Comment 1 for bug 1981123

Revision history for this message
Max (maxwurlitzer) wrote :

DMP Analysis
Failed to request MethodData, not in JIT code range
MethodDesc: 08b018e0
Method Name: DomainBoundILStubClass.IL_STUB_PInvoke(Int32, PatcherYRpp.CoordStruct ByRef, Int32, IntPtr, IntPtr, PatcherYRpp.Bool, IntPtr)
Class: 08906904
MethodTable: 08906958
mdToken: 06000000
Module: 089040d4
IsJitted: yes
CodeAddr: 08b19b38
Transparency: Critical
MethodDesc: 08b5c824
Method Name: PatcherYRpp.MapClass.DamageArea(PatcherYRpp.CoordStruct, Int32, PatcherYRpp.Pointer`1<PatcherYRpp.TechnoClass>, PatcherYRpp.Pointer`1<PatcherYRpp.WarheadTypeClass>, Boolean, PatcherYRpp.Pointer`1<PatcherYRpp.HouseClass>)
Class: 08b3f604
MethodTable: 08b5c8a4
mdToken: 060002e8
Module: 0ef1c9cc
IsJitted: yes
CodeAddr: 08b19a10
Transparency: Critical
*** WARNING: Unable to verify checksum for PatcherYRpp.dll
MethodDesc: 08b590d4
Method Name: Extension.Ext.AnimExt.Explosion_Damage(Boolean, Boolean)
Class: 08b3aadc
MethodTable: 08b591d0
mdToken: 06000122
Module: 0f338bf8
IsJitted: yes
CodeAddr: 08b190d8
Transparency: Critical
*** WARNING: Unable to verify checksum for Extension.dll
MethodDesc: 08b59164
Method Name: Extension.Ext.AnimExt.OnDamage()
Class: 08b3aadc
MethodTable: 08b591d0
mdToken: 0600012e
Module: 0f338bf8
IsJitted: yes
CodeAddr: 08b19098
Transparency: Critical
MethodDesc: 0f337364
Method Name: ExtensionHooks.AnimExtHooks.AnimClass_Update_Explosion(DynamicPatcher.REGISTERS*)
Class: 0f26df3c
MethodTable: 0f337414
mdToken: 06000007
Module: 0ef14618
IsJitted: yes
CodeAddr: 08b18fa0
Transparency: Critical
*** WARNING: Unable to verify checksum for AnimExt.tmp
MethodDesc: 0ef1ef5c
Method Name: DynamicPatcher.HookInfo+<>c__DisplayClass37_0.<GetCallableDlg>b__0(IntPtr)
Class: 0f267484
MethodTable: 0ef1ef74
mdToken: 06000143
Module: 089040d4
IsJitted: yes
CodeAddr: 0f324380
Transparency: Critical
Failed to request MethodData, not in JIT code range
Failed to request MethodData, not in JIT code range
MethodDesc: 0ef1ef5c
Method Name: DynamicPatcher.HookInfo+<>c__DisplayClass37_0.<GetCallableDlg>b__0(IntPtr)
Class: 0f267484
MethodTable: 0ef1ef74
mdToken: 06000143
Module: 089040d4
IsJitted: yes
CodeAddr: 0f324380
Transparency: Critical
Failed to request MethodData, not in JIT code range
Failed to request MethodData, not in JIT code range

