Hi, I had a crash
Illegal operation:
Code: C0000005h, flags: 00000000h, address: 00F672BDh
Access violation, operation: write, address: 00000000h
Call path:
playback_process entry=>dsp/run=>dsp_manager::run=>dsp::run
Code bytes (00F672BDh):
00F6727Dh: 88 6A F6 00 89 68 F6 00 B9 68 F6 00 17 69 F6 00
00F6728Dh: 63 69 F6 00 6E 69 F6 00 B4 69 F6 00 E2 6A F6 00
00F6729Dh: 55 8B EC 83 EC 04 89 7D FC 8B 7D 08 8B 4D 0C C1
00F672ADh: E9 07 66 0F EF C0 EB 08 8D A4 24 00 00 00 00 90
00F672BDh: 66 0F 7F 07 66 0F 7F 47 10 66 0F 7F 47 20 66 0F
00F672CDh: 7F 47 30 66 0F 7F 47 40 66 0F 7F 47 50 66 0F 7F
00F672DDh: 47 60 66 0F 7F 47 70 8D BF 80 00 00 00 49 75 D0
00F672EDh: 8B 7D FC 8B E5 5D C3 55 8B EC 83 EC 10 89 7D FC
Stack (02AFF460h):
02AFF440h: 00000000 00000000 00000000 00000000
02AFF450h: 00000000 00000000 00000000 00000000
02AFF460h: 00000000 02AFF484 00F6732A 00000000
02AFF470h: FFFEA480 7C9200A4 00000038 00F617BE
02AFF480h: 01197898 FFFFD497 00F4D009 00000000
02AFF490h: 00000000 FFFEA4B8 FFFEA4B8 01197898
02AFF4A0h: 0000BB80 00000002 01197898 00000003
02AFF4B0h: 00F935E8 0000080B 00F93C60 00014D2F
02AFF4C0h: 00000002 00000000 0000BB80 00000001
02AFF4D0h: 00000000 00000002 00029A5E 0000AC44
02AFF4E0h: 00F461A5 FFF50000 02F60020 00014D2F
02AFF4F0h: 00029A5C 0000BB80 00029A5E 00014D2F
02AFF500h: 02F60020 00000000 00F4583F 02F60020
02AFF510h: 00014D2F 00000002 0000BB80 01195D74
02AFF520h: 01195D70 01803808 01195D7C 00000002
02AFF530h: 00F44E18 0000BB80 01837AD8 6D110978
02AFF540h: 100025A3 01195D70 02AFF59C 02AFF5FC
02AFF550h: 00000000 01195D7C 00000000 01195D74
02AFF560h: 02AFF590 00F8F350 00000001 0049C0CD
02AFF570h: 01837DC8 01837D58 00000000 01837AD8
Registers:
EAX: 00000000, EBX: 00000000, ECX: 01FFFD49, EDX: 00000038
ESI: 03010020, EDI: 00000000, EBP: 02AFF464, ESP: 02AFF460
Crash location: "foo_vorbisstream", loaded at 00F40000h - 010EA000h
Loaded modules:
foobar2000 loaded at 00400000h - 0052B000h
ntdll loaded at 7C910000h - 7C9C6000h
kernel32 loaded at 7C800000h - 7C906000h
COMCTL32 loaded at 77390000h - 77493000h
msvcrt loaded at 77BE0000h - 77C38000h
ADVAPI32 loaded at 77DA0000h - 77E4C000h
RPCRT4 loaded at 77E50000h - 77EE2000h
Secur32 loaded at 77FC0000h - 77FD1000h
GDI32 loaded at 77EF0000h - 77F39000h
USER32 loaded at 7E390000h - 7E421000h
SHLWAPI loaded at 77F40000h - 77FB6000h
SHELL32 loaded at 7C9D0000h - 7D1F5000h
ole32 loaded at 774A0000h - 775DD000h
shared loaded at 10000000h - 1002A000h
COMDLG32 loaded at 76340000h - 7638A000h
IMM32 loaded at 76320000h - 7633D000h
LPK loaded at 62DC0000h - 62DC9000h
USP10 loaded at 753C0000h - 7542B000h
uxtheme loaded at 5B090000h - 5B0C8000h
MSCTF loaded at 74690000h - 746DC000h
RTSUltraMonHook loaded at 00A90000h - 00ABE000h
msctfime loaded at 75140000h - 7516E000h
foo_albumlist loaded at 00AD0000h - 00B3C000h
foo_audioscrobbler loaded at 00B60000h - 00B90000h
WS2_32 loaded at 719F0000h - 71A07000h
WS2HELP loaded at 719E0000h - 719E8000h
foo_cdda loaded at 00BB0000h - 00BF0000h
foo_dsp_std loaded at 00C10000h - 00C59000h
foo_httpcontrol loaded at 00C80000h - 00CC0000h
WSOCK32 loaded at 71A10000h - 71A1A000h
MPR loaded at 71A60000h - 71A72000h
foo_input_std loaded at 00CE0000h - 00E0C000h
foo_ui_std loaded at 00E30000h - 00F05000h
gdiplus loaded at 4EB80000h - 4ED26000h
MSIMG32 loaded at 76310000h - 76315000h
foo_vorbisstream loaded at 00F40000h - 010EA000h
WINMM loaded at 76AE0000h - 76B0F000h
WINSPOOL loaded at 72F50000h - 72F76000h
OLEAUT32 loaded at 770E0000h - 7716B000h
serwvdrv loaded at 5D0A0000h - 5D0A7000h
umdmxfrm loaded at 5B3C0000h - 5B3C7000h
foo_whatsnew loaded at 011B0000h - 011E1000h
RTSUltraMonHookRes loaded at 01F80000h - 01F83000h
mswsock loaded at 71990000h - 719D0000h
DNSAPI loaded at 76ED0000h - 76EF7000h
winrnr loaded at 76F60000h - 76F68000h
WLDAP32 loaded at 76F10000h - 76F3D000h
mslbui loaded at 60970000h - 60979000h
