Win32All Crashes Python 2.3?
Tim Daneliuk
tundra at tundraware.com
Tue Aug 5 02:20:07 EDT 2003
Tim Daneliuk wrote:
FWIW, here is the Dr. Watson dump that results:
Microsoft (R) Windows 2000 (TM) Version 5.00 DrWtsn32
Copyright (C) 1985-1999 Microsoft Corp. All rights reserved.
Application exception occurred:
App: (pid=1268)
When: 8/5/2003 @ 01:16:56.212
Exception number: c0000005 (access violation)
*----> System Information <----*
Computer Name: VIPER
User Name: tundra
Number of Processors: 1
Processor Type: x86 Family 6 Model 8 Stepping 3
Windows 2000 Version: 5.0
Current Build: 2195
Service Pack: 4
Current Type: Uniprocessor Free
Registered Organization: TundraWare Inc.
Registered Owner: tundra
*----> Task List <----*
0 Idle.exe
8 System.exe
172 SMSS.exe
204 CSRSS.exe
200 WINLOGON.exe
252 SERVICES.exe
264 LSASS.exe
420 svchost.exe
448 spoolsv.exe
480 svchost.exe
496 GHOSTS~2.exe
532 Navapsvc.exe
560 NeTmSvNT.exe
644 NPROTECT.exe
688 mstask.exe
736 slpservice.exe
764 slpmonx.exe
788 NOPDB.exe
832 stisvc.exe
860 tlntsvr.exe
900 WinMgmt.exe
928 MsPMSPSv.exe
960 svchost.exe
1028 hplampc.exe
1100 explorer.exe
1212 hpztsb04.exe
1228 hphmon03.exe
1244 LVComS.exe
1256 NetTime.exe
1272 point32.exe
1316 Pptd40nt.exe
1336 FTClCtrl.exe
1376 Navapw32.exe
1348 hphipm09.exe
996 AlarmApp.exe
356 bosskey.exe
1400 dnoter.exe
1428 HOTSYNC.exe
1436 qsd.exe
1476 TASKMGR.exe
1516 trillian.exe
1540 wftpd.exe
1648 fapiexe.exe
1308 opera.exe
1484 mmc.exe
1304 svchost.exe
1448 mozilla.exe
428 putty.exe
1676 exceed.exe
1280 pythonw.exe
1268 pythonw.exe
1752 rundll32.exe
1780 emacs.exe
1168 DRWTSN32.exe
0 _Total.exe
(1D000000 - 1D005000)
(77F80000 - 77FFB000)
(1E000000 - 1E0F0000)
(7C4E0000 - 7C599000)
(77E10000 - 77E75000)
(77F40000 - 77F7C000)
(7C2D0000 - 7C332000)
(77D30000 - 77D9E000)
(782F0000 - 78538000)
(70BD0000 - 70C35000)
(78000000 - 78045000)
(71710000 - 71794000)
(1E1E0000 - 1E1EE000)
(1E1D0000 - 1E1DC000)
(75050000 - 75058000)
(75030000 - 75044000)
(75020000 - 75028000)
(10000000 - 1006C000)
(1E190000 - 1E199000)
(10220000 - 1031B000)
(76B30000 - 76B6E000)
(75E60000 - 75E7A000)
(00A60000 - 00AEF000)
(1E200000 - 1E20F000)
(779B0000 - 77A4B000)
(77A50000 - 77B3C000)
(1E600000 - 1E615000)
(7C340000 - 7C34F000)
(1E730000 - 1E742000)
(74FF0000 - 75002000)
(77980000 - 779A4000)
(00F00000 - 00F07000)
(75170000 - 751BF000)
(751C0000 - 751C6000)
(75150000 - 7515F000)
(77950000 - 7797A000)
(76620000 - 76631000)
(1E2A0000 - 1E2AC000)
(782C0000 - 782CC000)
(77340000 - 77353000)
(77520000 - 77525000)
(77320000 - 77337000)
(773B0000 - 773DF000)
(77380000 - 773A3000)
(77830000 - 7783E000)
(77880000 - 7790E000)
(7C0F0000 - 7C152000)
(774E0000 - 77513000)
(774C0000 - 774D1000)
(77530000 - 77552000)
(77360000 - 77379000)
(777E0000 - 777E8000)
(777F0000 - 777F5000)
(10210000 - 10216000)
(61210000 - 6121F000)
(61220000 - 61232000)
(01560000 - 01584000)
(77570000 - 775A0000)
(681A0000 - 681A7000)
(66740000 - 66747000)
(775A0000 - 77626000)
(77840000 - 7787E000)
(770C0000 - 770E3000)
(01990000 - 01B94000)
State Dump for Thread Id 0x224
eax=0068005c ebx=00000000 ecx=00000000 edx=010b41d0 esi=0097b968 edi=1e062da0
eip=780104ac esp=0012e0b0 ebp=0012e488 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202
function: wcslen
780104a8 8b442404 mov eax,[esp+0x4] ss:00bc7f97=????????
