- $ cdb -z link.exe.2488.dmp
 - Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
 - Copyright (c) Microsoft Corporation. All rights reserved.
 - Loading Dump File [C:\Users\roland_mainz\AppData\Local\CrashDumps\link.exe.2488.dmp]
 - User Mini Dump File: Only registers, stack and portions of memory are available
 - Symbol search path is: srv*
 - Executable search path is:
 - Windows 10 Version 19045 MP (8 procs) Free x86 compatible
 - Product: WinNt, suite: SingleUserTS
 - 19041.1.amd64fre.vb_release.191206-1406
 - Machine Name:
 - Debug session time: Fri Feb 16 18:24:07.000 2024 (UTC + 1:00)
 - System Uptime: not available
 - Process Uptime: 0 days 0:00:02.000
 - ...........................
 - This dump file has an exception of interest stored in it.
 - The stored exception information can be accessed via .ecxr.
 - (9b8.19c0): Access violation - code c0000005 (first/second chance not available)
 - For analysis of this file, run !analyze -v
 - eax=00000000 ebx=00000000 ecx=1fa931b8 edx=011fc840 esi=00000003 edi=00000003
 - eip=77de314c esp=011fc3d0 ebp=011fc560 iopl=0 nv up ei pl nz ac po nc
 - cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000212
 - ntdll!NtWaitForMultipleObjects+0xc:
 - 77de314c c21400 ret 14h
 - 0:000> !analyze -v
 - *******************************************************************************
 - * *
 - * Exception Analysis *
 - * *
 - *******************************************************************************
 - KEY_VALUES_STRING: 1
 - Key : AV.Dereference
 - Value: NullClassPtr
 - Key : AV.Fault
 - Value: Read
 - Key : Analysis.CPU.Sec
 - Value: 2
 - Key : Analysis.DebugAnalysisProvider.CPP
 - Value: Create: 8007007e on WINGRENDEL02
 - Key : Analysis.DebugData
 - Value: CreateObject
 - Key : Analysis.DebugModel
 - Value: CreateObject
 - Key : Analysis.Elapsed.Sec
 - Value: 13
 - Key : Analysis.Memory.CommitPeak.Mb
 - Value: 81
 - Key : Analysis.System
 - Value: CreateObject
 - Key : Timeline.Process.Start.DeltaSec
 - Value: 2
 - NTGLOBALFLAG: 4400
 - APPLICATION_VERIFIER_FLAGS: 0
 - CONTEXT: (.ecxr)
 - eax=00000000 ebx=80400000 ecx=1fa931b8 edx=011fc840 esi=00000000 edi=02217f4e
 - eip=00a5051f esp=011fcd0c ebp=011fda78 iopl=0 nv up ei pl zr na pe nc
 - cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246
 - link!FPass1DefFile+0x57487:
 - 00a5051f ff7608 push dword ptr [esi+8] ds:002b:00000008=????????
 - Resetting default scope
 - EXCEPTION_RECORD: (.exr -1)
 - ExceptionAddress: 00a5051f (link!FPass1DefFile+0x00057487)
 - ExceptionCode: c0000005 (Access violation)
 - ExceptionFlags: 00000000
 - NumberParameters: 2
 - Parameter[0]: 00000000
 - Parameter[1]: 00000008
 - Attempt to read from address 00000008
 - PROCESS_NAME: link.exe
 - READ_ADDRESS: 00000008
 - ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%p verwies auf Arbeitsspeicher bei 0x%p. Der Vorgang %s konnte im Arbeitsspeicher nicht durchgef hrt werden.
 - EXCEPTION_CODE_STR: c0000005
 - EXCEPTION_PARAMETER1: 00000000
 - EXCEPTION_PARAMETER2: 00000008
 - STACK_TEXT:
 - 011fda78 009e874b 1eb6d290 80400000 00b34550 link!FPass1DefFile+0x57487
 - 011fe328 009e41f4 1eb6c1bc 00002000 00000000 link!IMAGE::Pass1+0x26c
 - 011ff004 009c65e5 1eb6c574 00000003 762a5220 link!IMAGE::BuildImage+0x14c
 - 011ff4cc 009c19b4 00000003 01382e58 1eb6cbf4 link!LinkerMain+0x722
 - 011ffa4c 009c1742 1eb6cb30 01382ff0 01382e58 link!wmainInner+0x24c
 - 011ffa88 00a0a37d 00000003 01382e58 01382ff0 link!wmain+0x37
 - 011ffad0 775efcc9 00d8c000 775efcb0 011ffb3c link!__scrt_common_main_seh+0xfa
 - 011ffae0 77dd7c5e 00d8c000 69ec703d 00000000 kernel32!BaseThreadInitThunk+0x19
 - 011ffb3c 77dd7c2e ffffffff 77df8bfc 00000000 ntdll!__RtlUserThreadStart+0x2f
 - 011ffb4c 00000000 00a0a405 00d8c000 00000000 ntdll!_RtlUserThreadStart+0x1b
 - SYMBOL_NAME: link!FPass1DefFile+57487
 - MODULE_NAME: link
 - IMAGE_NAME: link.exe
 - STACK_COMMAND: ~0s ; .ecxr ; kb
 - FAILURE_BUCKET_ID: NULL_CLASS_PTR_READ_c0000005_link.exe!FPass1DefFile
 - OS_VERSION: 10.0.19041.1
 - BUILDLAB_STR: vb_release
 - OSPLATFORM_TYPE: x86
 - OSNAME: Windows 10
 - FAILURE_ID_HASH: {a0dafe66-7903-d4b3-110f-db16df688bfd}
 - Followup: MachineOwner
 - ---------
 
link.exe crash dump building msnfs41client on NFSv4.1 filesystem
Posted by Anonymous on Fri 16th Feb 2024 23:22
raw | new post
Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.
 nrubsig.kpaste.net RSS