I’ve got a NULL_POINTER_READ in this minidump with virtually nothing in the stack except what appears to be a completely bogus address (note big offset). I’ve got my symbols and image set correctly. I don’t have a way to repro this crash, though we have received quite a few dumps that look like this. I’ve tried a “dps esp-100 esp+100” and don’t see any useful symbols there. What would be my next steps in trying to find a real call stack? Any thoughts appreciated!
FAULTING_IP:
AfterFX_10000000!controlfp_s+1585f6
1015c65a 8b10 mov edx,dword ptr [eax]
EXCEPTION_RECORD: ffffffff – (.exr 0xffffffffffffffff)
ExceptionAddress: 1015c65a (AfterFX_10000000!controlfp_s+0x001585f6)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00000000
Attempt to read from address 00000000
DEFAULT_BUCKET_ID: NULL_POINTER_READ
PROCESS_NAME: AfterFX.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 00000000
READ_ADDRESS: 00000000
FOLLOWUP_IP:
AfterFX_10000000!controlfp_s+1585f6
1015c65a 8b10 mov edx,dword ptr [eax]
FAULTING_THREAD: 0000054c
PRIMARY_PROBLEM_CLASS: NULL_POINTER_READ
BUGCHECK_STR: APPLICATION_FAULT_NULL_POINTER_READ
LAST_CONTROL_TRANSFER: from 00000000 to 1015c65a
STACK_TEXT:
008fc4b0 00000000 008fd98c 6cee13c3 008fd734 AfterFX_10000000!controlfp_s+0x1585f6
STACK_COMMAND: ~0s; .ecxr ; kb
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: AfterFX_10000000!controlfp_s+1585f6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: AfterFX_10000000
IMAGE_NAME: AfterFX.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 48be54e6
FAILURE_BUCKET_ID: NULL_POINTER_READ_c0000005_AfterFX.dll!controlfp_s
BUCKET_ID: APPLICATION_FAULT_NULL_POINTER_READ_AfterFX_10000000!controlfp_s+1585f6