Access Violation in Svchost.exe in Windows 2000 (298061)



The information in this article applies to:

  • Microsoft Windows 2000 Server SP1
  • Microsoft Windows 2000 Advanced Server SP1
  • Microsoft Windows 2000 Professional SP1

This article was previously published under Q298061

SYMPTOMS

You may receive the following error message in Windows 2000:
Event ID: 4097
Source: DrWatson
Description: The application, Svchost.exe, generated an application error. The error occurred at xx/xx/xxx @ xx:xx:xx. The exception generated was c0000005 at address xxxxxxxx (l.RpcRequestMutex)

CAUSE

This error message can occur if User Datagram Protocol (UDP) packets are received on port 135 for EndPortMapper.

RESOLUTION

To resolve this problem, obtain the latest service pack for Windows 2000. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:

260910 How to Obtain the Latest Windows 2000 Service Pack

The English version of this fix should have the following file attributes or later:
   Date        Time   Version        Size     File name
   -----------------------------------------------------
   5-Jun-2001  18:47  5.0.2195.3691  427,280  Rpcrt4.dll
				

STATUS

Microsoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article. This problem was first corrected in Windows 2000 Service Pack 3.

MORE INFORMATION

For additional information about how to install Windows 2000 and Windows 2000 hotfixes at the same time, click the article number below to view the article in the Microsoft Knowledge Base:

249149 Installing Microsoft Windows 2000 and Windows 2000 Hotfixes

If symbols are installed on the machine the stack trace will look similiar to the following.
0:005> r
eax=00000000 ebx=00000000 ecx=00cffde0 edx=00000000 esi=000aed90 edi=00000000
eip=77d46ae7 esp=00cffdbc ebp=00cffdc8 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246
RPCRT4!I_RpcRequestMutex+b:
77d46ae7 393b             cmp     [ebx],edi         ds:0023:00000000=????????


0:005> k
ChildEBP RetAddr  
00cffdc8 77d46eea RPCRT4!I_RpcRequestMutex+0xb
00cffdd8 77d44da9 RPCRT4!NdrAfterCallProcessing+0x18
00cffde8 77d44c24 RPCRT4!SCALL__DoPostDispatchProcessing+0x11
00cffe34 77d44b21 RPCRT4!RPC_INTERFACE__DispatchToStubWorker+0x128
00cffe54 77d79f15 RPCRT4!RPC_INTERFACE__DispatchToStub+0x5e
00cffebc 77d79296 RPCRT4!DG_SCALL__ProcessRpcCall+0x2c3
00cffed0 77d7909f RPCRT4!DG_SCONNECTION__CallDispatchLoop+0xaa
00cffee8 77d785c1 RPCRT4!DG_SCONNECTION__DispatchPacket+0x2ff
00cfff04 77d766ce RPCRT4!ProcessDgServerPacket+0x1b6
00cfff20 77d5d1cd RPCRT4!ProcessDatagramServerReceiveEvent+0x17
00cfff74 77d5d074 RPCRT4!LOADABLE_TRANSPORT__ProcessIOEvents+0xcd
00cfff78 77d50d7f RPCRT4!ProcessIOEventsWrapper+0x9
00cfffa8 77d50c7a RPCRT4!BaseCachedThreadRoutine+0x4f
00cfffb4 77e8758a RPCRT4!ThreadStartRoutine+0x18
00cfffec 00000000 KERNEL32!BaseThreadStart+0x52
				

Modification Type:MinorLast Reviewed:9/26/2005
Keywords:kbHotfixServer kbQFE kbbug kbfix kbnetwork kbWin2000PreSP3Fix kbWin2000sp3fix KB298061