Forum Discussion
7 years ago
Microsoft (R) Windows Debugger Version 10.0.19494.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\ventu\OneDrive\Documenti\Battlefield V\crash_dumps\CrashDump_2019.10.08_20.57.44.998.mdmp] Comment: 'Frostbite MiniDump. Address: 0000000141F4326E (In Windbg type: .ecxr) [EOF]' User Mini Dump File: Only registers, stack and portions of memory are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Version 18362 MP (12 procs) Free x64 Product: WinNt, suite: SingleUserTS 18362.1.amd64fre.19h1_release.190318-1202 Machine Name: Debug session time: Tue Oct 8 20:57:45.000 2019 (UTC + 2:00) System Uptime: not available Process Uptime: 0 days 0:09:49.000 ................................................................ ................................................................ ...... This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr. (ff4.186c): Access violation - code c0000005 (first/second chance not available) For analysis of this file, run !analyze -v ntdll!NtGetContextThread+0x14: 00007fff`ec7dde54 c3 ret 0:019> !analyze -v ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* KEY_VALUES_STRING: 1 Key : AV.Dereference Value: NullPtr Key : AV.Fault Value: Read Key : Analysis.CPU.Sec Value: 94 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-KP1KK6Q Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 105 Key : Analysis.Memory.CommitPeak.Mb Value: 3677 Key : Analysis.System Value: CreateObject Key : Timeline.Process.Start.DeltaSec Value: 589 COMMENT: Frostbite MiniDump. Address: 0000000141F4326E (In Windbg type: .ecxr) [EOF] NTGLOBALFLAG: 0 PROCESS_BAM_CURRENT_THROTTLED: 0 PROCESS_BAM_PREVIOUS_THROTTLED: 0 CHKIMG_EXTENSION: !chkimg -lo 50 -d !bfv 141cb4ff1 - bfv!fb::JsMessageListener::onJSRegister+f8f61 [ e6:31 ] 141cb4ff3-141cb5006 20 bytes - bfv!fb::JsMessageListener::onJSRegister+f8f63 (+0x02) [ 20 38 e8 c0 c5 4b 20 a6:56 80 7c 24 31 00 75 6d ] 141cb5008-141cb50f0 233 bytes - bfv!fb::JsMessageListener::onJSRegister+f8f78 (+0x15) [ 39 b9 6c 7c 3b 26 fb 76:c6 44 24 31 01 0f 31 48 ] 141f431ee-141f432ed 256 bytes - bfv!fb::JsMessageListener::onJSRegister+38715e (+0x28e1e6) [ 71 9b 05 42 3f 69 0b 89:15 0d c3 a5 01 e8 c8 f9 ] 510 errors : !bfv (141cb4ff1-141f432ed) CONTEXT: (.ecxr) rax=0000000000000000 rbx=00000000379b7470 rcx=00000000341c9160 rdx=00000000341c9178 rsi=00000000379b63e0 rdi=00000000887a0005 rip=0000000141f4326e rsp=00000000341c8480 rbp=00000000341c8580 r8=00000000341c9577 r9=000000014432cbd0 r10=00000000341c7c58 r11=00000000341c8470 r12=00000000000003ff r13=000000012ac4f960 r14=0000000000000000 r15=000000014399f198 iopl=0 nv up ei pl nz na pe nc cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202 bfv!fb::JsMessageListener::onJSRegister+0x3871de: 00000001`41f4326e 488b08 mov rcx,qword ptr [rax] ds:00000000`00000000=???????????????? Resetting default scope EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 0000000141f4326e (bfv!fb::JsMessageListener::onJSRegister+0x00000000003871de) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000000 Attempt to read from address 0000000000000000 PROCESS_NAME: bfv.exe READ_ADDRESS: 0000000000000000 ERROR_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%p ha fatto riferimento alla memoria a 0x%p. La memoria non poteva essere %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000000 ADDITIONAL_DEBUG_TEXT: Followup set based on attribute [Is_ChosenCrashFollowupThread] from Frame:[0] on thread:[PSEUDO_THREAD] STACK_TEXT: 00000000`00000000 00000000`00000000 memory_corruption!bfv+0x0 SYMBOL_NAME: memory_corruption!bfv STACK_COMMAND: ** Pseudo Context ** ManagedPseudo ** Value: 119827fe760 ** ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE_c0000005_memory_corruption!bfv IMAGE_NAME: memory_corruption MODULE_NAME: memory_corruption OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e5dceec7-2269-9bcc-ad42-8401a2cea73a} Followup: MachineOwner ---------