Unity Player caused an Access Violation (0xc0000005) - windows

I have a Unity Build (player) which is working fine on my PC but producing error(crash) on my client PC. The client has shared the log (Crash log) which is related to access Violation.
> Unity Player [version: Unity 5.6.2f1_a2913c821e27]
VB_Player_005.exe caused an Access Violation (0xc0000005)
in module VB_Player_005.exe at 0033:205c16c7.
Error occurred at 2019-01-07_124838.
D:\DB\07_Mark\03_Medien\Player\01_3D_Rocket\VB\VB_Player_005.exe, run by KJ.
22% memory in use.
8073 MB physical memory [6280 MB free].
11145 MB paging file [7712 MB free].
134217728 MB user address space [134213247 MB free].
Read from location 0000000e caused an access violation.
Context:
RDI: 0x00005853 RSI: 0x00001003 RAX: 0x00000000
RBX: 0x0017eb80 RCX: 0x0000000e RDX: 0x00000000
RIP: 0x205c16c7 RBP: 0x00000001 SegCs: 0x00000033
EFlags: 0x00010293 RSP: 0x0017e950 SegSs: 0x0000002b
R8: 0x00000010 R9: 0x00000001 R10: 0x20d67f88
R11: 0x00000000 R12: 0x00000010 R13: 0x00000000
R14: 0x05e17b00 R15: 0x0017eae0
Bytes at CS:EIP:
0f b7 31 33 ff 48 8d 59 02 44 8d 7f 08 eb 07 0f
Stack:
0x0017e950: 06300031 00000000 40bca088 00007ff8 1.0........#....
0x0017e960: 00000000 00000000 0017ea48 00000000 ........H.......
0x0017e970: 0017eae0 00000000 05e17b00 00000000 .........{......
0x0017e980: 062cbaf8 00000000 062a1ab8 00000000 ..,.......*.....
0x0017e990: 00005853 00000000 00001003 00000000 SX..............
0x0017e9a0: 0017ea39 00000000 2052c664 00007ff7 9.......d.R ....
0x0017e9b0: 0000000e 00000000 062a1ab8 00000000 ..........*.....
0x0017e9c0: 0017eb80 00000000 0017ea48 00000000 ........H.......
0x0017e9d0: 00000000 00000000 00000000 00000000 ................
0x0017e9e0: 00000000 00000000 00000000 00000000 ................
0x0017e9f0: 0017ea08 00000000 3df0ca21 00007ff8 ........!..=....
0x0017ea00: 0630cd10 00000000 0628a6b0 00000000 ..0.......(.....
0x0017ea10: 062fd580 00000000 061e1a10 00000000 ../.............
0x0017ea20: 022b8060 00000000 00000024 00000000 `.+.....$.......
0x0017ea30: 3df00000 00007ff8 00000024 00000000 ...=....$.......
0x0017ea40: 00000042 00000000 00000000 00000000 B...............
0x0017ea50: 063052c8 00000000 00000000 00000000 .R0.............
0x0017ea60: 00000001 00000000 00000005 00000000 ................
0x0017ea70: 05e17b00 00000000 036f40d8 00000000 .{.......#o.....
0x0017ea80: 0017ee78 00000000 036f4060 00000000 x.......`#o.....
0x0017ea90: 0017eef0 00000000 2052c7ca 00007ff7 ..........R ....
0x0017eaa0: 00000000 00000000 20d68020 00007ff7 ........ .. ....
0x0017eab0: 062c7950 00000000 00000001 00000000 Py,.............
0x0017eac0: 00000001 00000001 00000001 00000001 ................
0x0017ead0: 80000000 00000000 00000000 00000000 ................
0x0017eae0: 00000000 00000000 3dde2690 00007ff8 .........&.=....
0x0017eaf0: 00000000 00000000 00633e28 00000000 ........(>c.....
0x0017eb00: 00633da0 00000000 00000000 00000000 .=c.............
0x0017eb10: 00000001 00000000 00000000 00000000 ................
0x0017eb20: 00000001 00000000 00000001 00000000 ................
0x0017eb30: 00000000 00000000 00000000 00000000 ................
0x0017eb40: 00000000 00000000 f1cb0000 00007fff ................
0x0017eb50: 00000000 00000000 00000000 00000000 ................
0x0017eb60: 00000001 00000007 00000001 00000000 ................
0x0017eb70: 00000000 00000000 00000000 00000000 ................
0x0017eb80: 0056004e 00440049 00410049 00470020 N.V.I.D.I.A. .G.
0x0017eb90: 00460065 0072006f 00650063 00390020 e.F.o.r.c.e. .9.
0x0017eba0: 00300034 0058004d 00000000 00000000 4.0.M.X.........
0x0017ebb0: 00000000 00000000 00000000 00000000 ................
0x0017ebc0: 00000000 00000000 00000000 00000000 ................
0x0017ebd0: 00000000 00000000 00000000 00000000 ................
0x0017ebe0: 00000000 00000000 00000000 00000000 ................
0x0017ebf0: 00000000 00000000 00000000 00000000 ................
0x0017ec00: 00000000 00000000 00000000 00000000 ................
0x0017ec10: 00000000 00000000 00000000 00000000 ................
0x0017ec20: 00000000 00000000 00000000 00000000 ................
0x0017ec30: 00000000 00000000 00000000 00000000 ................
0x0017ec40: 00000000 00000000 00000000 00000000 ................
0x0017ec50: 00000000 00000000 00000000 00000000 ................
0x0017ec60: 00000000 00000000 00000000 00000000 ................
0x0017ec70: 00000000 00000000 00000000 00000000 ................
0x0017ec80: 000010de 0000134d 138e1043 000000a2 ....M...C.......
0x0017ec90: 7e3e0000 00000000 00000000 00000000 ..>~............
0x0017eca0: fc431000 00000000 0000bc49 00000000 ..C.....I.......
0x0017ecb0: 0056004e 00440049 00410049 00470020 N.V.I.D.I.A. .G.
0x0017ecc0: 00460065 0072006f 00650063 00390020 e.F.o.r.c.e. .9.
0x0017ecd0: 00300034 0058004d 00000000 00000000 4.0.M.X.........
0x0017ece0: 00000000 00000000 00000000 00000000 ................
0x0017ecf0: 00000000 00000000 00000000 00000000 ................
0x0017ed00: 00000000 00000000 00000000 00000000 ................
0x0017ed10: 00000000 00000000 00000000 00000000 ................
0x0017ed20: 00000000 00000000 00000000 00000000 ................
0x0017ed30: 00000000 00000000 00000000 00000000 ................
0x0017ed40: 00000000 00000000 00000000 00000000 ................
0x0017ed50: 00000000 00000000 00000000 00000000 ................
0x0017ed60: 00000000 00000000 00000000 00000000 ................
0x0017ed70: 00000000 00000000 00000000 00000000 ................
0x0017ed80: 00000000 00000000 00000000 00000000 ................
0x0017ed90: 00000000 00000000 00000000 00000000 ................
0x0017eda0: 00000000 00000000 00000000 00000000 ................
0x0017edb0: 000010de 0000134d 138e1043 000000a2 ....M...C.......
0x0017edc0: 7e3e0000 00000000 00000000 00000000 ..>~............
0x0017edd0: fc431000 00000000 0000bc49 00000000 ..C.....I.......
0x0017ede0: 00000008 00000000 1fea3a7b 00007ff7 ........{:......
0x0017edf0: 036f4060 00000000 036f4060 00000000 `#o.....`#o.....
0x0017ee00: 00000008 00000000 036f40d8 00000000 .........#o.....
0x0017ee10: 0017f010 00000000 00000400 00007ff8 ................
0x0017ee20: 00000000 00000000 00000000 00000000 ................
0x0017ee30: 00000000 00007ff7 00000000 00000000 ................
0x0017ee40: 00000000 00000000 00633da0 00000000 .........=c.....
0x0017ee50: 00633da0 00000000 00000000 00000000 .=c.............
0x0017ee60: 05e17328 00000000 00633da0 00000000 (s.......=c.....
0x0017ee70: 00000000 00000000 00000000 00000000 ................
0x0017ee80: 00000000 00000000 00000000 00000000 ................
0x0017ee90: 00000000 00000000 00000042 00007ff8 ........B.......
0x0017eea0: 022c20b0 00000000 0000001a 00000000 . ,.............
0x0017eeb0: 00460065 0072006f 0000001a 00000000 e.F.o.r.........
0x0017eec0: 00000042 0058004d 00000000 00000000 B...M.X.........
0x0017eed0: 00000000 00000000 00000000 00000000 ................
0x0017eee0: 0056004e 00440049 00410049 00470020 N.V.I.D.I.A. .G.
0x0017eef0: 00460065 0072006f 00650063 00390020 e.F.o.r.c.e. .9.
0x0017ef00: 00300034 0058004d 00000000 00000000 4.0.M.X.........
0x0017ef10: 00000000 00000000 00000000 00000000 ................
0x0017ef20: 00000000 00000000 00000000 00000000 ................
0x0017ef30: 00000000 00000000 00000000 00000000 ................
0x0017ef40: 00000000 00000000 00000000 00000000 ................
0x0017ef50: 00000000 00000000 00000000 00000000 ................
0x0017ef60: 00000000 00000000 00000000 00000000 ................
0x0017ef70: 00000000 00000000 00000000 00000000 ................
0x0017ef80: 00000000 00000000 00000000 00000000 ................
0x0017ef90: 00000000 00000000 00000000 00000000 ................
0x0017efa0: 00000000 00000000 00000000 00000000 ................
0x0017efb0: 00000000 00000000 00000000 00000000 ................
0x0017efc0: 00000000 00000000 00000000 00000000 ................
0x0017efd0: 00000000 00000000 00000000 00000000 ................
0x0017efe0: 000010de 0000134d 138e1043 000000a2 ....M...C.......
0x0017eff0: 7e3e0000 00000000 00000000 00000000 ..>~............
0x0017f000: fc431000 00000000 0000bc49 00000000 ..C.....I.......
0x0017f010: 4449564e 47204149 726f4665 39206563 NVIDIA GeForce 9
0x0017f020: 584d3034 00000000 00000000 00000000 40MX............
0x0017f030: 00000000 00000000 3db25b90 00007ff8 .........[.=....
0x0017f040: 0017f0d1 00000000 3db25a38 00007ff8 ........8Z.=....
0x0017f050: 3db258e0 00007ff8 00000000 00000000 .X.=............
0x0017f060: 000000c4 00000000 00000000 00000000 ................
