test_full_minidump.pysnap 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383
  1. ---
  2. created: '2019-04-25T13:14:48.774031Z'
  3. creator: sentry
  4. source: tests/symbolicator/test_native_plugin.py
  5. ---
  6. contexts:
  7. device:
  8. arch: x86
  9. type: device
  10. os:
  11. build: ''
  12. name: Windows
  13. type: os
  14. version: 10.0.14393
  15. debug_meta:
  16. images:
  17. - code_file: C:\projects\breakpad-tools\windows\Release\crash.exe
  18. code_id: 5AB380779000
  19. debug_file: C:\projects\breakpad-tools\windows\Release\crash.pdb
  20. debug_id: 3249d99d-0c40-4931-8610-f4e4fb0b6936-1
  21. image_addr: '0x2a0000'
  22. image_size: 36864
  23. type: pe
  24. - code_file: C:\Windows\System32\dbghelp.dll
  25. code_id: 57898E12145000
  26. debug_file: dbghelp.pdb
  27. debug_id: 9c2a902b-6fdf-40ad-8308-588a41d572a0-1
  28. image_addr: '0x70850000'
  29. image_size: 1331200
  30. type: pe
  31. - code_file: C:\Windows\System32\msvcp140.dll
  32. code_id: 589ABC846c000
  33. debug_file: msvcp140.i386.pdb
  34. debug_id: bf5257f7-8c26-43dd-9bb7-901625e1136a-1
  35. image_addr: '0x709a0000'
  36. image_size: 442368
  37. type: pe
  38. - code_file: C:\Windows\System32\apphelp.dll
  39. code_id: 57898EEB92000
  40. debug_file: apphelp.pdb
  41. debug_id: 8daf7773-372f-460a-af38-944e193f7e33-1
  42. image_addr: '0x70a10000'
  43. image_size: 598016
  44. type: pe
  45. - code_file: C:\Windows\System32\dbgcore.dll
  46. code_id: 57898DAB25000
  47. debug_file: dbgcore.pdb
  48. debug_id: aec7ef2f-df4b-4642-a471-4c3e5fe8760a-1
  49. image_addr: '0x70b70000'
  50. image_size: 151552
  51. type: pe
  52. - code_file: C:\Windows\System32\VCRUNTIME140.dll
  53. code_id: 589ABC7714000
  54. debug_file: vcruntime140.i386.pdb
  55. debug_id: 0ed80a50-ecda-472b-86a4-eb6c833f8e1b-1
  56. image_addr: '0x70c60000'
  57. image_size: 81920
  58. type: pe
  59. - code_file: C:\Windows\System32\CRYPTBASE.dll
  60. code_id: 57899141a000
  61. debug_file: cryptbase.pdb
  62. debug_id: 147c51fb-7ca1-408f-85b5-285f2ad6f9c5-1
  63. image_addr: '0x73ba0000'
  64. image_size: 40960
  65. type: pe
  66. - code_file: C:\Windows\System32\sspicli.dll
  67. code_id: 59BF30E31f000
  68. debug_file: wsspicli.pdb
  69. debug_id: 51e432b1-0450-4b19-8ed1-6d4335f9f543-1
  70. image_addr: '0x73bb0000'
  71. image_size: 126976
  72. type: pe
  73. - code_file: C:\Windows\System32\advapi32.dll
  74. code_id: 5A49BB7677000
  75. debug_file: advapi32.pdb
  76. debug_id: 0c799483-b549-417d-8433-4331852031fe-1
  77. image_addr: '0x73c70000'
  78. image_size: 487424
  79. type: pe
  80. - code_file: C:\Windows\System32\msvcrt.dll
  81. code_id: 57899155be000
  82. debug_file: msvcrt.pdb
  83. debug_id: 6f6409b3-d520-43c7-9b2f-62e00bfe761c-1
  84. image_addr: '0x73cf0000'
  85. image_size: 778240
  86. type: pe
  87. - code_file: C:\Windows\System32\sechost.dll
  88. code_id: 598942C741000
  89. debug_file: sechost.pdb
  90. debug_id: 6f6a05dd-0a80-478b-a419-9b88703bf75b-1
  91. image_addr: '0x74450000'
  92. image_size: 266240
  93. type: pe
  94. - code_file: C:\Windows\System32\kernel32.dll
  95. code_id: 590285E9e0000
  96. debug_file: wkernel32.pdb
  97. debug_id: d3474559-96f7-47d6-bf43-c176b2171e68-1
  98. image_addr: '0x75050000'
  99. image_size: 917504
  100. type: pe
  101. - code_file: C:\Windows\System32\bcryptPrimitives.dll
  102. code_id: 59B0DF8F5a000
  103. debug_file: bcryptprimitives.pdb
  104. debug_id: 287b19c3-9209-4a2b-bb8f-bcc37f411b11-1
  105. image_addr: '0x75130000'
  106. image_size: 368640
  107. type: pe
  108. - code_file: C:\Windows\System32\rpcrt4.dll
  109. code_id: 5A49BB75c1000
  110. debug_file: wrpcrt4.pdb
  111. debug_id: ae131c67-27a7-4fa1-9916-b5a4aef41190-1
