[erlang-questions] werl R14A on windows 7 frequently crashes during file access

Tuncer Ayaz tuncer.ayaz@REDACTED
Sat Jul 24 01:58:29 CEST 2010


call stacks of the three crash dumps:

werl.exe.9504.dmp

ChildEBP RetAddr  Args to Child
01a2d6ec 76fc5e4c 75386872 00000002 01a2d740 ntdll!KiFastSystemCallRet
01a2d6f0 75386872 00000002 01a2d740 00000001 ntdll!NtWaitForMultipleObjects+0xc
01a2d78c 759ef14a 01a2d740 01a2d7b4 00000000
KERNELBASE!WaitForMultipleObjectsEx+0x100
01a2d7d4 759ef2c2 00000002 7ffd4000 00000000
kernel32!WaitForMultipleObjectsExImplementation+0xe0
01a2d7f0 75a02f1d 00000002 01a2d824 00000000
kernel32!WaitForMultipleObjects+0x18
01a2d85c 75a02fba 01a2d93c 00000001 00000001
kernel32!WerpReportFaultInternal+0x186
01a2d870 75a02d48 01a2d93c 00000001 01a2d90c kernel32!WerpReportFault+0x70
01a2d880 75a02cc7 01a2d93c 00000001 4ba91c66 kernel32!BasepReportFault+0x20
01a2d90c 76ff5a74 00000000 76f9d950 00000000
kernel32!UnhandledExceptionFilter+0x1af
01a2d914 76f9d950 00000000 01a2ffd4 76fd0598 ntdll!__RtlUserThreadStart+0x62
01a2d928 76f9d7ec 00000000 00000000 00000000 ntdll!_EH4_CallFilterFunc+0x12
01a2d950 76fc65f9 fffffffe 01a2ffc4 01a2da58 ntdll!_except_handler4+0x8e
01a2d974 76fc65cb 01a2da3c 01a2ffc4 01a2da58 ntdll!ExecuteHandler2+0x26
01a2da24 76fc6457 00a2da3c 01a2da58 01a2da3c ntdll!ExecuteHandler+0x24
01a2da24 76fd1ffe 00a2da3c 01a2da58 01a2da3c ntdll!KiUserExceptionDispatcher+0xf
01a2dd70 76fd1faf 0180dee0 01830c98 01830858 ntdll!RtlpLowFragHeapFree+0x31
01a2dd88 759ef1cc 002f0000 00000000 0180dee0 ntdll!RtlFreeHeap+0x105
01a2dd9c 70ff4c39 002f0000 00000000 0180dee0 kernel32!HeapFree+0x14
01a2dde8 011ed4fc 0180dee0 009a0b24 0000028c msvcr80!free+0xcd
01a2de0c 011ed67d 009a0b24 01a2defc 00000005
beam_smp!reorganize_linebufs(struct HWND__ * hwnd = <Memory access
error>)+0x22c
01a2de6c 011ed7f1 009a0b24 00000000 0000029d
beam_smp!Client_OnSize(struct HWND__ * hwnd = 0x755d8876, unsigned int
state = 0x11ed7a0, int cx = 0n10095396, int cy = 0n5)+0xbd
01a2de80 755d86ef 009a0b24 00000005 00000000
beam_smp!ClientWndProc(struct HWND__ * hwnd = 0x755d8876, unsigned int
iMsg = 0x11ed7a0, unsigned int wParam = 0x9a0b24, long lParam =
0n5)+0x51
01a2deac 755d8876 011ed7a0 009a0b24 00000005 user32!InternalCallWinProc+0x23
01a2df24 755d1945 00000000 011ed7a0 009a0b24
user32!UserCallWinProcCheckWow+0x14b
01a2dfac 755d7308 009a0b24 011ed7a0 009a0b24
user32!RealDefWindowProcWorker+0x50c
01a2dfc8 73d81e60 009a0b24 00000047 00000000 user32!RealDefWindowProcW+0x47
01a2e024 73d81f20 00000000 00000000 00000000 uxtheme!_ThemeDefWindowProc+0x197
01a2e040 755d79f0 009a0b24 00000047 00000000 uxtheme!ThemeDefWindowProcW+0x18
01a2e088 755d86ef 009a0b24 00000047 00000000 user32!DefWindowProcW+0x68
01a2e0b4 755d79cc 011ed7a0 009a0b24 00000047 user32!InternalCallWinProc+0x23
