Bugzilla – Attachment 124949 Details for
Bug 99370
crash after update to version 5.1.2
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
2 nd backtrace with more data
backtrace-version_5.1.3.1-b.TXT (text/plain), 10.42 KB, created by
rvwalleghem
on 2016-05-10 10:27:25 UTC
(
hide
)
Description:
2 nd backtrace with more data
Filename:
MIME Type:
Creator:
rvwalleghem
Created:
2016-05-10 10:27:25 UTC
Size:
10.42 KB
patch
obsolete
> >************* Symbol Path validation summary ************** >Response Time (ms) Location >Deferred CACHE*C:\symbols >Deferred SRV*http://dev-downloads.libreoffice.org/symstore/symbols >Deferred SRV*http://msdl.microsoft.com/download/symbols > >************* Symbol Path validation summary ************** >Response Time (ms) Location >Deferred CACHE*C:\symbols >Deferred SRV*http://dev-downloads.libreoffice.org/symstore/symbols >Deferred SRV*http://msdl.microsoft.com/download/symbols >CommandLine: "D:\Program Files\LibreOffice\program\soffice.exe" > >************* Symbol Path validation summary ************** >Response Time (ms) Location >Deferred CACHE*C:\symbols >Deferred SRV*http://dev-downloads.libreoffice.org/symstore/symbols >Deferred SRV*http://msdl.microsoft.com/download/symbols >Symbol search path is: CACHE*C:\symbols;SRV*http://dev-downloads.libreoffice.org/symstore/symbols;SRV*http://msdl.microsoft.com/download/symbols >Executable search path is: >ModLoad: 00000000`01190000 00000000`011a0000 soffice.exe >ModLoad: 00007ffe`8b000000 00007ffe`8b1c1000 ntdll.dll >ModLoad: 00000000`77430000 00000000`775ab000 ntdll.dll >ModLoad: 00000000`73320000 00000000`73370000 C:\WINDOWS\system32\wow64.dll >ModLoad: 00000000`73380000 00000000`733fa000 C:\WINDOWS\system32\wow64win.dll >(648.37bc): Break instruction exception - code 80000003 (first chance) >ntdll!LdrpDoDebuggerBreak+0x30: >00007ffe`8b0cab20 cc int 3 >0:000> g >ModLoad: 00000000`00dc0000 00000000`00e6d000 WOW64_IMAGE_SECTION >ModLoad: 00000000`762d0000 00000000`763b0000 WOW64_IMAGE_SECTION >ModLoad: 00000000`00dc0000 00000000`00e6d000 NOT_AN_IMAGE >ModLoad: 00000000`00dc0000 00000000`00f16000 NOT_AN_IMAGE >ModLoad: 00000000`73370000 00000000`73378000 C:\WINDOWS\system32\wow64cpu.dll >ModLoad: 00000000`762d0000 00000000`763b0000 C:\WINDOWS\SysWOW64\KERNEL32.DLL >ModLoad: 00000000`766a0000 00000000`7681e000 C:\WINDOWS\SysWOW64\KERNELBASE.dll >ModLoad: 00000000`727e0000 00000000`728dc000 C:\Program Files\Bitdefender\Bitdefender 2016\Active Virus Control\Avc3_00358_012\avcuf32.dll >ModLoad: 00000000`713e0000 00000000`71472000 C:\WINDOWS\SysWOW64\apphelp.dll >ModLoad: 