Access Violation 005CD8DC

Hi,
after stopping debugging of a servlet I get an access violation:
005CD8DC in modul jdeveloper.exe Read of address 00000044
I have to restart Jdev, to debug again.
I use JDev 3.1.1.2, NT4 SP6, German
I have installed tomcat on the same machine (but not running), there is also a JDK 1.22 installed.
Whats`s wrong ?
Klaus
null

Again, can someone from Oracle/JDev please reply to messages about this problem? There are many many messages re this problem but no answers from Oracle. Everytime I stop a debugging process I get an access violation. I then can't debug again because JDev thinks a debug process is still running. This bug existed 6 months ago and is still in 3.1.1.2 Build 767. Is it going to be fixed???
I have WinNT SP4 with 256M RAM and nothing else running on the machine.

Similar Messages

  • TFTP Read Access Violation in Snoop while doing network boot

    Hi
    I have setup my Oracle dhcp server and AI on oracle 11.1.
    configure the /etc/ethers and /etc/hosts file as well.
    pntadm and dhtam is also setup with macro
    I deplou solaris 11.1 AI sparc image as my service
    create-client and manifest is also associated as per client machine Mac interface
    On client machine
    I created the devalias entry for my Nic interface
    did now
    boot net:dhcp
    Requesting Internet Address for 0:e:1E:8:bf:f8
    Requesting Internet Address for 0:e:1E:8:bf:f8
    Time out waiting for tftp reply
    On server machine in snoop its showing
    tftp read "01010F19" (octet)
    TFTP Error : Access violation
    I check tftp service is running on server as below
    /usr/sbin/in.tftpd -s /etc/netboot
    Please help me i am not able to figure out whats the problem
    Thanks

    But even on dhcp it doesn't work without setting network-boot-arguments on OBP
    If i don't feed any entry in /etc/ethers and /etc/hosts
    whenvever I do on client side boot net:dhcp it always give rarp messages in the snoop on server.
    What can be the reason.

  • How can I repair "an access violation has occurred"

    I found this message after you install the update of an audio software (Pro Tools 8.0.5) and after trying to listen to an audio recording "an access violation has occurred." In a later appeared to me the message "/ System / Library / Extensions / CDSDAAudioCaptureSupport.Kext". I removed the software completely reinstalled all audio and I havethe previous version but to no avail. I also reinstalled operating system from OS 10.6.2 Leopard up to 10.6.8 but still nothing. The message reappears when I use the audio software is not allowing me to listen to the audio (only with ProTools, while iTunes feature regularly. I do not know what to do yet.

    Linc Davis wrote:
    It's the PACE DRM rootkit that's installed along with the Pro Tools application. Its purpose is to cripple your computer so that you can only do what the developer chooses to let you do. If you have a problem with that, you'll have to take it up with DigiDesign, or get rid of their product.
    Most absurd response to a question I have ever read...
    DRM protects composers life myself from theft. I just hate it when people steal my stuff. Don't you?
    I've  been a PT professional user for well over a decade. My computer is in no way "crippled". I can do what I want with it and what I want with that software. I run PT with iTunes open all day long with no issue. I can import audio from my iTunes library into PT with no issue. If the audio you are trying to import is protected (from being stolen and remixed etc.) than no, you can't import it into PT. I'm pretty sure that most law abiding citizens would agree that having thier own personal livelyhood protected under law would be a good thing. But for some reason, this society thinks that musicians and other creative professionals don't deserve the same level of protection and don't need to feed thier families...

  • Error Occuring While Processing Data With DIAdem 8.1Excepti​on EAccessVio​lation in module ntdll.dll at 000111DE. Access violation at address 7C9111DE in module 'ntdll.dll​". Read address 37363430

    Hello,
    We are having an issue running Diadem 8.1 on a new HP XW 9400 with Windows XP SP2. 3 errors have been occuring with frequent crashes, they are:
    1) "1Exception EAccessViolation in module ntdll.dll at 000111DE. Access violation at address 7C9111DE in module 'ntdll.dll". Read address 37363430.
    2) The instruction at "0x7c9111de" referenced memory at "0x352e302d". The memory could not be "read".
     3) ---Error---   DIAdem
    Error in Autosequence - processing in line: 74 (IARV_VAR_GET)
    Runtime Error while executing command "Iarv2Txt$ := FR(T9,L1)"
    Error type: ACCESS VIOLATION
    Error address: 000101DE
    Module name:ntdll.dll
    We are using the same scripts and version 8.1 on a variety of Dell desktop computers (W2K and XP SP2) without any issue, looking for suggestions as this affects no other software on the HP XW 9400 other than DIAdem. Appreciate any suggestions.
    Message Edited by swillh on 06-25-2007 08:55 AM

    Christian,
    I will answer your questions in the text below. Thanks for your help.
    Hi swillh,
    I also would like to help you.
    Unfortunately, The reported access violation in the central Windows ntdll.dll is very unspecific.
    May be the following questions will help you to provide me more info.
    1. You mentioned that the aut's and - I think - also the accessed text file reside on a server.
    Is there a stable network connection?
    The server can sometimes be a little slow but the connection is good. This computer is using the same connection that the prior computer utilized without issue.
    Are the files accessed by multiple clients simultaneously?
    It is possible that more than one computer can be accessing the same file, but again, this has never been an issue. We are reading the files only, not writing to them.
    The processing routines we are running have used for over 5 years without any issues until adding this computer.
    Is the text file read by one client while another client is writing the same file?
    No, files are "read only"
    2. Have you already tested opening the file with the FileOpen command before calling FR?
    Yes
    Do you see any chance to convert the aut to a vbs file? This gives you more alternatives in accessing text files.
    3. What do you mean with "processing ATD's with 30 or more channels of data"? Where is the relation between ATD files and data channels?
    Processing Crash Dummy data with file sets low in channel count (15 channels) result in successful processing without any crashes or access errors.  When processing dummies with more than 20 channels we sometimes encounter these issues. The higher channel count may be the only common factor I can find in these faults.
    Steve
    Message Edited by swillh on 07-09-2007 08:44 AM

  • Error while executing "" command Error type ACCESS VIOLATION Error Address: 0006898E Module name:gfsdesk.DLL

    Hi All,
    I'm using diadem from .net Program. While on the run I'm getting the following error.
    Error While executing "" Command
    Error type ACCESS VIOLATION
    Error Address: 0006898E
    Module name:gfsdesk.DLL
    Anyone have any idea why this is happening?
    regards,
    Swaroop

    Hi Swaroop,
    It would be helpful to better understand what your code really does. The information that you called DIAdem from your enviroenment is not yet sufficient to understand what the problem might be.
    Andreas

  • Access Violation error with Diadem 2011

    I've started using Diadem 2011, and have run into an Access Violation error when loading some of my existing reports.  I've created a simple example which shows what's happening:
    I've created a simple Bar plot:
    If I change the left hand bar to be "Filled" instead of "Right Diagonal", Diadem throws up an access violation error.  I've attached the TDM and TDR files used to create the graph.  The error in the log file is:
    139  Error while executing "" command
         Error type: ACCESS VIOLATION
         Error address: 0004F5E5
         Module nameIAdem.exe
    Diadem: 11.0.3f4563 TDM
    USI: 1.9.0f4551
    DataFinder: 3.0.0f4556
    (By the way, it would be great to be able to copy those version details directly from the About page!)
    Attachments:
    Data.zip ‏7 KB

    I've tried this as administrator, and have exactly the same issues, so it doesn't appear to be a permissions problem.  I've uninstalled and reinstalled DIAdem and everything's the same.
    Here's another ZIP file with hopefully all of the required files.  I've created the data files from scrathc several times, and see the same problem.  One other thing I've just noticed is that it only occurs when filling the bars with the color Black, not blue or red or anything else.
    Attachments:
    Data.zip ‏9 KB

