valuable help so far !
    As I'm still searching an anwser for the problem, I noticed the drwtsn32.log file also (sometimes) mentions HotSpot, this is a line from my drwtsn32.log file:
    mov ecx,[gHotSpotVMLongConstantEntryValueOffset+0x13f48[/i]
    Now, I'm not an expert on HotSpot, but I too know there have been numerous problems reported before with this technology.
    Ramesh, it sure looks like your hypothesis about the runtime compilation corresponds to this problem a lot.
    Additionally, I must also mention the fact that the problem only seems to occur during stress-tests (concurrency-problem?) and is NOT reproducable reliably. All of this makes me think even more that it's a JVM problem of some kind, what is your (anyone) opinion about this ?
    Again, thanks for your support, it sure helps a lot !
    Kind regards,
    David

Maybe you are looking for

  • Vendor ageing

    Hi Team, The requirment called vendor ageing report. when we using the T.code F.46 for company code level in standard sap 0-30   31-60   61-90   >90. So our requirement is 0-30  30-45 45-60 60-90  >90. So this is can able to change the days. Regards,

  • HT204053 i need to know how to separate different devices on the same itunes account

    I need to kow how to seperate different devices on the same itunes account

  • MBP doesn't save files, then crashes - Illustrator

    Hi...I'm in need of some direction on what to do here. My Illustrator CS2 program on my first generation MBP decided to crash and not register any of the saves I made before the crash. I had been hitting "Save" in Illustrator for over 2 hours, and wh

  • Subsequent debit function for MRKO settlement

    Hi, We have one business requirement for one of our client, The business requirement is ERS - Automatic invoice settlement  is paid for the amount of Rs 150 for the  qty of 10. After the automatic invoice settlement via using t.coe MRRL, We can able

  • Randomly sorting dimension values in 11g

    Hi, I know how (for a text dimension) to easily allow users to sort in ascending or descending order. I also know how to enforce a "default" sort order in the logical layer using a numerical column, etc. But I have Brio users that are used to picking