KEY_VALUES_STRING: 1

    Key : AV.Dereference
    Value: NullPtr

    Key : AV.Fault
    Value: Read

    Key : Analysis.CPU.mSec
    Value: 7093

    Key : Analysis.DebugAnalysisManager
    Value: Create

    Key : Analysis.Elapsed.mSec
    Value: 9560

    Key : Analysis.Init.CPU.mSec
    Value: 671

    Key : Analysis.Init.Elapsed.mSec
    Value: 24623

    Key : Analysis.Memory.CommitPeak.Mb
    Value: 111

    Key : CLR.BuiltBy
    Value: NET48REL1LAST_C

    Key : CLR.Engine
    Value: CLR

    Key : CLR.Version
    Value: 4.8.4515.0

    Key : Timeline.OS.Boot.DeltaSec
    Value: 1431

    Key : Timeline.Process.Start.DeltaSec
    Value: 257

    Key : WER.OS.Branch
    Value: co_release

    Key : WER.OS.Timestamp
    Value: 2021-06-04T16:28:00Z

    Key : WER.OS.Version
    Value: 10.0.22000.1

    Key : WER.Process.Version
    Value: 1.0.1.1

FILE_IN_CAB: extcrashdump.dmp

NTGLOBALFLAG: 0

PROCESS_BAM_CURRENT_THROTTLED: 0

PROCESS_BAM_PREVIOUS_THROTTLED: 0

APPLICATION_VERIFIER_FLAGS: 0

CONTEXT: (.ecxr)
eax=0019cd60 ebx=16ee4220 ecx=000050dc edx=0019cd60 esi=24e7beb0 edi=00000000
eip=00442832 esp=0019ccf8 ebp=1be6c3b0 iopl=0 nv up ei pl nz na po nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210202
gamemd+0x42832:
00442832 8b17 mov edx,dword ptr [edi] ds:002b:00000000=????????
Resetting default scope

EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00442832 (gamemd+0x00042832)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000000
   Parameter[1]: 00000000
Attempt to read from address 00000000

PROCESS_NAME: gamemd.exe

READ_ADDRESS: 00000000

ERROR_CODE: (NTSTATUS) 0xc0000005 - L'istruzione a 0x%p ha fatto riferimento alla memoria a 0x%p. La memoria non poteva essere %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 00000000

EXCEPTION_PARAMETER2: 00000000

STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
1be6c3b0 6358b846 17507940 0019cea8 63568373 gamemd+0x42832
0019cd78 63568373 17507940 0019cf64 0019cf64 Ares!Game_DialogFunc_Subtext_Propagate+0xf16
0019cea8 08b19ba3 00000000 16ee4220 00000001 Ares!DamageArea_CellSpread3+0x113
0019cef0 08b19ad0 1bb6bdf0 00000001 16ee4220 0x8b19ba3
0019cf50 08b1968e 1bb6bdf0 00000001 16ee4220 0x8b19ad0
0019d0fc 08b190bb 00000000 200f3150 0019d15c 0x8b1968e
0019d10c 08b19048 00000000 200f3150 00000000 0x8b190bb
0019d15c 0f3243a6 08d8ac20 00000000 00000000 0x8b19048
0019d180 0890d84e 0ee4ebb0 08bf7a38 0019fed8 0xf3243a6
0019d1a8 0f340014 0019d1b8 0019d1b8 00424538 0x890d84e
ffffffff 0f3243a6 08d8aa94 00000000 00000000 0xf340014
0814d450 0890d84e 0ee4ebb0 00005042 0000aea8 0xf3243a6
0019d238 0ee703bb 0019d248 00000000 00423ac0 0x890d84e
08201448 0055b613 00000000 00000002 0019f0a8 0xee703bb
08201448 0055dca3 00000001 00000004 0019f0a8 gamemd+0x15b613
0000000a 756ffa00 000002b0 00000000 0019d2e8 gamemd+0x15dca3
00000000 00000000 00000000 00000000 00000000 KERNELBASE!ReleaseMutex+0x10

STACK_COMMAND: ~0s; .ecxr ; kb

SYMBOL_NAME: gamemd+42832

MODULE_NAME: gamemd

IMAGE_NAME: gamemd.exe

FAILURE_BUCKET_ID: NULL_POINTER_READ_c0000005_gamemd.exe!Unknown

OS_VERSION: 10.0.22000.1

BUILDLAB_STR: co_release

OSPLATFORM_TYPE: x86

OSNAME: Windows 10

IMAGE_VERSION: 1.0.1.1

FAILURE_ID_HASH: {b3acfea6-6eb6-cc9e-abb0-96150d313caa}

Followup: MachineOwner
---------