Closed Bug 11813 Opened 25 years ago Closed 25 years ago

Dr Watson log generated running BitTest

Categories

(SeaMonkey :: General, defect, P3)

x86
Windows NT

Tracking

(Not tracked)

VERIFIED WONTFIX

People

(Reporter: me, Assigned: beard)

References

()

Details

Application exception occurred: App: BitTest.dbg (pid=175) When: 8/12/1999 @ 16:15:2.339 Exception number: c0000005 (access violation) *----> System Information <----* Computer Name: FLETCHERB_TEST User Name: fletcheb Number of Processors: 1 Processor Type: x86 Family 6 Model 7 Stepping 2 Windows Version: 4.0 Current Build: 1381 Service Pack: 4 Current Type: Uniprocessor Free Registered Organization: WRQ Registered Owner: Fletcher Bonds *----> Task List <----* 0 Idle.exe 2 System.exe 20 smss.exe 28 csrss.exe 34 winlogon.exe 40 services.exe 43 lsass.exe 69 spoolss.exe 88 smartagt.exe 81 RpcSs.exe 107 pstores.exe 100 nddeagnt.exe 133 Explorer.exe 67 SysTray.exe 138 comsmd.exe 143 DACONFIG.exe 145 RealPlay.exe 154 Remote.exe 98 netscape.exe 99 ddhelp.exe 182 notepad.exe 175 BitTest.exe 174 drwtsn32.exe 0 _Total.exe (00400000 - 00407000) BitTest.dbg (77f60000 - 77fbc000) dll\ntdll.dbg (60830000 - 6084c000) raptorgfxwin.dbg (608e0000 - 60916000) xpcom.dbg (60800000 - 60807000) plc3.dbg (607b0000 - 607cf000) nspr3.dbg (776d0000 - 776d8000) dll\wsock32.dbg (77f00000 - 77f5e000) dll\kernel32.dbg (776b0000 - 776c4000) dll\ws2_32.dbg (78000000 - 78040000) (77e70000 - 77ec4000) dll\user32.dbg (77ed0000 - 77efc000) dll\gdi32.dbg (77dc0000 - 77dff000) dll\advapi32.dbg (77e10000 - 77e67000) dll\rpcrt4.dbg (776a0000 - 776a7000) dll\ws2help.dbg (77fd0000 - 77ffa000) dll\winmm.dbg (606d0000 - 606d8000) libreg32.dbg (77c40000 - 77d7c000) dll\shell32.dbg (77aa0000 - 77b14000) COMCTL32.dbg (780a0000 - 780a0000) (60810000 - 60817000) plds3.dbg (605f0000 - 605fc000) img3250.dbg (77d80000 - 77db2000) dll\comdlg32.dbg (60620000 - 6065f000) js3250.dbg (60710000 - 60784000) netlib.dbg (60930000 - 6093b000) xppref32.dbg (60940000 - 6094c000) zlib.dbg (77fc0000 - 77fc8000) dll\mmdrv.dbg (6bd00000 - 6bd28000) D:\DDK-NT\lib\i386\free\ydsxg32.dll (608c0000 - 608db000) raptorwidget.dbg (76ab0000 - 76ab5000) dll\imm32.dbg (77b20000 - 77bd5000) dll\ole32.dbg (60850000 - 60882000) raptorhtmlpars.dbg (77a40000 - 77a4d000) dll\ntshrui.dbg (77800000 - 7783a000) dll\netapi32.dbg (77840000 - 77849000) dll\NetRap.dbg (777e0000 - 777ed000) dll\samlib.dbg (77bf0000 - 77bf7000) dll\rpcltc1.dbg State Dump for Thread Id 0xb0 eax=00000000 ebx=00000000 ecx=00004f01 edx=000000a1 esi=77ed11c7 edi=00000001 eip=77ed5676 esp=0012fcec ebp=0012fd0c iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202 function: GetClipRgn 77ed564f ff050460ef77 inc dword ptr [77ef6004] ds:77ef6004=00000002 77ed5655 c20400 ret 0x4 77ed5658 64a118000000 mov eax,fs:[00000018] fs:00000018=???????? 77ed565e 8b4030 mov eax,[eax+0x30] ds:00f2ea06=???????? 77ed5661 ff742404 push dword ptr [esp+0x4] ss:0105e6f3=???????? 77ed5665 6a00 push 0x0 77ed5667 ff7018 push dword ptr [eax+0x18] ds:00f2ea06=???????? 77ed566a ff156450ef77 call dword ptr [77ef5064] ds:77ef5064=77f64cfe 77ed5670 ebe3 jmp GetClipRgn+0x40 (77ed5655) 77ed5672 8b542404 mov edx,[esp+0x4] ss:0105e6f3=???????? FAULT ->77ed5676 833a0c cmp dword ptr [edx],0xc ds:000000a1=???????? 77ed5679 0f8492960000 je GetTransform+0x14e4 (77eded11) 77ed567f 8b4210 mov eax,[edx+0x10] ds:00f2eaa7=???????? 77ed5682 85c0 test eax,eax 77ed5684 7525 jnz GetClipRgn+0x96 (77ed56ab) 77ed5686 0fb7420c movzx eax,word ptr [edx+0xc] ds:00f2eaa8=???? 77ed568a 0fb74a0e movzx ecx,word ptr [edx+0xe] ds:00f2eaa8=???? 