Bugzilla – Attachment 117862 Details for
Bug 91270
UI: Crash on exit after Manage Changes
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
backtrace 5.1.0.0
backtrace.txt (text/plain), 11.15 KB, created by
Gordo
on 2015-08-12 14:32:20 UTC
(
hide
)
Description:
backtrace 5.1.0.0
Filename:
MIME Type:
Creator:
Gordo
Created:
2015-08-12 14:32:20 UTC
Size:
11.15 KB
patch
obsolete
>FAULTING_IP: >vcllo!boost::checked_delete<Gdiplus::Bitmap>+1d [c:\cygwin\home\tinderbox\master\workdir\unpackedtarball\boost\boost\core\checked_delete.hpp @ 34] >613423ad 8b02 mov eax,dword ptr [edx] > >EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff) >ExceptionAddress: 00000000613423ad (vcllo!boost::checked_delete<Gdiplus::Bitmap>+0x000000000000001d) > ExceptionCode: c0000005 (Access violation) > ExceptionFlags: 00000000 >NumberParameters: 2 > Parameter[0]: 0000000000000000 > Parameter[1]: 0000000005e9ea28 >Attempt to read from address 0000000005e9ea28 > >FAULTING_THREAD: 0000000000000d24 > >PROCESS_NAME: soffice.bin > >ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. > >EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. > >EXCEPTION_PARAMETER1: 0000000000000000 > >EXCEPTION_PARAMETER2: 0000000005e9ea28 > >READ_ADDRESS: 0000000005e9ea28 > >FOLLOWUP_IP: >vcllo!boost::checked_delete<Gdiplus::Bitmap>+1d [c:\cygwin\home\tinderbox\master\workdir\unpackedtarball\boost\boost\core\checked_delete.hpp @ 34] >613423ad 8b02 mov eax,dword ptr [edx] > >NTGLOBALFLAG: 0 > >APPLICATION_VERIFIER_FLAGS: 0 > >CHKIMG_EXTENSION: !chkimg -lo 50 -d !ntdll_775f0000 > 77623201-77623206 6 bytes - ntdll_775f0000!LdrUnloadDll > [ 6a 14 68 b0 83 61:ff 25 1e 00 a7 71 ] > 77639500-77639502 3 bytes - ntdll_775f0000!ZwClose (+0x162ff) > [ b8 0c 00:ff 25 1e ] > 77639504-77639505 2 bytes - ntdll_775f0000!NtClose+4 (+0x04) > [ 00 33:ae 71 ] > 77639638-7763963a 3 bytes - ntdll_775f0000!ZwSetInformationProcess (+0x134) > [ b8 19 00:ff 25 1e ] > 7763963c-7763963d 2 bytes - ntdll_775f0000!NtSetInformationProcess+4 (+0x04) > [ 00 33:98 70 ] > 776397b8-776397ba 3 bytes - ntdll_775f0000!ZwTerminateProcess (+0x17c) > [ b8 29 00:ff 25 1e ] > 776397bc-776397bd 2 bytes - ntdll_775f0000!NtTerminateProcess+4 (+0x04) > [ 00 33:b9 70 ] > 77639860-77639862 3 bytes - ntdll_775f0000!NtOpenFile (+0xa4) > [ b8 30 00:ff 25 1e ] > 77639864-77639865 2 bytes - ntdll_775f0000!NtOpenFile+4 (+0x04) > [ 00 33:a4 70 ] > 776398c0-776398c2 3 bytes - ntdll_775f0000!NtOpenSection (+0x5c) > [ b8 34 00:ff 25 1e ] > 776398c4-776398c5 2 bytes - ntdll_775f0000!ZwOpenSection+4 (+0x04) > [ 00 33:aa 70 ] > 776399b0-776399b2 3 bytes - ntdll_775f0000!NtAdjustPrivilegesToken (+0xec) > [ b8 3e 00:ff 25 1e ] > 776399b4-776399b5 2 bytes - ntdll_775f0000!ZwAdjustPrivilegesToken+4 (+0x04) > [ 00 33:a1 70 ] > 77639a58-77639a5a 3 bytes - ntdll_775f0000!ZwCreateEvent (+0xa4) > [ b8 45 00:ff 25 1e ] > 77639a5c-77639a5d 2 bytes - ntdll_775f0000!ZwCreateEvent+4 (+0x04) > [ 00 33:d1 70 ] > 77639a88-77639a8a 3 bytes - ntdll_775f0000!NtCreateSection (+0x2c) > [ b8 47 00:ff 25 1e ] > 77639a8c-77639a8d 2 bytes - ntdll_775f0000!ZwCreateSection+4 (+0x04) > [ 00 33:ad 70 ] > 77639ae8-77639aea 3 bytes - ntdll_775f0000!ZwCreateThread (+0x5c) > [ b8 4b 00:ff 25 1e ] > 77639aec-77639aed 2 bytes - ntdll_775f0000!NtCreateThread+4 (+0x04) > [ 00 33:c5 70 ] > 77639b60-77639b62 3 bytes - ntdll_775f0000!NtTerminateThread (+0x74) > [ b8 50 00:ff 25 1e ] > 77639b64-77639b65 2 bytes - ntdll_775f0000!ZwTerminateThread+4 (+0x04) > [ 00 33:c2 70 ] > 77639b90-77639b92 3 bytes - ntdll_775f0000!ZwCreateFile (+0x2c) > [ b8 52 00:ff 25 1e ] > 77639b94-77639b95 2 bytes - ntdll_775f0000!NtCreateFile+4 (+0x04) > [ 00 33:a7 70 ] > 77639e78-77639e7a 3 bytes - ntdll_775f0000!ZwAlpcConnectPort (+0x2e4) > [ b8 71 00:ff 25 1e ] > 77639e7c-77639e7d 2 bytes - ntdll_775f0000!ZwAlpcConnectPort+4 (+0x04) > [ 00 33:92 70 ] > 77639e90-77639e92 3 bytes - ntdll_775f0000!ZwAlpcCreatePort (+0x14) > [ b8 72 00:ff 25 1e ] > 77639e94-77639e95 2 bytes - ntdll_775f0000!ZwAlpcCreatePort+4 (+0x04) > [ 00 33:d7 70 ] > 7763a010-7763a012 3 bytes - ntdll_775f0000!NtAlpcSendWaitReceivePort (+0x17c) > [ b8 82 00:ff 25 1e ] > 7763a014-7763a015 2 bytes - ntdll_775f0000!ZwAlpcSendWaitReceivePort+4 (+0x04) > [ 00 33:da 70 ] > 7763a160-7763a162 3 bytes - ntdll_775f0000!NtConnectPort (+0x14c) > [ b8 90 00:ff 25 1e ] > 7763a164-7763a165 2 bytes - ntdll_775f0000!NtConnectPort+4 (+0x04) > [ 00 33:b6 70 ] > 7763a1c0-7763a1c2 3 bytes - ntdll_775f0000!ZwCreateEventPair (+0x5c) > [ b8 94 00:ff 25 1e ] > 7763a1c4-7763a1c5 2 bytes - ntdll_775f0000!ZwCreateEventPair+4 (+0x04) > [ 00 33:ce 70 ] > 7763a268-7763a26a 3 bytes - ntdll_775f0000!ZwCreateMutant (+0xa4) > [ b8 9b 00:ff 25 1e ] > 7763a26c-7763a26d 2 bytes - ntdll_775f0000!NtCreateMutant+4 (+0x04) > [ 00 33:d4 70 ] > 7763a2b0-7763a2b2 3 bytes - ntdll_775f0000!NtCreatePort (+0x44) > [ b8 9e 00:ff 25 1e ] > 7763a2b4-7763a2b5 2 bytes - ntdll_775f0000!NtCreatePort+4 (+0x04) > [ 00 33:c8 70 ] > 7763a328-7763a32a 3 bytes - ntdll_775f0000!NtCreateSemaphore (+0x74) > [ b8 a3 00:ff 25 1e ] > 7763a32c-7763a32d 2 bytes - ntdll_775f0000!NtCreateSemaphore+4 (+0x04) > [ 00 33:cb 70 ] > 7763a340-7763a342 3 bytes - ntdll_775f0000!NtCreateSymbolicLinkObject (+0x14) > [ b8 a4 00:ff 25 1e ] > 7763a344-7763a345 2 bytes - ntdll_775f0000!NtCreateSymbolicLinkObject+4 (+0x04) > [ 00 33:9e 70 ] > 7763a358-7763a35a 3 bytes - ntdll_775f0000!ZwCreateThreadEx (+0x14) > [ b8 a5 00:ff 25 1e ] > 7763a35c-7763a35d 2 bytes - ntdll_775f0000!NtCreateThreadEx+4 (+0x04) > [ 00 33:95 70 ] > 7763a830-7763a832 3 bytes - ntdll_775f0000!ZwLoadDriver (+0x4d4) > [ b8 d9 00:ff 25 1e ] > 7763a834-7763a835 2 bytes - ntdll_775f0000!NtLoadDriver+4 (+0x04) > [ 00 33:b3 70 ] > 