00000000`662a0000 00000000`66504000 C:\WINDOWS\AppPatch\AcGenral.DLL >ModLoad: 00000000`74180000 00000000`7423e000 C:\WINDOWS\SysWOW64\msvcrt.dll >ModLoad: 00000000`769a0000 00000000`769e4000 C:\WINDOWS\SysWOW64\sechost.dll >ModLoad: 00000000`74240000 00000000`742ed000 C:\WINDOWS\SysWOW64\RPCRT4.dll >ModLoad: 00000000`74160000 00000000`7417e000 C:\WINDOWS\SysWOW64\SspiCli.dll >ModLoad: 00000000`74150000 00000000`7415a000 C:\WINDOWS\SysWOW64\CRYPTBASE.dll >ModLoad: 00000000`769f0000 00000000`76a48000 C:\WINDOWS\SysWOW64\bcryptPrimitives.dll >ModLoad: 00000000`76d50000 00000000`76d95000 C:\WINDOWS\SysWOW64\SHLWAPI.dll >ModLoad: 00000000`74b10000 00000000`74ccd000 C:\WINDOWS\SysWOW64\combase.dll >ModLoad: 00000000`763b0000 00000000`764ff000 C:\WINDOWS\SysWOW64\GDI32.dll >ModLoad: 00000000`76120000 00000000`76267000 C:\WINDOWS\SysWOW64\USER32.dll >ModLoad: 00000000`76bf0000 00000000`76cdb000 C:\WINDOWS\SysWOW64\ole32.dll >ModLoad: 00000000`76b40000 00000000`76bd2000 C:\WINDOWS\SysWOW64\OLEAUT32.dll >ModLoad: 00000000`74d20000 00000000`7611e000 C:\WINDOWS\SysWOW64\SHELL32.dll >ModLoad: 00000000`743f0000 00000000`74427000 C:\WINDOWS\SysWOW64\cfgmgr32.dll >ModLoad: 00000000`76e70000 00000000`7736a000 C:\WINDOWS\SysWOW64\windows.storage.dll >ModLoad: 00000000`744c0000 00000000`7453b000 C:\WINDOWS\SysWOW64\advapi32.dll >ModLoad: 00000000`74970000 00000000`7497c000 C:\WINDOWS\SysWOW64\kernel.appcore.dll >ModLoad: 00000000`76a50000 00000000`76add000 C:\WINDOWS\SysWOW64\shcore.dll >ModLoad: 00000000`76ce0000 00000000`76d24000 C:\WINDOWS\SysWOW64\powrprof.dll >ModLoad: 00000000`76be0000 00000000`76bef000 C:\WINDOWS\SysWOW64\profapi.dll >ModLoad: 00000000`73700000 00000000`73775000 C:\WINDOWS\SysWOW64\UxTheme.dll >ModLoad: 00000000`73fd0000 00000000`73ff4000 C:\WINDOWS\SysWOW64\WINMM.dll >ModLoad: 00000000`73a10000 00000000`73a25000 C:\WINDOWS\SysWOW64\samcli.dll >ModLoad: 00000000`66c70000 00000000`66c88000 C:\WINDOWS\SysWOW64\MSACM32.dll >ModLoad: 00000000`74140000 00000000`74148000 C:\WINDOWS\SysWOW64\VERSION.dll >ModLoad: 00000000`73fb0000 00000000`73fc9000 C:\WINDOWS\SysWOW64\USERENV.dll >ModLoad: 00000000`734c0000 00000000`734dd000 C:\WINDOWS\SysWOW64\dwmapi.dll >ModLoad: 00000000`6b670000 00000000`6b7ed000 C:\WINDOWS\SysWOW64\urlmon.dll >ModLoad: 00000000`73cb0000 00000000`73d17000 C:\WINDOWS\SysWOW64\WINSPOOL.DRV >ModLoad: 00000000`74120000 00000000`74136000 C:\WINDOWS\SysWOW64\MPR.dll >ModLoad: 00000000`73d20000 00000000`73d43000 C:\WINDOWS\SysWOW64\WINMMBASE.dll >ModLoad: 00000000`6b3a0000 00000000`6b66b000 C:\WINDOWS\SysWOW64\iertutil.dll >ModLoad: 