FAULT ->780104ac 668b08 mov cx,[eax] ds:0068005c=????
780104af 40 inc eax
780104b0 40 inc eax
780104b1 6685c9 test cx,cx
780104b4 75f6 jnz close+0x55 (780130ac)
780104b6 2b442404 sub eax,[esp+0x4] ss:00bc7f97=????????
780104ba d1f8 sar eax,1
780104bc 48 dec eax
780104bd c3 ret
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012E488 00000001 00000000 00000000 007B9A43 00823720 !wcslen
*----> Raw Stack Dump <----*
0012e0b0 a1 0a 06 1e 5c 00 68 00 - a0 2d 06 1e 20 d1 78 00 ....\.h..-.. .x.
0012e0c0 88 e4 12 00 00 00 00 00 - d0 41 0b 01 5c 00 68 00 .........A..\.h.
0012e0d0 6f 00 6d 00 00 00 5c 00 - 09 00 00 00 6e 00 64 00 o.m...\.....n.d.
0012e0e0 72 00 61 00 5c 00 4e 00 - 00 00 74 00 03 00 00 00 r.a.\.N...t.....
0012e0f0 00 12 09 1e 48 00 00 00 - d0 41 0b 01 01 00 00 00 ....H....A......
0012e100 36 0b 0e 1e 8c e0 12 00 - 04 00 00 00 a0 e2 12 00 6...............
0012e110 91 81 f9 77 50 96 f8 77 - ff ff ff ff b0 e2 12 00 ...wP..w........
0012e120 30 0e f9 77 bb 21 f9 77 - 08 06 74 00 93 21 f9 77 0..w.!.w..t..!.w
0012e130 00 00 00 00 40 00 00 00 - 68 2a 0b 01 20 e9 78 00 .... at ...h*.. .x.
0012e140 b8 a1 76 00 f2 e1 08 1e - 34 e9 78 00 01 00 00 00 ..v.....4.x.....
0012e150 00 00 00 00 60 08 0b 1e - 20 e9 78 00 34 e9 78 00 ....`... .x.4.x.
0012e160 a8 a2 76 00 b8 a1 76 00 - b8 a1 76 00 22 3e 09 1e ..v...v...v.">..
0012e170 b8 a1 76 00 a8 a2 76 00 - b8 a1 76 00 b8 a1 76 00 ..v...v...v...v.
0012e180 20 e9 78 00 f2 be 05 1e - b8 a1 76 00 fc be 05 1e .x.......v.....
0012e190 20 e9 78 00 02 00 00 00 - b8 a1 76 00 90 c4 05 1e .x.......v.....
0012e1a0 b8 a1 76 00 a8 c4 05 1e - 02 00 00 00 01 00 00 00 ..v.............
0012e1b0 5a c4 05 1e b8 a1 76 00 - 20 e9 78 00 02 00 00 00 Z.....v. .x.....
0012e1c0 b8 a1 76 00 20 e9 78 00 - 20 e9 78 00 6e c3 05 1e ..v. .x. .x.n...
0012e1d0 b8 a1 76 00 20 e9 78 00 - 02 00 00 00 20 e9 78 00 ..v. .x..... .x.
