Comment #2 on issue 24037 by [email protected]: Mega crasher in the utility  
process
http://code.google.com/p/chromium/issues/detail?id=24037

FAULTING_IP:
klg+30fa
6fa930fa 8b08            mov     ecx,dword ptr [eax]

EXCEPTION_RECORD:  ffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 6fa930fa (klg+0x000030fa)
    ExceptionCode: c0000005 (Access violation)
   ExceptionFlags: 00000000
NumberParameters: 2
    Parameter[0]: 00000000
    Parameter[1]: 00b8cd20
Attempt to read from address 00b8cd20

DEFAULT_BUCKET_ID:  INVALID_POINTER_READ

PROCESS_NAME:  chrome.exe

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced  
memory at
"0x%08lx". The memory could not be "%s".

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx"  
referenced
memory at "0x%08lx". The memory could not be "%s".

EXCEPTION_PARAMETER1:  00000000

EXCEPTION_PARAMETER2:  00b8cd20

READ_ADDRESS:  00b8cd20

FOLLOWUP_IP:
klg+30fa
6fa930fa 8b08            mov     ecx,dword ptr [eax]

LAST_CONTROL_TRANSFER:  from 00000000 to 76e74460

FAULTING_THREAD:  ffffffff

PRIMARY_PROBLEM_CLASS:  INVALID_POINTER_READ

BUGCHECK_STR:  APPLICATION_FAULT_INVALID_POINTER_READ

IP_ON_HEAP:  000feaa0
The fault address in not in any loaded module, please check your build's  
rebase
log at <releasedir>\bin\build_logs\timebuild\ntrebase.log for module which  
may
contain the address if it were loaded.

UNALIGNED_STACK_POINTER:  01f411c2

STACK_TEXT:
6fa930fa klg+0x30fa


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  klg+30fa

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: klg

IMAGE_NAME:  klg.dat

DEBUG_FLR_IMAGE_TIMESTAMP:  49950110

STACK_COMMAND:  dds 6fa930fa ; kb

FAILURE_BUCKET_ID:  INVALID_POINTER_READ_c0000005_klg.dat!Unknown

BUCKET_ID:  APPLICATION_FAULT_INVALID_POINTER_READ_klg+30fa

WATSON_STAGEONE_URL:
http://watson.microsoft.com/StageOne/chrome_exe/0_0_0_0/4ac64269/klg_dat/6_1_0_1/4995
0110/c0000005/000030fa.htm?Retriage=1

Followup: MachineOwner
---------

0:000> lmvm klg
start    end        module name
6fa90000 6faaf000   klg      T (no symbols)
     Loaded symbol image file: klg.dat
     Image path: C:\Program Files\Spyware Doctor\klg.dat
     Image name: klg.dat
     Timestamp:        Thu Feb 12 21:11:44 2009 (49950110)
     CheckSum:         00000000
     ImageSize:        0001F000
     File version:     6.1.0.1
     Product version:  6.1.0.1
     File flags:       0 (Mask 3F)
     File OS:          4 Unknown Win32
     File type:        1.0 App
     File date:        00000000.00000000
     Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4


--
You received this message because you are listed in the owner
or CC fields of this issue, or because you starred this issue.
You may adjust your issue notification preferences at:
http://code.google.com/hosting/settings

--~--~---------~--~----~------------~-------~--~----~
Automated mail from issue updates at http://crbug.com/
Subscription options: http://groups.google.com/group/chromium-bugs
-~----------~----~----~----~------~----~------~--~---

Reply via email to