Bugzilla – Attachment 92160 Details for
Bug 73464
ACCESSIBILITY: 4.2.0.3 RC3 QA Blocker -- crash when IA2 bridge is active-- pressing ENTER key creating new paragraph, or a BACKSPACE when rubbing out paragraph
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
WinDbg analyze -v of soffice.bin dump file
bug73464_Analyze-V_ofDumpFile.txt (text/plain), 6.37 KB, created by
V Stuart Foote
on 2014-01-15 16:04:16 UTC
(
hide
)
Description:
WinDbg analyze -v of soffice.bin dump file
Filename:
MIME Type:
Creator:
V Stuart Foote
Created:
2014-01-15 16:04:16 UTC
Size:
6.37 KB
patch
obsolete
> >Microsoft (R) Windows Debugger Version 6.2.9200.20512 X86 >Copyright (c) Microsoft Corporation. All rights reserved. > > >Loading Dump File [C:\Users\vsfoote\Downloads\Procdump\soffice_140115_095153.dmp] >Comment: ' >*** procdump.exe soffice.bin -h >*** Hung window detected: 1406e2' >User Mini Dump File: Only registers, stack and portions of memory are available > >Symbol search path is: CACHE*C:\symcache;srv*http://msdl.microsoft.com/download/symbols*http://dev-downloads.libreoffice.org/symstore/symbols >Executable search path is: >Windows 7 Version 7601 (Service Pack 1) MP (8 procs) Free x86 compatible >Product: WinNt, suite: SingleUserTS >Machine Name: >Debug session time: Wed Jan 15 09:51:53.000 2014 (UTC - 6:00) >System Uptime: not available >Process Uptime: 0 days 0:00:48.000 >................................................................ >................................................................ >................. >Loading unloaded module list >. >eax=00000000 ebx=00000000 ecx=7fffffff edx=00000000 esi=05670000 edi=000011e4 >eip=7748f8d1 esp=013ae798 ebp=013ae81c iopl=0 nv up ei pl zr na pe nc >cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 >ntdll!ZwWaitForSingleObject+0x15: >7748f8d1 83c404 add esp,4 >0:000> !analyze -v >******************************************************************************* >* * >* Exception Analysis * >* * >******************************************************************************* > >*** ERROR: Symbol file could not be found. Defaulted to export symbols for vcllo.dll - >*** ERROR: Symbol file could not be found. Defaulted to export symbols for sofficeapp.dll - >*** ERROR: Symbol file could not be found. Defaulted to export symbols for soffice.bin - >Cannot find frame 0x9, previous scope unchanged >Cannot find frame 0x9, previous scope unchanged >Cannot find frame 0x9, previous scope unchanged >Cannot find frame 0x9, previous scope unchanged >Cannot find frame 0xb, previous scope unchanged >Cannot find frame 0x10, previous scope unchanged >Cannot find frame 0x7, previous scope unchanged >Cannot find frame 0x7, previous scope unchanged >*** ERROR: Symbol file could not be found. Defaulted to export symbols for UAccCOM.dll - >*** ERROR: Symbol file could not be found. Defaulted to export symbols for sal3.dll - >*** ERROR: Symbol file could not be found. Defaulted to export symbols for salhelper3MSC.dll - >*** ERROR: Symbol file could not be found. Defaulted to export symbols for lnglo.dll - >*** ERROR: Symbol file could not be found. Defaulted to export symbols for sysdtrans.dll - > >FAULTING_IP: >ntdll!RtlReportCriticalFailure+57 >7753e753 eb12 jmp ntdll!RtlReportCriticalFailure+0x6b (7753e767) > >EXCEPTION_RECORD: 003ae9bc -- (.exr 0x3ae9bc) >Cannot read Exception record @ 003ae9bc > >FAULTING_THREAD: 