locked
Service crashed with exception : {EXCEPTION} Guard Page Exception A page of memory that marks the end of a data structure, such as a stack or an array, has been accessed. RRS feed

  • Question

  • EXCEPTION_RECORD:  (.exr -1)
    .exr -1
    ExceptionAddress: 003feb16
       ExceptionCode: 80000001 (Guard page violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000000
       Parameter[1]: 00bce010


    ERROR_CODE: (NTSTATUS) 0x80000001 - {EXCEPTION}  Guard Page Exception  A page of memory that marks the end of a data structure, such as a stack or an array, has been accessed.

    EXCEPTION_CODE: (HRESULT) 0x80000001 (2147483649) - Not implemented

    EXCEPTION_CODE_STR:  80000001

    EXCEPTION_PARAMETER1:  00000000

    EXCEPTION_PARAMETER2:  00bce010

    WATSON_BKT_PROCSTAMP:  5ee91bd8

    WATSON_BKT_PROCVER:  17.2.5.4


    WATSON_BKT_MODULE:  unknown

    WATSON_BKT_MODVER:  0.0.0.0

    WATSON_BKT_MODOFFSET:  3feb16

    WATSON_BKT_MODSTAMP:  bbbbbbb4

    BUILD_VERSION_STRING:  6.1.7601.24384 (win7sp1_ldr_escrow.190220-1800)

    MODLIST_WITH_TSCHKSUM_HASH:  09746ef12c2b2af76b06fdeeada4a6f83def7e30

    MODLIST_SHA1_HASH:  f2f1783896ab0feda9c41800e115a40766d09480

    NTGLOBALFLAG:  0

    PROCESS_BAM_CURRENT_THROTTLED: 0

    PROCESS_BAM_PREVIOUS_THROTTLED: 0

    APPLICATION_VERIFIER_FLAGS:  0

    PRODUCT_TYPE:  1

    SUITE_MASK:  272

    DUMP_FLAGS:  c07

    DUMP_TYPE:  3

    MISSING_CLR_SYMBOL: 0

    ANALYSIS_SESSION_HOST:  WIN2019SEP

    ANALYSIS_SESSION_TIME:  07-27-2020 12:06:25.0762

    ANALYSIS_VERSION: 10.0.18362.1 x86fre

    MANAGED_CODE: 1

    MANAGED_ENGINE_MODULE:  mscorwks

    THREAD_ATTRIBUTES: 
    OS_LOCALE:  ENU

    ADDITIONAL_DEBUG_TEXT:  SOS.DLL is not loaded for managed code. Analysis might be incomplete

    BUGCHECK_STR:  GUARD_PAGE_VIOLATION_NOSOS

    DEFAULT_BUCKET_ID:  GUARD_PAGE_VIOLATION_NOSOS

    PRIMARY_PROBLEM_CLASS:  GUARD_PAGE_VIOLATION

    PROBLEM_CLASSES: 

        ID:     [0n321]
        Type:   [@APPLICATION_FAULT_STRING]
        Class:  Primary
        Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
                BUCKET_ID
        Name:   Omit
        Data:   Add
                String: [GUARD_PAGE_VIOLATION]
        PID:    [Unspecified]
        TID:    [Unspecified]
        Frame:  [0]

        ID:     [0n251]
        Type:   [NOSOS]
        Class:  Addendum
        Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
                BUCKET_ID
        Name:   Add
        Data:   Omit
        PID:    [Unspecified]
        TID:    [Unspecified]
        Frame:  [0]

    IP_ON_HEAP:  00378703
    The fault address in not in any loaded module, please check your build's rebase
    log at <releasedir>\bin\build_logs\timebuild\ntrebase.log for module which may
    contain the address if it were loaded.

    FRAME_ONE_INVALID: 1

    LAST_CONTROL_TRANSFER:  from 00378703 to 003feb16

    STACK_TEXT:  
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    07bcde3c 00378703 044407c0 00bce010 044407a0 0x3feb16
    07bcde54 003789b4 00bce010 044407a0 07bcde84 0x378703
    07bcde74 00378dc2 c000000d 00bce010 07bcdff4 0x3789b4
    07bcde90 003fe1b9 c000000d 00bce010 00000000 0x378dc2
    07bcdef4 72301366 07bce010 00000000 07bce010 0x3fe1b9
    07bcdf18 7234230d 07bce010 00000002 00db0924 WSHTCPIP!WSHStringToAddress+0x49
    07bcdf60 75526b5f 07bce010 00000002 00db0924 mswsock!WSPStringToAddress+0x87
    07bcdfbc 74d49ed6 07bce010 00000002 00000000 ws2_32!WSAStringToAddressW+0xa2
    07bce818 74d49283 05d6a7b8 00000021 07bce850 winhttp!IsHostLiteralOrLocalHostW+0x116
    07bce864 74d55a9d 00000002 05d6a7b8 00000021 winhttp!HTTP_PROXY_RESOLVER::doesServerBypassProxy+0x43
    07bce884 74d491eb 00000002 05d6a7b8 00000021 winhttp!HTTP_PROXY_RESOLVER::ProxyResolutionForServer+0x2d
    07bce8c8 74d481e4 00000002 05d6a7b8 00000021 winhttp!HTTP_PROXY_RESOLVER::ProcessDirectAccessResults+0x41
    07bce8ec 74d48103 00000002 05d6a7b8 00000021 winhttp!HTTP_PROXY_RESOLVER::ProxyResolutionWithDirectAccess+0x32
    07bce930 74d47e11 0e3d1ed8 05b01d40 00000000 winhttp!HTTP_USER_REQUEST::_SendRequestWithDrainComplete+0xc5
    07bce954 74d47b8f 00000000 00000000 00000000 winhttp!HTTP_USER_REQUEST::SendRequest+0x524
    07bcea24 6b70d197 05b01d40 00000000 00000000 winhttp!WinHttpSendRequest+0x245
    .
    .
    .
    .
    .
    .

    Any idea, what could be the reason ? 



    Thursday, August 6, 2020 5:59 AM

All replies

  • Hi,

    Thanks for posting here.

    The system raises a STATUS_GUARD_PAGE_VIOLATION (0x80000001) exception when a program attempts to access an address within a guard page.

    And the stack shows that the exception occurred in the WinHttpSendRequest call. Could you provide a minimal, reproducible sample for us to reproduce it?

    Best Regards,

    Drake

    This “General Windows Desktop Development Issues” Forum will be migrating to a new home on Microsoft Q&A, please refer to this sticky post for more details. 


    "Win32 API" forum will be migrating to a new home on Microsoft Q&A !
    We invite you to post new questions in the "Win32 API" forum’s new home on Microsoft Q&A !
    For more information, please refer to the sticky post.

    Thursday, August 6, 2020 6:57 AM
  • If the real stack trace (STACK_TEXT) is longer and was stripped in this message, then investigate it and find the lines that belong to your program.



    • Edited by Viorel_MVP Thursday, August 6, 2020 7:57 AM
    Thursday, August 6, 2020 7:56 AM