Bugzilla – Attachment 113009 Details for
Bug 88935
Linked images - read error, flickering, freeze
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
MS Stacktrace of mini-dump during thrash
tdf88935_linkedImages_ST.txt (text/plain), 5.69 KB, created by
V Stuart Foote
on 2015-01-31 23:22:50 UTC
(
hide
)
Description:
MS Stacktrace of mini-dump during thrash
Filename:
MIME Type:
Creator:
V Stuart Foote
Created:
2015-01-31 23:22:50 UTC
Size:
5.69 KB
patch
obsolete
>0:000:x86> .load wow64exts >0:000:x86> !analyze -v >******************************************************************************* >* * >* Exception Analysis * >* * >******************************************************************************* > > >FAULTING_IP: >+483d250 >00000000 ?? ??? > >EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff) >ExceptionAddress: 0000000000000000 > ExceptionCode: 80000003 (Break instruction exception) > ExceptionFlags: 00000000 >NumberParameters: 0 > >CONTEXT: 0000000000000000 -- (.cxr 0x0;r) >eax=00000018 ebx=00000007 ecx=10947640 edx=00000004 esi=00000002 edi=00000002 >eip=5d50aa1a esp=00cbec3c ebp=00cbec9c iopl=0 nv up ei pl nz na po nc >cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00200202 >vcllo!decode_mcu_slow+0x297: >5d50aa1a 8b45e8 mov eax,dword ptr [ebp-18h] ss:002b:00cbec84=00000009 > >FAULTING_THREAD: 0000000000000c64 > >PROCESS_NAME: soffice.bin > >OVERLAPPED_MODULE: Address regions for 'ieframe' and 'invocadaptlo' overlap > >ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached. > >EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid > >NTGLOBALFLAG: 0 > >APPLICATION_VERIFIER_FLAGS: 0 > >APP: soffice.bin > >ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre > >BUGCHECK_STR: APPLICATION_FAULT_STATUS_BREAKPOINT_ZEROED_STACK > >PRIMARY_PROBLEM_CLASS: STATUS_BREAKPOINT > >DEFAULT_BUCKET_ID: STATUS_BREAKPOINT > >LAST_CONTROL_TRANSFER: from 000000005d50a0f2 to 000000005d50aa1a > >STACK_TEXT: >00cbec9c 5d50a0f2 00cbee78 10d59d40 10d59d20 vcllo!decode_mcu_slow+0x297 >00cbecb8 5d5096af 00cbee78 10d59d40 10947640 vcllo!decode_mcu+0x6e >00cbed18 5d5155db 00000003 10d59e28 00000000 vcllo!decompress_onepass+0x63 >00cbed30 5d50497a 00cbee78 00cbedb0 00cbed54 vcllo!process_data_simple_main+0x22 >00cbed4c 5d45c8cb 00000000 00cbedb0 00000001 vcllo!jpeg_read_scanlines+0x7b >00cbf090 5d45dbf0 10a6aa80 10c2d200 00cbf0c0 vcllo!ReadJPEG+0x44b >00cbf0d4 5d45c29f 00cbf470 15c04914 00000000 vcllo!JPEGReader::Read+0xc0 >00cbf108 5d448482 10c2d200 00cbf470 00000000 vcllo!ImportJPEG+0xaf >00cbf288 5d447e8f 00cbf470 1091d704 10c2d200 vcllo!GraphicFilter::ImportGraphic+0x5e2 >00cbf2b0 5c9b124a 00cbf470 1091d704 10c2d200 vcllo!GraphicFilter::ImportGraphic+0x1f >00cbf368 5c9b0e70 00cbf470 10c2d200 15c04cd7 sfxlo!SvFileObject::GetGraphic_Impl+0x14a >00cbf484 5c9c5e0e 00cbf4bc 00cf8784 00000001 sfxlo!SvFileObject::GetData+0x180 >00cbf4d8 5c9b162e 15c04d53 00000000 103de078 sfxlo!sfx2::SvLinkSource::NotifyDataChanged+0xde >00cbf500 64904781 1091d6f8 