Bugzilla – Attachment 124472 Details for
Bug 99370
crash after update to version 5.1.2
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
backtrace file
backtrace-01.txt (text/plain), 4.12 KB, created by
rvwalleghem
on 2016-04-18 17:40:52 UTC
(
hide
)
Description:
backtrace file
Filename:
MIME Type:
Creator:
rvwalleghem
Created:
2016-04-18 17:40:52 UTC
Size:
4.12 KB
patch
obsolete
>Microsoft (R) Windows Debugger Version 10.0.10586.567 X86 >Copyright (c) Microsoft Corporation. All rights reserved. > >CommandLine: "D:\Program Files\LibreOffice\program\soffice.exe" > >************* Symbol Path validation summary ************** >Response Time (ms) Location >Deferred CACHE*C:\symbols >Deferred SRV*http://dev-downloads.libreoffice.org/symstore/symbols >Deferred SRV*http://msdl.microsoft.com/download/symbols >Symbol search path is: CACHE*C:\symbols;SRV*http://dev-downloads.libreoffice.org/symstore/symbols;SRV*http://msdl.microsoft.com/download/symbols >Executable search path is: >ModLoad: 00d30000 00d40000 soffice.exe >ModLoad: 77ac0000 77c3b000 ntdll.dll >ModLoad: 757f0000 758d0000 C:\WINDOWS\SysWOW64\KERNEL32.DLL >ModLoad: 74c00000 74d7e000 C:\WINDOWS\SysWOW64\KERNELBASE.dll >ModLoad: 72e80000 72f79000 C:\Program Files\Bitdefender\Bitdefender 2016\Active Virus Control\Avc3_00354_008\avcuf32.dll >ModLoad: 71b70000 71c02000 C:\WINDOWS\SysWOW64\apphelp.dll >ModLoad: 5acd0000 5af34000 C:\WINDOWS\AppPatch\AcGenral.DLL >ModLoad: 77870000 7792e000 C:\WINDOWS\SysWOW64\msvcrt.dll >ModLoad: 76410000 76454000 C:\WINDOWS\SysWOW64\sechost.dll >ModLoad: 758d0000 7597d000 C:\WINDOWS\SysWOW64\RPCRT4.dll >ModLoad: 747f0000 7480e000 C:\WINDOWS\SysWOW64\SspiCli.dll >ModLoad: 747e0000 747ea000 C:\WINDOWS\SysWOW64\CRYPTBASE.dll >ModLoad: 75ec0000 75f18000 C:\WINDOWS\SysWOW64\bcryptPrimitives.dll >ModLoad: 74d80000 74dc5000 C:\WINDOWS\SysWOW64\SHLWAPI.dll >ModLoad: 76040000 761fd000 C:\WINDOWS\SysWOW64\combase.dll >ModLoad: 762c0000 7640f000 C:\WINDOWS\SysWOW64\GDI32.dll >ModLoad: 74dd0000 74f17000 C:\WINDOWS\SysWOW64\USER32.dll >ModLoad: 74f20000 7500b000 C:\WINDOWS\SysWOW64\ole32.dll >ModLoad: 75010000 750a2000 C:\WINDOWS\SysWOW64\OLEAUT32.dll >ModLoad: 76460000 7785e000 C:\WINDOWS\SysWOW64\SHELL32.dll >ModLoad: 750b0000 750e7000 C:\WINDOWS\SysWOW64\cfgmgr32.dll >ModLoad: 750f0000 755ea000 C:\WINDOWS\SysWOW64\windows.storage.dll >ModLoad: 74910000 7498b000 C:\WINDOWS\SysWOW64\advapi32.dll >ModLoad: 748a0000 748ac000 C:\WINDOWS\SysWOW64\kernel.appcore.dll >ModLoad: 74b10000 74b9d000 C:\WINDOWS\SysWOW64\shcore.dll >ModLoad: 75700000 75744000 C:\WINDOWS\SysWOW64\powrprof.dll >ModLoad: 77860000 7786f000 C:\WINDOWS\SysWOW64\profapi.dll >ModLoad: 006b0000 00725000 C:\WINDOWS\SysWOW64\UxTheme.dll >ModLoad: 74660000 74684000 C:\WINDOWS\SysWOW64\WINMM.dll >ModLoad: 669a0000 669b5000 C:\WINDOWS\SysWOW64\samcli.dll >ModLoad: 5acb0000 5acc8000 C:\WINDOWS\SysWOW64\MSACM32.dll >ModLoad: 747d0000 747d8000 C:\WINDOWS\SysWOW64\VERSION.dll >ModLoad: 74410000 74429000 C:\WINDOWS\SysWOW64\USERENV.dll >ModLoad: 00560000 0057d000 C:\WINDOWS\SysWOW64\dwmapi.dll >ModLoad: 704b0000 7062d000 C:\WINDOWS\SysWOW64\urlmon.dll >ModLoad: 74350000 743b7000 C:\WINDOWS\SysWOW64\WINSPOOL.DRV >ModLoad: 747b0000 747c6000 C:\WINDOWS\SysWOW64\MPR.dll >ModLoad: 74310000 74333000 C:\WINDOWS\SysWOW64\WINMMBASE.dll >ModLoad: 701e0000 704ab000 C:\WINDOWS\SysWOW64\iertutil.dll >ModLoad: 742e0000 742fb000 C:\WINDOWS\SysWOW64\bcrypt.dll >ModLoad: 75750000 7577b000 C:\WINDOWS\SysWOW64\IMM32.DLL >ModLoad: 5abc0000 5acae000 C:\WINDOWS\SysWOW64\MSVCR120.dll >(2180.c3c): Break instruction exception - code 80000003 (first chance) >eax=00000000 ebx=00000003 ecx=2bf10000 edx=00000000 esi=00d300e8 edi=002b2000 >eip=77b6ccbc esp=0018f2d4 ebp=0018f300 iopl=0 nv up ei pl zr na pe nc >cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 >ntdll!LdrpDoDebuggerBreak+0x2b: >77b6ccbc cc int 3 >0:000> g >eax=00000000 ebx=77bca920 ecx=00000000 edx=00000000 esi=0000014d edi=00000000 >eip=77b36e9c esp=0018f684 ebp=0018f758 iopl=0 nv up ei pl nz na pe nc >cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000206 >ntdll!NtTerminateProcess+0xc: >77b36e9c c20800 ret 8 >0:000> !analyze -v >Last event: 2180.c3c: Exit process 0:2180, code 14d > debugger time: Mon Apr 18 19:29:50.094 2016 (UTC + 2:00)
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 99370
:
124456
| 124472 |
124477
|
124724
|
124731
|
124732
|
124947
|
124949