0012e1e0 02 00 00 00 94 e7 78 00 - 4e 12 09 1e 02 00 00 00 ......x.N.......
State Dump for Thread Id 0x1f4
eax=778321fe ebx=00000004 ecx=0000004c edx=00000000 esi=77f93233 edi=00000004
eip=77f9323e esp=0101fd24 ebp=0101fd70 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
function: NtWaitForMultipleObjects
77f93233 b8e9000000 mov eax,0xe9
77f93238 8d542404 lea edx,[esp+0x4] ss:01ab9c0b=85f88b20
77f9323c cd2e int 2e
77f9323e c21400 ret 0x14
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0101FD70 7C4FABFB 0101FD48 00000001 00000000 00000000 ntdll!NtWaitForMultipleObjects
0101FFB4 7C4E987C 00000005 000B000A 7C2D02A7 00152F90 kernel32!WaitForMultipleObjects
0101FFEC 00000000 778321FE 00152F90 00000000 000000C8 kernel32!SetThreadExecutionState
*----> Raw Stack Dump <----*
0101fd24 d7 bd 4e 7c 04 00 00 00 - 48 fd 01 01 01 00 00 00 ..N|....H.......
0101fd34 00 00 00 00 00 00 00 00 - 01 00 00 00 90 2f 15 00 ............./..
0101fd44 01 00 00 00 d4 00 00 00 - d8 00 00 00 e8 00 00 00 ................
0101fd54 54 01 00 00 8c 05 67 e2 - 00 00 00 00 80 0a ac f5 T.....g.........
0101fd64 d9 f3 4a 80 09 00 00 00 - 0c 00 00 00 b4 ff 01 01 ..J.............
0101fd74 fb ab 4f 7c 48 fd 01 01 - 01 00 00 00 00 00 00 00 ..O|H...........
0101fd84 00 00 00 00 00 00 00 00 - b2 22 83 77 04 00 00 00 .........".w....
0101fd94 b0 fe 01 01 00 00 00 00 - ff ff ff ff 90 2f 15 00 ............./..
0101fda4 a7 02 2d 7c 0a 00 0b 00 - d0 e8 ff e2 00 00 00 02 ..-|............
0101fdb4 0c 0c ac f5 00 00 00 00 - 01 00 00 00 38 00 00 00 ............8...
0101fdc4 23 00 00 00 23 00 00 00 - 0a 00 0b 00 a7 02 2d 7c #...#.........-|
0101fdd4 90 2f 15 00 68 02 2d 7c - 4c 00 00 00 fe 21 83 77 ./..h.-|L....!.w
0101fde4 f8 eb fd 7f 24 98 4e 7c - 1b 00 00 00 00 02 00 00 ....$.N|........
0101fdf4 fc ff 01 01 23 00 00 00 - 00 00 00 00 d0 e8 ff e2 ....#...........
0101fe04 6c 05 67 e2 00 00 00 02 - 00 00 00 02 80 e7 46 80 l.g...........F.
0101fe14 00 00 00 00 80 e7 46 80 - 24 0b ac f5 0d 11 4b 80 ......F.$.....K.
0101fe24 00 00 00 02 0c 0c ac f5 - 3c 0b ac f5 82 fb 4a 80 ........<.....J.
0101fe34 0c 0c ac f5 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0101fe44 01 00 00 00 00 00 00 00 - 00 00 00 00 80 39 48 80 .............9H.
0101fe54 01 00 00 00 00 00 00 00 - 00 00 00 00 68 72 a2 81 ............hr..
State Dump for Thread Id 0x628
eax=00acb470 ebx=0154ff90 ecx=00740688 edx=00000000 esi=77f94086 edi=0000016c
eip=77f94091 esp=0154ff74 ebp=0154ff98 iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000297
function: ZwWaitForSingleObject
77f94086 b8ea000000 mov eax,0xea
77f9408b 8d542404 lea edx,[esp+0x4] ss:01fe9e5b=????????