0x0017f070: 022ab230 00000000 00000004 00000000 0.*.............
0x0017f080: 00000007 00007ff8 00000000 00000000 ................
0x0017f090: 030e89e0 00000000 2056d369 00007ff7 ........i.V ....
0x0017f0a0: 20f44340 00007ff7 20ff2d50 00007ff7 #C. ....P-. ....
0x0017f0b0: 00000000 00000000 00000000 00000000 ................
0x0017f0c0: 030e89e0 00000000 2056d79d 00007ff7 ..........V ....
0x0017f0d0: 00000010 00000000 030c7050 00000000 ........Pp......
0x0017f0e0: 00000001 00000000 00633da0 00000000 .........=c.....
0x0017f0f0: 00000010 00000000 1fc87241 00007ff7 ........Ar......
0x0017f100: 00000010 00000000 210498a0 00007ff7 ...........!....
0x0017f110: 0017f208 00000000 3db2593c 00007ff8 ........<Y.=....
0x0017f120: 00000000 00000000 00000000 00000000 ................
0x0017f130: 00000000 00000000 203cbd60 00007ff7 ........`.< ....
0x0017f140: 022ab230 00000000 00000004 00007ff8 0.*.............
0x0017f150: 00000007 00000000 00000000 00000000 ................
0x0017f160: 00000000 00000000 3db4bd5b 00007ff8 ........[..=....
0x0017f170: 00000000 00000000 00000000 00000000 ................
0x0017f180: 0017f208 00000000 00000000 00000000 ................
0x0017f190: 00000000 00000000 00000010 00000000 ................
0x0017f1a0: 210498a0 00007ff7 1fc87325 00007ff7 ...!....%s......
0x0017f1b0: 00000010 00000000 00000270 00000000 ........p.......
0x0017f1c0: 21049a00 00007ff7 00000001 00000000 ...!............
0x0017f1d0: 210470a0 00007ff7 203cc184 00007ff7 .p.!......< ....
0x0017f1e0: 00000017 00000000 00000270 00000000 ........p.......
0x0017f1f0: 00000010 00000000 00000018 00000000 ................
0x0017f200: 00000000 00000000 20ff2d50 00007ff7 ........P-. ....
0x0017f210: 061b0188 00000000 3db4c053 00007ff8 ........S..=....
0x0017f220: 20ff2d48 00007ff7 20c96820 00007ff7 H-. .... h. ....
0x0017f230: 3dd5ac48 00007ff8 3db4c539 00007ff8 H..=....9..=....
0x0017f240: 05e17328 00000000 00000000 00000000 (s..............
0x0017f250: 00000001 00000000 203cbd60 00007ff7 ........`.< ....
0x0017f260: 00000000 00000000 00000270 00000000 ........p.......
0x0017f270: 00000010 00000000 00000017 00000000 ................
0x0017f280: 00000000 00000000 20c6c26c 00007ff7 ........l.. ....
0x0017f290: 00000282 00007ff7 20ff2d50 00007ff7 ........P-. ....
0x0017f2a0: 00000001 00000000 203cc0d2 00007ff7 ..........< ....
0x0017f2b0: 030e87c0 00000000 00000002 00000000 ................
0x0017f2c0: 00000000 00000000 00000000 00000000 ................
0x0017f2d0: 20c6c26c 00007ff7 00000282 00007ff7 l.. ............
0x0017f2e0: 00000000 00000000 1fea6504 00007ff7 .........e......
0x0017f2f0: 00000001 00000000 00000001 00000000 ................
0x0017f300: 00000000 00000000 00000001 00000000 ................
0x0017f310: 00000282 00000000 000001c0 00000000 ................
0x0017f320: 0056004e 00440049 00410049 00470020 N.V.I.D.I.A. .G.
0x0017f330: 00460065 0072006f 00650063 00390020 e.F.o.r.c.e. .9.
0x0017f340: 00300034 0058004d 00000000 00000000 4.0.M.X.........
0x0017f350: 00000000 00000000 00000000 00000000 ................
0x0017f360: 00000000 00000000 00000000 00000000 ................
0x0017f370: 00000000 00000000 00000000 00000000 ................
0x0017f380: 00000000 00000000 00000000 00000000 ................
0x0017f390: 00000000 00000000 00000000 00000000 ................
0x0017f3a0: 00000000 00000000 00000000 00000000 ................
0x0017f3b0: 00000000 00000000 00000000 00000000 ................
0x0017f3c0: 00000000 00000000 00000000 00000000 ................
0x0017f3d0: 00000000 00000000 00000000 00000000 ................
0x0017f3e0: 00000000 00000000 00000000 00000000 ................
0x0017f3f0: 00000000 00000000 00000000 00000000 ................
0x0017f400: 00000000 00000000 00000000 00000000 ................
0x0017f410: 00000000 00000000 00000000 00000000 ................
0x0017f420: 00000000 00000000 00000000 00000000 ................
0x0017f430: 00000001 00000000 00000001 00000000 ................
0x0017f440: 00000000 00000000 030e87c0 00000000 ................
0x0017f450: 00000002 00000000 1fea9b0b 00007ff7 ................
0x0017f460: 036f4060 00000000 00000005 00000000 `#o.............
0x0017f470: 43000000 00000000 00000000 00000000 ...C............
0x0017f480: 20c6c26c 00007ff7 203cbd60 00007ff7 l.. ....`.< ....
0x0017f490: 030e87c0 00000000 1feed86e 00007ff7 ........n.......
0x0017f4a0: 00000000 00000000 00000017 00000000 ................
0x0017f4b0: 00000000 00000000 20c6c26c 00007ff7 ........l.. ....
0x0017f4c0: 00000001 00000000 00000001 00000000 ................
0x0017f4d0: 00000000 00000000 1fefcaa6 00007ff7 ................
0x0017f4e0: 038e6c60 00000000 00000000 00000000 `l..............
0x0017f4f0: 00000002 00000000 00000000 00000000 ................
0x0017f500: 00800000 00000000 00000065 00007ff7 ........e.......
0x0017f510: 030e7d10 00000000 00000001 00000000 .}..............
0x0017f520: 00000000 00000000 1fe718ec 00007ff7 ................
0x0017f530: 00000000 00000000 1fbb0000 00007ff7 ................
0x0017f540: 00000000 00000000 038ded30 00000000 ........0.......
0x0017f550: 00000000 00000000 1fe7403c 00007ff7 ........<#......
0x0017f560: 20fdfe01 00007ff7 0017f5b9 00000000 ... ............
0x0017f570: 00000000 00000000 00000001 00000000 ................
0x0017f580: 20f680e0 00007ff7 205bd81e 00007ff7 ... ......[ ....
0x0017f590: 00000000 00000000 20d1a718 00007ff7 ........... ....
0x0017f5a0: 00000000 00000000 63726f66 66672d65 ........force-gf
0x0017f5b0: 6f6a2d78 00007362 0000000e 00000000 x-jobs..........
0x0017f5c0: 00000042 00007ff7 0017f628 00000000 B.......(.......
0x0017f5d0: 00000000 00000000 00000000 00000000 ................
0x0017f5e0: 00000000 00000000 20051dea 00007ff7 ........... ....
0x0017f5f0: 00000001 00000000 00000000 00000000 ................
0x0017f600: 00000000 00000000 00000000 00000000 ................
0x0017f610: 0017f6c0 00000000 203dbf4b 00007ff7 ........K.= ....
0x0017f620: 20d1a718 00007ff7 00000000 00000000 ... ............
0x0017f630: 00000000 00000000 0229b9e0 00000000 ..........).....
0x0017f640: 00000000 00000000 203d9bee 00007ff7 ..........= ....
0x0017f650: 0000776f 00000000 0000000a 00000000 ow..............
0x0017f660: 00000042 00000000 00000000 00000000 B...............
0x0017f670: 00000050 0000002b 1fc197c0 00007ff7 P...+...........
0x0017f680: 00000000 00000000 00000001 00000000 ................
0x0017f690: 00000000 00000000 00000000 00000000 ................
0x0017f6a0: 00000000 00000000 00000000 00000000 ................
0x0017f6b0: 00000000 00000000 0229b9e0 00000000 ..........).....
0x0017f6c0: 0017f7d0 00000000 1fc1e97a 00007ff7 ........z.......
0x0017f6d0: 00cf0000 00000000 00000140 00000000 ........#.......
0x0017f6e0: 000000f0 00000000 00000000 00000000 ................
0x0017f6f0: 00000000 00000000 1fc87268 00007ff7 ........hr......
0x0017f700: 20c68370 00007ff7 20c6bac0 00007ff7 p.. ....... ....
0x0017f710: 00000000 00000000 ffebffff 00000000 ................
0x0017f720: 0017f7ac 00000000 20c37568 00007ff7 ........hu. ....
0x0017f730: 02180310 00000000 2056d79d 00007ff7 ..........V ....
0x0017f740: 00000000 00000000 00637465 00646567 ........etc.ged.
0x0017f750: 20f68f10 00007ff7 00000003 00000000 ... ............
0x0017f760: 00000042 00000000 0229b990 00000000 B.........).....
0x0017f770: 0229b9e0 00000000 0229b9e0 00000000 ..).......).....
0x0017f780: 00000000 00000000 021803e0 00000000 ................
0x0017f790: 021803e0 00000000 022afab0 00000000 ..........*.....
0x0017f7a0: 00000067 00000000 00000408 00000016 g...............
0x0017f7b0: 00000067 00000000 00000042 00007ff8 g.......B.......
0x0017f7c0: 02180450 00000000 021803e0 00000000 P...............
0x0017f7d0: 02297690 00000000 00000070 00000000 .v).....p.......
0x0017f7e0: 0017f850 00000000 00000070 00000000 P.......p.......
0x0017f7f0: 00000042 000013bb 022afc70 00000000 B.......p.*.....
0x0017f800: 00000062 00000000 205c6416 00007ff7 b........d\ ....
0x0017f810: 00000062 00000000 00000042 00000000 b.......B.......
0x0017f820: 022afb90 00000000 0000006a 00000000 ..*.....j.......
0x0017f830: 00000004 00000000 0000006a 00000000 ........j.......
0x0017f840: 00000042 00000000 02297890 00000000 B........x).....
0x0017f850: 00000071 00000000 205bde1a 00007ff7 q.........[ ....
0x0017f860: 00000071 00000000 00000042 00007ff7 q.......B.......
0x0017f870: 0000000f 00000000 00000000 00000000 ................
0x0017f880: 00000000 00000000 205bdebe 00007ff7 ..........[ ....
