Closed
Bug 11813
Opened 25 years ago
Closed 25 years ago
Dr Watson log generated running BitTest
Categories
(SeaMonkey :: General, defect, P3)
Tracking
(Not tracked)
VERIFIED
WONTFIX
People
(Reporter: me, Assigned: beard)
References
()
Details
Application exception occurred:
App: BitTest.dbg (pid=175)
When: 8/12/1999 @ 16:15:2.339
Exception number: c0000005 (access violation)
*----> System Information <----*
Computer Name: FLETCHERB_TEST
User Name: fletcheb
Number of Processors: 1
Processor Type: x86 Family 6 Model 7 Stepping 2
Windows Version: 4.0
Current Build: 1381
Service Pack: 4
Current Type: Uniprocessor Free
Registered Organization: WRQ
Registered Owner: Fletcher Bonds
*----> Task List <----*
0 Idle.exe
2 System.exe
20 smss.exe
28 csrss.exe
34 winlogon.exe
40 services.exe
43 lsass.exe
69 spoolss.exe
88 smartagt.exe
81 RpcSs.exe
107 pstores.exe
100 nddeagnt.exe
133 Explorer.exe
67 SysTray.exe
138 comsmd.exe
143 DACONFIG.exe
145 RealPlay.exe
154 Remote.exe
98 netscape.exe
99 ddhelp.exe
182 notepad.exe
175 BitTest.exe
174 drwtsn32.exe
0 _Total.exe
(00400000 - 00407000) BitTest.dbg
(77f60000 - 77fbc000) dll\ntdll.dbg
(60830000 - 6084c000) raptorgfxwin.dbg
(608e0000 - 60916000) xpcom.dbg
(60800000 - 60807000) plc3.dbg
(607b0000 - 607cf000) nspr3.dbg
(776d0000 - 776d8000) dll\wsock32.dbg
(77f00000 - 77f5e000) dll\kernel32.dbg
(776b0000 - 776c4000) dll\ws2_32.dbg
(78000000 - 78040000)
(77e70000 - 77ec4000) dll\user32.dbg
(77ed0000 - 77efc000) dll\gdi32.dbg
(77dc0000 - 77dff000) dll\advapi32.dbg
(77e10000 - 77e67000) dll\rpcrt4.dbg
(776a0000 - 776a7000) dll\ws2help.dbg
(77fd0000 - 77ffa000) dll\winmm.dbg
(606d0000 - 606d8000) libreg32.dbg
(77c40000 - 77d7c000) dll\shell32.dbg
(77aa0000 - 77b14000) COMCTL32.dbg
(780a0000 - 780a0000)
(60810000 - 60817000) plds3.dbg
(605f0000 - 605fc000) img3250.dbg
(77d80000 - 77db2000) dll\comdlg32.dbg
(60620000 - 6065f000) js3250.dbg
(60710000 - 60784000) netlib.dbg
(60930000 - 6093b000) xppref32.dbg
(60940000 - 6094c000) zlib.dbg
(77fc0000 - 77fc8000) dll\mmdrv.dbg
(6bd00000 - 6bd28000) D:\DDK-NT\lib\i386\free\ydsxg32.dll
(608c0000 - 608db000) raptorwidget.dbg
(76ab0000 - 76ab5000) dll\imm32.dbg
(77b20000 - 77bd5000) dll\ole32.dbg
(60850000 - 60882000) raptorhtmlpars.dbg
(77a40000 - 77a4d000) dll\ntshrui.dbg
(77800000 - 7783a000) dll\netapi32.dbg
(77840000 - 77849000) dll\NetRap.dbg
(777e0000 - 777ed000) dll\samlib.dbg
(77bf0000 - 77bf7000) dll\rpcltc1.dbg
State Dump for Thread Id 0xb0
eax=00000000 ebx=00000000 ecx=00004f01 edx=000000a1 esi=77ed11c7 edi=00000001
eip=77ed5676 esp=0012fcec ebp=0012fd0c iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202
function: GetClipRgn
77ed564f ff050460ef77 inc dword ptr [77ef6004]
ds:77ef6004=00000002
77ed5655 c20400 ret 0x4
77ed5658 64a118000000 mov eax,fs:[00000018]
fs:00000018=????????
77ed565e 8b4030 mov eax,[eax+0x30]
ds:00f2ea06=????????
77ed5661 ff742404 push dword ptr [esp+0x4]
ss:0105e6f3=????????
77ed5665 6a00 push 0x0
77ed5667 ff7018 push dword ptr [eax+0x18]
ds:00f2ea06=????????
77ed566a ff156450ef77 call dword ptr [77ef5064]
ds:77ef5064=77f64cfe
77ed5670 ebe3 jmp GetClipRgn+0x40 (77ed5655)
77ed5672 8b542404 mov edx,[esp+0x4]
ss:0105e6f3=????????
FAULT ->77ed5676 833a0c cmp dword ptr [edx],0xc
ds:000000a1=????????
77ed5679 0f8492960000 je GetTransform+0x14e4 (77eded11)
77ed567f 8b4210 mov eax,[edx+0x10]
ds:00f2eaa7=????????
77ed5682 85c0 test eax,eax
77ed5684 7525 jnz GetClipRgn+0x96 (77ed56ab)
77ed5686 0fb7420c movzx eax,word ptr [edx+0xc]
ds:00f2eaa8=????