  112. image_addr: '0x75810000'
  113. image_size: 790528
  114. type: pe
  115. - code_file: C:\Windows\System32\ucrtbase.dll
  116. code_id: 59BF2B5Ae0000
  117. debug_file: ucrtbase.pdb
  118. debug_id: 6bedcbce-0a3a-40e9-8040-81c2c8c6cc2f-1
  119. image_addr: '0x758f0000'
  120. image_size: 917504
  121. type: pe
  122. - code_file: C:\Windows\System32\KERNELBASE.dll
  123. code_id: 59BF2BCF1a1000
  124. debug_file: wkernelbase.pdb
  125. debug_id: 8462294a-c645-402d-ac82-a4e95f61ddf9-1
  126. image_addr: '0x76db0000'
  127. image_size: 1708032
  128. type: pe
  129. - code_file: C:\Windows\System32\ntdll.dll
  130. code_id: 59B0D8F3183000
  131. debug_file: wntdll.pdb
  132. debug_id: 971f98e5-ce60-41ff-b2d7-235bbeb34578-1
  133. image_addr: '0x77170000'
  134. image_size: 1585152
  135. type: pe
  136. errors:
  137. - name: timestamp
  138. type: past_timestamp
  139. value: 1521713273.0
  140. exception:
  141. values:
  142. - mechanism:
  143. handled: false
  144. synthetic: true
  145. type: minidump
  146. raw_stacktrace:
  147. frames:
  148. - in_app: false
  149. instruction_addr: '0x771d0f44'
  150. package: C:\Windows\System32\ntdll.dll
  151. trust: fp
  152. - in_app: false
  153. instruction_addr: '0x771d0f79'
  154. package: C:\Windows\System32\ntdll.dll
  155. trust: fp
  156. - in_app: false
  157. instruction_addr: '0x750662c4'
  158. package: C:\Windows\System32\kernel32.dll
  159. trust: cfi
  160. - in_app: false
  161. instruction_addr: '0x2a2d97'
  162. package: C:\projects\breakpad-tools\windows\Release\crash.exe
  163. trust: cfi
  164. - in_app: false
  165. instruction_addr: '0x2a2a3d'
  166. package: C:\projects\breakpad-tools\windows\Release\crash.exe
  167. trust: context
  168. registers:
  169. eax: '0x0'
  170. ebp: '0x10ff670'
  171. ebx: '0xfe5000'
  172. ecx: '0x10ff670'
  173. edi: '0x13bfd78'
  174. edx: '0x7'
  175. eflags: '0x10246'
  176. eip: '0x2a2a3d'
  177. esi: '0x759c6314'
  178. esp: '0x10ff644'
  179. stacktrace:
  180. frames:
  181. - in_app: false
  182. instruction_addr: '0x771d0f44'
  183. package: C:\Windows\System32\ntdll.dll
  184. trust: fp
  185. - in_app: false
  186. instruction_addr: '0x771d0f79'
  187. package: C:\Windows\System32\ntdll.dll
  188. trust: fp
  189. - in_app: false
  190. instruction_addr: '0x750662c4'
  191. package: C:\Windows\System32\kernel32.dll
  192. trust: cfi
  193. - abs_path: f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl
  194. filename: exe_common.inl
  195. function: __scrt_common_main_seh
  196. in_app: false
  197. instruction_addr: '0x2a2d97'
  198. lineno: 283
  199. package: C:\projects\breakpad-tools\windows\Release\crash.exe
  200. trust: cfi
  201. - abs_path: c:\projects\breakpad-tools\windows\crash\main.cpp
  202. filename: main.cpp
  203. function: main
  204. in_app: false
  205. instruction_addr: '0x2a2a3d'
  206. lineno: 35
  207. package: C:\projects\breakpad-tools\windows\Release\crash.exe
  208. trust: context
  209. registers:
  210. eax: '0x0'
  211. ebp: '0x10ff670'
  212. ebx: '0xfe5000'
  213. ecx: '0x10ff670'
  214. edi: '0x13bfd78'
  215. edx: '0x7'
  216. eflags: '0x10246'
  217. eip: '0x2a2a3d'
  218. esi: '0x759c6314'
  219. esp: '0x10ff644'
  220. thread_id: 1636
  221. type: EXCEPTION_ACCESS_VIOLATION_WRITE
  222. value: 'Fatal Error: EXCEPTION_ACCESS_VIOLATION_WRITE'
  223. stacktrace: null
  224. threads:
  225. values:
  226. - crashed: true
  227. id: 1636
  228. - crashed: false
  229. id: 3580
  230. raw_stacktrace:
  231. frames:
  232. - in_app: false
  233. instruction_addr: '0x771d0f44'
  234. package: C:\Windows\System32\ntdll.dll
  235. trust: fp
  236. - in_app: false
  237. instruction_addr: '0x771d0f79'
  238. package: C:\Windows\System32\ntdll.dll