0x0017f890: 00000022 00000000 022afa40 00000000 ".......#.*.....
0x0017f8a0: 0000006b 00000000 00000000 00000000 k...............
0x0017f8b0: 0000006b 00000000 00000042 00007ff7 k.......B.......
0x0017f8c0: 20f68f10 00007ff7 009a1f20 00000000 ... .... .......
0x0017f8d0: 009a0840 00000000 20c6ba01 00007ff7 #.......... ....
0x0017f8e0: 00000000 00000000 205d019a 00007ff7 ..........] ....
0x0017f8f0: 00000000 00000000 00000000 00000000 ................
0x0017f900: 00000000 00000000 1fbb0000 00007ff7 ................
0x0017f910: 00000000 00000000 205c1dcc 00007ff7 ..........\ ....
0x0017f920: 00000000 00000000 00000000 00000000 ................
0x0017f930: 00000000 00000000 00000000 00000000 ................
0x0017f940: 00000000 00000000 00000000 00000000 ................
0x0017f950: 00000068 00000000 005f2a4a 00000000 h.......J*_.....
0x0017f960: 005f2a2a 00000000 005f2966 00000000 **_.....f)_.....
0x0017f970: 00000000 00000000 00000000 00000000 ................
0x0017f980: 00000000 00000000 00000000 00000401 ................
0x0017f990: 00000001 00000000 00000000 00000000 ................
0x0017f9a0: 00000000 00000000 00010001 00000000 ................
0x0017f9b0: 00000000 00000000 00000000 00000000 ................
0x0017f9c0: 00000000 00000000 40c23034 00007ff8 ........40.#....
0x0017f9d0: 00000000 00000000 00000000 00000000 ................
0x0017f9e0: 00000000 00000000 00000000 00000000 ................
0x0017f9f0: 00000000 00000000 42ea3691 00007ff8 .........6.B....
0x0017fa00: 00000000 00000000 00000000 00000000 ................
0x0017fa10: 00000000 00000000 00000000 00000000 ................
0x0017fa20: 00000000 00000000 3f97bb60 00007ff8 ........`..?....
0x0017fa30: 0017da50 00000000 0017da50 00000000 P.......P.......
0x0017fa40: 00000000 00000000 00000000 00000000 ................
0x0017fa50: 00000000 00000000 00000000 00000000 ................
0x0017fa60: 00000000 00000000 00000000 00000000 ................
0x0017fa70: 00000000 00000000 00000000 00000000 ................
0x0017fa80: 00000000 00000000 00000000 00000000 ................
0x0017fa90: 00000000 00000000 00000000 00000000 ................
0x0017faa0: 00000000 00000000 00000000 00000000 ................
0x0017fab0: 00000000 00000000 00000000 00000000 ................
0x0017fac0: 00000000 00000000 00000000 00000000 ................
0x0017fad0: 00000000 00000000 00000000 00000000 ................
0x0017fae0: 00000000 00000000 00000000 00000000 ................
0x0017faf0: 00000000 00000000 00000000 00000000 ................
0x0017fb00: 00000000 00000000 00000000 00000000 ................
0x0017fb10: 00000000 00000000 00000000 00000000 ................
0x0017fb20: 00000000 00000000 00000000 00000000 ................
0x0017fb30: 00000000 00000000 00000000 00000000 ................
0x0017fb40: 00000000 00000000 00000000 00000000 ................
0x0017fb50: 00000000 00000000 00000000 00000000 ................
0x0017fb60: 00000000 00000000 00000000 00000000 ................
0x0017fb70: 00000000 00000000 00000000 00000000 ................
0x0017fb80: 00000000 00000000 00000000 00000000 ................
0x0017fb90: 00000000 00000000 00000000 00000000 ................
0x0017fba0: 00000000 00000000 00000000 00000000 ................
0x0017fbb0: 00000000 00000000 00000000 00000000 ................
0x0017fbc0: 00000000 00000000 00000000 00000000 ................
0x0017fbd0: 00000000 00000000 00000000 00000000 ................
0x0017fbe0: 00000000 00000000 00000000 00000000 ................
0x0017fbf0: 00000000 00000000 00000000 00000000 ................
0x0017fc00: 00000000 00000000 00000000 00000000 ................
0x0017fc10: 00000000 00000000 00000000 00000000 ................
0x0017fc20: 00000000 00000000 00000000 00000000 ................
0x0017fc30: 00000000 00000000 00000000 00000000 ................
0x0017fc40: 00000000 00000000 00000000 00000000 ................
0x0017fc50: 00000000 00000000 00000000 00000000 ................
0x0017fc60: 00000000 00000000 00000000 00000000 ................
0x0017fc70: 00000000 00000000 00000000 00000000 ................
0x0017fc80: 00000000 00000000 00000000 00000000 ................
0x0017fc90: 00000000 00000000 00000000 00000000 ................
0x0017fca0: 00000000 00000000 00000000 00000000 ................
0x0017fcb0: 00000000 00000000 00000000 00000000 ................
0x0017fcc0: 00000000 00000000 00000000 00000000 ................
0x0017fcd0: 00000000 00000000 00000000 00000000 ................
0x0017fce0: 00000000 00000000 00000000 00000000 ................
0x0017fcf0: 00000000 00000000 00000000 00000000 ................
0x0017fd00: 00000000 00000000 00000000 00000000 ................
0x0017fd10: 00000000 00000000 00000000 00000000 ................
0x0017fd20: 00000000 00000000 00000000 00000000 ................
0x0017fd30: 00000000 00000000 00000000 00000000 ................
0x0017fd40: 00000000 00000000 00000000 00000000 ................
0x0017fd50: 00000000 00000000 00000000 00000000 ................
0x0017fd60: 00000000 00000000 00000000 00000000 ................
0x0017fd70: 00000000 00000000 00000000 00000000 ................
0x0017fd80: 00000000 00000000 00000000 00000000 ................
0x0017fd90: 00000000 00000000 00000000 00000000 ................
0x0017fda0: 00000000 00000000 00000000 00000000 ................
0x0017fdb0: 00000000 00000000 00000000 00000000 ................
0x0017fdc0: 00000000 00000000 00000000 00000000 ................
0x0017fdd0: 00000000 00000000 00000000 00000000 ................
0x0017fde0: 00000000 00000000 00000000 00000000 ................
0x0017fdf0: 00000000 00000000 00000000 00000000 ................
0x0017fe00: 00000000 00000000 00000000 00000000 ................
0x0017fe10: 00000000 00000000 00000000 00000000 ................
0x0017fe20: 00000000 00000000 00000000 00000000 ................
0x0017fe30: 00000000 00000000 00000000 00000000 ................
0x0017fe40: 00000000 00000000 00000000 00000000 ................
0x0017fe50: 00000000 00000000 00000000 00000000 ................
0x0017fe60: 00000000 00000000 00000000 00000000 ................
0x0017fe70: 00000000 00000000 00000000 00000000 ................
0x0017fe80: 00000000 00000000 00000000 00000000 ................
0x0017fe90: 00000000 00000000 00000000 00000000 ................
0x0017fea0: 00000000 00000000 00000000 00000000 ................
0x0017feb0: 00000000 00000000 00000000 00000000 ................
0x0017fec0: 00000000 00000000 00000000 00000000 ................
0x0017fed0: 00000000 00000000 00000000 00000000 ................
0x0017fee0: 00000000 00000000 00000000 00000000 ................
0x0017fef0: 00000000 00000000 00000000 00000000 ................
0x0017ff00: 00000000 00000000 00000000 00000000 ................
0x0017ff10: 00000000 00000000 00000000 00000000 ................
0x0017ff20: 00000000 00000000 00000000 00000000 ................
0x0017ff30: 00000000 00000000 00000000 00000000 ................
0x0017ff40: 00000000 00000000 00000000 00000000 ................
0x0017ff50: 00000000 00000000 00000000 00000000 ................
0x0017ff60: 00000000 00000000 00000000 00000000 ................
0x0017ff70: 00000000 00000000 00000000 00000000 ................
0x0017ff80: 00000000 00000000 00000000 00000000 ................
0x0017ff90: 00000000 00000000 00000000 00000000 ................
0x0017ffa0: 00000000 00000000 00000000 00000000 ................
0x0017ffb0: 00000000 00000000 00000000 00000000 ................
0x0017ffc0: 00000000 00000000 00000000 00000000 ................
0x0017ffd0: 00000000 00000000 00000000 00000000 ................
0x0017ffe0: 00000000 00000000 00000000 00000000 ................
0x0017fff0: 00000000 00000000 00000000 00000000 ................
== [end of error.log] ==
I google and didn't found any comprehensive solution while I have experience this kind of error before in different unity builds and mostly found the reason of this error are
1. Low disk space
2. Heavy project
3. 32 or 64 bit architecture problem
But in current situation I don't think any above error is valid as it is a small project which is running on low end PC pretty well.

A quick google of "Read from location 0000000e caused an access violation." showed a few people having this issue, and uninstalling or configuring citrix seemed to solve it.
"While I am not OP, I had the same problem. I couldn't find any running Citrix processes (not 100% sure though, the application spawns dozens of processes), but still got the crash with the same 0000000e Access Violation.
I could fix the issue without uninstalling Citrix by disabling the "Citrix Virtual Bus Enumerator" in the Device Manager." - m3adow - Forum Link

Related

Linux driver debugging NULL pointer usage

Im learning to develop and backport drivers and Im new to this.
I am wondering how to debug this issue. I found that there is some usage of NULL pointer but I dont know how to find it. This debug trace doesn't shows me where it is in the driver code. And I dont know how to start.