  • Access violation error with 1.4.0

    Our client/server application (RMI) ran fine in 1.3.1. When we compiled and deployed with 1.4.0, an error of "access violation" were thrown by Windows NT or Windown 2000 at run time. Stack trace posted as below. Anyone has any ideas on the cause of it. Thanks you very much.
    Application exception occurred:
    App: (pid=346)
    When: 6/18/2002 @ 17:18:40.166
    Exception number: c0000005 (access violation)
    ----> System Information <----
    Computer Name: PAUL
    User Name: paul
    Number of Processors: 1
    Processor Type: x86 Family 6 Model 4 Stepping 2
    Windows Version: 4.0
    Current Build: 1381
    Service Pack: 6
    Current Type: Uniprocessor Free
    Registered Organization: Quarry Technologies
    Registered Owner: Quarry Technologies
    ----> Task List <----
    0 Idle.exe
    2 System.exe
    20 SMSS.exe
    24 CSRSS.exe
    34 winlogon.exe
    40 SERVICES.exe
    43 LSASS.exe
    68 SPOOLSS.exe
    81 defwatch.exe
    86 inetd32.exe
    93 MGABG.exe
    94 mgasc.exe
    97 mgactrl.exe
    99 rtvscan.exe
    45 rtsserv.exe
    112 RPCSS.exe
    117 portserv.exe
    127 wtxregds.exe
    130 WinVNC.exe
    137 PSTORES.exe
    140 mstask.exe
    144 NOPDB.exe
    200 NDDEAGNT.exe
    122 explorer.exe
    186 systray.exe
    187 mgaqdesk.exe
    44 vptray.exe
    113 point32.exe
    91 realplay.exe
    209 winampa.exe
    211 loadqm.exe
    213 aim.exe
    215 msmsgs.exe
    218 wftpd32.exe
    192 OSA.exe
    238 esserver.exe
    240 vpexrt.exe
    241 CMD.exe
    63 vncviewer.exe
    255 JBuilder.exe
    277 DDHELP.exe
    274 CMD.exe
    287 CMD.exe
    293 SYSLOGD.exe
    313 SYSLOGD.exe
    270 P4Win.exe
    310 javaw.exe
    346 javaw.exe
    443 javaw.exe
    433 javaw.exe
    354 DRWTSN32.exe
    0 _Total.exe
    (00400000 - 00406000)
    (77f60000 - 77fbe000) dll\ntdll.dbg
    (77dc0000 - 77dff000) dll\advapi32.dbg
    (77f00000 - 77f5e000) dll\kernel32.dbg
    (77e70000 - 77ec5000) dll\user32.dbg
    (77ed0000 - 77efc000) dll\gdi32.dbg
    (77e10000 - 77e67000) dll\rpcrt4.dbg
    (78000000 - 78046000)
    (6d330000 - 6d330000)
    (77fd0000 - 77ffa000) dll\winmm.dbg
    (6bd00000 - 6bd14000) K:\DDK\lib\i386\free\cm-pci.dll
    (6d1d0000 - 6d1d7000)
    (6d300000 - 6d30d000)
    (6d210000 - 6d228000)
    (6d320000 - 6d32d000)
    (6d2d0000 - 6d2dd000)
    (776d0000 - 776d8000) dll\wsock32.dbg
    (776b0000 - 776c4000) dll\ws2_32.dbg
    (776a0000 - 776a7000) dll\ws2help.dbg
    (74ff0000 - 74ffe000) dll\rnr20.dbg
    (77bf0000 - 77bf7000) dll\rpcltc1.dbg
    (77660000 - 7766f000) dll\msafd.dbg
    (77690000 - 77699000) dll\wshtcpip.dbg
    (6d2f0000 - 6d2f5000)
    (6d000000 - 6d0f6000)
    (77c00000 - 77c18000) drv\winspool.dbg
    (76ab0000 - 76ab5000) dll\imm32.dbg
    (77b20000 - 77bd7000) dll\ole32.dbg
    (6d180000 - 6d1d0000)
    State Dump for Thread Id 0x18b
    eax=6d3fb8cc ebx=00000000 ecx=00762700 edx=00000000 esi=0000012c edi=00000000
    eip=77f682db esp=0006fc10 ebp=0006fc34 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:00f6e617=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    0006fc34 77f04f37 0000012c ffffffff 00000000 6d38b719 ntdll!NtWaitForSingleObject
    0006fc7c 6d3b14c0 00000000 ffffffff 0076219c 007e0330 kernel32!WaitForSingleObject
    ----> Raw Stack Dump <----
    0006fc10 a0 cc f1 77 2c 01 00 00 - 00 00 00 00 00 00 00 00 ...w,...........
    0006fc20 50 05 7e 00 10 2f 76 00 - 30 03 7e 00 00 30 00 00 P.~../v.0.~..0..
    0006fc30 04 01 00 00 7c fc 06 00 - 37 4f f0 77 2c 01 00 00 ....|...7O.w,...
    0006fc40 ff ff ff ff 00 00 00 00 - 19 b7 38 6d 2c 01 00 00 ..........8m,...
    0006fc50 ff ff ff ff 9c 21 76 00 - 10 2f 76 00 a0 21 76 00 .....!v../v..!v.
    0006fc60 00 00 00 00 02 00 00 00 - 00 00 00 00 30 03 7e 00 ............0.~.
    0006fc70 30 03 7e 00 10 2f 76 00 - 01 00 00 00 c0 fc 06 00 0.~../v.........
    0006fc80 c0 14 3b 6d 00 00 00 00 - ff ff ff ff 9c 21 76 00 ..;m.........!v.
    0006fc90 30 03 7e 00 30 03 7e 00 - 00 00 00 00 30 03 7e 00 0.~.0.~.....0.~.
    0006fca0 d0 fc 06 00 05 86 36 6d - 5c 05 41 6d d8 fc 06 00 ......6m\.Am....
    0006fcb0 00 00 00 00 00 00 00 00 - 75 85 36 6d 30 03 7e 00 ........u.6m0.~.
    0006fcc0 d0 fc 06 00 b7 85 36 6d - 50 9c 77 00 30 03 7e 00 ......6mP.w.0.~.
    0006fcd0 14 ff 06 00 d2 14 40 00 - bc 03 7e 00 56 00 00 00 ......@...~.V...
    0006fce0 10 28 07 00 00 00 00 00 - 43 3a 5c 6a 32 73 64 6b .(......C:\j2sdk
    0006fcf0 31 2e 34 2e 30 5c 6a 72 - 65 00 6a 61 76 61 77 2e 1.4.0\jre.javaw.
    0006fd00 65 78 65 00 12 00 00 00 - a0 fe 06 00 00 e0 fd 7f exe.............
    0006fd10 00 00 00 00 a9 a0 f6 77 - 9c fe 06 00 00 00 00 80 .......w........
    0006fd20 70 fe 06 00 00 e0 fd 7f - 00 f0 fd 7f 00 00 00 00 p...............
    0006fd30 5c 00 52 00 65 00 67 00 - 69 00 73 00 74 00 72 00 \.R.e.g.i.s.t.r.
    0006fd40 79 00 5c 00 4d 00 61 00 - 63 00 68 00 69 00 6e 00 y.\.M.a.c.h.i.n.
    State Dump for Thread Id 0x156
    eax=02c29d90 ebx=007648d0 ecx=02c29d90 edx=00000009 esi=02c29d90 edi=26dbfd64
    eip=6d3318d5 esp=26dbfc6c ebp=26dbfc88 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: <nosymbols>
    6d3318c0 8d4df0 lea ecx,[ebp-0x10] ss:27cbe68e=????????
    6d3318c3 e875000000 call 6d33193d
    6d3318c8 5f pop edi
    6d3318c9 5e pop esi
    6d3318ca c9 leave
    6d3318cb c3 ret
    6d3318cc 56 push esi
    6d3318cd 8bf1 mov esi,ecx
    6d3318cf 8b5604 mov edx,[esi+0x4] ds:03b28796=????????
    6d3318d2 83c208 add edx,0x8
    FAULT ->6d3318d5 8b4210 mov eax,[edx+0x10] ds:00efea0f=????????
    6d3318d8 85c0 test eax,eax
    6d3318da 7f25 jg 6d331901
    6d3318dc 7d1b jge 6d3318f9
    6d3318de 83c9ff or ecx,0xff
    6d3318e1 6a04 push 0x4
    6d3318e3 2bc8 sub ecx,eax
    6d3318e5 8b4608 mov eax,[esi+0x8] ds:03b28796=????????
    6d3318e8 d3e0 shl eax,cl
    6d3318ea 8b4a4c mov ecx,[edx+0x4c] ds:00efea0f=????????
    6d3318ed 8d440807 lea eax,[eax+ecx+0x7] ds:03b28797=????????
    6d3318f1 59 pop ecx
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26dbfc88 6d34d03a 02c29d90 02c37c48 22fc8df4 02c37c48 <nosymbols>
    State Dump for Thread Id 0x160
    eax=00000004 ebx=00000000 ecx=052c2748 edx=00000000 esi=00000320 edi=00000000
    eip=77f682db esp=26dffc10 ebp=26dffc34 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27cfe617=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26dffc34 77f04f37 00000320 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    26dffc7c 6d39ead0 00000000 00000000 00000001 00767d30 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x11a
    eax=00000004 ebx=00000000 ecx=052c2a60 edx=00000000 esi=00000430 edi=00000000
    eip=77f682db esp=26e3fbd4 ebp=26e3fbf8 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27d3e5db=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26e3fbf8 77f04f37 00000430 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    26e3fc40 6d39ead0 00000000 00000000 00000001 007670b0 kernel32!WaitForSingleObject
    ----> Raw Stack Dump <----
    26e3fbd4 a0 cc f1 77 30 04 00 00 - 00 00 00 00 00 00 00 00 ...w0...........
    26e3fbe4 b0 70 76 00 4c b3 75 00 - 10 87 76 00 30 04 00 00 .pv.L.u...v.0...
    26e3fbf4 2a 14 39 6d 40 fc e3 26 - 37 4f f0 77 30 04 00 00 *.9m@..&7O.w0...
    26e3fc04 ff ff ff ff 00 00 00 00 - fe d2 38 6d 30 04 00 00 ..........8m0...
    26e3fc14 ff ff ff ff 00 00 00 00 - 40 27 2c 05 b0 70 76 00 ........@',..pv.
    26e3fc24 00 00 00 00 b0 70 76 00 - 30 04 00 00 00 00 00 00 .....pv.0.......
    26e3fc34 f4 8f 76 00 02 00 00 00 - 00 00 00 00 64 fc e3 26 ..v.........d..&
    26e3fc44 d0 ea 39 6d 00 00 00 00 - 00 00 00 00 01 00 00 00 ..9m............
    26e3fc54 b0 70 76 00 40 27 2c 05 - b0 70 76 00 70 3c b3 22 .pv.@',..pv.p<."
    26e3fc64 84 fc e3 26 aa e7 36 6d - 00 88 76 00 00 00 00 00 ...&..6m..v.....
    26e3fc74 00 00 00 00 b0 70 76 00 - b0 70 76 00 ac 3c b3 22 .....pv..pv..<."
    26e3fc84 b8 fc e3 26 0d 96 ab 00 - b0 70 76 00 d0 fc e3 26 ...&.....pv....&
    26e3fc94 00 00 00 00 00 00 00 00 - 9c fc e3 26 00 00 00 00 ...........&....
    26e3fca4 d0 fc e3 26 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 ...&.R."....p<."
    26e3fcb4 c8 fc e3 26 f8 fc e3 26 - 9f 2d ab 00 00 00 00 00 ...&...&.-......