00000000`73c50000 00000000`73c6b000 C:\WINDOWS\SysWOW64\bcrypt.dll >ModLoad: 00000000`76da0000 00000000`76dcb000 C:\WINDOWS\SysWOW64\IMM32.DLL >ModLoad: 00000000`66740000 00000000`6682e000 C:\WINDOWS\SysWOW64\MSVCR120.dll >(648.37bc): WOW64 breakpoint - code 4000001f (first chance) >First chance exceptions are reported before any exception handling. >This exception may be expected and handled. >ntdll_77430000!LdrpDoDebuggerBreak+0x2b: >774dccbc cc int 3 >0:000:x86> !analyze -v >******************************************************************************* >* * >* Exception Analysis * >* * >******************************************************************************* > > >DUMP_CLASS: 2 > >DUMP_QUALIFIER: 0 > >FAULTING_IP: >ntdll_77430000!LdrpDoDebuggerBreak+2b >774dccbc cc int 3 > >EXCEPTION_RECORD: (.exr -1) >ExceptionAddress: 00000000774dccbc (ntdll_77430000!LdrpDoDebuggerBreak+0x000000000000002b) > ExceptionCode: 4000001f (WOW64 breakpoint) > ExceptionFlags: 00000000 >NumberParameters: 1 > Parameter[0]: 0000000000000000 > >FAULTING_THREAD: 000037bc > >DEFAULT_BUCKET_ID: ZEROED_STACK > >PROCESS_NAME: soffice.exe > >ERROR_CODE: (NTSTATUS) 0x4000001f - Uitzonderingsstatuscode gebruikt bij win32 x86-emulatiesubsysteem. > >EXCEPTION_CODE: (NTSTATUS) 0x4000001f (1073741855) - Uitzonderingsstatuscode gebruikt bij win32 x86-emulatiesubsysteem. > >EXCEPTION_CODE_STR: 4000001f > >EXCEPTION_PARAMETER1: 0000000000000000 > >WATSON_BKT_PROCSTAMP: 57174c2c > >WATSON_BKT_PROCVER: 5.1.3.1 > >PROCESS_VER_PRODUCT: LibreOffice > >WATSON_BKT_MODULE: ntdll.dll > >WATSON_BKT_MODSTAMP: 56cc16f5 > >WATSON_BKT_MODOFFSET: accbc > >WATSON_BKT_MODVER: 10.0.10586.122 > >MODULE_VER_PRODUCT: Microsoft® Windows® Operating System > >BUILD_VERSION_STRING: 10.0.10586.162 (th2_release_sec.160223-1728) > >MODLIST_WITH_TSCHKSUM_HASH: af794cb66d1955a49e94f9e7b89a9d20aeb21828 > >MODLIST_SHA1_HASH: 9d60b5d2f713e27c871a6d8b8313670dc6410dfb > >NTGLOBALFLAG: 70 > >APPLICATION_VERIFIER_FLAGS: 0 > >PRODUCT_TYPE: 1 > >SUITE_MASK: 784 > >APP: soffice.exe > >ANALYSIS_SESSION_HOST: LAPTOP-NCI0R87 > >ANALYSIS_SESSION_TIME: 05-10-2016 12:24:43.0476 > >ANALYSIS_VERSION: 10.0.10586.567 amd64fre > >THREAD_ATTRIBUTES: >OS_LOCALE: NLB > >PROBLEM_CLASSES: > > > >ZEROED_STACK > Tid [0x37bc] > Frame [0x00]: ntdll!LdrpDoDebuggerBreak > > >BUGCHECK_STR: APPLICATION_FAULT_ZEROED_STACK > >LAST_CONTROL_TRANSFER: from 00000000774a2f6f to 00000000774dccbc > >STACK_TEXT: >0018f768 774a2f6f 21c290c7 ffffffff 00000000 ntdll_77430000!LdrpDoDebuggerBreak+0x2b >0018f9a0 77495296 21c29097 0018fa20 77430000 ntdll_77430000!LdrpInitializeProcess+0x1915 >0018f9f0 774951ab 00000000 00000000 00000000 ntdll_77430000!