01a2e12c 755d70f4 00000000 011ed7a0 009a0b24 user32!UserCallWinProcCheckWow+0xe0
01a2e188 755d184e 00596f80 00000047 00000000 user32!DispatchClientMessage+0xda
01a2e1b0 76fc642e 01a2e1c8 00000030 01a2e27c user32!__fnINLPWINDOWPOS+0x25
01a2e1f4 755d66ca 73d8cb9d 009a0b24 00000000 ntdll!KiUserCallbackDispatcher+0x2e
01a2e1f8 73d8cb9d 009a0b24 00000000 01a2e2a8 user32!NtUserSetScrollInfo+0xc
01a2e244 755d6672 009a0b24 00000000 01a2e2a8 uxtheme!ThemeSetScrollInfoProc+0x70
01a2e28c 011eaaff 009a0b24 00000000 01a2e2a8 user32!SetScrollInfo+0x57
01a2e2c0 011ed5e2 01a2e3ac 00000005 00000000
beam_smp!set_scroll_info(struct HWND__ * hwnd = 0x0180ded8)+0xaf
01a2e31c 011ed7f1 009a0b24 00000000 0000029d
beam_smp!Client_OnSize(struct HWND__ * hwnd = 0x755d8876, unsigned int
state = 0x11ed7a0, int cx = 0n10095396, int cy = 0n5)+0x22
01a2e330 755d86ef 009a0b24 00000005 00000000
beam_smp!ClientWndProc(struct HWND__ * hwnd = 0x755d8876, unsigned int
iMsg = 0x11ed7a0, unsigned int wParam = 0x9a0b24, long lParam =
0n5)+0x51
01a2e35c 755d8876 011ed7a0 009a0b24 00000005 user32!InternalCallWinProc+0x23
01a2e3d4 755d1945 00000000 011ed7a0 009a0b24
user32!UserCallWinProcCheckWow+0x14b
01a2e45c 755d7308 009a0b24 011ed7a0 009a0b24
user32!RealDefWindowProcWorker+0x50c
01a2e478 73d81e60 009a0b24 00000047 00000000 user32!RealDefWindowProcW+0x47
01a2e4d4 73d81f20 00000000 00000000 00000000 uxtheme!_ThemeDefWindowProc+0x197
01a2e4f0 755d79f0 009a0b24 00000047 00000000 uxtheme!ThemeDefWindowProcW+0x18
01a2e538 755d86ef 009a0b24 00000047 00000000 user32!DefWindowProcW+0x68
01a2e564 755d79cc 011ed7a0 009a0b24 00000047 user32!InternalCallWinProc+0x23
01a2e5dc 755d70f4 00000000 011ed7a0 009a0b24 user32!UserCallWinProcCheckWow+0xe0
01a2e638 755d184e 00596f80 00000047 00000000 user32!DispatchClientMessage+0xda
01a2e660 76fc642e 01a2e678 00000030 01a2ea84 user32!__fnINLPWINDOWPOS+0x25
01a2e6a4 755ca8d0 011ecab3 009a0b24 00000000 ntdll!KiUserCallbackDispatcher+0x2e
01a2e6a8 011ecab3 009a0b24 00000000 0000001c user32!NtUserMoveWindow+0xc
01a2e9f0 755d86ef 000807d2 00000005 00000000
beam_smp!FrameWndProc(struct HWND__ * hwnd = <Memory access error>,
unsigned int iMsg = <Memory access error>, unsigned int wParam =
<Memory access error>, long lParam = <Memory access error>)+0x133
01a2ea1c 755d8876 011ec980 000807d2 00000005 user32!InternalCallWinProc+0x23
01a2ea94 755d1945 00000000 011ec980 000807d2
user32!UserCallWinProcCheckWow+0x14b
01a2eb1c 755d7308 011ec980 011ec980 000807d2
user32!RealDefWindowProcWorker+0x50c
01a2eb38 73d81e60 000807d2 00000047 00000000 user32!RealDefWindowProcW+0x47
01a2eb94 73d81f20 00000000 00000000 00000000 uxtheme!_ThemeDefWindowProc+0x197
01a2ebb0 755d79f0 000807d2 00000047 00000000 uxtheme!ThemeDefWindowProcW+0x18

