- $ cdb -z link.exe.2488.dmp
- Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\roland_mainz\AppData\Local\CrashDumps\link.exe.2488.dmp]
- User Mini Dump File: Only registers, stack and portions of memory are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Version 19045 MP (8 procs) Free x86 compatible
- Product: WinNt, suite: SingleUserTS
- 19041.1.amd64fre.vb_release.191206-1406
- Machine Name:
- Debug session time: Fri Feb 16 18:24:07.000 2024 (UTC + 1:00)
- System Uptime: not available
- Process Uptime: 0 days 0:00:02.000
- ...........................
- This dump file has an exception of interest stored in it.
- The stored exception information can be accessed via .ecxr.
- (9b8.19c0): Access violation - code c0000005 (first/second chance not available)
- For analysis of this file, run !analyze -v
- eax=00000000 ebx=00000000 ecx=1fa931b8 edx=011fc840 esi=00000003 edi=00000003
- eip=77de314c esp=011fc3d0 ebp=011fc560 iopl=0 nv up ei pl nz ac po nc
- cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000212
- ntdll!NtWaitForMultipleObjects+0xc:
- 77de314c c21400 ret 14h
- 0:000> !analyze -v
- *******************************************************************************
- * *
- * Exception Analysis *
- * *
- *******************************************************************************
- KEY_VALUES_STRING: 1
- Key : AV.Dereference
- Value: NullClassPtr
- Key : AV.Fault
- Value: Read
- Key : Analysis.CPU.Sec
- Value: 2
- Key : Analysis.DebugAnalysisProvider.CPP
- Value: Create: 8007007e on WINGRENDEL02
- Key : Analysis.DebugData
- Value: CreateObject
- Key : Analysis.DebugModel
- Value: CreateObject
- Key : Analysis.Elapsed.Sec
- Value: 13
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 81
- Key : Analysis.System
- Value: CreateObject
- Key : Timeline.Process.Start.DeltaSec
- Value: 2
- NTGLOBALFLAG: 4400
- APPLICATION_VERIFIER_FLAGS: 0
- CONTEXT: (.ecxr)
- eax=00000000 ebx=80400000 ecx=1fa931b8 edx=011fc840 esi=00000000 edi=02217f4e
- eip=00a5051f esp=011fcd0c ebp=011fda78 iopl=0 nv up ei pl zr na pe nc
- cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246
- link!FPass1DefFile+0x57487:
- 00a5051f ff7608 push dword ptr [esi+8] ds:002b:00000008=????????
- Resetting default scope
- EXCEPTION_RECORD: (.exr -1)
- ExceptionAddress: 00a5051f (link!FPass1DefFile+0x00057487)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 00000000
- Parameter[1]: 00000008
- Attempt to read from address 00000008
- PROCESS_NAME: link.exe
- READ_ADDRESS: 00000008
- ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%p verwies auf Arbeitsspeicher bei 0x%p. Der Vorgang %s konnte im Arbeitsspeicher nicht durchgef hrt werden.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 00000000
- EXCEPTION_PARAMETER2: 00000008
- STACK_TEXT:
- 011fda78 009e874b 1eb6d290 80400000 00b34550 link!FPass1DefFile+0x57487
- 011fe328 009e41f4 1eb6c1bc 00002000 00000000 link!IMAGE::Pass1+0x26c
- 011ff004 009c65e5 1eb6c574 00000003 762a5220 link!IMAGE::BuildImage+0x14c
- 011ff4cc 009c19b4 00000003 01382e58 1eb6cbf4 link!LinkerMain+0x722
- 011ffa4c 009c1742 1eb6cb30 01382ff0 01382e58 link!wmainInner+0x24c
- 011ffa88 00a0a37d 00000003 01382e58 01382ff0 link!wmain+0x37
- 011ffad0 775efcc9 00d8c000 775efcb0 011ffb3c link!__scrt_common_main_seh+0xfa
- 011ffae0 77dd7c5e 00d8c000 69ec703d 00000000 kernel32!BaseThreadInitThunk+0x19
- 011ffb3c 77dd7c2e ffffffff 77df8bfc 00000000 ntdll!__RtlUserThreadStart+0x2f
- 011ffb4c 00000000 00a0a405 00d8c000 00000000 ntdll!_RtlUserThreadStart+0x1b
- SYMBOL_NAME: link!FPass1DefFile+57487
- MODULE_NAME: link
- IMAGE_NAME: link.exe
- STACK_COMMAND: ~0s ; .ecxr ; kb
- FAILURE_BUCKET_ID: NULL_CLASS_PTR_READ_c0000005_link.exe!FPass1DefFile
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x86
- OSNAME: Windows 10
- FAILURE_ID_HASH: {a0dafe66-7903-d4b3-110f-db16df688bfd}
- Followup: MachineOwner
- ---------
link.exe crash dump building msnfs41client on NFSv4.1 filesystem
Posted by Anonymous on Fri 16th Feb 2024 23:22
raw | new post
Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.