    26e3fcc4 51 76 ab 00 00 00 00 00 - 00 00 00 00 40 27 2c 05 Qv..........@',.
    26e3fcd4 03 00 00 00 40 27 2c 05 - d4 fc e3 26 34 0a b8 22 ....@',....&4.."
    26e3fce4 20 fd e3 26 78 0c b8 22 - 00 00 00 00 c8 09 b8 22 ..&x.."......."
    26e3fcf4 18 fd e3 26 40 fd e3 26 - 76 2e ab 00 00 00 00 00 ...&@..&v.......
    26e3fd04 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1ca
    eax=00000000 ebx=00000000 ecx=00000001 edx=00000000 esi=26e7ff28 edi=00000000
    eip=77f6791f esp=26e7ff14 ebp=26e7ff30 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtDelayExecution
    77f67914 b827000000 mov eax,0x27
    77f67919 8d542404 lea edx,[esp+0x4] ss:27d7e91b=????????
    77f6791d cd2e int 2e
    77f6791f c20800 ret 0x8
    77f67922 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26e7ff30 77f1cebe 0000000a 00000000 6d39138c 0000000a ntdll!NtDelayExecution
    26e7ff5c 6d3af3f5 0076a380 0000000a 00000000 00000000 kernel32!Sleep
    State Dump for Thread Id 0x1c8
    eax=78002432 ebx=00000000 ecx=6d38ac38 edx=00000000 esi=00000120 edi=00000000
    eip=77f682db esp=26ebfef4 ebp=26ebff18 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27dbe8fb=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26ebff18 77f04f37 00000120 ffffffff 00000000 6d38b6bf ntdll!NtWaitForSingleObject
    26ebff60 6d3af53e 00000001 ffffffff 22b40f78 0076a210 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x15e
    eax=78002432 ebx=00000000 ecx=0006fa28 edx=00000000 esi=0000069c edi=00000000
    eip=77f682db esp=26effe3c ebp=26effe60 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27dfe843=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26effe60 77f04f37 0000069c ffffffff 00000000 6d390d49 ntdll!NtWaitForSingleObject
    26effea0 6d390d8d 00000001 6d38e927 0076b370 0076b2c0 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x1c4
    eax=00000001 ebx=00000000 ecx=26f3fc28 edx=00000000 esi=000001f4 edi=00000000
    eip=77f682db esp=26f3fe80 ebp=26f3fea4 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:27e3e887=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    26f3fea4 77f04f37 000001f4 ffffffff 00000000 6d38b719 ntdll!NtWaitForSingleObject
    26f3feec 6d3c1f67 00000000 ffffffff 0076b190 01e37000 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    26f3fe80 a0 cc f1 77 f4 01 00 00 - 00 00 00 00 00 00 00 00 ...w............
    26f3fe90 10 c3 76 00 50 29 76 00 - 30 b0 76 00 30 b0 76 00 ..v.P)v.0.v.0.v.
    26f3fea0 e0 c3 76 00 ec fe f3 26 - 37 4f f0 77 f4 01 00 00 ..v....&7O.w....
    26f3feb0 ff ff ff ff 00 00 00 00 - 19 b7 38 6d f4 01 00 00 ..........8m....
    26f3fec0 ff ff ff ff 90 b1 76 00 - 90 b1 76 00 50 29 76 00 ......v...v.P)v.
    26f3fed0 00 00 00 00 02 00 00 00 - cc 03 00 00 30 b0 76 00 ............0.v.
    26f3fee0 30 b0 76 00 50 29 76 00 - 01 00 00 00 00 00 00 00 0.v.P)v.........
    26f3fef0 67 1f 3c 6d 00 00 00 00 - ff ff ff ff 90 b1 76 00 g.<m..........v.
    26f3ff00 00 70 e3 01 40 ff f3 26 - 00 00 00 00 46 29 3c 6d .p..@..&....F)<m
    26f3ff10 e0 b0 76 00 30 b0 76 00 - 80 c2 76 00 30 b0 76 00 ..v.0.v...v.0.v.
    26f3ff20 e0 c3 76 00 00 d8 76 00 - 08 d8 76 00 f4 db 76 00 ..v...v...v...v.
    26f3ff30 54 ff f3 26 30 b0 76 00 - 30 b0 76 00 08 d8 76 00 T..&0.v.0.v...v.
    26f3ff40 6c ff f3 26 02 f9 3a 6d - 30 b0 76 00 30 b0 76 00 l..&..:m0.v.0.v.
    26f3ff50 30 b0 76 00 30 b0 76 00 - e0 c3 76 00 00 d8 76 00 0.v.0.v...v...v.
    26f3ff60 08 d8 76 00 f4 db 76 00 - c0 c3 76 00 84 ff f3 26 ..v...v...v....&
    26f3ff70 d2 f8 3a 6d 18 88 b5 02 - 30 b0 76 00 cb fe 38 6d ..:m....0.v...8m
    26f3ff80 80 c2 76 00 b8 ff f3 26 - 8d 24 00 78 30 b0 76 00 ..v....&.$.x0.v.
    26f3ff90 18 88 b5 02 d0 f8 06 00 - 80 c2 76 00 ff ff ff ff ..........v.....
    26f3ffa0 90 ff f3 26 91 76 11 80 - dc ff f3 26 6a f5 00 78 ...&.v.....&j..x
    26f3ffb0 d0 33 03 78 00 00 00 00 - ec ff f3 26 de 4e f0 77 .3.x.......&.N.w
    State Dump for Thread Id 0x1ac
    eax=00000004 ebx=00000000 ecx=02b73c40 edx=00000000 esi=00000500 edi=2717fbfc
    eip=77f682db esp=2717fbe0 ebp=2717fc04 iopl=0 ov up ei pl nz na pe cy
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000a03
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2807e5e7=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2717fc04 77f04f37 00000500 000493e0 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2717fc4c 6d39ead0 000493e0 00000000 00000001 0077f5e0 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    2717fbe0 a0 cc f1 77 00 05 00 00 - 00 00 00 00 fc fb 17 27 ...w...........'
    2717fbf0 e0 f5 77 00 ec b2 75 00 - f0 f4 77 00 00 a2 2f 4d ..w...u...w.../M
    2717fc00 ff ff ff ff 4c fc 17 27 - 37 4f f0 77 00 05 00 00 ....L..'7O.w....
    2717fc10 e0 93 04 00 00 00 00 00 - fe d2 38 6d 00 05 00 00 ..........8m....
    2717fc20 e0 93 04 00 00 00 00 00 - 38 b1 32 05 e0 f5 77 00 ........8.2...w.
    2717fc30 00 00 00 00 e0 f5 77 00 - 00 05 00 00 00 00 00 00 ......w.........
    2717fc40 02 00 00 00 02 00 00 00 - 00 00 00 00 70 fc 17 27 ............p..'
    2717fc50 d0 ea 39 6d e0 93 04 00 - 00 00 00 00 01 00 00 00 ..9m............
    2717fc60 e0 f5 77 00 38 b1 32 05 - e0 f5 77 00 70 3c b3 22 ..w.8.2...w.p<."
    2717fc70 90 fc 17 27 aa e7 36 6d - a0 e3 76 00 e0 93 04 00 ...'..6m..v.....
    2717fc80 00 00 00 00 e0 f5 77 00 - e0 f5 77 00 ac 3c b3 22 ......w...w..<."
    2717fc90 c4 fc 17 27 0d 96 ab 00 - e0 f5 77 00 dc fc 17 27 ...'......w....'
    2717fca0 e0 93 04 00 00 00 00 00 - a8 fc 17 27 ac 3c b3 22 ...........'.<."
    2717fcb0 dc fc 17 27 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 ...'.R."....p<."
    2717fcc0 d4 fc 17 27 0c fd 17 27 - 9f 2d ab 00 00 00 00 00 ...'...'.-......
    2717fcd0 51 76 ab 00 e0 93 04 00 - 00 00 00 00 c0 ae 32 05 Qv............2.
    2717fce0 01 00 00 00 00 00 00 00 - 01 00 00 00 c0 ae 32 05 ..............2.
    2717fcf0 e0 fc 17 27 b9 c8 d6 22 - 3c fd 17 27 60 ca d6 22 ...'..."<..'`.."
    2717fd00 00 00 00 00 b0 c7 d6 22 - 3c fd 17 27 5c fd 17 27 ......."<..'\..'
    2717fd10 9f 2d ab 00 00 00 00 00 - 00 00 00 00 e8 a7 66 05 .-............f.
    State Dump for Thread Id 0x1be
    eax=02b621d8 ebx=7766b100 ecx=00000001 edx=00000000 esi=0007b2b8 edi=00000568
    eip=77f682db esp=271bf6a4 ebp=271bf6f8 iopl=0 nv up ei ng nz ac pe cy
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000293
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:280be0ab=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    271bf6f8 77661202 00000568 0000052c 00000002 00000004 ntdll!NtWaitForSingleObject
    271bfb60 776bb101 0000052c 271bfc00 271bfc10 00000000 msafd!<nosymbols>
    271bfb98 776bb08c 0000052c 271bfc00 271bfc10 00000000 ws2_32!WSAAccept
    271bfc14 00ab960d 0076fe84 271bfc58 271bfc54 271bfc28 ws2_32!accept
    *----> Raw Stack Dump <----*
    271bf6a4 ce 89 66 77 68 05 00 00 - 01 00 00 00 d0 f6 1b 27 ..fwh..........'
    271bf6b4 d4 b2 07 00 bc b2 07 00 - 1a 00 00 00 00 44 be ab .............D..
    271bf6c4 0d 17 c2 01 ff ff ff ff - ff ff ff 7f ff ff ff ff ................
    271bf6d4 ff ff ff 7f 00 00 00 00 - 58 ae 07 00 ad 1f 6a 77 ........X.....jw
    271bf6e4 d8 11 66 77 2c 05 00 00 - 00 00 00 00 00 00 00 00 ..fw,...........
    271bf6f4 00 00 00 00 60 fb 1b 27 - 02 12 66 77 68 05 00 00 ....`..'..fwh...
    271bf704 2c 05 00 00 02 00 00 00 - 04 00 00 00 00 00 00 00 ,...............
    271bf714 18 69 07 00 28 88 07 00 - 66 00 02 00 00 00 00 00 .i..(...f.......
    271bf724 00 00 00 00 00 00 00 00 - 08 00 00 00 00 00 00 00 ................
    271bf734 00 00 00 00 00 00 00 00 - 00 00 00 00 e9 03 00 00 ................
    271bf744 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf754 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf764 00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf774 01 00 00 00 06 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf784 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf794 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7a4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7b4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7c4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271bf7d4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1ce