werl.exe.12616.dmp

ChildEBP RetAddr  Args to Child
01adf310 76fc5e4c 75386872 00000002 01adf364 ntdll!KiFastSystemCallRet
01adf314 75386872 00000002 01adf364 00000001 ntdll!NtWaitForMultipleObjects+0xc
01adf3b0 759ef14a 01adf364 01adf3d8 00000000
KERNELBASE!WaitForMultipleObjectsEx+0x100
01adf3f8 759ef2c2 00000002 7ffdd000 00000000
kernel32!WaitForMultipleObjectsExImplementation+0xe0
01adf414 75a02f1d 00000002 01adf448 00000000
kernel32!WaitForMultipleObjects+0x18
01adf480 75a02fba 01adf560 00000001 00000001
kernel32!WerpReportFaultInternal+0x186
01adf494 75a02d48 01adf560 00000001 01adf530 kernel32!WerpReportFault+0x70
01adf4a4 75a02cc7 01adf560 00000001 437b60c2 kernel32!BasepReportFault+0x20
01adf530 76ff5a74 00000000 76f9d950 00000000
kernel32!UnhandledExceptionFilter+0x1af
01adf538 76f9d950 00000000 01adffd4 76fd0598 ntdll!__RtlUserThreadStart+0x62
01adf54c 76f9d7ec 00000000 00000000 00000000 ntdll!_EH4_CallFilterFunc+0x12
01adf574 76fc65f9 fffffffe 01adffc4 01adf67c ntdll!_except_handler4+0x8e
01adf598 76fc65cb 01adf660 01adffc4 01adf67c ntdll!ExecuteHandler2+0x26
01adf648 76fc6457 00adf660 01adf67c 01adf660 ntdll!ExecuteHandler+0x24
01adf648 76f9f23e 00adf660 01adf67c 01adf660 ntdll!KiUserExceptionDispatcher+0xf
01adf98c 77007e3f 01887f00 01887f00 00000020 ntdll!RtlpDeCommitFreeBlock+0x146
01adfa74 76fd34ca 000000a2 000000b0 01887f02 ntdll!RtlpAllocateHeap+0x76b
01adfaf8 70ff4d83 006e0000 00000000 000000a2 ntdll!RtlAllocateHeap+0x23a
01adfb18 013bab33 000000a2 015c252a 755d7041 msvcr80!malloc+0x7a
01adfb28 013bc020 015c252a 013bc04f 013bc60d beam_smp!ConNewLine(void)+0x23
01adfb30 013bc04f 013bc60d 00000000 01adfbfc
beam_smp!ensure_line_below(void)+0x50
01adfb34 013bc60d 00000000 01adfbfc 00000401
beam_smp!ConCarriageFeed(int hard_newline = <Memory access error>)+0xf
01adfb78 013bd980 007c0eac 755d86ef 007c0eac
beam_smp!ConDrawText(struct HWND__ * hwnd = <Memory access
error>)+0x13d
01adfb80 755d86ef 007c0eac 00000401 00000000
beam_smp!ClientWndProc(struct HWND__ * hwnd = 0x755d8876, unsigned int
iMsg = 0x13bd7a0, unsigned int wParam = 0x7c0eac, long lParam =
0n1025)+0x1e0
01adfbac 755d8876 013bd7a0 007c0eac 00000401 user32!InternalCallWinProc+0x23
01adfc24 755d89b5 00000000 013bd7a0 007c0eac
user32!UserCallWinProcCheckWow+0x14b
01adfc84 755d8e9c 013bd7a0 00000000 00000000 user32!DispatchMessageWorker+0x35e
01adfc94 013bdc7d 01adfce4 00000000 00000000 user32!DispatchMessageW+0xf
01adff48 70ff29bb 00000000 43789f36 00000000
beam_smp!ConThreadInit(void * param = <Memory access error>)+0x2ed
01adff80 70ff2a47 00000000 759f1194 006e5258 msvcr80!_endthreadex+0x3b