7763a908-7763a90a 3 bytes - ntdll_775f0000!ZwMakeTemporaryObject (+0xd4) > [ b8 e2 00:ff 25 1e ] > 7763a90c-7763a90d 2 bytes - ntdll_775f0000!NtMakeTemporaryObject+4 (+0x04) > [ 00 b9:9b 70 ] > 7763b534-7763b536 3 bytes - ntdll_775f0000!NtSetSystemInformation (+0xc28) > [ b8 64 01:ff 25 1e ] > 7763b538-7763b539 2 bytes - ntdll_775f0000!NtSetSystemInformation+4 (+0x04) > [ 00 33:b0 70 ] > 7763b5dc-7763b5de 3 bytes - ntdll_775f0000!NtShutdownSystem (+0xa4) > [ b8 6b 01:ff 25 1e ] >WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output. >136 errors : !ntdll_775f0000 (77623201-7763b6a1) > >BUGCHECK_STR: APPLICATION_FAULT_MEMORY_CORRUPTION_INVALID_POINTER_READ_LARGE_SHUTDOWN > >PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE_SHUTDOWN > >DEFAULT_BUCKET_ID: MEMORY_CORRUPTION_LARGE_SHUTDOWN > >LAST_CONTROL_TRANSFER: from 0000000061346d83 to 00000000613423ad > >STACK_TEXT: >013cf594 61346d83 05e9ea28 0d764288 013cf5b0 vcllo!boost::checked_delete<Gdiplus::Bitmap>+0x1d [c:\cygwin\home\tinderbox\master\workdir\unpackedtarball\boost\boost\core\checked_delete.hpp @ 34] >013cf5a4 60dc9b04 0d764288 013cf5bc 60db0069 vcllo!boost::detail::sp_counted_impl_p<Gdiplus::Bitmap>::dispose+0x13 [c:\cygwin\home\tinderbox\master\workdir\unpackedtarball\boost\boost\smart_ptr\detail\sp_counted_impl.hpp @ 78] >013cf5b0 60db0069 0d5ae0c0 013cf5d8 6133ad1f vcllo!boost::detail::sp_counted_base::release+0x24 [c:\cygwin\home\tinderbox\master\workdir\unpackedtarball\boost\boost\smart_ptr\detail\sp_counted_base_w32.hpp @ 104] >013cf5bc 6133ad1f 767d636e 0d5ae0bc 013cf5e8 vcllo!boost::detail::shared_count::~shared_count+0x19 [c:\cygwin\home\tinderbox\master\workdir\unpackedtarball\boost\boost\smart_ptr\detail\shared_count.hpp @ 476] >013cf5d8 6134334d 767d6342 0d5ae0a8 013cf654 vcllo!boost::shared_ptr<Gdiplus::Bitmap>::~shared_ptr<Gdiplus::Bitmap>+0x3f >013cf5f4 6134387f 0d5ae0a8 013cf61c 611032cc vcllo!WinSalBitmap::~WinSalBitmap+0x4d [c:\cygwin\home\tinderbox\master\vcl\win\source\gdi\salbmp.cxx @ 208] >013cf600 611032cc 00000001 00210000 0d5ae0a8 vcllo!WinSalBitmap::`scalar deleting destructor'+0xf >013cf61c 61092b5f 0d763c40 013cf644 610a693e vcllo!ImpBitmap::~ImpBitmap+0x2c [c:\cygwin\home\tinderbox\master\vcl\source\gdi\impbmp.cxx @ 43] >013cf628 610a693e 00000001 0d764030 0d763c40 vcllo!ImpBitmap::`scalar deleting destructor'+0xf >013cf644 610a1b7e 767d60d6 0d67fd44 013cf670 vcllo!Bitmap::ImplReleaseRef+0x4e [c:\cygwin\home\tinderbox\master\vcl\source\gdi\bitmap.cxx @ 352] >013cf660 610a9edb 767d60ca 0d67fd44 013cf698 vcllo!Bitmap::~Bitmap+0x3e [c:\cygwin\home\tinderbox\master\vcl\source\gdi\bitmap.cxx @ 134] >013cf67c 61110adb 767d6012 05437048 05437048 vcllo!BitmapEx::~BitmapEx+0x4b [c:\cygwin\home\tinderbox\master\vcl\source\gdi\bitmapex.cxx @ 190] >013cf6a4 61110d5f 0d67fd40 013cf6dc 611109c0 vcllo!ImplImageData::~ImplImageData+0x6b [c:\cygwin\home\tinderbox\master\vcl\source\gdi\impimage.cxx @ 113] >013cf6b0 611109c0 00000001 00000000 0d67fd40 vcllo!ImplImageData::`scalar deleting destructor'+0xf >013cf6dc 610fe4cf 0d763d00 013cf708 610fdb7c vcllo!ImplImage::~ImplImage+0x70 [c:\cygwin\home\tinderbox\master\vcl\source\gdi\impimage.cxx @ 136] >013cf6e8 610fdb7c 00000001 ffffffff 0d763d00 vcllo!ImplImage::`scalar deleting destructor'+0xf >013cf708 5f2a67fe 013cf72c 5f15c7c0 00000000 vcllo!Image::~Image+0x4c [c:\cygwin\home\tinderbox\master\vcl\source\gdi\image.cxx @ 158] >013cf710 5f15c7c0 00000000 00000001 00000000 swlo!`SwRedlineAcceptDlg::GetActionImage'::`2'::`dynamic atexit destructor for 'aDeleted''+0xe >013cf72c 5f15c9e8 05533d38 05533ba8 05533ba8 swlo!_CRT_INIT+0xc1 [f:\dd\vctools\crt\crtw32\dllstuff\crtdll.c @ 416] >013cf770 5f15c912 5e580000 00000000 00000001 swlo!__DllMainCRTStartup+0xcf [f:\dd\vctools\crt\crtw32\dllstuff\crtdll.c @ 522] >013cf784 776393d0 5e580000 00000000 00000001 swlo!_DllMainCRTStartup+0x1c [f:\dd\vctools\crt\crtw32\dllstuff\crtdll.c @ 472] >013cf7a4 7762ee8a 5f15c8f6 5e580000 00000000 ntdll_775f0000!LdrpCallInitRoutine+0x14 >013cf844 7762eeae 013cf860 76c58d14 00000000 ntdll_775f0000!LdrShutdownProcess+0x1a9 >013cf84c 76c58d13 00000000 77e8f3b0 ffffffff ntdll_775f0000!RtlExitUserProcess+0x64 >013cf860 67b23fac 00000000 013cf8b4 67b2427e KERNEL32!ExitProcess+0x12 >013cf86c 67b2427d 00000000 767d001c 00000000 MSVCR120!__crtExitProcess+0x15 [f:\dd\vctools\crt\crtw32\startup\crt0dat.c @ 774] >013cf8b4 67b242a2 00000000 00000000 00000000 MSVCR120!doexit+0x115 [f:\dd\vctools\crt\crtw32\startup\crt0dat.c @ 678] >013cf8c8 009712e3 00000000 7651fdd7 00000000 MSVCR120!exit+0xf [f:\dd\vctools\crt\crtw32\startup\crt0dat.c @ 417] >WARNING: Stack unwind information not available. Following frames may be wrong. >013cf908 76ccf804 7efde000 013cf954 7766d981 soffice!main+0x2c3 >013cf914 7766d981 7efde000 7748ac17 00000000 KERNEL32!BaseThreadInitThunk+0xe >013cf954 7766db93 0097119f 7efde000 00000000 ntdll_775f0000!__RtlUserThreadStart+0x23 >013cf96c 00000000 0097119f 7efde000 00000000 ntdll_775f0000!_RtlUserThreadStart+0x1b > > >SYMBOL_NAME: memory_corruption!ntdll_775f0000 > >FOLLOWUP_NAME: MachineOwner > >MODULE_NAME: memory_corruption > >IMAGE_NAME: memory_corruption > >DEBUG_FLR_IMAGE_TIMESTAMP: 0 > >STACK_COMMAND: ~0s ; kb > >FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE_SHUTDOWN_c0000005_memory_corruption!ntdll_775f0000 > >BUCKET_ID: X64_APPLICATION_FAULT_MEMORY_CORRUPTION_INVALID_POINTER_READ_LARGE_SHUTDOWN_memory_corruption!ntdll_775f0000 > >WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/soffice_bin/5_1_0_0/55c2a10c/vcllo_dll/5_1_0_0/55c90886/c0000005/005b23ad.htm?Retriage=1 > >Followup: MachineOwner >---------
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 91270
:
115575
| 117862