rasadhlp loaded at 76F70000h - 76F76000h
imon loaded at 20B00000h - 20B2F000h
NTMARTA loaded at 77650000h - 77671000h
SAMLIB loaded at 71B50000h - 71B63000h
hnetcfg loaded at 62E40000h - 62E99000h
rsvpsp loaded at 72FD0000h - 72FED000h
wshtcpip loaded at 719D0000h - 719D8000h
imagehlp loaded at 76C40000h - 76C68000h
DBGHELP loaded at 5D3F0000h - 5D491000h
VERSION loaded at 77BD0000h - 77BD8000h
Stack dump analysis:
Address: 00F6732Ah, location: "foo_vorbisstream", loaded at 00F40000h - 010EA000h
Address: 7C9200A4h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlAllocateHeap" (+00000000h)
Address: 00F617BEh, location: "foo_vorbisstream", loaded at 00F40000h - 010EA000h
Address: 00F4D009h, location: "foo_vorbisstream", loaded at 00F40000h - 010EA000h
Address: 00F935E8h, location: "foo_vorbisstream", loaded at 00F40000h - 010EA000h
Address: 00F93C60h, location: "foo_vorbisstream", loaded at 00F40000h - 010EA000h
Address: 00F461A5h, location: "foo_vorbisstream", loaded at 00F40000h - 010EA000h
Address: 00F4583Fh, location: "foo_vorbisstream", loaded at 00F40000h - 010EA000h
Address: 00F44E18h, location: "foo_vorbisstream", loaded at 00F40000h - 010EA000h
Address: 100025A3h, location: "shared", loaded at 10000000h - 1002A000h
Symbol: "uCallStackTracker::uCallStackTracker" (+00000000h)
Address: 00F8F350h, location: "foo_vorbisstream", loaded at 00F40000h - 010EA000h
Address: 0049C0CDh, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 004B712Dh, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 0049C651h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 7C929D90h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlReAllocateHeap" (+00000210h)
Address: 7C929D8Ah, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlReAllocateHeap" (+0000020Ah)
Address: 004A325Ch, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 004A3293h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 0041EEC0h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 0109001Fh, location: "foo_vorbisstream", loaded at 00F40000h - 010EA000h
Address: 0044B2CEh, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 004B9764h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 0044824Ch, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 004D1220h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 004B9E19h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 00447ED6h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 004D69C4h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 004902CFh, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 0044B6A1h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 004D292Ch, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 004D20CCh, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 004BB7EAh, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 0044A2E8h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 7C802530h, location: "kernel32", loaded at 7C800000h - 7C906000h
Symbol: "WaitForSingleObject" (+00000000h)
Address: 7C80A0A7h, location: "kernel32", loaded at 7C800000h - 7C906000h
Symbol: "SetEvent" (+00000000h)
Address: 004DD1C0h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 7C80B6BEh, location: "kernel32", loaded at 7C800000h - 7C906000h
Symbol: "GetModuleFileNameA" (+0000015Fh)
Address: 7C80B6D3h, location: "kernel32", loaded at 7C800000h - 7C906000h
Symbol: "GetModuleFileNameA" (+00000174h)
Address: 7C800000h, location: "kernel32", loaded at 7C800000h - 7C906000h
Address: 004DD1C0h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 7C920202h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlAllocateHeap" (+0000015Eh)
Address: 7C92017Bh, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlAllocateHeap" (+000000D7h)
Address: 7C9201BBh, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlAllocateHeap" (+00000117h)