000015bc > >PROCESS_NAME: soffice.bin > >ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached. > >EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid > >NTGLOBALFLAG: 0 > >APPLICATION_VERIFIER_FLAGS: 0 > >APP: soffice.bin > >CONTEXT: 013aea0c -- (.cxr 0x13aea0c) >eax=013aed04 ebx=00000000 ecx=7fffffff edx=00000000 esi=00160000 edi=5d965c1c >eip=7753e753 esp=013aecf4 ebp=013aed6c iopl=0 nv up ei pl zr na pe nc >cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 >ntdll!RtlReportCriticalFailure+0x57: >7753e753 eb12 jmp ntdll!RtlReportCriticalFailure+0x6b (7753e767) >Resetting default scope > >LAST_CONTROL_TRANSFER: from 7753f659 to 7753e753 > >BUGCHECK_STR: APPLICATION_FAULT_ACTIONABLE_HEAP_CORRUPTION_heap_failure_invalid_argument_AFTER_CALL > >PRIMARY_PROBLEM_CLASS: ACTIONABLE_HEAP_CORRUPTION_heap_failure_invalid_argument_AFTER_CALL > >DEFAULT_BUCKET_ID: ACTIONABLE_HEAP_CORRUPTION_heap_failure_invalid_argument_AFTER_CALL > >STACK_TEXT: >775742a8 774f9cb1 ntdll!RtlSizeHeap+0x69 >775742ac 74f9625c ole32!CRetailMalloc_GetSize+0x21 >775742b0 763a443a oleaut32!APP_DATA::FreeCachedMem+0x30 >775742b4 763a3ea3 oleaut32!SysFreeString+0x6b >775742b8 763a7803 oleaut32!BSTR_UserFree+0x19 >775742bc 76997af6 rpcrt4!NdrUserMarshalFree+0x37 >775742c0 76a1083e rpcrt4!NdrpFreeParams+0x145 >775742c4 76a1072a rpcrt4!NdrStubCall2+0x4eb >775742c8 7508d7e6 ole32!CStdStubBuffer_Invoke+0xb6 >775742cc 7508d876 ole32!SyncStubInvoke+0x3c >775742d0 7508ddd0 ole32!StubInvoke+0xb9 >775742d4 74fa8a43 ole32!CCtxComChnl::ContextInvoke+0xfa >775742d8 74fa8938 ole32!MTAInvoke+0x1a >775742dc 74fa950a ole32!STAInvoke+0x46 >775742e0 7508dccd ole32!AppInvoke+0xab >775742e4 7508db41 ole32!ComInvokeWithLockAndIPID+0x372 >775742e8 7508e1fd ole32!ComInvoke+0xc5 >775742ec 74fa9367 ole32!ThreadDispatch+0x23 >775742f0 74fa9326 ole32!ThreadWndProc+0x161 >775742f4 768762fa user32!InternalCallWinProc+0x23 >775742f8 76876d3a user32!UserCallWinProcCheckWow+0x109 >775742fc 768777c4 user32!DispatchMessageWorker+0x3bc >77574300 7687788a user32!DispatchMessageW+0xf >77574304 5e453a20 vcllo!WorkWindow::IsMaximized+0x9cf0 >77574308 5e453b90 vcllo!WorkWindow::IsMaximized+0x9e60 >7757430c 5e0f8127 vcllo!Application::Execute+0x97 >77574310 5e0f80b0 vcllo!Application::Execute+0x20 >77574314 5e102b21 vcllo!EmbeddedFontsHelper::operator=+0x171 >77574318 678fa7af sofficeapp!soffice_main+0xbf >7757431c 008e1051 soffice!main+0x51 >77574320 76af336a kernel32!BaseThreadInitThunk+0xe >77574324 774a9f72 ntdll!__RtlUserThreadStart+0x70 > > >STACK_COMMAND: .cxr 013AEA0C ; kb ; dps 775742a8 ; kb > >FOLLOWUP_IP: >rpcrt4!NdrStubCall2+4eb >76a1072a ffb584fcffff push dword ptr [ebp-37Ch] > >SYMBOL_STACK_INDEX: 7 > >SYMBOL_NAME: rpcrt4!NdrStubCall2+4eb > >FOLLOWUP_NAME: MachineOwner > >MODULE_NAME: rpcrt4 > >IMAGE_NAME: rpcrt4.dll > >DEBUG_FLR_IMAGE_TIMESTAMP: 51db9710 > >FAILURE_BUCKET_ID: ACTIONABLE_HEAP_CORRUPTION_heap_failure_invalid_argument_AFTER_CALL_80000003_rpcrt4.dll!NdrStubCall2 > >BUCKET_ID: APPLICATION_FAULT_ACTIONABLE_HEAP_CORRUPTION_heap_failure_invalid_argument_AFTER_CALL_rpcrt4!NdrStubCall2+4eb > >WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/soffice_bin/4_2_0_2/52ce7462/unknown/0_0_0_0/bbbbbbb4/80000003/00000000.htm?Retriage=1 > >Followup: MachineOwner >--------- >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 73464
:
91877
|
91920
|
92158
|
92159
| 92160 |
92195
|
92196