77ed568e 0fafc1 imul eax,ecx 77ed5691 0faf4204 imul eax,[edx+0x4] ds:00f2eaa8=???????? 77ed5695 83c01f add eax,0x1f 77ed5698 24e0 and al,0xe0 77ed569a 99 cdq *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0012fd0c 00401525 00000000 00000000 00000000 00000000 gdi32!GetClipRgn 0012fd6c 0040250c 00000000 00000000 006aa520 0012ff1c BitTest!<nosymbols> 0012feac 77e71268 003e038c 00000111 00009c52 00000000 BitTest!<nosymbols> 0012ff24 00000000 016bb0a8 0000009e 0000008c 0012ffc0 user32!TranslateMessageEx 00009c52 00000000 00000000 00000000 00000000 00000000 BitTest!<nosymbols> *----> Raw Stack Dump <----* 0012fcec 33 5f ed 77 a1 00 00 00 - 00 00 00 00 00 00 00 00 3_.w............ 0012fcfc c7 11 ed 77 00 00 00 00 - 00 00 00 00 cc dc ed 77 ...w...........w 0012fd0c 6c fd 12 00 25 15 40 00 - 00 00 00 00 00 00 00 00 l...%.@......... 0012fd1c 00 00 00 00 00 00 00 00 - 01 00 00 00 a1 00 00 00 ................ 0012fd2c 00 00 00 00 00 01 00 00 - 00 00 00 00 52 9c 00 00 ............R... 0012fd3c 84 fd 12 00 00 01 00 00 - 00 00 00 00 64 fd 12 00 ............d... 0012fd4c 6c 13 e7 77 20 a5 6a 00 - a1 00 00 00 00 00 00 00 l..w .j......... 0012fd5c 45 d6 8e 60 4d 3f 8e 60 - 88 fe 12 00 01 00 00 00 E..`M?.`........ 0012fd6c ac fe 12 00 0c 25 40 00 - 00 00 00 00 00 00 00 00 .....%@......... 0012fd7c 20 a5 6a 00 1c ff 12 00 - 46 3a 5c 66 6c 65 74 63 .j.....F:\fletc 0012fd8c 68 5c 42 65 6c 75 67 61 - 33 2e 4a 50 47 00 65 67 h\Beluga3.JPG.eg 0012fd9c 00 00 00 00 0e 32 00 78 - 88 31 40 00 00 00 00 00 .....2.x.1@..... 0012fdac 40 86 8f 60 01 00 00 00 - 60 3d 91 60 32 58 8e 60 @..`....`=.`2X.` 0012fdbc f8 fd 12 00 01 00 00 00 - e0 fd 12 00 fc 72 e7 77 .............r.w 0012fdcc c0 b3 6a 00 1c 00 00 00 - 01 00 00 00 3e 00 00 00 ..j.........>... 0012fddc 00 00 00 00 78 f8 8f 60 - 00 00 00 00 00 00 00 00 ....x..`........ 0012fdec 01 00 00 00 00 00 00 00 - 78 f8 8f 60 00 00 00 00 ........x..`.... 0012fdfc 00 00 00 00 01 00 00 00 - 00 00 00 00 40 20 42 00 ............@ B. 0012fe0c 00 00 00 00 00 00 00 00 - 47 00 00 00 78 f8 8f 60 ........G...x..` 0012fe1c 00 00 00 00 00 00 00 00 - 01 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0xbd eax=77e15f2a ebx=00000000 ecx=00000000 edx=00000000 esi=00149324 edi=0014de30 eip=77f67f27 esp=00b2fe04 ebp=00b2ff90 iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202 function: ZwReplyWaitReceivePort 77f67f1c b890000000 mov eax,0x90 77f67f21 8d542404 lea edx,[esp+0x4] ss:01a5e80b=???????? 77f67f25 cd2e int 2e 77f67f27 c21000 ret 0x10 77f67f2a 8bc0 mov eax,eax *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 00b2ff90 77e15df4 77e15e7a 0014de30 00b2ffec 77f8c6c5 ntdll!ZwReplyWaitReceivePort 00003a98 00000000 00000000 00000000 00000000 00000000 rpcrt4!I_RpcAsyncSendReceive
NT4 SP4 running M8 w/ Communicator 4.61 installed. Fired test prog w/o parameters while browsing EXEs.
Assignee: don → beard
Status: NEW → ASSIGNED
This is a test program. It's not being actively maintained, so I doubt this will get fixed.
Status: ASSIGNED → RESOLVED
Closed: 25 years ago
Resolution: --- → WONTFIX
Status: RESOLVED → REOPENED
If these are test progs that aren't being actively maintained, they should be ripped out. Why leave something in that we know will explode if someone happens to find/run it. Right? thanks.
Resolution: WONTFIX → ---
Clearing Won't Fix due to reopen.
Status: REOPENED → RESOLVED
Closed: 25 years ago25 years ago
Resolution: --- → WONTFIX
Marking Verified/Won't Fix - no action will be taken on this to the best of my knowledge
Status: RESOLVED → VERIFIED
Product: Browser → Seamonkey
You need to log in before you can comment on or make changes to this bug.