I succeeded to backport mcp251xfd driver to 4.9 linux and it works, I succeeded to read data with candump but when I do reboot this happens: ( and sometimes happens on bringing up the interface)
[ 35.383520] Unable to handle kernel NULL pointer dereference at virtual address 000000c8
[ 35.392667] pgd = ffffff80094a1000
[ 35.396502] [000000c8] *pgd=000000007f7fe003, *pud=000000007f7fe003, *pmd=0000000000000000
[ 35.405833] Internal error: Oops: 96000005 [#1] PREEMPT SMP
[ 35.412105] Modules linked in: vin_v4l2 ov8858_r2a_4lane vin_io videobuf2_dma_contig gt9xxnew_ts sprdbt_tty sprdwl_ng uwe5622_bsp_sdio sunxi_gmac
[ 35.426863] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 4.9.170 #2
[ 35.432909] NOHZ: local_softirq_pending 08
[ 35.433034] NOHZ: local_softirq_pending 08
[ 35.433125] NOHZ: local_softirq_pending 08
[ 35.447419] Hardware name: sun50iw10 (DT)
[ 35.451931] task: ffffffc03e1cc880 task.stack: ffffffc03e1e0000
[ 35.458608] PC is at test_and_set_bit+0x18/0x40
[ 35.463713] LR is at __netif_schedule+0x28/0x80
[ 35.468811] pc : [<ffffff80083fddb8>] lr : [<ffffff80087e5588>] pstate: 40400145
[ 35.477129] sp : ffffffc03f733d70
[ 35.480856] x29: ffffffc03f733d70 x28: 000000000002536] 3cf0 3b36d4a0 ffffffc0 3b2f6c80 ffffffc0 00000003 00000000 ffffffff 00000000
[ 35.591815] 3d10 0000000a 00000000 08e8f018 ffffff80 00000001 00000000 3f733d70 ffffffc0
[ 35.601089] 3d30 087e5588 ffffff80 3f733d70 ffffffc0 083fddb8 ffffff80 40400145 00000000
[ 35.610363] 3d50 3b36d000 ffffffc0 00000001 00000000 ffffffff 0000007f 3b36d4a0 ffffffc0
[ 35.619637] 3d70 3f733da0 ffffffc0 087e5610 ffffff80 3b2f6c00 ffffffc0 00000001 00000000
[ 35.628911] 3d90 3b2f6c00 ffffffc0 087e55fc ffffff80 3f733dc0 ffffffc0 088162f0 ffffff80
[ 35.638185] 3db0 3b36d000 ffffffc0 00000001 00000000 3f733e10 ffffffc0 08114920 ffffff80
[ 35.647459] 3dd0 00000101 00000000 3b36d4b8 ffffffc0 088161f4 ffffff80 088161f4 ffffff80
[ 35.656742]
[ 35.656742] X6: 0xffffffc03f733e68:
[ 35.662328] 3e68 08e93000 ffffff80 0920d000 ffffff80 09206000 ffffff80 09210000 ffffff80
[ 35.671603] 3e88 ffffffff 00000000 00000101 00000000 08114c1c ffffff80 3f733f30 ffffffc0
[ 35.680876] 3ea8 08081438 ffffff80 09205188 ffffff80 00000001 00000000 00000002 00000000
[ 35.690149] 3ec8 09412e80 ffffff80 00000282 00000000 08e8f018 ffffff80 00000000 00000000
[ 35.699422] 3ee8 0841cb98 ffffff80 09205188 ffffff80 00000001 00000000 00000002 00000000
[ 35.708694] 3f08 09412e80 ffffff80 00000282 00000000 08081328 ffffff80 3f733f30 ffffffc0
[ 35.717968] 3f28 000409aa 00000000 3f733fc0 ffffffc0 080aa3a8 ffffff80 09412e80 ffffff80
[ 35.727242] 3f48 00000005 00000000 08cf4000 ffffff80 00000000 00000000 08e98000 ffffff80
[ 35.736535]
[ 35.736535] X21: 0xffffffc03b2f6b80:
[ 35.742218] 6b80 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 35.751490] 6ba0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 35.760762] 6bc0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 35.770034] 6be0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 0000000000000 00000000 00000000 00000000
[ 35.831355] d440 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 35.840625] d460 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 35.849897] d480 00000000 00000000 00000000 00000000 00000000 00000000 00000064 00000000
[ 35.859169] d4a0 00310030 0000012c 00000000 00000000 00000000 00000000 00000000 00000000
[ 35.868441] d4c0 3f734ff0 ffffffc0 fffecaff 00000000 088161f4 ffffff80 3b36d000 ffffffc0
[ 35.877714] d4e0 18000003 ffffffff 00000000 00000000 00000000 00000000 00000000 00000000
[ 35.886987] d500 08ea3fdc ffffff80 00000000 00000000 00000000 00000000 3b36d518 ffffffc0
[ 35.896264]
[ 35.896264] X23: 0xffffffc03b2f6c00:
[ 35.901947] 6c00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 35.911219] 6c20 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 35.920491] 6c40 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 35.929763] 6c60 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 35.939038] 6c80 00010001 ffffffff 00000000 00000000 00000000 00000000 00000000 00000000
[ 35.948310] 6ca0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 35.957583] 6cc0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 35.966856] 6ce0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 35.976137]
[ 35.976137] X29: 0xffffffc03f733cf0:
[ 35.981821] 3cf0 3b36d4a0 ffffffc0 3b2f6c80 ffffffc0 00000003 00000000 ffffffff 00000000
[ 35.991093] 3d10 0000000a 00000000 08e8f018 ffffff80 00000001 00000000 3f733d70 ffffffc0
[ 36.000367] 3d30 087e5588 ffffff80 3f733d70 ffffffc0 083fddb8 ffffff80 40400145 00000000
[ 36.009640] 3d50 3b36d000 ffffffc0 00000001 00000000 ffffffff 0000007f 3b36d4a0 ffffffc0
[ 36.018914] 3d70 3f733da0 ffffffc0 087e5610 ffffff80 3b2f6c00 ffffffc0 00000001 00000000
[ 36.028187] 3d90 3b2f6c00 ffffffc0 087e55fc ffffff80 3f733dc0 ffffffc0 088162f0 ffffff80
[ 36.037464] 3db0 3b36d000 ffffffc0 00000001 00000000 3f733e10 ffffffc0 08114920 ffffff80
[ 36.046737] 3dd0 00000101 00000000 3b36d4b8 ffffffc0 088161f4 ffffff80 088161f4 ffffff80
[ 36.056010]
[ 36.057689] Process swapper/3 (pid: 0, stack limit = 0xffffffc03e1e0000)
[ 36.065231] Stack: (0xffffffc03f733d70 to 0xffffffc03e1e4000)
[ 36.071694] Call trace:
[ 36.074449] Exception stack(0xffffffc03f733b80 to 0xffffffc03f733cb0)
[ 36.081705] 3b80: 0000000000000000 0000007fffffffff 00000000414a3000 ffffff80083fddb8
[ 36.090520] 3ba0: 0000000040400145 ffffffc03e21dda0 0000000000000000 ffffffc03f73b780
[ 36.099336] 3bc0: ffffffc03f733d30 0000000000000000 ffffffc03f733c00 0000000000000000
[ 36.108151] 3be0: 0000000000000000 0000000000000000 0000000000000000 0000000000000400
[ 36.116966] 3c00: 0000000000000018 0000000100000000 0000000000000001 0000000000000000
[ 36.125781] 3c20: 0000000000000000 ffffffc03e21df00 0000000000000006 00000000000409aa
[ 36.134597] 3c40: 0000000000000000 00000000000000c8 0000000000000001 0000000000000000
[ 36.143413] 3c60: 0000000000000001 000000000000000f ffffffc03f733ee8 0800000000000000
[ 36.152227] 3c80: 0000000000000001 0000000000000000 0000000000000004 000000000000000f
[ 36.161037] 3ca0: 0000000000000000 000000000000004c
[ 36.166536] [<ffffff80083fddb8>] test_and_set_bit+0x18/0x40
[ 36.172813] [<ffffff80087e5610>] netif_schedule_queue+0x30/0x40
[ 36.179482] [<ffffff80088162f0>] dev_watchdog+0xfc/0x278
[ 36.185467] [<ffffff8008114920>] call_timer_fn+0xa4/0x1c0
[ 36.191546] [<ffffff8008114b8c>] expire_timers+0x124/0x170
[ 36.197723] [<ffffff8008114c90>] run_timer_softirq+0xb8/0x188
[ 36.204192] [<ffffff8008081438>] __do_softirq+0x178/0x338
[ 36.210272] [<ffffff80080aa3a8>] irq_exit+0x90/0xd0
[ 36.215767] [<ffffff80000012 0000000000000000 000000000000002d
[ 36.270918] 3ea0: 000000000000001f 0000000000000000 ffffff800821c950 0000007faa340698
[ 36.279734] 3ec0: 0000007faa3caa70 ffffff800920df48 0000000000000003 0000000000000008
[ 36.288549] 3ee0: ffffff800920dfdc ffffffc03e1cc880 0000000000000000 0000000000000000
[ 36.297363] 3f00: 0000000000000000 0000000000000000 0000000000000000 ffffffc03e1e3f60
[ 36.306179] 3f20: ffffff800808577c ffffffc03e1e3f60 ffffff8008085780 0000000060400145
[ 36.314995] 3f40: ffffffc03e1cc880 ffffff800810c27c ffffffffffffffff ffffff8008085700
[ 36.323808] [<ffffff8008082b68>] el1_irq+0xe8/0x18c
[ 36.329302] [<ffffff8008085780>] arch_cpu_idle+0x98/0x178
[ 36.335385] [<ffffff80089fed18>] default_idle_call+0x28/0x30
[ 36.341759] [<ffffff80080f2394>] cpu_startup_entry+0xc4/0x104
[ 36.348231] [<ffffff8008091034>] secondary_start_kernel+0x1d0/0x1dc
[ 36.355285] [<0000000040a011b4>] 0x40a011b4
[ 36.360002] Code: d2800022 8b400c21 f9800031 9ac32044 (c85f7c22)
[ 36.366860] ---[ end trace a8e12e41d725d1cb ]---
[ 36.372057] Kernel panic - not syncing: Fatal exception in interrupt
[ 36.379202] SMP: stopping secondary CPUs
[ 36.383621] Kernel Offset: disabled
[ 36.387563] Memory Limit: none
[ 36.391016] Rebooting in 5 seconds..
Firstly I wasnt able to bring up the interface with similar problem and I readed that this is buffer overflow or double free. From the previous dump I saw in which function the problem happens and I commented this line -> kfree(ram); # 1034 line # this file --> https://github.com/minima34/mcp251xfd_4.9/blob/master/mcp251xfd/mcp251xfd-core.c
This allowed me to get my driver working but now I have this nasty issue, that blocked me and freaked me. This time I can't see where the problem happens and its confusing.
I think that the problem is that I commented kfree() in 1034 line but I dont know how to do it then.

ORA-01092 Oracle Instance terminated. disconnected forced

I am trying to start an Oracle 11g database but it is failing with ORA-01092 and ORA-00600 errors:
Microsoft Windows [Version 6.0.6001]
Copyright (c) 2006 Microsoft Corporation. All rights reserved.
