Skip to content
This repository has been archived by the owner on Oct 28, 2021. It is now read-only.

Windows - test_handshake_plain_auth is consistently failing in Appveyor #3273

Open
bobsummerwill opened this issue Sep 3, 2016 · 1 comment

Comments

@bobsummerwill
Copy link
Contributor

See https://ci.appveyor.com/project/ethereum/cpp-ethereum/build/1.0.106.

Test Case "test_handshake_plain_auth": 
unknown location(0): fatal error: in "eip8/test_handshake_plain_auth": memory access violation occurred at address 0x00000024, while attempting to  write to an inaccessible (or protected) address
C:\projects\cpp-ethereum\test\libp2p\eip-8.cpp(282): last checkpoint
@halfalicious
Copy link
Contributor

halfalicious commented Feb 2, 2019

!analyze output after hitting a crash running eip8/test_handshake_eip8_auth1 with Application Verifier basic checks enabled:

0:000> !analyze -v
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************
APPLICATION_VERIFIER_HEAPS_FIRST_CHANCE_ACCESS_VIOLATION (13)
First chance access violation for current stack trace.
This is the most common application verifier stop. Typically it is caused by a
buffer overrun error. The heap verifier places a non-accessible page at the end
of a heap allocation and a buffer overrun will cause an exception by
touching this page. To debug this stop identify the access address that caused
the exception and then use the following debugger command:
    !heap -p -a ACCESS_ADDRESS
This command will give details about the nature of the error and what heap block is
overrun. It will also give the stack trace for the block allocation.
There are several other causes for this stop. For example accessing a heap block
after being freed. The same debugger command will be useful for this case too. 
Arguments:
Arg1: 00000176fc8c5fe8, Invalid address causing the exception. 
Arg2: 00007ffc90f65d42, Code address executing the invalid access. 
Arg3: 00000043763fcc30, Exception record. 
Arg4: 00000043763fc740, Context record. 

KEY_VALUES_STRING: 1


TIMELINE_ANALYSIS: 1

Timeline: !analyze.Start
    Name: <blank>
    Time: 2019-02-02T04:53:02.90Z
    Diff: 909 mSec

Timeline: Dump.Current
    Name: <blank>
    Time: 2019-02-02T04:53:03.0Z
    Diff: 0 mSec

Timeline: Process.Start
    Name: <blank>
    Time: 2019-02-02T04:52:29.0Z
    Diff: 34000 mSec

Timeline: OS.Boot
    Name: <blank>
    Time: 2019-01-27T04:44:15.0Z
    Diff: 518928000 mSec


DUMP_CLASS: 2

DUMP_QUALIFIER: 0

FAULTING_IP: 
vfbasics!AVrfpCheckStaticInitializedCriticalSection+6
00007ffc`90f65d42 488b4120        mov     rax,qword ptr [rcx+20h]

EXCEPTION_RECORD:  00000043763fcc30 -- (.exr 0x43763fcc30)
ExceptionAddress: 00007ffc90f65d42 (vfbasics!AVrfpCheckStaticInitializedCriticalSection+0x0000000000000006)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000176fc8c5fe8
Attempt to read from address 00000176fc8c5fe8

FAULTING_THREAD:  00006cc4

DEFAULT_BUCKET_ID:  BREAKPOINT_AVRF

PROCESS_NAME:  testeth.exe

CONTEXT:  00000043763fc740 -- (.cxr 0x43763fc740)
rax=0000000000000000 rbx=00000176fc8c5fc8 rcx=00000176fc8c5fc8
rdx=0000000000000ece rsi=0000004375336000 rdi=0000000000006cc4
rip=00007ffc90f65d42 rsp=00000043763fced0 rbp=0000000000000000
 r8=0000000000000615  r9=0000000000000002 r10=00000043763f6000
r11=00000043763fcf08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
vfbasics!AVrfpCheckStaticInitializedCriticalSection+0x6:
00007ffc`90f65d42 488b4120        mov     rax,qword ptr [rcx+20h] ds:00000176`fc8c5fe8=????????????????
Resetting default scope

ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION}  Breakpoint  A breakpoint has been reached.

EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more arguments are invalid

EXCEPTION_CODE_STR:  80000003

EXCEPTION_PARAMETER1:  0000000000000000

WATSON_BKT_PROCSTAMP:  5c5521ed

WATSON_BKT_MODULE:  vrfcore.dll

WATSON_BKT_MODSTAMP:  ac2e4c50

WATSON_BKT_MODOFFSET:  25f7

WATSON_BKT_MODVER:  10.0.17134.12

MODULE_VER_PRODUCT:  Microsoft® Windows® Operating System

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

MODLIST_WITH_TSCHKSUM_HASH:  ea5fccd1d6646a7a3cc6ebc04d4fa5e5c4063b35

MODLIST_SHA1_HASH:  7994ab5b7bd9bdeacc96db004919819ec7f78b84

NTGLOBALFLAG:  2000100

PROCESS_BAM_CURRENT_THROTTLED: 0

PROCESS_BAM_PREVIOUS_THROTTLED: 0

APPLICATION_VERIFIER_FLAGS:  81643027

PRODUCT_TYPE:  1

SUITE_MASK:  272

DUMP_TYPE:  fe

APPLICATION_VERIFIER_LOADED: 1

ANALYSIS_SESSION_HOST:  EVANSTON

ANALYSIS_SESSION_TIME:  02-01-2019 20:53:02.0090

ANALYSIS_VERSION: 10.0.17134.12 amd64fre

THREAD_ATTRIBUTES: 
OS_LOCALE:  ENU

PROBLEM_CLASSES: 

    ID:     [0n317]
    Type:   [@APPLICATION_FAULT_STRING]
    Class:  Primary
    Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
            BUCKET_ID
    Name:   Omit
    Data:   Add
            String: [BREAKPOINT]
    PID:    [Unspecified]
    TID:    [Unspecified]
    Frame:  [0]

    ID:     [0n96]
    Type:   [AVRF]
    Class:  Addendum
    Scope:  DEFAULT_BUCKET_ID (Failure Bucket ID prefix)
            BUCKET_ID
    Name:   Add
    Data:   Omit
    PID:    [0x11ba8]
    TID:    [0x6cc4]
    Frame:  [0] : vrfcore!VerifierStopMessageEx

