climateprediction.net home page
documented c0000005 (Zugriffsverletzung)

documented c0000005 (Zugriffsverletzung)

Questions and Answers : Windows : documented c0000005 (Zugriffsverletzung)
Message board moderation

To post messages, you must log in.

AuthorMessage
old_user2741

Send message
Joined: 29 Aug 04
Posts: 6
Credit: 29,078
RAC: 0
Message 3273 - Posted: 7 Sep 2004, 15:04:12 UTC
Last modified: 7 Sep 2004, 15:12:16 UTC

c0000005 (Zugriffsverletzung)

if I'm completely wrong here, I offer my apology

must I Update the gui to 4.06 4.07?



windows 2000 amd p2600 256k DDR 400

dual project attached.

a faithfull pc, only boinc (gui 4.05) running


afther abend no progress for seti (peempted) or for cpdn


//
stopped boinc client, started boinc client
now cpdn progressing, restarted from "last checkpoint" not from zero (fine!)

now the hadsm3um_4.03_w with 50 MB+ is seen in the tasklist

(and
setiathome_4.03
hadsm3_4.03_win
boinc_gui.exe
)
//




tasklist after abend

setiathome_4.03
hadsm3_4.03_win
boinc_gui.exe

and the rest..


message came from from the OS:

drwtsn32:

Anwendungsausnahme aufgetreten:
Anwendung: (pid=780)
Wann: 07.09.2004 @ 16:34:37.765
Ausnahmenummer: c0000005 (Zugriffsverletzung)

*----> Systeminformationen Taskliste
007a6ea3 8b4d98 mov ecx,[ebp+0x98] ss:03aa82fe=00000000
007a6ea6 8d0c08 lea ecx,[eax+ecx] ds:02fc5f3c=3859e27e
007a6ea9 894d9c mov [ebp+0x9c],ecx ss:03aa82fe=00000000
007a6eac 8b4d94 mov ecx,[ebp+0x94] ss:03aa82fe=00000000
007a6eaf 8d0c08 lea ecx,[eax+ecx] ds:02fc5f3c=3859e27e
007a6eb2 8955a4 mov [ebp+0xa4],edx ss:03aa82fe=00000000
007a6eb5 8b559c mov edx,[ebp+0x9c] ss:03aa82fe=00000000
007a6eb8 eb04 jmp 007b47be
007a6eba d95cb1f8 fstp dword ptr [ecx+esi*4+0xf8] ds:00a8a58d=00000000
007a6ebe d944b1fc fld dword ptr [ecx+esi*4+0xfc] ds:00a8a58d=00000000
FEHLER ->007a6ec2 d844b2fc fadd dword ptr [edx+esi*4+0xfc] ds:00a8a58d=00000000
007a6ec6 46 inc esi
007a6ec7 3bf7 cmp esi,edi
007a6ec9 7eef jle 007b48ba
007a6ecb d95cb1f8 fstp dword ptr [ecx+esi*4+0xf8] ds:00a8a58d=00000000
007a6ecf 8b55a4 mov edx,[ebp+0xa4] ss:03aa82fe=00000000
007a6ed2 0345a0 add eax,[ebp+0xa0] ss:03aa82fe=00000000
007a6ed5 42 inc edx
007a6ed6 8b4d90 mov ecx,[ebp+0x90] ss:03aa82fe=00000000
007a6ed9 3bd1 cmp edx,ecx
007a6edb 7eb8 jle 007afa95
007a6edd 8b7da8 mov edi,[ebp+0xa8] ss:03aa82fe=00000000

*----> Stack Back Trace
039722B8 006FA8F6 00000000 00000000 03E45570 006FA8F6 !
03E45568 0061CAD3 03FF5660 0061CAD3 04BDFC68 04469940 !
03FF5658 00546043 042976C8 00546043 03FF5950 040779D0 !
042976B8 0049BA44 00001000 00000800 04B08A40 0049BA44 !
0429E804 00422BE3 04BDFCC8 04BDFCC4 04BDFCC0 04BDFCBC !
04BDF9F0 00407E27 0094A518 0094A514 04BDFCC8 04BDFCC4 !
04BDFFC0 77E81AF6 77882AD0 FFFFFFFF 7FFDF000 C0000005 !
04BDFFF0 00000000 008DC367 00000000 000000C8 00000100 kernel32!OpenEventA

*----> Raw Stack Dump
02b580b0 00 d3 10 3f 00 13 c6 3e - 00 e9 03 3f 00 50 0e 3f ...?...>...?.P.?
02b580c0 00 7d 03 3f 80 7e 0b 3f - 00 c0 05 3f 80 20 03 3f .}.?.~.?...?. .?
02b580d0 80 c1 0c 3f 80 33 3f 3f - 80 a4 4e 3f 80 58 79 3f ...?.3??..N?.Xy?
02b580e0 00 e2 52 3f 00 83 52 3f - 00 26 51 3f 80 1e 7a 3f ..R?..R?.&Q?..z?
02b580f0 80 82 94 3f c0 ee ad 3f - 00 19 6b 3f 80 a1 73 3f ...?...?..k?..s?
02b58100 c0 b4 97 3f 40 8c a8 3f - 00 12 87 3f 00 51 96 bf ...?@..?...?.Q..
02b58110 80 c7 e6 bf 00 03 4f bf - 00 64 d1 be 00 85 db be ......O..d......
02b58120 00 d9 04 bf 00 79 54 bf - 00 48 1e bf 80 c8 19 3f .....yT..H.....?
02b58130 00 7a fc 3e 80 28 10 3f - 00 5c 36 3f 40 3a 8c 3f .z.>.(.?.6?@:.?
02b58140 80 79 32 3f 00 c0 57 3f - 00 93 5b 3f 80 b8 70 3f .y2?..W?..[?..p?
02b58150 80 b8 8a 3f 00 4c 95 3f - 40 62 a2 3f 40 c9 af 3f ...?.L.?@b.?@..?
02b58160 c0 44 00 40 00 d0 f7 3f - c0 04 cc 3f 00 14 0d 3e .D.@...?...?...>
02b58170 00 af 80 be 80 3c 7a bf - 80 62 35 bf 00 85 78 bf ..... Stack Back Trace

*----> Raw Stack Dump C.
0943003c 00 00 00 00 41 00 08 00 - 01 01 08 00 58 ce 36 37 ....A.......X.67
0943004c 59 ce 36 37 59 ce 36 37 - 59 ce 36 37 59 ce 36 37 Y.67Y.67Y.67Y.67
0943005c 59 ce 36 37 59 ce 36 37 - 59 ce 36 37 59 ce 36 37 Y.67Y.67Y.67Y.67
0943006c 61 ce 36 37 91 c6 36 37 - 62 cc 36 37 44 0f 37 37 a.67..67b.67D.77
0943007c 38 6f 35 37 19 9b 34 37 - b0 aa 34 37 9f 5b 35 37 8o57..47..47.[57

Funktion: NtWaitForMultipleObjects
77882873 b8e9000000 mov eax,0xe9
77882878 8d542404 lea edx,[esp+0x4] ss:09eb9e33=????????
7788287c cd2e int 2e
7788287e c21400 ret 0x14


*----> Stack Back Trace
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
77882060 8B000000 83042454 0F00147A 017B9C85 42FF9000 ntdll!NtWaitForMultipleObjects
180D8B64 00000000 00000000 00000000 00000000 00000000 nosymbols

kind regards ric
ID: 3273 · Report as offensive     Reply Quote

Questions and Answers : Windows : documented c0000005 (Zugriffsverletzung)

©2024 cpdn.org