Address: 76F10000h, location: "WLDAP32", loaded at 76F10000h - 76F3D000h
Symbol: "Ordinal325" (+00000000h)
Address: 7C923405h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlDecodePointer" (+00000000h)
Address: 20B01D8Ch, location: "imon", loaded at 20B00000h - 20B2F000h
Symbol: "exeProc" (+0000051Ch)
Address: 20B00000h, location: "imon", loaded at 20B00000h - 20B2F000h
Address: 20B00000h, location: "imon", loaded at 20B00000h - 20B2F000h
Address: 7C91E900h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "strchr" (+00000113h)
Address: 7C927DF0h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlCompareUnicodeString" (+00000468h)
Address: 7C927DE9h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlCompareUnicodeString" (+00000461h)
Address: 7C928027h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "LdrGetProcedureAddress" (+0000019Fh)
Address: 7C910000h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Address: 004DD1C0h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 011C51F5h, location: "foo_whatsnew", loaded at 011B0000h - 011E1000h
Address: 011D5DFCh, location: "foo_whatsnew", loaded at 011B0000h - 011E1000h
Address: 011C2393h, location: "foo_whatsnew", loaded at 011B0000h - 011E1000h
Address: 011D94E8h, location: "foo_whatsnew", loaded at 011B0000h - 011E1000h
Address: 011C191Fh, location: "foo_whatsnew", loaded at 011B0000h - 011E1000h
Address: 011C1917h, location: "foo_whatsnew", loaded at 011B0000h - 011E1000h
Address: 7C800000h, location: "kernel32", loaded at 7C800000h - 7C906000h
Address: 7C91E900h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "strchr" (+00000113h)
Address: 72FDB354h, location: "rsvpsp", loaded at 72FD0000h - 72FED000h
Address: 72FD0000h, location: "rsvpsp", loaded at 72FD0000h - 72FED000h
Address: 72FE4692h, location: "rsvpsp", loaded at 72FD0000h - 72FED000h
Address: 72FD27B0h, location: "rsvpsp", loaded at 72FD0000h - 72FED000h
Address: 72FDB354h, location: "rsvpsp", loaded at 72FD0000h - 72FED000h
Address: 7C92B0A4h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "CsrNewThread" (+0000001Ah)
Address: 7C92B197h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "CsrNewThread" (+0000010Dh)
Address: 72FE459Ah, location: "rsvpsp", loaded at 72FD0000h - 72FED000h
Address: 7C920202h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlAllocateHeap" (+0000015Eh)
Address: 7C91E900h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "strchr" (+00000113h)
Address: 7C920208h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlAllocateHeap" (+00000164h)
Address: 7C920202h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlAllocateHeap" (+0000015Eh)
Address: 7C92017Bh, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlAllocateHeap" (+000000D7h)
Address: 7C9201BBh, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlAllocateHeap" (+00000117h)
Address: 7C8097F6h, location: "kernel32", loaded at 7C800000h - 7C906000h
Symbol: "InterlockedIncrement" (+00000000h)
Address: 7C920202h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlAllocateHeap" (+0000015Eh)
Address: 7C91E900h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "strchr" (+00000113h)
Address: 7C920208h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlAllocateHeap" (+00000164h)
Address: 7C920202h, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlAllocateHeap" (+0000015Eh)
Address: 7C92017Bh, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlAllocateHeap" (+000000D7h)
Address: 7C9201BBh, location: "ntdll", loaded at 7C910000h - 7C9C6000h
Symbol: "RtlAllocateHeap" (+00000117h)
Address: 77E5611Ch, location: "RPCRT4", loaded at 77E50000h - 77EE2000h
Symbol: "NdrTypeFlags" (+000003E4h)
Address: 77E56125h, location: "RPCRT4", loaded at 77E50000h - 77EE2000h
Symbol: "NdrTypeFlags" (+000003EDh)
Address: 77E560A8h, location: "RPCRT4", loaded at 77E50000h - 77EE2000h
Symbol: "NdrTypeFlags" (+00000370h)