00000000 00cbf520 sfxlo!SvFileObject::LoadGrfReady_Impl+0x4e >00cbf510 61a7794b 00000000 10c57468 00cbf530 tllo!Link::Call+0x11 >00cbf520 64904781 003de078 00000000 00cbf550 svtlo!svtools::AsynchronLink::LinkStubHandleCall+0x4b >00cbf530 5d1cf0c2 00000000 15c04d4c 00000482 tllo!Link::Call+0x11 >00cbf550 5d1cf934 10c57468 00000000 00000482 vcllo!ImplHandleUserEvent+0x52 >00cbf5a0 5d4d79c9 04d803e8 04d80740 00000016 vcllo!ImplWindowFrameProc+0x3c4 >00cbf5b8 5d4da2a9 0070050e 10c57468 00000482 vcllo!ImplHandleUserEvent+0x29 >00cbf5f8 5d4da8a0 0070050e 00000482 00000000 vcllo!SalFrameWndProc+0x749 >00cbf644 773662fa 0070050e 00000482 00000000 vcllo!SalFrameWndProcW+0x60 >00cbf670 77366d3a 5d4da840 0070050e 00000482 user32!InternalCallWinProc+0x23 >00cbf6e8 773677c4 00000000 5d4da840 0070050e user32!UserCallWinProcCheckWow+0x109 >00cbf748 7736788a 5d4da840 00000000 00cbf78c user32!DispatchMessageWorker+0x3bc >00cbf758 5d4a7134 00cbf770 01154170 00000001 user32!DispatchMessageW+0xf >00cbf78c 5d4a79c3 01154101 00000000 5d75c708 vcllo!ImplSalYield+0x64 >00cbf7b0 5d42b389 01154101 00000000 03df45ec vcllo!WinSalInstance::Yield+0xa3 >00cbf7c8 6618f463 15c04103 5d75c708 010e4d93 vcllo!Application::Execute+0x69 >00cbf958 5d431b54 00000000 00000001 5d431f09 sofficeapp!desktop::Desktop::Main+0xdc3 >00cbf964 5d431f09 00e06148 00cbf9c8 661bc040 vcllo!ImplSVMain+0x24 >00cbf970 661bc040 15c04193 010e4d93 661f3378 vcllo!SVMain+0x29 >00cbf9c8 000a101e 010e4d93 000a12af 000a0000 sofficeapp!soffice_main+0x80 >WARNING: Stack unwind information not available. Following frames may be wrong. >00cbfa1c 75b7338a 7efde000 00cbfa68 77989f72 soffice+0x101e >00cbfa28 77989f72 7efde000 7e408e65 00000000 kernel32!BaseThreadInitThunk+0xe >00cbfa68 77989f45 000a1183 7efde000 00000000 ntdll_77950000!__RtlUserThreadStart+0x70 >00cbfa80 00000000 000a1183 7efde000 00000000 ntdll_77950000!_RtlUserThreadStart+0x1b > > >STACK_COMMAND: ~0s; .ecxr ; kb > >FOLLOWUP_IP: >vcllo!decode_mcu_slow+297 [c:\cygwin64\home\buildslave\r\workdir\unpackedtarball\jpeg-turbo\jdhuff.c @ 608] >5d50aa1a 8b45e8 mov eax,dword ptr [ebp-18h] > >FAULTING_SOURCE_LINE: c:\cygwin64\home\buildslave\r\workdir\unpackedtarball\jpeg-turbo\jdhuff.c > >FAULTING_SOURCE_FILE: c:\cygwin64\home\buildslave\r\workdir\unpackedtarball\jpeg-turbo\jdhuff.c > >FAULTING_SOURCE_LINE_NUMBER: 608 > >SYMBOL_STACK_INDEX: 0 > >SYMBOL_NAME: vcllo!decode_mcu_slow+297 > >FOLLOWUP_NAME: MachineOwner > >MODULE_NAME: vcllo > >IMAGE_NAME: vcllo.dll > >DEBUG_FLR_IMAGE_TIMESTAMP: 54c1af8f > >FAILURE_BUCKET_ID: STATUS_BREAKPOINT_80000003_vcllo.dll!decode_mcu_slow > >BUCKET_ID: X64_APPLICATION_FAULT_STATUS_BREAKPOINT_ZEROED_STACK_vcllo!decode_mcu_slow+297 > >ANALYSIS_SOURCE: UM > >FAILURE_ID_HASH_STRING: um:status_breakpoint_80000003_vcllo.dll!decode_mcu_slow > >FAILURE_ID_HASH: {c312a19d-5151-e0bd-d7ee-558c6a492874} > >Followup: MachineOwner >--------- > >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 88935
:
112948
|
113000
| 113009 |
113309