    eax=00ab017d ebx=7766b100 ecx=00000011 edx=00000000 esi=0007b548 edi=000005cc
    eip=77f682db esp=271ff6a4 ebp=271ff6f8 iopl=0 nv up ei ng nz ac pe cy
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000293
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:280fe0ab=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    271ff6f8 77661202 000005cc 00000590 00000002 00000004 ntdll!NtWaitForSingleObject
    271ffb60 776bb101 00000590 271ffc00 271ffc10 00000000 msafd!<nosymbols>
    271ffb98 776bb08c 00000590 271ffc00 271ffc10 00000000 ws2_32!WSAAccept
    271ffc14 00ab960d 00777e44 271ffc58 271ffc54 271ffc28 ws2_32!accept
    *----> Raw Stack Dump <----*
    271ff6a4 ce 89 66 77 cc 05 00 00 - 01 00 00 00 d0 f6 1f 27 ..fw...........'
    271ff6b4 64 b5 07 00 4c b5 07 00 - 1a 00 00 00 f0 7a 09 b5 d...L........z..
    271ff6c4 0d 17 c2 01 ff ff ff ff - ff ff ff 7f ff ff ff ff ................
    271ff6d4 ff ff ff 7f 00 00 00 00 - 84 ae 07 00 ad 1f 6a 77 ..............jw
    271ff6e4 d8 11 66 77 90 05 00 00 - 00 00 00 00 00 00 00 00 ..fw............
    271ff6f4 00 00 00 00 60 fb 1f 27 - 02 12 66 77 cc 05 00 00 ....`..'..fw....
    271ff704 90 05 00 00 02 00 00 00 - 04 00 00 00 00 00 00 00 ................
    271ff714 50 aa 07 00 28 88 07 00 - 66 00 02 00 00 00 00 00 P...(...f.......
    271ff724 00 00 00 00 00 00 00 00 - 08 00 00 00 00 00 00 00 ................
    271ff734 00 00 00 00 00 00 00 00 - 00 00 00 00 e9 03 00 00 ................
    271ff744 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff754 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff764 00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff774 01 00 00 00 06 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff784 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff794 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7a4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7b4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7c4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    271ff7d4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1c2
    eax=00ab017d ebx=00000000 ecx=00000019 edx=00000000 esi=000005b0 edi=00000000
    eip=77f682db esp=2723fba0 ebp=2723fbc4 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2813e5a7=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2723fbc4 77f04f37 000005b0 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2723fc0c 6d39ead0 00000000 00000000 00000001 00780730 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    2723fba0 a0 cc f1 77 b0 05 00 00 - 00 00 00 00 00 00 00 00 ...w............
    2723fbb0 30 07 78 00 2c b3 75 00 - 00 07 78 00 b0 05 00 00 0.x.,.u...x.....
    2723fbc0 2a 14 39 6d 0c fc 23 27 - 37 4f f0 77 b0 05 00 00 *.9m..#'7O.w....
    2723fbd0 ff ff ff ff 00 00 00 00 - fe d2 38 6d b0 05 00 00 ..........8m....
    2723fbe0 ff ff ff ff 00 00 00 00 - 38 ae b5 02 30 07 78 00 ........8...0.x.
    2723fbf0 00 00 00 00 30 07 78 00 - b0 05 00 00 00 00 00 00 ....0.x.........
    2723fc00 2c b3 75 00 02 00 00 00 - 00 00 00 00 30 fc 23 27 ,.u.........0.#'
    2723fc10 d0 ea 39 6d 00 00 00 00 - 00 00 00 00 01 00 00 00 ..9m............
    2723fc20 30 07 78 00 38 ae b5 02 - 30 07 78 00 70 3c b3 22 0.x.8...0.x.p<."
    2723fc30 50 fc 23 27 aa e7 36 6d - 20 14 78 00 00 00 00 00 P.#'..6m .x.....
    2723fc40 00 00 00 00 30 07 78 00 - 30 07 78 00 ac 3c b3 22 ....0.x.0.x..<."
    2723fc50 84 fc 23 27 0d 96 ab 00 - 30 07 78 00 9c fc 23 27 ..#'....0.x...#'
    2723fc60 00 00 00 00 00 00 00 00 - 68 fc 23 27 ac 3c b3 22 ........h.#'.<."
    2723fc70 9c fc 23 27 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 ..#'.R."....p<."
    2723fc80 94 fc 23 27 c4 fc 23 27 - 9f 2d ab 00 00 00 00 00 ..#'..#'.-......
    2723fc90 51 76 ab 00 00 00 00 00 - 00 00 00 00 08 ac 32 05 Qv............2.
    2723fca0 01 00 00 00 08 ac 32 05 - a0 fc 23 27 34 0a b8 22 ......2...#'4.."
    2723fcb0 ec fc 23 27 78 0c b8 22 - 00 00 00 00 c8 09 b8 22 ..#'x.."......."
    2723fcc0 e4 fc 23 27 0c fd 23 27 - 76 2e ab 00 00 00 00 00 ..#'..#'v.......
    2723fcd0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    State Dump for Thread Id 0x1cd
    eax=00000004 ebx=00000000 ecx=22d8b980 edx=00000000 esi=000005c0 edi=2727fc48
    eip=77f682db esp=2727fc2c ebp=2727fc50 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2817e633=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2727fc50 77f04f37 000005c0 0000ea60 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2727fc98 6d39ead0 0000ea60 00000000 00000001 00781270 kernel32!WaitForSingleObject
    *----> Raw Stack Dump <----*
    2727fc2c a0 cc f1 77 c0 05 00 00 - 00 00 00 00 48 fc 27 27 ...w........H.''
    2727fc3c 70 12 78 00 6c b3 75 00 - c0 11 78 00 00 ba 3c dc p.x.l.u...x...<.
    2727fc4c ff ff ff ff 98 fc 27 27 - 37 4f f0 77 c0 05 00 00 ......''7O.w....
    2727fc5c 60 ea 00 00 00 00 00 00 - fe d2 38 6d c0 05 00 00 `.........8m....
    2727fc6c 60 ea 00 00 00 00 00 00 - 98 d3 32 05 70 12 78 00 `.........2.p.x.
    2727fc7c 00 00 00 00 70 12 78 00 - c0 05 00 00 00 00 00 00 ....p.x.........
    2727fc8c 4b 96 34 6d 02 00 00 00 - 00 00 00 00 bc fc 27 27 K.4m..........''
    2727fc9c d0 ea 39 6d 60 ea 00 00 - 00 00 00 00 01 00 00 00 ..9m`...........
    2727fcac 70 12 78 00 98 d3 32 05 - 70 12 78 00 70 3c b3 22 p.x...2.p.x.p<."
    2727fcbc dc fc 27 27 aa e7 36 6d - 20 28 78 00 60 ea 00 00 ..''..6m (x.`...
    2727fccc 00 00 00 00 70 12 78 00 - 70 12 78 00 ac 3c b3 22 ....p.x.p.x..<."
    2727fcdc 10 fd 27 27 0d 96 ab 00 - 70 12 78 00 28 fd 27 27 ..''....p.x.(.''
    2727fcec 60 ea 00 00 00 00 00 00 - f4 fc 27 27 00 00 00 00 `.........''....
    2727fcfc 28 fd 27 27 c8 52 b7 22 - 00 00 00 00 70 3c b3 22 (.''.R."....p<."
    2727fd0c 20 fd 27 27 50 fd 27 27 - 9f 2d ab 00 00 00 00 00 .''P.''.-......
    2727fd1c 51 76 ab 00 60 ea 00 00 - 00 00 00 00 98 d3 32 05 Qv..`.........2.
    2727fd2c 03 00 00 00 98 d3 32 05 - 2c fd 27 27 92 ea d8 22 ......2.,.''..."
    2727fd3c 74 fd 27 27 28 ed d8 22 - 00 00 00 00 20 ea d8 22 t.''(..".... .."
    2727fd4c 74 fd 27 27 84 fd 27 27 - 7d 01 ab 00 00 00 00 00 t.''..''}.......
    2727fd5c 00 00 00 00 00 00 00 00 - 00 00 00 00 98 d3 32 05 ..............2.
    State Dump for Thread Id 0x1b8
    eax=00000004 ebx=00000000 ecx=2323ba90 edx=00000000 esi=00000924 edi=276cfc38
    eip=77f682db esp=276cfc1c ebp=276cfc40 iopl=0 nv up ei pl nz na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:285ce623=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    276cfc40 77f04f37 00000924 00007530 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    276cfc88 6d39ead0 00007530 00000000 00000001 007dc330 kernel32!WaitForSingleObject
    State Dump for Thread Id 0x18a
    eax=00000004 ebx=00000000 ecx=02bbf9a0 edx=00000000 esi=000009b0 edi=00000000
    eip=77f682db esp=2770fbe0 ebp=2770fc04 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: NtWaitForSingleObject
    77f682d0 b8c5000000 mov eax,0xc5
    77f682d5 8d542404 lea edx,[esp+0x4] ss:2860e5e7=????????
    77f682d9 cd2e int 2e
    77f682db c20c00 ret 0xc
    77f682de 8bc0 mov eax,eax
    ----> Stack Back Trace <----
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    2770fc04 77f04f37 000009b0 ffffffff 00000000 6d38d2fe ntdll!NtWaitForSingleObject
    2770fc4c 6d39ead0 00000000 00000000 00000001 007dda00 kernel32!WaitForSingleObject
    ----> Raw Stack Dump <----
    2770fbe0 a0 cc f1 77 b0 09 00 00 - 00 00 00 00 00 00 00 00 ...w............
    2770fbf0 00 da 7d 00 ec b3 75 00 - 80 c1 7d 00 b0 09 00 00 ..}...u...}.....
    2770fc00 2a 14 39 6d 4c fc 70 27 - 37 4f f0 77 b0 09 00 00 *.9mL.p'7O.w....
    2770fc10 ff ff ff ff 00 00 00 00 - fe d2 38 6d b0 09 00 00 ..........8m....
    2770fc20 ff ff ff ff 00 00 00 00 - e8 ef bb 02 00 da 7d 00 ..............}.
    2770fc30 00 00 00 00 00 da 7d 00 - b0 09 00 00 00 00 00 00 ......}.........
    2770fc40 ec b3 75 00 02 00 00 00 - 00 00 00 00 70 fc 70 27 ..u.........p.p'
    2770fc50 d0 ea 39 6d 00 00 00 00 - 00 00 00 00 01 00 00 00 ..9m............
    2770fc60 00 da 7d 00 e8 ef bb 02 - 00 da 7d 00 70 3c b3 22 ..}.......}.p<."
    2770fc70 90 fc 70 27 aa e7 36 6d - 20 dc 7d 00 00 00 00 00 ..p'..6m .}.....
    2770fc80