_LdrpInitialize+0xe0 >0018fa04 77495170 00000000 00000000 0018fa20 ntdll_77430000!LdrpInitialize+0x25 >0018fa0c 00000000 0018fa20 77430000 00000000 ntdll_77430000!LdrInitializeThunk+0x10 > > >THREAD_SHA1_HASH_MOD_FUNC: f6d506c4546bb5d137f475a99d6cb238658f395a > >THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 08fa60203c5db325ebdc864404426a69227dce42 > >THREAD_SHA1_HASH_MOD: 421247e39d7ac2afa4b65a67c08f22894942361d > >FOLLOWUP_IP: >ntdll_77430000!LdrpDoDebuggerBreak+2b >774dccbc cc int 3 > >FAULT_INSTR_CODE: 3307ebcc > >SYMBOL_STACK_INDEX: 0 > >SYMBOL_NAME: ntdll!LdrpDoDebuggerBreak+2b > >FOLLOWUP_NAME: MachineOwner > >MODULE_NAME: ntdll_77430000 > >IMAGE_NAME: ntdll.dll > >DEBUG_FLR_IMAGE_TIMESTAMP: 56cc16f5 > >STACK_COMMAND: dt ntdll!LdrpLastDllInitializer BaseDllName ; dt ntdll!LdrpFailureData ; ~0s ; kb > >FAILURE_BUCKET_ID: ZEROED_STACK_4000001f_ntdll.dll!LdrpDoDebuggerBreak > >BUCKET_ID: APPLICATION_FAULT_ZEROED_STACK_ntdll!LdrpDoDebuggerBreak+2b > >PRIMARY_PROBLEM_CLASS: APPLICATION_FAULT_ZEROED_STACK_ntdll!LdrpDoDebuggerBreak+2b > >BUCKET_ID_OFFSET: 2b > >BUCKET_ID_MODULE_STR: ntdll_77430000 > >BUCKET_ID_MODTIMEDATESTAMP: 56cc16f5 > >BUCKET_ID_MODCHECKSUM: 1873f8 > >BUCKET_ID_MODVER_STR: 10.0.10586.122 > >BUCKET_ID_PREFIX_STR: APPLICATION_FAULT_ZEROED_STACK_ntdll!LdrpDoDebuggerBreak+2b > >FAILURE_PROBLEM_CLASS: ZEROED_STACK > >FAILURE_EXCEPTION_CODE: 4000001f > >FAILURE_IMAGE_NAME: ntdll.dll > >FAILURE_FUNCTION_NAME: LdrpDoDebuggerBreak > >BUCKET_ID_FUNCTION_STR: LdrpDoDebuggerBreak > >FAILURE_SYMBOL_NAME: ntdll.dll!LdrpDoDebuggerBreak > >WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/soffice.exe/5.1.3.1/57174c2c/ntdll.dll/10.0.10586.122/56cc16f5/4000001f/000accbc.htm?Retriage=1 > >TARGET_TIME: 2016-05-10T10:24:47.000Z > >OSBUILD: 10586 > >OSSERVICEPACK: 0 > >SERVICEPACK_NUMBER: 0 > >OS_REVISION: 0 > >OSPLATFORM_TYPE: x64 > >OSNAME: Windows 10 > >OSEDITION: Windows 10 WinNt SingleUserTS Personal > >USER_LCID: 0 > >OSBUILD_TIMESTAMP: 2015-10-30 03:46:21 > >BUILDDATESTAMP_STR: 160223-1728 > >BUILDLAB_STR: th2_release_sec > >BUILDOSVER_STR: 10.0.10586.162 > >ANALYSIS_SESSION_ELAPSED_TIME: 1059 > >ANALYSIS_SOURCE: UM > >FAILURE_ID_HASH_STRING: um:zeroed_stack_4000001f_ntdll.dll!ldrpdodebuggerbreak > >FAILURE_ID_HASH: {9350ba64-b97c-eea0-e422-fb306e9b8d8a} > >Followup: MachineOwner >--------- >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 99370
:
124456
|
124472
|
124477
|
124724
|
124731
|
124732
|
124947
| 124949