Microsoft (R) Windows Debugger Version 6.6.0007.5 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\bzr.dmp] User Mini Dump File with Full Memory: Only application data is available Windows XP Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible Product: WinNt, suite: SingleUserTS Debug session time: Mon Nov 30 12:14:45.000 2009 (GMT+8) System Uptime: 4 days 23:03:25.242 Process Uptime: 1 days 21:40:03.000 Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols;C:\Program Files\Bazaar\lib Executable search path is: ..................................................... This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr. (10f8.14f4): Access violation - code c0000005 (first/second chance not available) eax=0000000f ebx=3734419a ecx=03b7ebd0 edx=03b7f000 esi=05348caa edi=01b08600 eip=01b05cfb esp=0012e470 ebp=0012e4a8 iopl=0 nv up ei pl nz ac pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000216 bzrlib__groupcompress_pyx!create_delta+0x47b: 01b05cfb 833a00 cmp dword ptr [edx],0 ds:0023:03b7f000=???????? 0:000> !analyze -v ERROR: FindPlugIns 8007007b ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* *** WARNING: Unable to verify checksum for python25.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for python25.dll - FAULTING_IP: bzrlib__groupcompress_pyx!create_delta+47b [c:\work\bazaar\bzr-2a\2.0\bzrlib\diff-delta.c @ 1048] 01b05cfb 833a00 cmp dword ptr [edx],0 EXCEPTION_RECORD: ffffffff -- (.exr ffffffffffffffff) ExceptionAddress: 01b05cfb (bzrlib__groupcompress_pyx!create_delta+0x0000047b) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 03b7f000 Attempt to read from address 03b7f000 DEFAULT_BUCKET_ID: APPLICATION_FAULT PROCESS_NAME: bzr.exe ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s". READ_ADDRESS: 03b7f000 BUGCHECK_STR: ACCESS_VIOLATION LAST_CONTROL_TRANSFER: from 01b02035 to 01b05cfb STACK_TEXT: 0012e4a8 01b02035 020f0080 03b7ebd0 01b08188 bzrlib__groupcompress_pyx!create_delta+0x47b [c:\work\bazaar\bzr-2a\2.0\bzrlib\diff-delta.c @ 1048] 0012e4f8 1e08f24b 03951a20 0378c918 00000000 bzrlib__groupcompress_pyx!__pyx_f_18_groupcompress_pyx_10DeltaIndex_add_delta_source+0x105 [c:\work\bazaar\bzr-2a\2.0\bzrlib\_groupcompress_pyx.c @ 545] WARNING: Stack unwind information not available. Following frames may be wrong. 0012e514 1e03b442 0530b260 0378c918 00000000 python25!PyCFunction_Call+0x5b 0012e53c 1e03cf85 1e03d4a3 0012e56c 00000000 python25!PyEval_CallObject+0x2b2 0012e540 1e03d4a3 0012e56c 00000000 015284e8 python25!PyEval_EvalFrameEx+0x18c5 0012e58c 1e0d99db 00a434b0 1e071215 ffffffff python25!PyEval_EvalFrameEx+0x1de3 0012e594 1e071215 ffffffff ffffffff 00000000 python25!PyType_Lookup+0x3feb 0012e5ac 1e03e3ed 07c92e78 00000000 01513420 python25!PyFrame_New+0x75 0012e5e0 1e03a29c 015284e8 07c92e78 00000000 python25!PyEval_EvalCodeEx+0x62d 00332da0 00332d58 07c92e78 0000001a 00000000 python25!PyEval_GetFuncDesc+0x17c 00000000 00000000 00000000 00000000 00000000 0x332d58 STACK_COMMAND: ~0s; .ecxr ; kb FAULTING_THREAD: 000014f4 FOLLOWUP_IP: bzrlib__groupcompress_pyx!create_delta+47b [c:\work\bazaar\bzr-2a\2.0\bzrlib\diff-delta.c @ 1048] 01b05cfb 833a00 cmp dword ptr [edx],0 SYMBOL_STACK_INDEX: 0 FOLLOWUP_NAME: MachineOwner MODULE_NAME: bzrlib__groupcompress_pyx IMAGE_NAME: bzrlib._groupcompress_pyx.pyd DEBUG_FLR_IMAGE_TIMESTAMP: 4adde5c8 SYMBOL_NAME: bzrlib__groupcompress_pyx!create_delta+47b FAILURE_BUCKET_ID: ACCESS_VIOLATION_bzrlib__groupcompress_pyx!create_delta+47b BUCKET_ID: ACCESS_VIOLATION_bzrlib__groupcompress_pyx!create_delta+47b Followup: MachineOwner ---------