C:\Users\Administrator>sqlplus / as sysdba
SQL*Plus: Release 11.2.0.1.0 Production on Wed Sep 11 15:21:30 2019
Copyright (c) 1982, 2010, Oracle. All rights reserved.
Connected to an idle instance.
SQL> startup upgrade
ORACLE instance started.
Total System Global Area 430075904 bytes
Fixed Size 2176448 bytes
Variable Size 356518464 bytes
Database Buffers 67108864 bytes
Redo Buffers 4272128 bytes
Database mounted.
ORA-01092: ORACLE instance terminated. Disconnection forced
ORA-00600: internal error code, arguments: [4194], [], [], [], [], [], [], [],
[], [], [], []
Process ID: 5044
Session ID: 1 Serial number: 5
SQL> conn
Enter user-name: delhipilot
Enter password:
ERROR:
ORA-01034: ORACLE not available
ORA-27101: shared memory realm does not exist
Process ID: 0
Session ID: 0 Serial number: 0
SQL>
How can I start my database properly?
Here is an example of patching the system rollback segment header to avoid errors ORA-600 [4193] and ORA-600 [4194] during startup. Note that in this example the segment header is located in file 1 block 9 and the example in note 452620.1 is using file 1 block 2 as the segment header.
parnassusdata can also provide the recovery service.
It is a partial block dump for system rbs segment header file 1 block 9:
TRN CTL:: seq: 0x003a chd: 0x0017 ctl: 0x0052 inc: 0x00000000 nfb: 0x0001
mgc: 0x8002 xts: 0x0068 flg: 0x0001 opt: 2147483646 (0x7ffffffe)
uba: 0x00400197.003a.02 scn: 0x0000.004fbbf0
Version: 0x01
FREE BLOCK POOL::
uba: 0x00400197.003a.02 ext: 0x4 spc: 0x1dd2
uba: 0x00000000.0037.05 ext: 0x1 spc: 0x1d6c
uba: 0x00000000.0035.37 ext: 0x5 spc: 0x538
uba: 0x00000000.0000.00 ext: 0x0 spc: 0x0
1. Generate the bbed executable:
cd $ORACLE_HOME/rdbms/lib
make -f ins_rdbms.mk `pwd`/bbed
mv bbed $ORACLE_HOME/bin
2. Create file file.lis with the datafile where the system rollback segment header is stored:
file.lis has:
<relative file#> <datafile name> <size in bytes: v$datafile.bytes>
In our session file.lis contains:
1 /oradata/s102/system01.dbf 524288000
3. Create file bbed.par
bbed.par has:
MODE=EDIT
LISTFILE=<File name created in step2>
BLOCKSIZE=<db_block_size>
In our session bbed.par contains
MODE=EDIT
LISTFILE=file.lis
BLOCKSIZE=8192
4. Run bbed. Use password blockedit:
$ bbed parfile=bbed.par
Password:
BBED: Release 2.0.0.0.0 - Limited Production on Thu Sep 27 10:06:25 2007
Copyright (c) 1982, 2005, Oracle. All rights reserved.
************* !!! For Oracle Internal Use only !!! ***************
BBED>
5. Go to Block where the system rollback segment header is stored. In our example it is block 9:
BBED> set block 9
BLOCK# 9
6. Run map to see the C structures for the block and the DBA:
BBED> map
File: /oradata/s102/system01.dbf (1)
Block: 9 Dba:0x00400009
------------------------------------------------------------
Unlimited Undo Segment Header
struct kcbh, 20 bytes #0
struct ktech, 72 bytes #20
struct ktemh, 16 bytes #92
struct ktetb[6], 48 bytes #108
struct ktuxc, 104 bytes #4148
struct ktuxe[255], 10200 bytes #4252
ub4 tailchk #8188
Note that dba=0x00400009 is file 1 block 9, so we are positioned in the correct block.
7. Print the structure ktuxc:
BBED> print ktuxc
struct ktuxc, 104 bytes #4148
struct ktuxcscn, 8 bytes #4148
ub4 kscnbas #4148 0x004fbbf1
ub2 kscnwrp #4152 0x0000
struct ktuxcuba, 8 bytes #4156
ub4 kubadba #4156 0x00400197
ub2 kubaseq #4160 0x003a
ub1 kubarec #4162 0x03
sb2 ktuxcflg #4164 1 (KTUXCFSK)
ub2 ktuxcseq #4166 0x003a
sb2 ktuxcnfb #4168 1
ub4 ktuxcinc #4172 0x00000000
sb2 ktuxcchd #4176 6
sb2 ktuxcctl #4178 23
ub2 ktuxcmgc #4180 0x8002
ub4 ktuxcopt #4188 0x7ffffffe
struct ktuxcfbp[0], 12 bytes #4192
struct ktufbuba, 8 bytes #4192
ub4 kubadba #4192 0x00400197
ub2 kubaseq #4196 0x003a
ub1 kubarec #4198 0x0c
sb2 ktufbext #4200 4
sb2 ktufbspc #4202 5630
8. Modify ktuxc.ktuxcnfb to 0x0000
BBED> set offset ktuxc.ktuxcnfb
OFFSET 4168
BBED> print
ktuxc.ktuxcnfb
--------------
sb2 ktuxcnfb #4168 1
BBED> modify 0x0000
File: /oradata/s102/system01.dbf (1)
Block: 9 Offsets: 4168 to 4679 Dba:0x00400009
------------------------------------------------------------------------
00000000 00000000 06001700 02800100 68000000 feffff7f 97014000 3a000c00
0400fe15 00000000 37000500 01006c1d 00000000 35003700 05003805 00000000
00000000 00000000 00000000 00000000 00000000 30000000 93014000 191f5300
00000000 09005f00 00000000 00000000 00000000 01000000 00000000 31000000
96014000 a03e5b00 00000000 09005c00 00000000 00000000 00000000 01000000
00000000 31000000 96014000 9e3e5b00 00000000 09000e00 00000000 00000000
00000000 01000000 00000000 30000000 93014000 f4bb4f00 00000000 09001600
00000000 00000000 00000000 01000000 00000000 31000000 96014000 c13a5b00
00000000 09004800 00000000 00000000 00000000 01000000 00000000 31000000
96014000 983e5b00 00000000 09006000 00000000 00000000 00000000 01000000
00000000 30000000 93014000 f2bb4f00 00000000 09001400 00000000 00000000
00000000 01000000 00000000 31000000 96014000 933e5b00 00000000 09006100
00000000 00000000 00000000 01000000 00000000 31000000 96014000 8d3e5b00
00000000 09004700 00000000 00000000 00000000 01000000 00000000 30000000
94014000 87d15900 00000000 09002100 00000000 00000000 00000000 01000000
00000000 30000000 94014000 211f5300 00000000 09001d00 00000000 00000000
<32 bytes per line>
9. Modify ktuxc.ktuxcfbp[0].ktufbuba to 0x00000000
BBED> set offset ktuxc.ktuxcfbp[0].ktufbuba
OFFSET 4192
BBED> print
ktuxc.ktuxcfbp[0].ktufbuba.kubadba
----------------------------------
ub4 kubadba #4192 0x00400197
BBED> modify 0x00000000
File: /oradata/s102/system01.dbf (1)
Block: 9 Offsets: 4192 to 4703 Dba:0x00400009
------------------------------------------------------------------------
00000000 3a000c00 0400fe15 00000000 37000500 01006c1d 00000000 35003700
05003805 00000000 00000000 00000000 00000000 00000000 00000000 30000000
93014000 191f5300 00000000 09005f00 00000000 00000000 00000000 01000000
00000000 31000000 96014000 a03e5b00 00000000 09005c00 00000000 00000000
00000000 01000000 00000000 31000000 96014000 9e3e5b00 00000000 09000e00
00000000 00000000 00000000 01000000 00000000 30000000 93014000 f4bb4f00
00000000 09001600 00000000 00000000 00000000 01000000 00000000 31000000
96014000 c13a5b00 00000000 09004800 00000000 00000000 00000000 01000000
00000000 31000000 96014000 983e5b00 00000000 09006000 00000000 00000000
00000000 01000000 00000000 30000000 93014000 f2bb4f00 00000000 09001400
00000000 00000000 00000000 01000000 00000000 31000000 96014000 933e5b00
00000000 09006100 00000000 00000000 00000000 01000000 00000000 31000000
96014000 8d3e5b00 00000000 09004700 00000000 00000000 00000000 01000000
00000000 30000000 94014000 87d15900 00000000 09002100 00000000 00000000
00000000 01000000 00000000 30000000 94014000 211f5300 00000000 09001d00
00000000 00000000 00000000 01000000 00000000 30000000 93014000 0d1f5300
<32 bytes per line>
BBED>
10. Disable the block Checksum by changing the kcbh.flg_kcbh-4 and kcbh.chkval_kcbh to 0x0000:
BBED> map
File: /oradata/s102/system01.dbf (1)
Block: 9 Dba:0x00400009
------------------------------------------------------------
Unlimited Undo Segment Header
struct kcbh, 20 bytes #0
struct ktech, 72 bytes #20
struct ktemh, 16 bytes #92
struct ktetb[6], 48 bytes #108
struct ktuxc, 104 bytes #4148
struct ktuxe[255], 10200 bytes #4252
ub4 tailchk #8188
BBED> print kcbh
struct kcbh, 20 bytes #0
ub1 type_kcbh #0 0x0e
ub1 frmt_kcbh #1 0xa2
ub1 spare1_kcbh #2 0x00
ub1 spare2_kcbh #3 0x00
ub4 rdba_kcbh #4 0x00400009
ub4 bas_kcbh #8 0x005b3f76
ub2 wrp_kcbh #12 0x0000
ub1 seq_kcbh #14 0x01
ub1 flg_kcbh #15 0x04 (KCBHFCKV)
ub2 chkval_kcbh #16 0xe264
ub2 spare3_kcbh #18 0x0000
BBED> set offset kcbh.flg_kcbh
OFFSET 15
BBED> print
kcbh.flg_kcbh
-------------
ub1 flg_kcbh #15 0x04 (KCBHFCKV)
BBED> modify 0x00
File: /oradata/s102/system01.dbf (1)
Block: 9 Offsets: 15 to 526 Dba:0x00400009
------------------------------------------------------------------------
0064e200 00000000 00000000 00000000 00000000 00060000 002f0000 00201000
00040000 00060000 00080000 00970140 00000000 00040000 00000000 00000000
00000000 00000000 00000000 00060000 00000000 00000000 00000000 400a0040
00070000 00110040 00080000 00810140 00080000 00890140 00080000 00910140
00080000 00990140 00080000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
<32 bytes per line>
BBED> set offset kcbh.chkval_kcbh
OFFSET 16
BBED> print
kcbh.chkval_kcbh
----------------
ub2 chkval_kcbh #16 0xe264
BBED> modify 0x0000
File: /oradata/s102/system01.dbf (1)
Block: 9 Offsets: 16 to 527 Dba:0x00400009
------------------------------------------------------------------------
00000000 00000000 00000000 00000000 00000000 06000000 2f000000 20100000
04000000 06000000 08000000 97014000 00000000 04000000 00000000 00000000
00000000 00000000 00000000 06000000 00000000 00000000 00000040 0a004000
07000000 11004000 08000000 81014000 08000000 89014000 08000000 91014000
08000000 99014000 08000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
<32 bytes per line>
11. Verify the the block has no corruptions:
BBED> verify
DBVERIFY - Verification starting
FILE = /oradata/s102/system01.dbf
BLOCK = 9
DBVERIFY - Verification complete
Total Blocks Examined : 1
Total Blocks Processed (Data) : 0
Total Blocks Failing (Data) : 0
Total Blocks Processed (Index): 0
Total Blocks Failing (Index): 0
Total Blocks Empty : 0
Total Blocks Marked Corrupt : 0
Total Blocks Influx : 0
12. exit, open the database and shrink the system rollback segment:
BBED> exit
[oracle#arem example]$ sqlplus / as sysdba
SQL*Plus: Release 10.2.0.3.0 - Production on Thu Sep 27 10:28:00 2007
Copyright (c) 1982, 2006, Oracle. All Rights Reserved.