    I am seeing exactly the same error. I started seeing it after we started making extensive use of introspection in our code. It happens repeatably when we are load testing our software.

  • Oracle 8.1.6 and 8.1.61 ODBC Driver Access Violation

    Using Oracle ODBC for Windows to Oracle 8.1.6 database to get a list of the tables/views in the database.
    The following code worked on 8.0.4, 8.0.5, and 8.1.5 databases and their respective ODBC Drivers. It gives me an access violation with 8.1.6.
    The 8.1.61 ODBC Drivers was able to run the code once, but when I ran it a second time, it gave me an access violation.
    The access violation occurs on the SQLFetch somewhere in the middle of the loop.
    Here is the abbreviated sample code:
    SQLAllocHandle(SQL_HANDLE_STMT, m_hdbc, &hCursor);
    SQLSetStmtAttr (hCursor, SQL_ATTR_CURSOR_TYPE, (SQLPOINTER) SQL_CURSOR_STATIC, 0);
    SQLTables(hCursor, NULL, 0, NULL, 0, NULL, 0, NULL, 0);
    SQLBindCol(hCursor, 1, SQL_C_CHAR, sQualifier, sizeof(sQualifier), &indQualifier);
    SQLBindCol(hCursor, 2, SQL_C_CHAR, sOwner, sizeof(sOwner), &indOwner);
    SQLBindCol(hCursor, 3, SQL_C_CHAR, sTableName, sizeof(sTableName), &indTableName);
    nReturn = SQL_SUCCESS;
    while ((nReturn = SQLFetch(hCursor) ) == SQL_SUCCESS)
    // after a 100 or so iterations, it crashes
    nReturn = SQLFreeHandle(SQL_HANDLE_STMT, hCursor);
    Please let me know if there are other ODBC drivers I could use, or if 8.1.62 will fix this.
    null

    I am using Visual Basic as front end to oracle 8 i as the
    database.When I am connecting to database from Visual Basic
    I am getting an error SQl Handle failed. When i am tring to
    create a DSN through Microsoft Oracle ODBC Driver I am getting
    an Error "The Oracle(tm) client and networking components were
    not found. These componenets are supplied are supplied by Oracle
    Corporation and are part of The Oracle Version (or greater)
    client software installation. You will be unable to use this
    Driver until these componenst have been installed" . Please give
    me a solution to his as it is critical to me.
    Please email the solution or tips at [email protected]

  • Adobe Acrobat 8 Professional Random Crash (Access Violation)

    hi all. first time poster. long time reader.
    i have encountered an odd access violation problem - 'ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "blah" referenced memory at "blah". The memory could not be "blah" - in 'acrobat.dll' recently with a customer who is experiencing seemingly random crashes with adobe acrobat 8 professional.
    they are running the application off a citrix presnetation server 4.5 server (windows server 2003 R2 with service pack 2). each server is hosting about 8 or more users per server per day. every now and then, ie once a day, adobe acrobat crashes during use. there doesn't appear to be anything consistent in so far as the action the user is performing. they will be mid-way through marking up a document and it will just crash for one of them. all the others will continue working fine.
    i have access to numerous crash dumps and nothing seems to really stand out...other than 'Acrobat_3000000!AVAcroALM_Destroy'. For example...
    STACK_TEXT:
    WARNING: Stack unwind information not available. Following frames may be wrong.
    0012f96c 0343c3e1 46e4e58d 0839ce58 0012faa0 Acrobat_3000000!PDDocCreateWordFinderEx+0x59641
    0012f9a0 0343c479 0000004d 00000000 46e4e5f5 Acrobat_3000000!AVAcroALM_Destroy+0x30afe
    0012f9d8 0343c94a 08650e08 0000004d 0012f9fc Acrobat_3000000!AVAcroALM_Destroy+0x30b96
    0012fa68 0343cea2 08650e08 0000004d 0012fab0 Acrobat_3000000!AVAcroALM_Destroy+0x31067
    0012faf8 0343d0a3 08650e08 0000004d 0bbf6748 Acrobat_3000000!AVAcroALM_Destroy+0x315bf
    0012fb4c 0343d8da 08650e08 00000000 46e4e7e5 Acrobat_3000000!AVAcroALM_Destroy+0x317c0
    0012fbc8 03182465 08e6e808 0012fc48 00000000 Acrobat_3000000!AVAcroALM_Destroy+0x31ff7
    0012fc1c 0309eeba 0bbf6748 0012fc48 00000000 Acrobat_3000000!PDPageGetFlippedMatrix+0x471d
    0012fc88 030ae925 00000000 08dd9798 03098f43 Acrobat_3000000!PDDocCreateWordFinderEx+0x378ef
    0012fce8 0300e9f7 0003007a 0300d5c9 000004d3 Acrobat_3000000!PDDocCreateWordFinderEx+0x4735a
    0012fd04 7739b6e3 0003007a 00000113 000004d3 Acrobat_3000000!WinMain+0x24a4
    0012fd30 7739b874 0300d1bf 0003007a 00000113 user32!InternalCallWinProc+0x28
    0012fda8 7739ba92 00000000 0300d1bf 0003007a user32!UserCallWinProcCheckWow+0x151
    0012fe10 7739bad0 0012fe54 00000000 0012fe90 user32!DispatchMessageWorker+0x327
    0012fe20 0300a597 0012fe54 0012fe70 03ca2d20 user32!DispatchMessageW+0xf
    0012fe90 0300aece 46e4e2e5 00d40068 03ca2d20 Acrobat_3000000+0xa597
    0012fec8 0300c517 00000000 0012ff2c 00000000 Acrobat_3000000!AXWasInitViaPDFL+0x76a
    0012fedc 0300c649 00000005 0040a77c 0012ff2c Acrobat_3000000!AXWasInitViaPDFL+0x1db3
    0012fefc 00402d5f 03000000 00400000 001524e0 Acrobat_3000000!WinMain+0xf6
    0012ff30 00403281 00400000 00000000 001524e0 Acrobat+0x2d5f
    0012ffc0 77e6f23b 00000000 00000000 7ffd4000 Acrobat+0x3281
    0012fff0 00000000 00403402 00000000 00000000 kernel32!BaseProcessStart+0x23
    ...or another...
    STACK_TEXT:
    WARNING: Stack unwind information not available. Following frames may be wrong.
    0012f6e0 222cb7ad ad0d64ee 00000000 1398c0d8 Annots!PlugInMain+0xa9198
    0012f830 2091b7db 0012f934 0012f9f4 56433230 Annots!PlugInMain+0x1ca425
    0012f8d4 20913957 0850f3a0 0340f043 0850f3a0 AcroForm!DllUnregisterServer+0x10798b
    0012f900 0340f385 00000001 51ab7765 000000df AcroForm!DllUnregisterServer+0xffb07
    0012f940 034dda17 0850f3a0 00000001 51ab77d1 Acrobat_3000000!AVAcroALM_Destroy+0x3aa2
    0012f9f4 034454fa 00000000 084ce5c8 ffffff84 Acrobat_3000000!AVAcroALM_Destroy+0xd2134
    0012fa14 034451cb 084ce5c8 ffffff84 000000df Acrobat_3000000!AVAcroALM_Destroy+0x39c17
    0012fa3c 034451f0 084ce5c8 ffffff84 000000df Acrobat_3000000!AVAcroALM_Destroy+0x398e8
    0012fa5c 033e4a92 00fd0540 084ce5c8 ffffff84 Acrobat_3000000!AVAcroALM_Destroy+0x3990d
    0012fadc 033e6c01 084ce5c8 00000000 00000001 Acrobat_3000000!PDDocSetXAPMetadata+0xf227f
    0012fb24 033b0fbf 00000065 000000e3 00000001 Acrobat_3000000!
    ...continued in next post 'cause it keeps getting truncated ?!