77ed568a 0fb74a0e movzx ecx,word ptr [edx+0xe]
ds:00f2eaa8=????
77ed568e 0fafc1 imul eax,ecx
77ed5691 0faf4204 imul eax,[edx+0x4]
ds:00f2eaa8=????????
77ed5695 83c01f add eax,0x1f
77ed5698 24e0 and al,0xe0
77ed569a 99 cdq
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012fd0c 00401525 00000000 00000000 00000000 00000000 gdi32!GetClipRgn
0012fd6c 0040250c 00000000 00000000 006aa520 0012ff1c BitTest!<nosymbols>
0012feac 77e71268 003e038c 00000111 00009c52 00000000 BitTest!<nosymbols>
0012ff24 00000000 016bb0a8 0000009e 0000008c 0012ffc0 user32!TranslateMessageEx
00009c52 00000000 00000000 00000000 00000000 00000000 BitTest!<nosymbols>
*----> Raw Stack Dump <----*
0012fcec 33 5f ed 77 a1 00 00 00 - 00 00 00 00 00 00 00 00 3_.w............
0012fcfc c7 11 ed 77 00 00 00 00 - 00 00 00 00 cc dc ed 77 ...w...........w
0012fd0c 6c fd 12 00 25 15 40 00 - 00 00 00 00 00 00 00 00 l...%.@.........
0012fd1c 00 00 00 00 00 00 00 00 - 01 00 00 00 a1 00 00 00 ................
0012fd2c 00 00 00 00 00 01 00 00 - 00 00 00 00 52 9c 00 00 ............R...
0012fd3c 84 fd 12 00 00 01 00 00 - 00 00 00 00 64 fd 12 00 ............d...
0012fd4c 6c 13 e7 77 20 a5 6a 00 - a1 00 00 00 00 00 00 00 l..w .j.........
0012fd5c 45 d6 8e 60 4d 3f 8e 60 - 88 fe 12 00 01 00 00 00 E..`M?.`........
0012fd6c ac fe 12 00 0c 25 40 00 - 00 00 00 00 00 00 00 00 .....%@.........
0012fd7c 20 a5 6a 00 1c ff 12 00 - 46 3a 5c 66 6c 65 74 63 .j.....F:\fletc
0012fd8c 68 5c 42 65 6c 75 67 61 - 33 2e 4a 50 47 00 65 67 h\Beluga3.JPG.eg
0012fd9c 00 00 00 00 0e 32 00 78 - 88 31 40 00 00 00 00 00 .....2.x.1@.....
0012fdac 40 86 8f 60 01 00 00 00 - 60 3d 91 60 32 58 8e 60 @..`....`=.`2X.`
0012fdbc f8 fd 12 00 01 00 00 00 - e0 fd 12 00 fc 72 e7 77 .............r.w
0012fdcc c0 b3 6a 00 1c 00 00 00 - 01 00 00 00 3e 00 00 00 ..j.........>...
0012fddc 00 00 00 00 78 f8 8f 60 - 00 00 00 00 00 00 00 00 ....x..`........
0012fdec 01 00 00 00 00 00 00 00 - 78 f8 8f 60 00 00 00 00 ........x..`....
0012fdfc 00 00 00 00 01 00 00 00 - 00 00 00 00 40 20 42 00 ............@ B.
0012fe0c 00 00 00 00 00 00 00 00 - 47 00 00 00 78 f8 8f 60 ........G...x..`
0012fe1c 00 00 00 00 00 00 00 00 - 01 00 00 00 00 00 00 00 ................
State Dump for Thread Id 0xbd
eax=77e15f2a ebx=00000000 ecx=00000000 edx=00000000 esi=00149324 edi=0014de30
eip=77f67f27 esp=00b2fe04 ebp=00b2ff90 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202
function: ZwReplyWaitReceivePort
77f67f1c b890000000 mov eax,0x90
77f67f21 8d542404 lea edx,[esp+0x4]
ss:01a5e80b=????????
77f67f25 cd2e int 2e
77f67f27 c21000 ret 0x10
77f67f2a 8bc0 mov eax,eax
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00b2ff90 77e15df4 77e15e7a 0014de30 00b2ffec 77f8c6c5
ntdll!ZwReplyWaitReceivePort
00003a98 00000000 00000000 00000000 00000000 00000000
rpcrt4!I_RpcAsyncSendReceive
NT4 SP4 running M8 w/ Communicator 4.61 installed. Fired test prog w/o
parameters while browsing EXEs.
Assignee | ||
Updated•25 years ago
|
Status: NEW → ASSIGNED
Assignee | ||
Comment 2•25 years ago
|
||
This is a test program. It's not being actively maintained, so I doubt this will
get fixed.
Assignee | ||
Updated•25 years ago
|
Status: ASSIGNED → RESOLVED
Closed: 25 years ago
Resolution: --- → WONTFIX
If these are test progs that aren't being actively maintained, they should be
ripped
out. Why leave something in that we know will explode if someone happens to
find/run
it. Right? thanks.
Status: REOPENED → RESOLVED
Closed: 25 years ago → 25 years ago
Resolution: --- → WONTFIX
Marking Verified/Won't Fix - no action will be taken on this to the best of my
knowledge
Updated•20 years ago
|
Product: Browser → Seamonkey
You need to log in
before you can comment on or make changes to this bug.
Description
•