Connected to an idle instance.
SQL> startup
ORACLE instance started.
Total System Global Area 167772160 bytes
Fixed Size 1260696 bytes
Variable Size 62915432 bytes
Database Buffers 100663296 bytes
Redo Buffers 2932736 bytes
Database mounted.
Database opened.
SQL> alter rollback segment system shrink;
Rollback segment altered.
SQL>

Process survives crash dump

We have setup procdump as the (AeDebug) postmortem debugger to capture dumps of unhandled exceptions. The registry key is set to "c:\my\sysinternals\procdump.exe" -accepteula -ma -j "c:\dumps" %ld %ld %p
Currently I'm looking at a dump where the process that triggered a crash dump is still running hours after dumping the process has completed?!
It was my assumption that any process that triggers a crash dump is about to get terminated?
From WinDbg
Debug session time: Tue Dec 1 01:53:06.000 2015 (UTC + 1:00)
System Uptime: 18 days 18:09:24.556
Process Uptime: 1 days 0:09:31.000
0:000> ~
. 0 Id: 178c.eb4 Suspend: 0 Teb: fffdd000 Unfrozen
...
0:000> ? 178c
Evaluate expression: 6028 = 0000178c
From ProcExp
Looking at PID 6028 on Tue Dec 1 10:00:00, hours after the dump from 01:53:06.000
<3thParty>.exe:6028 Properties
Started: 1:43:35 30/11/2015
Edit
0:000> ~*kb1000
. 0 Id: 178c.eb4 Suspend: 0 Teb: fffdd000 Unfrozen
# ChildEBP RetAddr Args to Child
00 0018de38 77cd8567 00000574 00000001 00000000 ntdll!ZwWaitForSingleObject+0x15
01 0018debc 77cd8695 0018e0c8 0018e118 00000001 ntdll!RtlReportExceptionEx+0x14b
02 0018df14 772f8dd8 0018e0c8 0018e118 00000001 ntdll!RtlReportException+0x86
03 0018df34 772f8edb 0018dfa4 0018dfa4 00000000 ole32!SilentlyReportExceptions+0x79
04 0018df48 772f94e5 0018dfa4 00000000 00000000 ole32!ServerExceptionFilter+0xbb
05 0018df60 77360827 0018dfa4 0148502c 01048240 ole32!AppInvokeExceptionFilterWithMethodAddress+0x11
06 0018df7c 77183f21 00000000 0018faf8 77278760 ole32!SyncStubInvoke+0x82
07 0018df90 77183eae 00000000 00000000 00000000 msvcrt!_EH4_CallFilterFunc+0x12
08 0018dfbc 77286771 7736662c 7726ea10 0018e0c8 msvcrt!_except_handler4_common+0x8e
09 0018dfdc 77c8b499 0018e0c8 0018fae8 0018e118 ole32!_except_handler4+0x20
0a 0018e000 77c8b46b 0018e0c8 0018fae8 0018e118 ntdll!ExecuteHandler2+0x26
0b 0018e024 77c8b40e 0018e0c8 0018fae8 0018e118 ntdll!ExecuteHandler+0x24
0c 0018e0b0 77c40133 0118e0c8 0018e118 0018e0c8 ntdll!RtlDispatchException+0x127
0d 0018e0b0 00404880 0118e0c8 0018e118 0018e0c8 ntdll!KiUserExceptionDispatcher+0xf
WARNING: Stack unwind information not available. Following frames may be wrong.
0e 0018f61c 75a15932 01485018 01549420 00000000 <3thParty>+0x4880
0f 0018f640 75a905f1 00523859 0018f828 00000004 rpcrt4!Invoke+0x2a
10 0018fa44 7735aec1 010ac688 0101fb58 0104ea78 rpcrt4!NdrStubCall2+0x2ea
11 0018fa8c 76acffd3 010ac688 0104ea78 0101fb58 ole32!CStdStubBuffer_Invoke+0x3c
12 0018fab0 7735d876 010ac688 0104ea78 0101fb58 oleaut32!CUnivStubWrapper::Invoke+0xcb
13 0018faf8 7735ddd0 0104ea78 01048240 01095448 ole32!SyncStubInvoke+0x3c
14 0018fb44 77278a43 0104ea78 010be578 01097470 ole32!StubInvoke+0xb9
15 0018fc20 77278938 0101fb58 00000000 01097470 ole32!CCtxComChnl::ContextInvoke+0xfa
16 0018fc3c 7727950a 0104ea78 00000001 01097470 ole32!MTAInvoke+0x1a
17 0018fc68 7735dccd 0104ea78 00000001 01097470 ole32!STAInvoke+0x46
18 0018fc9c 7735db41 d0908070 0101fb58 01097470 ole32!AppInvoke+0xab
19 0018fd7c 7735e1fd 0104ea20 0101fef0 00000400 ole32!ComInvokeWithLockAndIPID+0x372
1a 0018fda4 77279367 0104ea20 00000400 00ff3548 ole32!ComInvoke+0xc5
1b 0018fdb8 77279326 0104ea20 00000000 77279286 ole32!ThreadDispatch+0x23
1c 0018fdfc 76eb62fa 00e2019e 00000400 0000babe ole32!ThreadWndProc+0x161
1d 0018fe28 76eb6d3a 77279286 00e2019e 00000400 user32!InternalCallWinProc+0x23
1e 0018fea0 76eb77c4 00000000 77279286 00e2019e user32!UserCallWinProcCheckWow+0x109
1f 0018ff00 76eb788a 77279286 00000000 00e2019e user32!DispatchMessageWorker+0x3bc
20 0018ff10 004aea6a 0018ff34 00010001 0018ff70 user32!DispatchMessageW+0xf
21 0018ff2c 004aeaaf 00e2019e 00000400 0000babe <3thParty>+0xaea6a
22 0018ff50 00a0c705 0018ff78 00a0c733 0018ff70 <3thParty>+0xaeaaf
23 0018ff70 00a3024b 0018ffc4 00404cac 0018ff88 <3thParty>!FrobWidget+0x4db279
24 0018ff88 7766338a fffde000 0018ffd4 77c69f72 <3thParty>!FrobWidget+0x4fedbf
25 0018ff94 77c69f72 fffde000 2ca36a95 00000000 kernel32!BaseThreadInitThunk+0xe
26 0018ffd4 77c69f45 00a30220 fffde000 ffffffff ntdll!__RtlUserThreadStart+0x70
27 0018ffec 00000000 00a30220 fffde000 00000000 ntdll!_RtlUserThreadStart+0x1b
1 Id: 178c.17a4 Suspend: 0 Teb: fffda000 Unfrozen
# ChildEBP RetAddr Args to Child
00 023cfed4 76b614ab 00000180 00000000 00000000 ntdll!ZwWaitForSingleObject+0x15
01 023cff40 77661194 00000180 ffffffff 00000000 KERNELBASE!WaitForSingleObjectEx+0x98
02 023cff58 77661148 00000180 ffffffff 00000000 kernel32!WaitForSingleObjectExImplementation+0x75
03 023cff6c 76bb511d 00000180 ffffffff 00000000 kernel32!WaitForSingleObject+0x12
04 023cff88 7766338a 00234b88 023cffd4 77c69f72 ws2_32!SockAsyncThread+0x25
05 023cff94 77c69f72 00234b88 2e876a95 00000000 kernel32!BaseThreadInitThunk+0xe
06 023cffd4 77c69f45 76bb50f8 00234b88 ffffffff ntdll!__RtlUserThreadStart+0x70
07 023cffec 00000000 76bb50f8 00234b88 00000000 ntdll!_RtlUserThreadStart+0x1b
2 Id: 178c.1108 Suspend: 0 Teb: fffd7000 Unfrozen
# ChildEBP RetAddr Args to Child
00 0273fdf4 77c82f91 00000003 010169d0 00000001 ntdll!NtWaitForMultipleObjects+0x15
01 0273ff88 7766338a 00000000 0273ffd4 77c69f72 ntdll!TppWaiterpThread+0x33d
02 0273ff94 77c69f72 010169a0 2ec86a95 00000000 kernel32!BaseThreadInitThunk+0xe
03 0273ffd4 77c69f45 77c82e65 010169a0 ffffffff ntdll!__RtlUserThreadStart+0x70
04 0273ffec 00000000 77c82e65 010169a0 00000000 ntdll!_RtlUserThreadStart+0x1b
3 Id: 178c.1794 Suspend: 0 Teb: fffac000 Unfrozen
# ChildEBP RetAddr Args to Child
00 0908fe28 77c83392 000001c0 0908fedc 25b36ac9 ntdll!NtWaitForWorkViaWorkerFactory+0x12
01 0908ff88 7766338a 01015748 0908ffd4 77c69f72 ntdll!TppWorkerThread+0x216
02 0908ff94 77c69f72 01015748 25b36a95 00000000 kernel32!BaseThreadInitThunk+0xe
03 0908ffd4 77c69f45 77c83e85 01015748 ffffffff ntdll!__RtlUserThreadStart+0x70
04 0908ffec 00000000 77c83e85 01015748 00000000 ntdll!_RtlUserThreadStart+0x1b
4 Id: 178c.5e4 Suspend: 0 Teb: fffaf000 Unfrozen
# ChildEBP RetAddr Args to Child
00 08b0fe28 77c83392 000001c4 08b0fedc 240b6ac9 ntdll!NtWaitForWorkViaWorkerFactory+0x12
01 08b0ff88 7766338a 01015748 08b0ffd4 77c69f72 ntdll!TppWorkerThread+0x216
02 08b0ff94 77c69f72 01015748 240b6a95 00000000 kernel32!BaseThreadInitThunk+0xe
03 08b0ffd4 77c69f45 77c83e85 01015748 ffffffff ntdll!__RtlUserThreadStart+0x70
04 08b0ffec 00000000 77c83e85 01015748 00000000 ntdll!_RtlUserThreadStart+0x1b
5 Id: 178c.c80 Suspend: 0 Teb: fffa9000 Unfrozen