werl.exe.14176.dmp

ChildEBP RetAddr  Args to Child
01b6f4f0 76fc5e4c 75386872 00000002 01b6f544 ntdll!KiFastSystemCallRet
01b6f4f4 75386872 00000002 01b6f544 00000001 ntdll!NtWaitForMultipleObjects+0xc
01b6f590 759ef14a 01b6f544 01b6f5b8 00000000
KERNELBASE!WaitForMultipleObjectsEx+0x100
01b6f5d8 759ef2c2 00000002 7ffdf000 00000000
kernel32!WaitForMultipleObjectsExImplementation+0xe0
01b6f5f4 75a02f1d 00000002 01b6f628 00000000
kernel32!WaitForMultipleObjects+0x18
01b6f660 75a02fba 01b6f740 00000001 00000001
kernel32!WerpReportFaultInternal+0x186
01b6f674 75a02d48 01b6f740 00000001 01b6f710 kernel32!WerpReportFault+0x70
01b6f684 75a02cc7 01b6f740 00000001 b1896c2b kernel32!BasepReportFault+0x20
01b6f710 76ff5a74 00000000 76f9d950 00000000
kernel32!UnhandledExceptionFilter+0x1af
01b6f718 76f9d950 00000000 01b6ffd4 76fd0598 ntdll!__RtlUserThreadStart+0x62
01b6f72c 76f9d7ec 00000000 00000000 00000000 ntdll!_EH4_CallFilterFunc+0x12
01b6f754 76fc65f9 fffffffe 01b6ffc4 01b6f85c ntdll!_except_handler4+0x8e
01b6f778 76fc65cb 01b6f840 01b6ffc4 01b6f85c ntdll!ExecuteHandler2+0x26
01b6f828 76fc6457 00b6f840 01b6f85c 01b6f840 ntdll!ExecuteHandler+0x24
01b6f828 0139c562 00b6f840 01b6f85c 01b6f840 ntdll!KiUserExceptionDispatcher+0xf
01b6fb78 0139d980 001a081c 755d86ef 001a081c
beam_smp!ConDrawText(struct HWND__ * hwnd = <Memory access
error>)+0x92
01b6fb80 755d86ef 001a081c 00000401 00000000
beam_smp!ClientWndProc(struct HWND__ * hwnd = 0x755d8876, unsigned int
iMsg = 0x139d7a0, unsigned int wParam = 0x1a081c, long lParam =
0n1025)+0x1e0
01b6fbac 755d8876 0139d7a0 001a081c 00000401 user32!InternalCallWinProc+0x23
01b6fc24 755d89b5 00000000 0139d7a0 001a081c
user32!UserCallWinProcCheckWow+0x14b
01b6fc84 755d8e9c 0139d7a0 00000000 00000000 user32!DispatchMessageWorker+0x35e
01b6fc94 0139dc7d 01b6fce4 00000000 00000000 user32!DispatchMessageW+0xf
01b6ff48 70ff29bb 00000000 b189c442 00000000
beam_smp!ConThreadInit(void * param = <Memory access error>)+0x2ed
01b6ff80 70ff2a47 00000000 759f1194 005b5258 msvcr80!_endthreadex+0x3b
01b6ff88 759f1194 005b5258 01b6ffd4 76fdb3f5 msvcr80!_endthreadex+0xc7
01b6ff94 76fdb3f5 005b5258 5e587bd5 00000000 kernel32!BaseThreadInitThunk+0xe
01b6ffd4 76fdb3c8 70ff29e1 005b5258 00000000 ntdll!__RtlUserThreadStart+0x70
01b6ffec 00000000 70ff29e1 005b5258 00000000 ntdll!_RtlUserThreadStart+0x1b


More information about the erlang-questions mailing list