    0012fbb4 030abb9e 00000065 000000e3 00000201 Acrobat_3000000!PDDocSetXAPMetadata+0xd9998
    0012fbd4 030abd6f 00000201 00000001 00e30065 Acrobat_3000000!PDDocCreateWordFinderEx+0x445d3
    0012fbf0 7739b6e3 000200ca 00000201 00000001 Acrobat_3000000!PDDocCreateWordFinderEx+0x447a4
    0012fc1c 7739b874 030abd08 000200ca 00000201 user32!InternalCallWinProc+0x28
    0012fc94 7739bfce 00000000 030abd08 000200ca user32!UserCallWinProcCheckWow+0x151
    0012fcc4 773b0463 030abd08 000200ca 00000201 user32!CallWindowProcAorW+0x98
    0012fce4 20b8e182 030abd08 000200ca 00000201 user32!CallWindowProcA+0x1b
    0012fd04 7739b6e3 000200ca 00000201 00000001 AcroForm!DllUnregisterServer+0x37a332
    0012fd30 7739b874 20b8e132 000200ca 00000201 user32!InternalCallWinProc+0x28
    0012fda8 7739ba92 00000000 20b8e132 000200ca user32!UserCallWinProcCheckWow+0x151
    0012fe10 7739bad0 0012fe54 00000000 0012fe90 user32!DispatchMessageWorker+0x327
    0012fe20 0300a597 0012fe54 0012fe70 03ca2d20 user32!DispatchMessageW+0xf
    0012fe90 0300aece 51ab70ed 00d40068 03ca2d20 Acrobat_3000000+0xa597
    0012fec8 0300c517 00000000 0012ff2c 00000000 Acrobat_3000000!AXWasInitViaPDFL+0x76a
    0012fedc 0300c649 00000005 0040a77c 0012ff2c Acrobat_3000000!AXWasInitViaPDFL+0x1db3
    0012fefc 00402d5f 03000000 00400000 001524e0 Acrobat_3000000!WinMain+0xf6
    0012ff30 00403281 00400000 00000000 001524e0 Acrobat+0x2d5f
    0012ffc0 77e6f23b 00000000 00000000 7ffde000 Acrobat+0x3281
    0012fff0 00000000 00403402 00000000 00000000 kernel32!BaseProcessStart+0x23
    is 'AVAcroALM' to do with licensing?
    other than advising them to bring citrix presentation server 4.5 up to date (HRP2) i'm at a loss what to advise. citrix often have issues with seamless published applications when spread across multiple monitors (as in this case), hence, my reason to ask them to bring their software up to date. often the funtion called will be different - often times 'Acrobat.dll!PDDocCreateWordFinderEx', other times 'Acrobat.dll!PDDocAcquirePage' and there are others.
    i can post more of the mini-dump if required. any - and ALL - assitance appreciated.
    thanks.

  • Windows XP Access Violation

    Has anyone had any issues with Microsoft Windows XP errors referencing access violations of memory? I have had this problem since the first time I installed Boot Camp Beta, and have yet to hear a reply from any of the Geniuses. In essence, I receive random but recurring errors when opening applications in Windows XP on my Boot Camp partition. Sometimes it's when I open Internet Explorer, sometimes it's when I open Wordpad, sometimes it's another application. Additionally, I consistently receive this error when closing certain enterprise level business intelligence software. I've done research and found that this is a result of code that tries to store null values in reserved memory, but that's about it. I'd really like to know if Apple has any solutions for this issue, and if not, what that will mean for those users who have purchased - or will purchase - a MacBook with the promise of being able to run Windows XP or Vista on the Intel-based MacBooks. If this issue is pervasive and not remedied, then it makes the real prospects of using a MacBook in a business setting running Windows impossible.

    Reinstalling OS X isn't going to help with Windows. There is something that is special about your Windows that is making it unstable. That something may be a driver required to run it on a Mac. Still, that driver lives on the Windows side. You might have more luck running in Parallels or VMWare as the drivers for those generic, simulated machines might be more stable.
    Yes, it is technically possible for MacOS X to become corrupted. That type of corruption is almost always caused by either 1) FileVault, 2) disk cloning, 3) flaky kernel extensions. Still, it is much less common than in Windows. For example, Acrobat Reader crashes on logout on my Dell work PC. It has done this as long as I can remember on every work PC I've had at 3 companies in as many states. I have the best IT support money can buy. It is not a problem, Acrobat just crashes on logout. I just have to remember to clean up the dialog boxes so the log off can complete to avoid some corporate or gov security regulation.

  • What does this error mean? Error: Access violation at address 0053DD46

    I am trying to run diff reports using batch scripts, and its very puzzling that some of the diff report scripts within the batch script are running and some are not, there is no consistency to what is getting errored out.
    I then tried running them manually in foreground on the client and I get the same issue. Has anyone encountered this issue? What do I make of it?,
    4/24/2013 1:29:30 PM - *** MDMConnect starting ***
    4/24/2013 1:29:30 PM - Logged in successfully.
    4/24/2013 1:29:30 PM - Started export job for PLN_FLD_ACCT_DIFF
    4/24/2013 1:29:34 PM - ERemotableException with message: "Server was unable to process request. ---> Error during Export. Export was unable to run. Error: Access violation at address 0053DD46 in module 'mdm_ntier_engine.exe'. Read of address 00000024" while running Export
    4/24/2013 1:29:34 PM - => ERROR: Data Relationship Management Server returned error: "Server was unable to process request. ---> Error during Export. Export was unable to run. Error: Access violation at address 0053DD46 in module 'mdm_ntier_engine.exe'. Read of address 00000024."
    4/24/2013 1:29:34 PM - *** MDMConnect stopping ***
    Thank you
    Tanuja Donavalli

    This is issue is coherent in DRM version 11.1.1.2
    Whenever a property is deleted, the references to that property would still exists/stored in tables. The next version of DRM is made to address this issue, where in it takes care of removing all references whenever we delete the property.
    Cause: Properties was deleted from DRM client but the value was still stored in the compare table for Difference export and causing export to fail.
    Solution: Need to recreate the deleted properties and remove the properties in the exports and delete the properties.
    Going Forward: Instead of deleting the properties we need to remove the property from the export and hide the property.
    Hope this helps.

  • 0xC0000005 Access Violation in cvirte.dll (SetWindowsErrorMode?)

    Hello,
    We will occasionally see a crash with our CVI LabWindows based 2010 SP1 application, a 0xC0000005 Access Violation exception thrown from within cvirte.dll. The app is working primarily from a spawned thread when the crash occurs. I've been able to get it consistently on a Win7 x64 VirtualBox VM and have some data that may be of use if someone there would like to investigate.
    When I track down the location of the instruction pointer (work below) it seems to be in the "SetWindowsErrorMode()" function (at least going by the exports in DependencyWalker):
    1. The IP is 0x687B5F1C at the time of the crash.
    2. The base module address for cvirte.dll is 0x68420000, so the IP is 0x395F1C bytes into the DLL.
    3. Using DependencyWalker on cvirte.dll and sorting by entry point indicates that the IP is inside of "SetWindowsErrorMode()" at 0x003938D0, which comes before "MinimizeAllWindows()" at 0x003984B0.
    Coincidentally, this crash happens in CVI 2013 F1 as well, the offset within "SetWindowsErrorMode()" is a bit different (0x264C past entry in 2010 SP1, 0x2D0C past entry in 2013), but locally the code looks the same in my VS2010 disassembler:
    CVI2010 SP1
    *Address *Code Bytes          *Instruction
    687B5F02 89 17                mov dword ptr [edi],edx
    687B5F04 8B 48 5C             mov ecx,dword ptr [eax+5Ch]
    687B5F07 89 78 6C             mov dword ptr [eax+6Ch],edi
    687B5F0A 89 4F 04             mov dword ptr [edi+4],ecx
    687B5F0D 89 58 5C             mov dword ptr [eax+5Ch],ebx
    687B5F10 C7 40 60 00 00 00 00 mov dword ptr [eax+60h],0
    687B5F17 5E                   pop esi
    687B5F18 85 DB                test ebx,ebx
    687B5F1A 74 09                je 687B5F25
    687B5F1C 8B 13                mov edx,dword ptr [ebx] <--- CRASH
    CVI2013 F1
    *Address *Code Bytes          *Instruction
    687CA2B2 89 17                mov dword ptr [edi],edx
    687CA2B4 8B 48 5C             mov ecx,dword ptr [eax+5Ch]
    687CA2B7 89 78 6C             mov dword ptr [eax+6Ch],edi
    687CA2BA 89 4F 04             mov dword ptr [edi+4],ecx
    687CA2BD 89 58 5C             mov dword ptr [eax+5Ch],ebx
    687CA2C0 C7 40 60 00 00 00 00 mov dword ptr [eax+60h],0
    687CA2C7 5E                   pop esi
    687CA2C8 85 DB                test ebx,ebx
    687CA2CA 74 09                je 687CA2D5
    687CA2CC 8B 13                mov edx,dword ptr [ebx] <--- CRASH
    I have dump files (mini, or mini+heap) for both builds if it would help.
    This bug seems semi-similar to the thread "Is InstallPopup not threadsafe?":
    http://forums.ni.com/t5/LabWindows-CVI/Is-InstallPopup-not-threadsafe/m-p/716822/highlight/true#M359...
    Just for posterity, I'll add the data for the 2013 build. IP is 0x687CA2CC, DLL Module address is 0x68420000-0x68A28000, so offset is 0x3AA2CC. "SetWindowsErrorMode()" enters at 0x003A75C0 in this dll, and "MinimizeAllWindows()" is at 0x003ACB20.
    Thanks-
    Baker

