pastebin - collaborative debugging tool
nrubsig.kpaste.net RSS


link.exe crash dump building msnfs41client on NFSv4.1 filesystem
Posted by Anonymous on Fri 16th Feb 2024 23:22
raw | new post

  1. $ cdb -z link.exe.2488.dmp
  2.  
  3. Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
  4. Copyright (c) Microsoft Corporation. All rights reserved.
  5.  
  6.  
  7. Loading Dump File [C:\Users\roland_mainz\AppData\Local\CrashDumps\link.exe.2488.dmp]
  8. User Mini Dump File: Only registers, stack and portions of memory are available
  9.  
  10. Symbol search path is: srv*
  11. Executable search path is:
  12. Windows 10 Version 19045 MP (8 procs) Free x86 compatible
  13. Product: WinNt, suite: SingleUserTS
  14. 19041.1.amd64fre.vb_release.191206-1406
  15. Machine Name:
  16. Debug session time: Fri Feb 16 18:24:07.000 2024 (UTC + 1:00)
  17. System Uptime: not available
  18. Process Uptime: 0 days 0:00:02.000
  19. ...........................
  20. This dump file has an exception of interest stored in it.
  21. The stored exception information can be accessed via .ecxr.
  22. (9b8.19c0): Access violation - code c0000005 (first/second chance not available)
  23. For analysis of this file, run !analyze -v
  24. eax=00000000 ebx=00000000 ecx=1fa931b8 edx=011fc840 esi=00000003 edi=00000003
  25. eip=77de314c esp=011fc3d0 ebp=011fc560 iopl=0         nv up ei pl nz ac po nc
  26. cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00000212
  27. ntdll!NtWaitForMultipleObjects+0xc:
  28. 77de314c c21400          ret     14h
  29. 0:000> !analyze -v
  30. *******************************************************************************
  31. *                                                                             *
  32. *                        Exception Analysis                                   *
  33. *                                                                             *
  34. *******************************************************************************
  35.  
  36.  
  37. KEY_VALUES_STRING: 1
  38.  
  39.     Key  : AV.Dereference
  40.     Value: NullClassPtr
  41.  
  42.     Key  : AV.Fault
  43.     Value: Read
  44.  
  45.     Key  : Analysis.CPU.Sec
  46.     Value: 2
  47.  
  48.     Key  : Analysis.DebugAnalysisProvider.CPP
  49.     Value: Create: 8007007e on WINGRENDEL02
  50.  
  51.     Key  : Analysis.DebugData
  52.     Value: CreateObject
  53.  
  54.     Key  : Analysis.DebugModel
  55.     Value: CreateObject
  56.  
  57.     Key  : Analysis.Elapsed.Sec
  58.     Value: 13
  59.  
  60.     Key  : Analysis.Memory.CommitPeak.Mb
  61.     Value: 81
  62.  
  63.     Key  : Analysis.System
  64.     Value: CreateObject
  65.  
  66.     Key  : Timeline.Process.Start.DeltaSec
  67.     Value: 2
  68.  
  69.  
  70. NTGLOBALFLAG:  4400
  71.  
  72. APPLICATION_VERIFIER_FLAGS:  0
  73.  
  74. CONTEXT:  (.ecxr)
  75. eax=00000000 ebx=80400000 ecx=1fa931b8 edx=011fc840 esi=00000000 edi=02217f4e
  76. eip=00a5051f esp=011fcd0c ebp=011fda78 iopl=0         nv up ei pl zr na pe nc
  77. cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
  78. link!FPass1DefFile+0x57487:
  79. 00a5051f ff7608          push    dword ptr [esi+8]    ds:002b:00000008=????????
  80. Resetting default scope
  81.  
  82. EXCEPTION_RECORD:  (.exr -1)
  83. ExceptionAddress: 00a5051f (link!FPass1DefFile+0x00057487)
  84.    ExceptionCode: c0000005 (Access violation)
  85.   ExceptionFlags: 00000000
  86. NumberParameters: 2
  87.    Parameter[0]: 00000000
  88.    Parameter[1]: 00000008
  89. Attempt to read from address 00000008
  90.  
  91. PROCESS_NAME:  link.exe
  92.  
  93. READ_ADDRESS:  00000008
  94.  
  95. ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%p verwies auf Arbeitsspeicher bei 0x%p. Der Vorgang %s konnte im Arbeitsspeicher nicht durchgef hrt werden.
  96.  
  97. EXCEPTION_CODE_STR:  c0000005
  98.  
  99. EXCEPTION_PARAMETER1:  00000000
  100.  
  101. EXCEPTION_PARAMETER2:  00000008
  102.  
  103. STACK_TEXT:
  104. 011fda78 009e874b 1eb6d290 80400000 00b34550 link!FPass1DefFile+0x57487
  105. 011fe328 009e41f4 1eb6c1bc 00002000 00000000 link!IMAGE::Pass1+0x26c
  106. 011ff004 009c65e5 1eb6c574 00000003 762a5220 link!IMAGE::BuildImage+0x14c
  107. 011ff4cc 009c19b4 00000003 01382e58 1eb6cbf4 link!LinkerMain+0x722
  108. 011ffa4c 009c1742 1eb6cb30 01382ff0 01382e58 link!wmainInner+0x24c
  109. 011ffa88 00a0a37d 00000003 01382e58 01382ff0 link!wmain+0x37
  110. 011ffad0 775efcc9 00d8c000 775efcb0 011ffb3c link!__scrt_common_main_seh+0xfa
  111. 011ffae0 77dd7c5e 00d8c000 69ec703d 00000000 kernel32!BaseThreadInitThunk+0x19
  112. 011ffb3c 77dd7c2e ffffffff 77df8bfc 00000000 ntdll!__RtlUserThreadStart+0x2f
  113. 011ffb4c 00000000 00a0a405 00d8c000 00000000 ntdll!_RtlUserThreadStart+0x1b
  114.  
  115.  
  116. SYMBOL_NAME:  link!FPass1DefFile+57487
  117.  
  118. MODULE_NAME: link
  119.  
  120. IMAGE_NAME:  link.exe
  121.  
  122. STACK_COMMAND:  ~0s ; .ecxr ; kb
  123.  
  124. FAILURE_BUCKET_ID:  NULL_CLASS_PTR_READ_c0000005_link.exe!FPass1DefFile
  125.  
  126. OS_VERSION:  10.0.19041.1
  127.  
  128. BUILDLAB_STR:  vb_release
  129.  
  130. OSPLATFORM_TYPE:  x86
  131.  
  132. OSNAME:  Windows 10
  133.  
  134. FAILURE_ID_HASH:  {a0dafe66-7903-d4b3-110f-db16df688bfd}
  135.  
  136. Followup:     MachineOwner
  137. ---------

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at