# ChildEBP RetAddr Args to Child
00 0b03fed8 76b63bd5 00000000 0b03ff1c 57962de4 ntdll!ZwDelayExecution+0x15
01 0b03ff40 76b644a5 0000ea60 00000000 0b03ff78 KERNELBASE!SleepEx+0x65
02 0b03ff50 7724d98d 0000ea60 010bd460 7724cd48 KERNELBASE!Sleep+0xf
03 0b03ff5c 7724cd48 00000000 00000000 010bd460 ole32!CROIDTable::WorkerThreadLoop+0x14
04 0b03ff78 7724d87a 00000000 00000000 0b03ff94 ole32!CRpcThread::WorkerLoop+0x26
05 0b03ff88 7766338a 010bd460 0b03ffd4 77c69f72 ole32!CRpcThreadCache::RpcWorkerThreadEntry+0x16
06 0b03ff94 77c69f72 010bd460 27b86a95 00000000 kernel32!BaseThreadInitThunk+0xe
07 0b03ffd4 77c69f45 7724d864 010bd460 ffffffff ntdll!__RtlUserThreadStart+0x70
08 0b03ffec 00000000 7724d864 010bd460 00000000 ntdll!_RtlUserThreadStart+0x1b
6 Id: 178c.14f4 Suspend: 0 Teb: fffa6000 Unfrozen
# ChildEBP RetAddr Args to Child
00 0b13fe28 77c83392 000001bc 0b13fedc 27a86ac9 ntdll!NtWaitForWorkViaWorkerFactory+0x12
01 0b13ff88 7766338a 01015748 0b13ffd4 77c69f72 ntdll!TppWorkerThread+0x216
02 0b13ff94 77c69f72 01015748 27a86a95 00000000 kernel32!BaseThreadInitThunk+0xe
03 0b13ffd4 77c69f45 77c83e85 01015748 ffffffff ntdll!__RtlUserThreadStart+0x70
04 0b13ffec 00000000 77c83e85 01015748 00000000 ntdll!_RtlUserThreadStart+0x1b
7 Id: 178c.ee4 Suspend: 0 Teb: fffa3000 Unfrozen
# ChildEBP RetAddr Args to Child
00 0b23fcbc 76b614ab 00000578 00000000 0b23fd04 ntdll!ZwWaitForSingleObject+0x15
01 0b23fd28 77661194 00000578 00002710 00000000 KERNELBASE!WaitForSingleObjectEx+0x98
02 0b23fd40 77661148 00000578 00002710 00000000 kernel32!WaitForSingleObjectExImplementation+0x75
03 0b23fd54 6e22b3d6 00000578 00002710 00000000 kernel32!WaitForSingleObject+0x12
04 0b23ff88 7766338a 01072188 0b23ffd4 77c69f72 comsvcs!PingThread+0x131
05 0b23ff94 77c69f72 01072188 27986a95 00000000 kernel32!BaseThreadInitThunk+0xe
06 0b23ffd4 77c69f45 6e22b320 01072188 ffffffff ntdll!__RtlUserThreadStart+0x70
07 0b23ffec 00000000 6e22b320 01072188 00000000 ntdll!_RtlUserThreadStart+0x1b
8 Id: 178c.914 Suspend: 0 Teb: fff9d000 Unfrozen
# ChildEBP RetAddr Args to Child
00 0d26ff5c 72be635c 00000534 0d26ff90 0d26ff84 ntdll!ZwRemoveIoCompletion+0x15
01 0d26ff88 7766338a 72be64b3 0d26ffd4 77c69f72 mswsock!SockAsyncThread+0x83
02 0d26ff94 77c69f72 0101d3e8 219d6a95 00000000 kernel32!BaseThreadInitThunk+0xe
03 0d26ffd4 77c69f45 72be62ee 0101d3e8 ffffffff ntdll!__RtlUserThreadStart+0x70
04 0d26ffec 00000000 72be62ee 0101d3e8 00000000 ntdll!_RtlUserThreadStart+0x1b
Edit 2
0:000> .exr -1
ExceptionAddress: 00404880 (<3thParty>+0x00004880)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00000000
Attempt to read from address 00000000
0:000> ~* e s -d esp L0xffff 0x1003f
0018e118 0001003f 00000000 00000000 00000000 ?...............
0018e9a8 0001003f 00000000 00000000 00000000 ?...............
0018efa8 0001003f 00000000 00000000 00000000 ?...............
0:000> .cxr 0018e118
eax=00fc2c80 ebx=00000000 ecx=00000000 edx=00fc2c50 esi=00000000 edi=00000000
eip=00404880 esp=0018e400 ebp=0018f61c iopl=0 nv up ei pl zr na pe nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246
<3thParty>+0x4880:
00404880 8b11 mov edx,dword ptr [ecx] ds:002b:00000000=????????
0:000> kbnf
*** Stack trace for last set context - .thread/.cxr resets it
# Memory ChildEBP RetAddr Args to Child
WARNING: Stack unwind information not available. Following frames may be wrong.
00 0018f61c 75a15932 01485018 01549420 00000000 <3thParty>+0x4880
01 24 0018f640 75a905f1 00523859 0018f828 00000004 rpcrt4!Invoke+0x2a
02 404 0018fa44 7735aec1 010ac688 0101fb58 0104ea78 rpcrt4!NdrStubCall2+0x2ea
03 48 0018fa8c 76acffd3 010ac688 0104ea78 0101fb58 ole32!CStdStubBuffer_Invoke+0x3c
04 24 0018fab0 7735d876 010ac688 0104ea78 0101fb58 oleaut32!CUnivStubWrapper::Invoke+0xcb
05 48 0018faf8 7735ddd0 0104ea78 01048240 01095448 ole32!SyncStubInvoke+0x3c
06 4c 0018fb44 77278a43 0104ea78 010be578 01097470 ole32!StubInvoke+0xb9
07 dc 0018fc20 77278938 0101fb58 00000000 01097470 ole32!CCtxComChnl::ContextInvoke+0xfa
08 1c 0018fc3c 7727950a 0104ea78 00000001 01097470 ole32!MTAInvoke+0x1a
09 2c 0018fc68 7735dccd 0104ea78 00000001 01097470 ole32!STAInvoke+0x46
0a 34 0018fc9c 7735db41 d0908070 0101fb58 01097470 ole32!AppInvoke+0xab
0b e0 0018fd7c 7735e1fd 0104ea20 0101fef0 00000400 ole32!ComInvokeWithLockAndIPID+0x372
0c 28 0018fda4 77279367 0104ea20 00000400 00ff3548 ole32!ComInvoke+0xc5
0d 14 0018fdb8 77279326 0104ea20 00000000 77279286 ole32!ThreadDispatch+0x23
0e 44 0018fdfc 76eb62fa 00e2019e 00000400 0000babe ole32!ThreadWndProc+0x161
0f 2c 0018fe28 76eb6d3a 77279286 00e2019e 00000400 user32!InternalCallWinProc+0x23
10 78 0018fea0 76eb77c4 00000000 77279286 00e2019e user32!UserCallWinProcCheckWow+0x109
11 60 0018ff00 76eb788a 77279286 00000000 00e2019e user32!DispatchMessageWorker+0x3bc
12 10 0018ff10 004aea6a 0018ff34 00010001 0018ff70 user32!DispatchMessageW+0xf
13 1c 0018ff2c 004aeaaf 00e2019e 00000400 0000babe <3thParty>+0xaea6a
14 24 0018ff50 00a0c705 0018ff78 00a0c733 0018ff70 <3thParty>+0xaeaaf
15 20 0018ff70 00a3024b 0018ffc4 00404cac 0018ff88 <3thParty>!FrobWidget+0x4db279
16 18 0018ff88 7766338a fffde000 0018ffd4 77c69f72 <3thParty>!FrobWidget+0x4fedbf
17 c 0018ff94 77c69f72 fffde000 2ca36a95 00000000 kernel32!BaseThreadInitThunk+0xe
18 40 0018ffd4 77c69f45 00a30220 fffde000 ffffffff ntdll!__RtlUserThreadStart+0x70
19 18 0018ffec 00000000 00a30220 fffde000 00000000 ntdll!_RtlUserThreadStart+0x1b
Normally, an unhandled exception does cause the process to be terminated once the dump has been captured. What's happening here is that you are running afoul of a compatibility behavior: If a COM server crashes while handling an inbound request, COM historically "handles" the crash by abandoning the call, returning RPC_E_SERVERFAULT to the external caller, and then pretending that the crash never occurred.
That's why the process is still running after the crash dump is taken: The exception was handled. Mind you, it was "handled" by ignoring it, but technically it was handled.
I would recommend using IGlobalOptions to set the COMGLB_EXECPTION_HANDLING property to one of the COMGLB_EXCEPTION_DONOT_HANDLE... values.

Windbg PTE Null but memory is readable

I am trying to understand PTEs on Windows with Windbg, for a stack address I get:
kd> dd 306F710
0306f710 00664db4 02f3fa3c 00000000 00000f04
0306f720 00664d78 00000000 00000000 00000000
0306f730 00000000 00000000 00000000 00000000
0306f740 00000000 00000000 00000000 00000000
0306f750 00000000 00000000 00000000 00000000
0306f760 00000000 00000000 00000000 00000000
0306f770 00000000 00000000 00000000 00000000
0306f780 00000000 00000000 00000000 00000000
kd> !pte 306F710
VA 0306f710
PDE at C06000C0 PTE at C0018378
contains 0000000000000000
not valid
How can this work?

