I am getting the same behavior… crashes when it hits 100%… every time… I am running the Windows version… a minidump is created and when I loaded in VS…
Summary:
Exception Code 0xC0000005
Exception Information The thread tried to read from or write to a virtual address for which it does not have the appropriate access
CallStack:
msvcr100.dll!memcpy()
urbackup_srv.exe!00000001400019d4()
urbackup_srv.exe!00000001400076d7()
…
msvcr100.dll!endthreadex()
msvcr100.dll!endthreadex()
Disassembly of the memcpy() around the crash:
0000000077ADC1F9 77 B5 ja memcpy+250h (077ADC1B0h)
0000000077ADC1FB B8 20 00 00 00 mov eax,20h
0000000077ADC200 48 81 E9 80 00 00 00 sub rcx,80h
0000000077ADC207 0F 18 04 0A prefetchnta [rdx+rcx]
0000000077ADC20B 0F 18 44 0A 40 prefetchnta [rdx+rcx+40h]
0000000077ADC210 FF C8 dec eax
0000000077ADC212 75 EC jne memcpy+2A0h (077ADC200h)
0000000077ADC214 48 81 C1 00 10 00 00 add rcx,1000h
0000000077ADC21B B8 40 00 00 00 mov eax,40h
***0000000077ADC220 4C 8B 4C 0A F8 mov r9,qword ptr [rdx+rcx-8]
Disassembly of the calling urbackup_srv.exe code:
0000000140001900 48 89 5C 24 08 mov qword ptr [rsp+8],rbx
0000000140001905 48 89 6C 24 10 mov qword ptr [rsp+10h],rbp
000000014000190A 48 89 74 24 18 mov qword ptr [rsp+18h],rsi
000000014000190F 57 push rdi
0000000140001910 48 83 EC 20 sub rsp,20h
0000000140001914 48 8B 7A 10 mov rdi,qword ptr [rdx+10h]
0000000140001918 49 8B E8 mov rbp,r8
000000014000191B 48 8B F2 mov rsi,rdx
000000014000191E 48 8B D9 mov rbx,rcx
0000000140001921 49 3B F8 cmp rdi,r8
0000000140001924 73 0E jae 0000000140001934
0000000140001926 48 8D 0D 1B 67 0C 00 lea rcx,[1400C8048h]
000000014000192D FF 15 C5 5B 0C 00 call qword ptr [1400C74F8h]
0000000140001933 CC int 3
0000000140001934 49 2B F8 sub rdi,r8
0000000140001937 4C 3B CF cmp r9,rdi
000000014000193A 49 0F 42 F9 cmovb rdi,r9
000000014000193E 48 3B CA cmp rcx,rdx
0000000140001941 75 1F jne 0000000140001962
0000000140001943 4A 8D 14 07 lea rdx,[rdi+r8]
0000000140001947 49 83 C8 FF or r8,0FFFFFFFFFFFFFFFFh
000000014000194B E8 C0 00 00 00 call 0000000140001A10
0000000140001950 4C 8B C5 mov r8,rbp
0000000140001953 33 D2 xor edx,edx
0000000140001955 48 8B CB mov rcx,rbx
0000000140001958 E8 B3 00 00 00 call 0000000140001A10
000000014000195D E9 89 00 00 00 jmp 00000001400019EB
0000000140001962 48 83 FF FE cmp rdi,0FFFFFFFFFFFFFFFEh
0000000140001966 76 0E jbe 0000000140001976
0000000140001968 48 8D 0D C9 66 0C 00 lea rcx,[1400C8038h]
000000014000196F FF 15 7B 5B 0C 00 call qword ptr [1400C74F0h]
0000000140001975 CC int 3
0000000140001976 48 8B 41 18 mov rax,qword ptr [rcx+18h]
000000014000197A 48 3B C7 cmp rax,rdi
000000014000197D 73 27 jae 00000001400019A6
000000014000197F 4C 8B 41 10 mov r8,qword ptr [rcx+10h]
0000000140001983 48 8B D7 mov rdx,rdi
0000000140001986 E8 25 03 00 00 call 0000000140001CB0
000000014000198B 48 85 FF test rdi,rdi
000000014000198E 74 5B je 00000001400019EB
0000000140001990 48 83 7E 18 10 cmp qword ptr [rsi+18h],10h
0000000140001995 72 03 jb 000000014000199A
0000000140001997 48 8B 36 mov rsi,qword ptr [rsi]
000000014000199A 48 83 7B 18 10 cmp qword ptr [rbx+18h],10h
000000014000199F 72 24 jb 00000001400019C5
00000001400019A1 48 8B 0B mov rcx,qword ptr [rbx]
00000001400019A4 EB 22 jmp 00000001400019C8
00000001400019A6 48 85 FF test rdi,rdi
00000001400019A9 75 E5 jne 0000000140001990
00000001400019AB 48 89 79 10 mov qword ptr [rcx+10h],rdi
00000001400019AF 48 83 F8 10 cmp rax,10h
00000001400019B3 72 08 jb 00000001400019BD
00000001400019B5 48 8B 01 mov rax,qword ptr [rcx]
00000001400019B8 40 88 38 mov byte ptr [rax],dil
00000001400019BB EB 2E jmp 00000001400019EB
00000001400019BD 48 8B C1 mov rax,rcx
00000001400019C0 C6 01 00 mov byte ptr [rcx],0
00000001400019C3 EB 26 jmp 00000001400019EB
00000001400019C5 48 8B CB mov rcx,rbx
00000001400019C8 48 8D 14 2E lea rdx,[rsi+rbp]
00000001400019CC 4C 8B C7 mov r8,rdi
00000001400019CF E8 18 F5 0B 00 call 00000001400C0EEC
00000001400019D4 48 83 7B 18 10 cmp qword ptr [rbx+18h],10h