77f9408f cd2e int 2e
77f94091 c20c00 ret 0xc
77f94094 8a5001 mov dl,[eax+0x1] ds:01565356=f3
77f94097 3a5101 cmp dl,[ecx+0x1] ds:011da56e=??
77f9409a 0f8598c7ffff jne RtlEqualPrefixSid+0x44 (77f90838)
77f940a0 84d2 test dl,dl
77f940a2 7410 jz RtlQueryAtomInAtomTable+0x31 (77f94fb4)
77f940a4 0fb6d2 movzx edx,dl
77f940a7 33ff xor edi,edi
77f940a9 8d72ff lea esi,[edx+0xff] ds:00a99ee6=a4f303e1
77f940ac 85f6 test esi,esi
77f940ae 0f8f04100100 jnle RtlEraseUnicodeString+0x4e (77fa50b8)
77f940b4 b001 mov al,0x1
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0154FF98 00ACB509 0000016C 000003E8 00000000 00A4A520 ntdll!ZwWaitForSingleObject
0154FFEC 00000000 00ACB470 00000000 00000000 000000C8 !TclpGetDate
*----> Raw Stack Dump <----*
0154ff74 c2 c4 4f 7c 6c 01 00 00 - 00 00 00 00 90 ff 54 01 ..O|l.........T.
0154ff84 00 00 74 00 68 c4 4f 7c - 00 00 00 00 80 69 67 ff ..t.h.O|.....ig.
0154ff94 ff ff ff ff ec ff 54 01 - 09 b5 ac 00 6c 01 00 00 ......T.....l...
0154ffa4 e8 03 00 00 00 00 00 00 - 20 a5 a4 00 f0 d4 cc 12 ........ .......
0154ffb4 18 5b c3 01 7c 98 4e 7c - 00 00 00 00 00 00 74 00 .[..|.N|......t.
0154ffc4 20 a5 a4 00 00 00 00 00 - 00 c0 fd 7f 88 06 74 00 .............t.
0154ffd4 c0 ff 54 01 88 06 74 00 - ff ff ff ff b4 f0 4f 7c ..T...t.......O|
0154ffe4 60 d3 4e 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 `.N|............
0154fff4 70 b4 ac 00 00 00 00 00 - 00 00 00 00 c8 00 00 00 p...............
01550004 00 01 00 00 ff ee ff ee - 02 10 00 00 00 00 00 00 ................
01550014 00 fe 00 00 00 00 10 00 - 00 20 00 00 00 02 00 00 ......... ......
01550024 00 20 00 00 26 02 00 00 - ff ef fd 7f 08 00 08 06 . ..&...........
01550034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01550044 98 05 55 01 0f 00 00 00 - f8 ff ff ff 50 00 55 01 ..U.........P.U.
01550054 50 00 55 01 40 06 55 01 - 00 00 00 00 00 00 00 00 P.U. at .U.........
01550064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01550074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01550084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01550094 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
015500a4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
State Dump for Thread Id 0x6bc
eax=00000210 ebx=0014d050 ecx=00149f60 edx=00000000 esi=00149f60 edi=00000100
eip=77f839c7 esp=0188fe28 ebp=0188ff74 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
function: NtReplyWaitReceivePortEx
77f839bc b8ac000000 mov eax,0xac
77f839c1 8d542404 lea edx,[esp+0x4] ss:02329d0f=????????
77f839c5 cd2e int 2e
77f839c7 c21400 ret 0x14
77f839ca 8b4710 mov eax,[edi+0x10] ds:00a99fe6=0cc4e804
77f839cd 8b483c mov ecx,[eax+0x3c] ds:00a9a0f6=5100ad7e
77f839d0 f6400801 test byte ptr [eax+0x8],0x1 ds:00a9a0f6=7e
77f839d4 7502 jnz RtlCreateProcessParameters+0xd (77f83cd8)
77f839d6 03c8 add ecx,eax
77f839d8 894de4 mov [ebp+0xe4],ecx ss:02329e5a=????????