Outlook crashes when reading mail

We have an outlook addin installed, and while opening some of the html-emails, outlook crashes. If we remove the addin, the emails open properly without outlook getting crashed.
The addin isn't supposed to do anything while opening emails. We can't figure out why outlook is crashing beacause of our addin.
We have also disabled hardware acceleration rendering
We analysed the crashdump and what we got in debuglog is pasted below:
FAULTING_IP:
GdiPlus!ScanOperation::Blend_sRGB_sRGB_MMX+43
4ec5ed94 8907 mov dword ptr [edi],eax
EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
.exr 0xffffffffffffffff
ExceptionAddress: 4ec5ed94 (GdiPlus!ScanOperation::Blend_sRGB_sRGB_MMX+0x00000043)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000001
Parameter[1]: a915a784
Attempt to write to address a915a784
DEFAULT_BUCKET_ID: INVALID_POINTER_READ
PROCESS_NAME: OUTLOOK.EXE
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 00000001
EXCEPTION_PARAMETER2: a915a784
WRITE_ADDRESS: a915a784
FOLLOWUP_IP:
GdiPlus!ScanOperation::Blend_sRGB_sRGB_MMX+43
4ec5ed94 8907 mov dword ptr [edi],eax
NTGLOBALFLAG: 0
MANAGED_STACK: !dumpstack -EE
!dumpstack -EE
No export dumpstack found
FAULTING_THREAD: 00001508
PRIMARY_PROBLEM_CLASS: INVALID_POINTER_READ
BUGCHECK_STR: APPLICATION_FAULT_INVALID_POINTER_READ_INVALID_POINTER_WRITE
LAST_CONTROL_TRANSFER: from 4ec5f3a3 to 4ec5ed94
STACK_TEXT:
0013a61c 4ec5f3a3 0000000e 13965ec0 a915a784 GdiPlus!ScanOperation::Blend_sRGB_sRGB_MMX+0x43
0013a638 4ed2aaa2 a915a784 13965ec0 0000000e GdiPlus!EpAlphaBlender::Blend+0x57
0013a690 4ed2ac57 00002000 13965ea8 139663a8 GdiPlus!EpScanGdiDci::DrawScanRecords_Dci+0x1de
0013a6e0 4ecc9c24 00000001 13965ea8 139663a8 GdiPlus!EpScanGdiDci::ProcessBatch_Dci+0x182
0013a704 4ec66d7b 0013a7b8 0013a870 4ec5f2c0 GdiPlus!EpScanGdiDci::EmptyBatch+0xaa
0013a710 4ec5f2c0 0000000e 00000000 4ec619ab GdiPlus!EpScanGdiDci::End+0x1e
0013a71c 4ec619ab 130027f8 13002850 130028d0 GdiPlus!EpScanBufferNative<unsigned long>::~EpScanBufferNative<unsigned long>+0x18
0013a870 4ec9d872 13975eb8 0013a994 130033c8 GdiPlus!DpDriver::DrawImage+0x1ba
0013a8e4 4ec61459 13956260 0013a994 13003548 GdiPlus!DriverMulti::DrawImage+0x78
0013ad40 4ec60d39 0013adb8 13965310 00000003 GdiPlus!GpGraphics::DrvDrawImage+0x2351
0013adf4 4ec609d7 00000000 130021a4 00000000 GdiPlus!GpGraphics::DrawImage+0x215
0013ae60 3d00769f 13956208 13965310 43470000 GdiPlus!GdipDrawImageRectRect+0x1b3
0013aea0 3d0075f3 00000000 00000000 41600000 mshtml!Gdiplus::Graphics::DrawImage+0x62
0013af20 3d123052 0013b0a8 00000000 00e8236d mshtml!XHDC::DrawImage+0x503
0013af80 3d2288bb 0013b0a8 0013b004 0013afe4 mshtml!CImgBitsDIB::StretchBlt+0x2ca
0013b028 3d1607e3 00000640 0013b0a8 1db7d978 mshtml!DrawPlaceHolder+0x33e
0013b0b8 3cf6d4ed 1d99ffd8 0013f658 0013f658 mshtml!CImgHelper::Draw+0x23f
0013b0d0 3cf9b516 0013f658 133f00d0 1d88da2c mshtml!CImgElementLayout::Draw+0x1a
0013b10c 3cf9b461 0013b1a0 0013b164 137215c0 mshtml!CLayout::DrawClient+0x62
0013b4c4 3cf98edf 137e1f88 00000000 00000007 mshtml!CDispLeafNode::DrawSelf+0x432
0013b610 3cf995fe 00000000 137e1f88 00000000 mshtml!CDispNode::Draw+0x217
0013b638 3cf9958e 137e1f88 0013b808 00000000 mshtml!CDispContainer::DrawChildren+0x56
0013b7fc 3cf98edf 137e1f88 1d98a220 00000007 mshtml!CDispContainer::DrawSelf+0x28a
0013b948 3cf995fe 00000000 137e1f88 00000000 mshtml!CDispNode::Draw+0x217
0013b970 3cf9958e 137e1f88 0013bb40 00000000 mshtml!CDispContainer::DrawChildren+0x56
0013bb34 3cf98edf 137e1f88 1d8fb008 00000007 mshtml!CDispContainer::DrawSelf+0x28a
0013bc80 3cf995fe 00000000 137e1f88 00000000 mshtml!CDispNode::Draw+0x217
0013bca8 3cf9958e 137e1f88 0013be78 00000000 mshtml!CDispContainer::DrawChildren+0x56
0013be6c 3cf98edf 137e1f88 1d8fafd0 00000007 mshtml!CDispContainer::DrawSelf+0x28a
0013bfb8 3cf995fe 00000000 137e1f88 00000000 mshtml!CDispNode::Draw+0x217
0013bfe0 3cf9958e 137e1f88 0013c1b0 00000000 mshtml!CDispContainer::DrawChildren+0x56
0013c1a4 3cf98edf 137e1f88 1d8fed68 00000007 mshtml!CDispContainer::DrawSelf+0x28a
0013c2f0 3cf995fe 00000000 137e1f88 00000000 mshtml!CDispNode::Draw+0x217
0013c318 3cf9958e 137e1f88 0013c4e8 00000000 mshtml!CDispContainer::DrawChildren+0x56
0013c4dc 3cf98edf 137e1f88 1db6fc7c 00000007 mshtml!CDispContainer::DrawSelf+0x28a
0013c628 3cf995fe 00000000 137e1f88 00000000 mshtml!CDispNode::Draw+0x217
0013c650 3cf9958e 137e1f88 0013c820 00000000 mshtml!CDispContainer::DrawChildren+0x56
0013c814 3cf98edf 137e1f88 1d889588 00000007 mshtml!CDispContainer::DrawSelf+0x28a
0013c960 3cf995fe 00000000 137e1f88 00000000 mshtml!CDispNode::Draw+0x217
0013c988 3cf9958e 137e1f88 0013cb58 00000000 mshtml!CDispContainer::DrawChildren+0x56
0013cb4c 3cf98edf 137e1f88 137ea79c 00000007 mshtml!CDispContainer::DrawSelf+0x28a
0013cc98 3cf9c490 00000000 137e1f88 00000000 mshtml!CDispNode::Draw+0x217
0013cd48 3ceb0ed7 1d831158 137e1f88 00000000 mshtml!CDispRoot::DrawEntire+0x88
0013f53c 3cf98d12 137215c0 137e1f88 0013f658 mshtml!CDispRoot::DrawRoot+0x319
0013f5ec 3cf9807e 137c3ec8 0013f658 ba0415b1 mshtml!CView::RenderView+0x3b6
0013faa0 3cf7ed29 0000000f 00000000 137c3cd8 mshtml!CDoc::OnPaint+0x5c7
0013fad4 3cfa9457 137c3cd8 0000000f 00000000 mshtml!CServer::OnWindowMessage+0x38f
0013fbfc 3cfa9331 137c3cd8 0000000f 00000000 mshtml!CDoc::OnWindowMessage+0x16c
0013fc28 7e418734 001304b8 0000000f 00000000 mshtml!CServer::WndProc+0x78
0013fc54 7e418816 3cfa92e5 001304b8 0000000f user32!InternalCallWinProc+0x28
0013fcbc 7e42a013 00000000 3cfa92e5 001304b8 user32!UserCallWinProcCheckWow+0x150
0013fcec 7e42a039 ffff0673 001304b8 0000000f user32!CallWindowProcAorW+0x98
0013fd0c 3026f4d5 ffff0673 001304b8 0000000f user32!CallWindowProcW+0x1b
WARNING: Stack unwind information not available. Following frames may be wrong.
0013fd34 7e418734 001304b8 0000000f 00000000 OUTLLIB!FAllowStoreToSend+0x264ff
0013fd60 7e418816 3026f476 001304b8 0000000f user32!InternalCallWinProc+0x28
0013fdc8 7e428ea0 00000000 3026f476 001304b8 user32!UserCallWinProcCheckWow+0x150
0013fe1c 7e428eec 006697a8 0000000f 00000000 user32!DispatchClientMessage+0xa3
0013fe44 7c90e473 0013fe54 00000018 006697a8 user32!__fnDWORD+0x24
0013fe68 7e4194d2 7e428f10 0013fee4 00000000 ntdll!KiUserCallbackDispatcher+0x13
0013feb0 7e418a10 0013fee4 00000000 0013ff04 user32!NtUserDispatchMessage+0xc
0013fec0 30d157fe 0013fee4 0013fee4 300592a7 user32!DispatchMessageW+0xf
0013ff04 3000139e 00000000 00000000 00000000 MSO!Ordinal326+0x21
0013ffc0 7c817077 00380039 00350039 7ffdf000 OUTLOOK+0x139e
0013fff0 00000000 30001084 00000000 00000000 kernel32!BaseProcessStart+0x23
STACK_COMMAND: ~0s; .ecxr ; kb
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: GdiPlus!ScanOperation::Blend_sRGB_sRGB_MMX+43
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: GdiPlus
IMAGE_NAME: GdiPlus.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 4a841b37
FAILURE_BUCKET_ID: INVALID_POINTER_READ_c0000005_GdiPlus.dll!ScanOperation::Blend_sRGB_sRGB_MMX
BUCKET_ID: APPLICATION_FAULT_INVALID_POINTER_READ_INVALID_POINTER_WRITE_GdiPlus!ScanOperation::Blend_sRGB_sRGB_MMX+43
Followup: MachineOwner
I appreciate any help on this issue.

Resources