  239. trust: fp
  240. - in_app: false
  241. instruction_addr: '0x750662c4'
  242. package: C:\Windows\System32\kernel32.dll
  243. trust: fp
  244. - in_app: false
  245. instruction_addr: '0x771e016c'
  246. package: C:\Windows\System32\ntdll.dll
  247. trust: context
  248. registers:
  249. eax: '0x0'
  250. ebp: '0x159faa4'
  251. ebx: '0x13b0990'
  252. ecx: '0x0'
  253. edi: '0x13b4af0'
  254. edx: '0x0'
  255. eflags: '0x216'
  256. eip: '0x771e016c'
  257. esi: '0x13b4930'
  258. esp: '0x159f900'
  259. stacktrace:
  260. frames:
  261. - in_app: false
  262. instruction_addr: '0x771d0f44'
  263. package: C:\Windows\System32\ntdll.dll
  264. trust: fp
  265. - in_app: false
  266. instruction_addr: '0x771d0f79'
  267. package: C:\Windows\System32\ntdll.dll
  268. trust: fp
  269. - in_app: false
  270. instruction_addr: '0x750662c4'
  271. package: C:\Windows\System32\kernel32.dll
  272. trust: fp
  273. - in_app: false
  274. instruction_addr: '0x771e016c'
  275. package: C:\Windows\System32\ntdll.dll
  276. trust: context
  277. registers:
  278. eax: '0x0'
  279. ebp: '0x159faa4'
  280. ebx: '0x13b0990'
  281. ecx: '0x0'
  282. edi: '0x13b4af0'
  283. edx: '0x0'
  284. eflags: '0x216'
  285. eip: '0x771e016c'
  286. esi: '0x13b4930'
  287. esp: '0x159f900'
  288. - crashed: false
  289. id: 2600
  290. raw_stacktrace:
  291. frames:
  292. - in_app: false
  293. instruction_addr: '0x771d0f44'
  294. package: C:\Windows\System32\ntdll.dll
  295. trust: fp
  296. - in_app: false
  297. instruction_addr: '0x771d0f79'
  298. package: C:\Windows\System32\ntdll.dll
  299. trust: fp
  300. - in_app: false
  301. instruction_addr: '0x750662c4'
  302. package: C:\Windows\System32\kernel32.dll
  303. trust: fp
  304. - in_app: false
  305. instruction_addr: '0x771e016c'
  306. package: C:\Windows\System32\ntdll.dll
  307. trust: context
  308. registers:
  309. eax: '0x0'
  310. ebp: '0x169fb98'
  311. ebx: '0x13b0990'
  312. ecx: '0x0'
  313. edi: '0x13b7c28'
  314. edx: '0x0'
  315. eflags: '0x202'
  316. eip: '0x771e016c'
  317. esi: '0x13b7a68'
  318. esp: '0x169f9f4'
  319. stacktrace:
  320. frames:
  321. - in_app: false
  322. instruction_addr: '0x771d0f44'
  323. package: C:\Windows\System32\ntdll.dll
  324. trust: fp
  325. - in_app: false
  326. instruction_addr: '0x771d0f79'
  327. package: C:\Windows\System32\ntdll.dll
  328. trust: fp
  329. - in_app: false
  330. instruction_addr: '0x750662c4'
  331. package: C:\Windows\System32\kernel32.dll
  332. trust: fp
  333. - in_app: false
  334. instruction_addr: '0x771e016c'
  335. package: C:\Windows\System32\ntdll.dll
  336. trust: context
  337. registers:
  338. eax: '0x0'
  339. ebp: '0x169fb98'
  340. ebx: '0x13b0990'
  341. ecx: '0x0'
  342. edi: '0x13b7c28'
  343. edx: '0x0'
  344. eflags: '0x202'
  345. eip: '0x771e016c'
  346. esi: '0x13b7a68'
  347. esp: '0x169f9f4'
  348. - crashed: false
  349. id: 2920
  350. raw_stacktrace:
  351. frames:
  352. - in_app: false
  353. instruction_addr: '0x771df3dc'
  354. package: C:\Windows\System32\ntdll.dll
  355. trust: context
  356. registers:
  357. eax: '0x0'
  358. ebp: '0x179f2b8'
  359. ebx: '0x17b1aa0'
  360. ecx: '0x0'
  361. edi: '0x17b1a90'
  362. edx: '0x0'
  363. eflags: '0x206'
  364. eip: '0x771df3dc'
  365. esi: '0x2cc'
  366. esp: '0x179f2ac'
  367. stacktrace:
  368. frames:
  369. - in_app: false
  370. instruction_addr: '0x771df3dc'
  371. package: C:\Windows\System32\ntdll.dll
  372. trust: context
  373. registers:
  374. eax: '0x0'
  375. ebp: '0x179f2b8'
  376. ebx: '0x17b1aa0'
  377. ecx: '0x0'
  378. edi: '0x17b1a90'
  379. edx: '0x0'
  380. eflags: '0x206'
  381. eip: '0x771df3dc'
  382. esi: '0x2cc'
  383. esp: '0x179f2ac'