    Hi Kelsey,
    Apologies for the long response time, I didn't receive a notification for your post.
    > What does your application do?
    Our application is used in this context to setup and run our vehicle simulations on a Windows based PC.
    > And, what is it doing at the time of the crash?
    At the time of the crash a simulation is being launched and run on another thread from the default thread pool like this:
    CmtScheduleThreadPoolFunctionAdv (DEFAULT_THREAD_POOL_HANDLE,
        sRun,
        NULL,
        THREAD_PRIORITY_NORMAL,
        NULL,
        EVENT_TP_THREAD_FUNCTION_END,
        NULL,
        RUN_IN_SCHEDULED_THREAD,
        &sThreadFuncId);
    That spawned thread will load a simulation DLL, read some data as input, run the simulation, output the results, then close the DLL.
    As I noted earlier, I couldn't get it to happen on my desktop, but I could get it on the VM when I used a very slow storage device for the I/O of the simulation (a slow thumb drive attached to the VM). My boss was seeing the issue on his virtualized PC on his Mac, typically only when he used a slower storage device as well (network storage for example).
    > When you reproduce this issue in 2010 and 2013 f1, are you using the same computer or using different machines?
    Both of these crash dumps were produced on the virtual machine as described.
    > For each dump file, which version of LabWindows/CVI were you running? You can find the version number by selecting Help»About LabWindows/CVI within LabWindows/CVI. Which version of cvirte.dll do you have? This will be located in System32 and/or SysWOW64.
    The development environment installed was CVI 2010 SP1. So the 2010 dump was just using the runtimes bundled with that installation. I then installed the 2013 F1 runtimes to see if the same issue persisted.
    It's possible I did a clean install with the 2013 F1 dev environment, I will double check this tomorrow when I have access to the virtual machine.
    Thanks for looking into this--
    Baker

  • Why does labview generate Dr. Watson error "C0000005 access violation"

    I am running Labview 5.1.1 in Windows 2000 Professional on a machine with the following configuration
    *----> System Information <----*
    Computer Name: ANDANTE
    User Name: Administrator
    Number of Processors: 2
    Processor Type: x86 Family 6 Model 8 Stepping 3
    Windows 2000 Version: 5.0
    Current Build: 2195
    Service Pack: 4
    Current Type: Multiprocessor Free
    I have all of a sudden begun to experience labview crashes. The crash occurs systematically after tens of minutes; not just a few minutes, but not more than an hour or so. I am running a vi but not actively interacting with the machine (no other applications running, not even moving the mouse around). The problem happens even when running a vi that I have run successfully for extended periods of time (overnight) only 3 months ago. I have tried it with two different vis, one that I have recently made a lot of modifications to and another that has not been touched for months (since before the crashes began), and it happens with both vis. They do much different things (communicate with different GPIB or PCI boards, write to different kinds of files in different locations, etc.), so the problem seems to be vi-independent.
    When the crash occurs, I see a dialog appear with the error
    labview.exe has generated errors and will be closed by windows. You will need to restart the program. An error log has been created.
    The Dr. Watson error log is generated and the error is
    Application exception occurred:
    App: (pid=1160)
    When: 4/25/2004 @ 01:57:56.640
    Exception number: c0000005 (access violation)
    I always get the same Dr. Watson error information -- i.e., it is very reproducible. I don't really know how to interpret the rest of the Dr. Watson log, but I include the report on the first thread, which is the one with the "FAULT" in it, at the end of this email.
    Looking around on the web, it may be that a temporary virus infection could have created the problem. In the period since the machines was last successfully used, I have seen two files be infected by the W32.Welchia.B.Worm virus, the files were svchost.exe and WksPatch[1].exe. These files have been quarantined and no other infected files have been found since this error began to appear.
    Any ideas? I've seen on the web that reinstalling Windows 2000 and/or upgrading to Labview 7.0 might solve the problem, but it would be nice to get some confirmation before taking the time/spending the money.
    Here is the state dump for the thread with the FAULT in it, as provided by Dr. Watson:
    State Dump for Thread Id 0x574
    eax=00000062 ebx=00000000 ecx=00000000 edx=00000004 esi=00000000 edi=05692214
    eip=00748236 esp=0012fb28 ebp=0012fb28 iopl=0 nv up ei pl zr na po nc
    cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
    function: StrLen
    00748230 55 push ebp
    00748231 8bec mov ebp,esp
    00748233 8b4d08 mov ecx,[ebp+0x8] ss:00ba9a0e=????????
    FAULT ->00748236 8a11 mov dl,[ecx] ds:00000000=??
    00748238 8d4101 lea eax,[ecx+0x1] ds:00a79ee6=????????
    0074823b 84d2 test dl,dl
    0074823d 7407 jz GetCDReg+0x6f6 (00750c46)
    0074823f 8a10 mov dl,[eax] ds:00000062=??
    00748241 40 inc eax
    00748242 84d2 test dl,dl
    00748244 75f9 jnz CfgRemove+0x44f (0074ae3f)
    00748246 2bc1 sub eax,ecx
    00748248 48 dec eax
    00748249 5d pop ebp
    0074824a c3 ret
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
    0012FB28 00737A74 00000000 00000000 05692214 00000400 !StrLen
    0012FC40 00736A45 050753E4 05692214 0012FC6C 00736724 !SetKeyboardHandlerProc
    0012FC50 00736724 05692214 0012FCB4 05692214 BDBC0000 !SetKeyboardHandlerProc
    0012FC6C 00736627 05692214 0569232C 00000400 00000000 !SetKeyboardHandlerProc
    0012FC98 0074B470 0012FCB4 BDBD0001 00000000 0569E8E0 !SetKeyboardHandlerProc
    0012FCD0 0074ACD0 00000000 0074AC10 0569FFA4 010A2418 !CfgRemove
    0012FCE8 007808D5 00000000 00000000 00000001 00000000 !CfgRemove
    0012FD08 007ACEB6 00000000 00000000 77E18F95 00000000 !ChkOccurrences
    0012FD9C 006033DE 00000001 00000000 77E2ADC1 007A5C80 !WMainLoop
    0012FF24 007B2186 00400000 00000000 00000001 00000001 !WMain
    0012FFC0 7C581AF6 005C0057 0061006C 7FFDF000 C0000005 !inp
    0012FFF0 00000000 007B2030 00000000 000000C8 00000100 kernel32!OpenEventA
    *----> Raw Stack Dump <----*
    0012fb28 40 fc 12 00 74 7a 73 00 - 00 00 00 00 00 00 00 00 @...tzs.........
    0012fb38 14 22 69 05 00 04 00 00 - 16 4d 65 74 68 6f 64 20 ."i......Method
    0012fb48 4e 6f 74 20 49 6d 70 6c - 65 6d 65 6e 74 65 64 00 Not Implemented.
    0012fb58 55 1f f8 77 18 25 f8 77 - 2f a8 fd 74 c4 01 00 00 U..w.%.w/..t....
    0012fb68 05 a5 fd 74 d0 26 ce 01 - 00 00 06 01 10 04 00 00 ...t.&..........
    0012fb78 00 00 00 00 00 00 00 00 - 2e fb 69 05 42 e9 69 05 ..........i.B.i.
    0012fb88 c1 2f 7b 00 00 00 00 00 - 12 04 00 00 11 04 00 00 ./{.............
    0012fb98 30 fb 69 05 12 04 12 00 - bb 35 7b 00 00 00 06 01 0.i......5{.....
    0012fba8 11 04 00 00 00 00 00 00 - 00 00 00 00 2e fb 69 05 ..............i.
    0012fbb8 35 34 7b 00 4c 34 7b 00 - 48 00 06 01 f8 fb 12 00 54{.L4{.H.......
    0012fbc8 10 04 00 00 ec 53 07 05 - 11 04 00 00 08 fc 00 00 .....S..........
    0012fbd8 ee c8 77 00 30 fb 69 05 - 11 04 00 00 00 00 00 00 ..w.0.i.........
    0012fbe8 00 04 00 00 01 00 00 00 - ec 53 07 05 00 04 00 00 .........S......
    0012fbf8 00 38 83 00 1c fc 12 00 - 23 ca 77 00 00 38 83 00 .8......#.w..8..
    0012fc08 40 ff 69 05 01 00 00 00 - 00 00 00 00 2d 00 00 00 @.i.........-...
    0012fc18 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
    0012fc28 00 00 00 00 00 00 00 00 - 00 00 00 00 01 00 00 00 ................
    0012fc38 50 fc 12 00 1a 6a 73 00 - 50 fc 12 00 45 6a 73 00 P....js.P...Ejs.
    0012fc48 e4 53 07 05 14 22 69 05 - 6c fc 12 00 24 67 73 00 .S..."i.l...$gs.
    0012fc58 14 22 69 05 b4 fc 12 00 - 14 22 69 05 00 00 bc bd ."i......"i.....

    For questions like these, you are better off contacting NI directly. Goto www.ni.com/ask for directions. It has been my experience that Dr. Watson error logs are only useful as supplementary information. It is best for support and for the forum if you can provide a clear description on how to cause the error consistently.