77f839db 8b4710 mov eax,[edi+0x10] ds:00a99fe6=0cc4e804
77f839de 668b4038 mov ax,[eax+0x38] ds:00a9a0f7=00ad
77f839e2 668945e0 mov [ebp+0xe0],ax ss:02329e5b=????
77f839e6 668945e2 mov [ebp+0xe2],ax ss:02329e5b=????
77f839ea 53 push ebx
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0188FF74 77D56D5E 77D39A00 00149F60 4013F27C 00000070 ntdll!NtReplyWaitReceivePortEx
0188FFA8 77D41C6D 0014E570 0188FFEC 7C4E987C 0014D050 rpcrt4!TowerConstruct
0188FFB4 7C4E987C 0014D050 4013F27C 00000070 0014D050 rpcrt4!I_RpcServerInqTransportType
0188FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!SetThreadExecutionState
State Dump for Thread Id 0x530
eax=77ab464e ebx=00000102 ecx=00130178 edx=00000000 esi=77f89153 edi=0198ff74
eip=77f8915e esp=0198ff60 ebp=0198ff7c iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
function: ZwDelayExecution
77f89153 b832000000 mov eax,0x32
77f89158 8d542404 lea edx,[esp+0x4] ss:02429e47=????????
77f8915c cd2e int 2e
77f8915e c20800 ret 0x8
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0198FF7C 7C4FAC79 0000EA60 00000000 77AB862F 0000EA60 ntdll!ZwDelayExecution
00007530 00000000 00000000 00000000 00000000 00000000 kernel32!Sleep
*----> Raw Stack Dump <----*
0198ff60 a5 ac 4f 7c 00 00 00 00 - 74 ff 98 01 68 c4 4f 7c ..O|....t...h.O|
0198ff70 18 0a 15 00 00 ba 3c dc - ff ff ff ff 30 75 00 00 ......<.....0u..
0198ff80 79 ac 4f 7c 60 ea 00 00 - 00 00 00 00 2f 86 ab 77 y.O|`......./..w
0198ff90 60 ea 00 00 10 47 ab 77 - 00 00 00 00 00 00 a5 77 `....G.w.......w
0198ffa0 18 0a 15 00 ec ff 98 01 - 18 0a 15 00 68 46 ab 77 ............hF.w
0198ffb0 d8 7a a6 77 c3 7a a6 77 - 7c 98 4e 7c 18 0a 15 00 .z.w.z.w|.N|....
0198ffc0 d8 7a a6 77 c3 7a a6 77 - 18 0a 15 00 00 a0 fd 7f .z.w.z.w........
0198ffd0 78 01 13 00 c0 ff 98 01 - 78 01 13 00 ff ff ff ff x.......x.......
0198ffe0 b4 f0 4f 7c 60 d3 4e 7c - 00 00 00 00 00 00 00 00 ..O|`.N|........
0198fff0 00 00 00 00 4e 46 ab 77 - 18 0a 15 00 00 00 00 00 ....NF.w........
01990000 4d 5a 90 00 03 00 00 00 - 04 00 00 00 ff ff 00 00 MZ..............
01990010 b8 00 00 00 00 00 00 00 - 40 00 00 00 00 00 00 00 ........ at .......
01990020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01990030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 01 00 00 ................
01990040 0e 1f ba 0e 00 b4 09 cd - 21 b8 01 4c cd 21 54 68 ........!..L.!Th
01990050 69 73 20 70 72 6f 67 72 - 61 6d 20 63 61 6e 6e 6f is program canno
01990060 74 20 62 65 20 72 75 6e - 20 69 6e 20 44 4f 53 20 t be run in DOS
01990070 6d 6f 64 65 2e 0d 0d 0a - 24 00 00 00 00 00 00 00 mode....$.......
01990080 9b b6 e5 4f df d7 8b 1c - df d7 8b 1c df d7 8b 1c ...O............
01990090 92 f4 97 1c de d7 8b 1c - 16 f5 a1 1c de d7 8b 1c ................
--
----------------------------------------------------------------------------
Tim Daneliuk tundra at tundraware.com
PGP Key: http://www.tundraware.com/PGP/
More information about the Python-list
mailing list