Address: 775C6860h, location: "ole32", loaded at 774A0000h - 775DD000h
Address: 77E560B4h, location: "RPCRT4", loaded at 77E50000h - 77EE2000h
Symbol: "NdrTypeFlags" (+0000037Ch)
Address: 00A975BAh, location: "RTSUltraMonHook", loaded at 00A90000h - 00ABE000h
Address: 004495E0h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 7E3AA013h, location: "USER32", loaded at 7E390000h - 7E421000h
Symbol: "IsWindowUnicode" (+000000A1h)
Address: 7C8106E9h, location: "kernel32", loaded at 7C800000h - 7C906000h
Symbol: "CreateThread" (+00000022h)
Address: 004D6998h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 004BF21Eh, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 774BD222h, location: "ole32", loaded at 774A0000h - 775DD000h
Symbol: "CoTaskMemAlloc" (+000001C2h)
Address: 775C6860h, location: "ole32", loaded at 774A0000h - 775DD000h
Address: 00449725h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 7C802530h, location: "kernel32", loaded at 7C800000h - 7C906000h
Symbol: "WaitForSingleObject" (+00000000h)
Address: 7C80A0A7h, location: "kernel32", loaded at 7C800000h - 7C906000h
Symbol: "SetEvent" (+00000000h)
Address: 774BF06Bh, location: "ole32", loaded at 774A0000h - 775DD000h
Symbol: "CoInitializeEx" (+000000F0h)
Address: 7C839AC0h, location: "kernel32", loaded at 7C800000h - 7C906000h
Symbol: "ValidateLocale" (+000002B0h)
Address: 7C802608h, location: "kernel32", loaded at 7C800000h - 7C906000h
Symbol: "WaitForSingleObjectEx" (+000000B8h)
Address: 7C802600h, location: "kernel32", loaded at 7C800000h - 7C906000h
Symbol: "WaitForSingleObjectEx" (+000000B0h)
Address: 7C802542h, location: "kernel32", loaded at 7C800000h - 7C906000h
Symbol: "WaitForSingleObject" (+00000012h)
Address: 004BF238h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 004496BDh, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 100025D2h, location: "shared", loaded at 10000000h - 1002A000h
Symbol: "uCallStackTracker::uCallStackTracker" (+0000002Fh)
Address: 004BF255h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 00449617h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 00A975BAh, location: "RTSUltraMonHook", loaded at 00A90000h - 00ABE000h
Address: 004BF269h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 7C80B713h, location: "kernel32", loaded at 7C800000h - 7C906000h
Symbol: "GetModuleFileNameA" (+000001B4h)
Address: 00A975BAh, location: "RTSUltraMonHook", loaded at 00A90000h - 00ABE000h
Address: 7C839AC0h, location: "kernel32", loaded at 7C800000h - 7C906000h
Symbol: "ValidateLocale" (+000002B0h)
Address: 7C80B720h, location: "kernel32", loaded at 7C800000h - 7C906000h
Symbol: "GetModuleFileNameA" (+000001C1h)
Address: 004495E0h, location: "foobar2000", loaded at 00400000h - 0052B000h
Address: 00BB42FFh, location: "foo_cdda", loaded at 00BB0000h - 00BF0000h
Version info:
foobar2000 v0.9.5.6
UNICODE
Windows 5.1
Additional info:
Album List 4.3 (foo_albumlist)
Standard Input Array 1.0 (foo_input_std)
HTTP Control 0.78 (foo_httpcontrol)
Default User Interface 0.9.5 (foo_ui_std)
edcast Vorbis Streamer 0.9.5.6a (foo_vorbisstream)
foobar2000 core 0.9.5.6 (Core)
CD Audio Decoder 2.1.3 (foo_cdda)
Standard DSP Array 1.0 (foo_dsp_std)
Feature Watcher 1.0.4 (foo_whatsnew)
Audioscrobbler 1.3.16 (foo_audioscrobbler)
After searching a bit, it seems it happens only when the crossfader is in the DSP chain.
Usually the only DSP i use are:
-crossfader
-edcast Vorbis Streamer (or original Edcast plugin)
So i don't know if the problem is with the crossfader or edcast or the combination of the 2 of them.
Another little bug (that was also present in the original plugin) :
If I close the edcast Vorbis Streamer window, it goes in the tray. Fine.
But once in the tray, if i close foobar, the edcast Vorbis Streamer icon stays in the tray until my mouse cursor hovers it which make it disappear.