  • Access Violation while initialising WEBUTIL on Ora9iDS

    Hello,
    as part of an urgent evaluation I installed WEBUTIL as described in the documentation, did the additional steps described in the readme and added WEBUTIL as described to an existing form. Now the form raises an access violation error while executing trigger WHEN-CUSTOM-ITEM-EVENT on item WEBUTIL.WEBUTIL_FILETRANSFER_FUNCTIONS exactly when calling procedure WEBUTIL_CORE.CustomEventHandler while registering the beans.
    Did anybody experience the like? Any guess what's going wrong or what could help?
    The crash is documented in the log as follows:
    [09/09/03 08:38:46 Westeuropäische Sommerzeit]::Client Status [ConnId=0, PID=3048]
         >> ERROR: Abnormal termination, Error Code: C0000005 ACCESS_VIOLATION
    ======================= STACK DUMP =======================
    Fault address: 60A98D4D 01:00097D4D
    Module: E:\Programme\OraHome1\bin\orapls9.dll
    System Information:
    Operating System: Windows NT Version 5.0 Build 2195 Service Pack 4
    Command line: ifweb90 server webfile=HTTP-0,0,1,53.147.33.61
    FORM/BLOCK/FIELD: DOKUMENTE:DOKUMENTE.KLARTEXT
    Last Trigger: WHEN-CUSTOM-ITEM-EVENT - (In Progress)
    Msg: <NULL>
    Last Builtin: NAME_IN - (Successfully Completed)
    Registers:
    EAX:00000000
    EBX:0012D9C0
    ECX:00000000
    EDX:0012D9C0
    ESI:0777C6E4
    EDI:02A26C78
    CS:EIP:001B:60A98D4D
    SS:ESP:0023:0012D978 EBP:0012D998
    DS:0023 ES:0023 FS:003B GS:0000
    Flags:00010246
    ------------------- Call Stack Trace ---------------------
    Frameptr RetAddr Param#1 Param#2 Param#3 Param#4 Function Name
    0x0012d998 60a3d308 0777c6e4 00000001 0012d9c0 070468a8 pfrb1assign_aad2va
    0x0012d9ec 60a92b11 0777c6e4 00000001 66020030 070468a8 pevmGBVAR+d8
    0x0012e0f0 60a1ce7d 0777c6e4 02a26c78 0776dd6c 00000002 _pfrrun+6841       
    0x0012e158 6601ea45 02a26c78 0777c6e4 02a46f00 029de3b4 _peicnt+ed         
    0x02a26874 029de3b4 65fdb2a0 65fdb2e0 65da1f30 00000000 0x6601ea45
    0x02a46f00 00000001 0000000a 02a46fd8 0026181f 65d51752 0x029de3b4
    ------------------- End of Stack Trace -------------------
    WebUtil-Logfile is not very verbose (despite detailed logging enabled):
    53.147.33.61:ZSCHAU: Connection from Form=E:\ISAP_ASP4\isap\websourcen\Doktestweb.fmx Client O/S=Windows 2000 locale=de
    53.147.33.61:ZSCHAU: 2003-Sep-09 08:38:00.889 WUF[VBeanCommon.getIPAddress()] 53.147.33.61
    53.147.33.61:ZSCHAU: 2003-Sep-09 08:38:00.929 WUH[VBeanCommon.getIPAddress()] 53.147.33.61
    53.147.33.61:ZSCHAU: 2003-Sep-09 08:38:00.949 WUS[VBeanCommon.getIPAddress()] 53.147.33.61
    Java Console prints:
    JInitiator: Version 1.3.1.9
    Verwendung der JRE-Version 1.3.1.9 Java HotSpot(TM) Client VM
    Home-Verzeichnis des Benutzers = C:\Dokumente und Einstellungen\zschau
    Proxy-Konfiguration:Automatische Proxy-Konfiguration
    JAR cache enabled
    Location: C:\Dokumente und Einstellungen\zschau\Oracle Jar Cache
    Maximum size: 50 MB
    Compression level: 0
    c: clear console window
    f: finalize objects on finalization queue
    g: garbage collect
    h: display this help message
    l: dump classloader list
    m: print memory usage
    q: hide console
    s: dump system properties
    t: dump thread list
    x: clear classloader cache
    0-5: set trace level to <n>
    Loading http://localhost:8888/forms90/webutil/webutil.jar from JAR cache
    Loading http://localhost:8888/forms90/webutil/jacob.jar from JAR cache
    Loading http://localhost:8888/forms90/java/f90all_jinit.jar from JAR cache
    RegisterWebUtil - Loading Webutil Version 1.0.2 Beta
    connectMode=HTTP, native.
    Forms Applet-Version : 90290
    2003-Sep-09 08:38:00.819 WUI[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:00.839 WUI[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:00.879 WUF[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:00.889 WUF[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:00.909 WUH[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:00.929 WUH[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:00.939 WUS[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:00.949 WUS[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:00.969 WUT[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:00.969 WUT[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:01.460 WUO[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:01.470 WUO[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:01.500 WUL[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:01.510 WUL[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:01.550 WUB[VBeanCommon.findLocalHost()] obtaining LocalHost info from InetAddress
    2003-Sep-09 08:38:01.560 WUB[VBeanCommon.getIPAddress()] 53.147.33.61
    2003-Sep-09 08:38:48.268 WUB[VBeanCommon.destroy()] WebUtil Browser Functions being removed..
    2003-Sep-09 08:38:48.298 WUL[VBeanCommon.destroy()] WebUtil C API Functions being removed..
    2003-Sep-09 08:38:49.59 WUO[VBeanCommon.destroy()] WebUtil Client Side Ole Functions being removed..
    2003-Sep-09 08:38:49.89 WUT[VBeanCommon.destroy()] WebUtil File Transfer Bean being removed..
    2003-Sep-09 08:38:49.89 WUS[VBeanCommon.destroy()] WebUtil Session Monitoring Facilities being removed..
    2003-Sep-09 08:38:49.89 WUH[VBeanCommon.destroy()] WebUtil Client Side Host Commands being removed..
    2003-Sep-09 08:38:49.99 WUF[VBeanCommon.destroy()] WebUtil Client Side File Functions being removed..
    2003-Sep-09 08:38:49.99 WUI[VBeanCommon.destroy()] WebUtil GetClientInfo Utility being removed..
    I run Ora9iDS on a Windows2000 system.
    Thanks to anybody who tries to help.

    Hello, Grant,
    the crash occurs before I try to do anything vital. There is some init stuff in the form (initialising items, global variables etc.), query execution for initial displaying of database entries and a sychronize statement. After that the triggers in the WEBUTIL section fire, as I understand to initialise the beans (registering). As part of this registering the crash occurs - before I call any of the WEBUTIL functionality from my own code.

  • Urgent problem: JRE Crashes with Access violation (c0000005)

    I have a problem where the JRE crashes with an Access violation (c0000005) at address (6d4218ce).
    The JVM is:
    java version "1.3.1_01"
    Java(TM) 2 Runtime Environment, Standard Edition (build 1.3.1_01)
    Java HotSpot(TM) Client VM (build 1.3.1_01, mixed mode)The application is swing based, and I have my suspicions that the problem occurs when exec'ing (Runtime.exec()) a script file (deletes data files and FTP's data files around an internal network), but I cannot categorically prove it as yet.
    The lack of a .map file does not help in analysing the Dr Watson log file. Does anyone know if a map file is available for 1.3.1?
    I have tried to raise this as a bug but as we cannot reproduce it on demand, I cannot get Sun to look into it.
    The Dr Watson log file shows:
    State Dump for Thread Id 0x13e
    eax=bf800000 ebx=0336b770 ecx=02b72168 edx=bf800008 esi=02b72168 edi=06ffd12c
    eip=6d4218ce esp=08d0fdbc ebp=08d0fddc iopl=0         nv up ei ng nz na pe nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000282
    function: <nosymbols>
            6d4218b9 8d4df0           lea     ecx,[ebp-0x10]         ss:09c0e7e2=00000000
            6d4218bc e875000000       call    6d421936
            6d4218c1 5f               pop     edi
            6d4218c2 5e               pop     esi
            6d4218c3 c9               leave
            6d4218c4 c3               ret
            6d4218c5 56               push    esi
            6d4218c6 8bf1             mov     esi,ecx
            6d4218c8 8b5604           mov     edx,[esi+0x4]          ds:03a70b6e=????????
            6d4218cb 83c208           add     edx,0x8
    FAULT ->6d4218ce 8b4210           mov     eax,[edx+0x10]         ds:c06fea0e=????????
            6d4218d1 85c0             test    eax,eax
            6d4218d3 7f25             jg      6d4218fa
            6d4218d5 7d1b             jge     6d4218f2
            6d4218d7 83c9ff           or      ecx,0xff
            6d4218da 6a04             push    0x4
            6d4218dc 2bc8             sub     ecx,eax
            6d4218de 8b4608           mov     eax,[esi+0x8]          ds:03a70b6e=????????
            6d4218e1 d3e0             shl     eax,cl
            6d4218e3 8b4a44           mov     ecx,[edx+0x44]         ds:c06fea0e=????????
            6d4218e6 8d440807         lea     eax,[eax+ecx+0x7]      ds:03a70b6f=????????
            6d4218ea 59               pop     ecx
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
    08d0fddc 6d4710ee 0336b734 0336b734 6d4381b7 0336b734 <nosymbols>
    State Dump for Thread Id 0x140
    eax=06a82398 ebx=00000000 ecx=06ab34f0 edx=00000000 esi=0000017c edi=00000000
    eip=77f682db esp=08d4fc24 ebp=08d4fc48 iopl=0         nv up ei pl zr na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246
    function: NtWaitForSingleObject
            77f682d0 b8c5000000       mov     eax,0xc5
            77f682d5 8d542404         lea     edx,[esp+0x4]          ss:09c4e62b=00000000
            77f682d9 cd2e             int     2e
            77f682db c20c00           ret     0xc
            77f682de 8bc0             mov     eax,eax
    *----> Stack Back Trace <----*
    FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
    08d4fc48 77f04f37 0000017c ffffffff 00000000 6d466097 ntdll!NtWaitForSingleObject
    08d4fc90 6d476550 00000000 00000000 00000001 00765d80 kernel32!WaitForSingleObject Any help would be much appreciated.
    Regards,
    Dave Jackson

    Probably nothing to do with it but I had some dodgy memory, and windows would complain that there was an error to do with that exact memory location: c0000005

Maybe you are looking for