Bugzilla – Attachment 70822 Details for
Bug 57079
Crash Using Edit Contour dialog and then changing Configuration
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Bug 57079 - WinDbg session
Bug 57079 - WinDbg session.txt (text/plain), 3.66 KB, created by
bfoman (inactive)
on 2012-11-30 09:55:16 UTC
(
hide
)
Description:
Bug 57079 - WinDbg session
Filename:
MIME Type:
Creator:
bfoman (inactive)
Created:
2012-11-30 09:55:16 UTC
Size:
3.66 KB
patch
obsolete
>0:025> !analyze -v >******************************************************************************* >* * >* Exception Analysis * >* * >******************************************************************************* > >*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files (x86)\Java\jre6\bin\client\jvm.dll - > >FAULTING_IP: >+3a89e >1b7ba009 890c0d00002f0a mov dword ptr [ecx+0A2F0000h],ecx > >EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff) >ExceptionAddress: 1b7ba009 > ExceptionCode: c0000005 (Access violation) > ExceptionFlags: 00000000 >NumberParameters: 2 > Parameter[0]: 00000001 > Parameter[1]: 0a2f0080 >Attempt to write to address 0a2f0080 > >FAULTING_THREAD: 00000ca4 > >DEFAULT_BUCKET_ID: BAD_INSTRUCTION_PTR > >PROCESS_NAME: soffice.bin > >ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo > >EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo > >EXCEPTION_PARAMETER1: 00000001 > >EXCEPTION_PARAMETER2: 0a2f0080 > >WRITE_ADDRESS: 0a2f0080 > >FOLLOWUP_IP: >jvm!JVM_Clone+3a89e >6d8ea69e 8b875c010000 mov eax,dword ptr [edi+15Ch] > >FAILED_INSTRUCTION_ADDRESS: >+55b52faf03dbd9a4 >1b7ba009 890c0d00002f0a mov dword ptr [ecx+0A2F0000h],ecx > >MOD_LIST: <ANALYSIS/> > >NTGLOBALFLAG: 0 > >APPLICATION_VERIFIER_FLAGS: 0 > >IP_ON_HEAP: 1b7b2e21 >The fault address in not in any loaded module, please check your build's rebase >log at <releasedir>\bin\build_logs\timebuild\ntrebase.log for module which may >contain the address if it were loaded. > >PRIMARY_PROBLEM_CLASS: BAD_INSTRUCTION_PTR > >BUGCHECK_STR: APPLICATION_FAULT_BAD_INSTRUCTION_PTR_INVALID_POINTER_WRITE > >FRAME_ONE_INVALID: 1 > >LAST_CONTROL_TRANSFER: from 1b7b2e21 to 1b7ba009 > >STACK_TEXT: >WARNING: Frame IP not in any known module. Following frames may be wrong. >0d6cf964 1b7b2e21 00000000 1b7b82e9 06dc49d0 0x1b7ba009 >0d6cfa28 6d8ea69e 00001f80 1b7b02ff 0aed8400 0x1b7b2e21 >0d6cfa40 6d8eadcb 0d6cfa74 0d6cfbe0 0000000a jvm!JVM_Clone+0x3a89e >0d6cfab8 6d97c3e1 0d6cfbd8 006cfb54 0d6cfb58 jvm!JVM_Clone+0x3afcb >0d6cfafc 6d8eaf71 6d8eac70 0d6cfbd8 0d6cfb54 jvm!JVM_FindSignal+0x506e1 >0d6cfb38 6d8eafcb 0d6cfbd8 0aed86ec 6da639ac jvm!JVM_Clone+0x3b171 >0d6cfb9c 6d8a5569 0d6cfbd8 0aed86e8 0aed86ec jvm!JVM_Clone+0x3b1cb >0d6cfbec 6d9090a4 0aed86ec 0aed8400 0aed8400 jvm!jio_fprintf+0x109 >0d6cfc18 6d93108c 00000000 00000000 00000000 jvm!JVM_Clone+0x592a4 >0d6cfe48 7c349565 0aed8400 00000000 00000000 jvm!JVM_FindSignal+0x538c >0d6cfe7c 7608339a 0c5b5748 0d6cfec8 77b59ef2 msvcr71!_threadstartex+0x6f [f:\vs70builds\3052\vc\crtbld\crt\src\threadex.c @ 241] >0d6cfe88 77b59ef2 0c5b5748 6ab0efee 00000000 kernel32!BaseThreadInitThunk+0xe >0d6cfec8 77b59ec5 7c3494f6 0c5b5748 00000000 ntdll!__RtlUserThreadStart+0x70 >0d6cfee0 00000000 7c3494f6 0c5b5748 00000000 ntdll!_RtlUserThreadStart+0x1b > > >SYMBOL_STACK_INDEX: 2 > >SYMBOL_NAME: jvm!JVM_Clone+3a89e > >FOLLOWUP_NAME: MachineOwner > >MODULE_NAME: jvm > >IMAGE_NAME: jvm.dll > >DEBUG_FLR_IMAGE_TIMESTAMP: 4faac266 > >STACK_COMMAND: dt ntdll!LdrpLastDllInitializer BaseDllName ; dt ntdll!LdrpFailureData ; ~25s ; kb > >FAILURE_BUCKET_ID: BAD_INSTRUCTION_PTR_c0000005_jvm.dll!JVM_Clone > >BUCKET_ID: APPLICATION_FAULT_BAD_INSTRUCTION_PTR_INVALID_POINTER_WRITE_BAD_IP_jvm!JVM_Clone+3a89e > >WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/soffice_bin/4_0_0_1/50b79ab3/unknown/0_0_0_0/bbbbbbb4/c0000005/1b7ba009.htm?Retriage=1 > >Followup: MachineOwner >---------
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 57079
:
70013
|
70822