BUGCHECK_STR:  BREAKPOINT_AVRF

PRIMARY_PROBLEM_CLASS:  BREAKPOINT

LAST_CONTROL_TRANSFER:  from 00007ffc9ebe7e70 to 00007ffc9ebe25f7

STACK_TEXT:  
00000043`763fbe30 00007ffc`9ebe7e70 : 00000025`00000000 00000043`763ffab0 00000000`00000005 00007ffc`da1d45c7 : vrfcore!VerifierStopMessageEx+0x827
00000043`763fc180 00007ffc`8f236439 : 00000043`763fc740 00007ffc`90f65d42 00000043`763fcc30 00000176`fc8c5fe8 : vrfcore!VfCoreRedirectedStopMessage+0x90
00000043`763fc210 00007ffc`da2acf56 : 00000043`763fcc30 00007ffc`90f827f0 00000000`00000000 00007ffc`90f827d0 : verifier!VerifierStopMessage+0xb9
00000043`763fc2c0 00007ffc`90f625e5 : 00007ff6`65906eac 00000043`00000000 00007ff6`65bead23 00007ff6`00000001 : ntdll!RtlApplicationVerifierStop+0x96
00000043`763fc330 00007ffc`90f6322e : 00000043`763fcc30 00000176`81827ff0 00000000`00000000 00007ffc`da1d477c : vfbasics!VerifierStopMessage+0x245
00000043`763fc390 00007ffc`90f628da : 00000043`763fc4b0 00000000`00000000 00000000`00000024 0053002b`00000001 : vfbasics!AVrfpCheckFirstChanceException+0x136
00000043`763fc420 00007ffc`da236b06 : 00007ffc`90f628c0 00000000`00000000 00000000`00000000 00000000`6771ca14 : vfbasics!AVrfpVectoredExceptionHandler+0x1a
00000043`763fc470 00007ffc`da1d4849 : 00000043`763fcc30 00000043`763fc740 00007ff6`6728a000 0053002b`002b0033 : ntdll!RtlpCallVectoredHandlers+0x106
00000043`763fc510 00007ffc`da2733ee : 00000000`00000000 00000000`00000000 00000176`fc8c5fc8 00000000`00000000 : ntdll!RtlDispatchException+0x69
00000043`763fc740 00007ffc`90f65d42 : 00000043`763fcef8 00007ff6`65e35d3c 00000043`763fcf40 00007ff6`658c67fd : ntdll!KiUserExceptionDispatch+0x2e
00000043`763fced0 00007ffc`90f65e05 : 00000043`763fd4d0 00007ffc`90f65efe 00000000`00000000 00000176`fc8c5fc8 : vfbasics!AVrfpCheckStaticInitializedCriticalSection+0x6
00000043`763fcf00 00007ff6`65aec617 : 00007ffc`d65cc570 00000043`763fd5b0 00000000`00000020 00007ff6`6592a2d1 : vfbasics!AVrfpRtlEnterCriticalSection2+0x3d
00000043`763fcf40 00007ff6`65ad601c : 00000176`fc8c5fc8 00000043`763fd4d0 00000043`763fd5b0 00007ff6`65e47420 : testeth!boost::asio::detail::win_mutex::lock+0x17
00000043`763fcf70 00007ff6`6592a4a3 : 00000043`763fcfd0 00000176`fc8c5fc8 00000043`763fd5b0 00007ff6`65e47332 : testeth!boost::asio::detail::scoped_lock<boost::asio::detail::win_mutex>::scoped_lock<boost::asio::detail::win_mutex>+0x3c
00000043`763fcfb0 00007ff6`658cdb94 : 00000176`fc8c5fa8 00000176`fcd6cf90 ffffffff`fffffffe 00007ff6`659147e5 : testeth!boost::asio::detail::win_iocp_socket_service_base::destroy+0x33
00000043`763fcff0 00007ff6`658c58c8 : 00000176`fc8c5f80 00000176`fcd6cf90 00000043`763fd090 00000000`00006cc4 : testeth!boost::asio::stream_socket_service<boost::asio::ip::tcp>::destroy+0x24
00000043`763fd020 00007ff6`65e35564 : 00000176`fcd6cf90 00000043`763fd0a0 00000176`00000002 00000043`763fd090 : testeth!boost::asio::basic_io_object<boost::asio::stream_socket_service<boost::asio::ip::tcp>,1>::~basic_io_object<boost::asio::stream_socket_service<boost::asio::ip::tcp>,1>+0x28
00000043`763fd060 00007ff6`65e355b3 : 00000176`fcd6cf90 00007ff6`675d1be0 00000000`00002719 00007ff6`675d1be0 : testeth!boost::asio::basic_socket<boost::asio::ip::tcp,boost::asio::stream_socket_service<boost::asio::ip::tcp> >::~basic_socket<boost::asio::ip::tcp,boost::asio::stream_socket_service<boost::asio::ip::tcp> >+0x24
00000043`763fd090 00007ff6`658c783e : 00000176`fcd6cf90 00000000`00000000 ffffffff`fffffffe 00000000`00000001 : testeth!boost::asio::basic_stream_socket<boost::asio::ip::tcp,boost::asio::stream_socket_service<boost::asio::ip::tcp> >::~basic_stream_socket<boost::asio::ip::tcp,boost::asio::stream_socket_service<boost::asio::ip::tcp> >+0x13
00000043`763fd0c0 00007ff6`658db2d7 : 00000176`fcd6cf80 00000176`fca2fff8 00000043`763fd5b0 00000043`763fd4d0 : testeth!dev::p2p::RLPXSocket::~RLPXSocket+0x2e
00000043`763fd100 00007ff6`65e39587 : 00000176`fcd6cf80 00007ff6`00000000 00000176`fcd64fa8 00007ff6`65998f44 : testeth!dev::p2p::RLPXSocket::`scalar deleting destructor'+0x17
00000043`763fd130 00007ff6`659a54c2 : 00000176`fcd6cf70 00000176`fcd64f98 00000176`fcd64fd0 00007ff6`66d0d669 : testeth!std::_Ref_count_obj<dev::p2p::RLPXSocket>::_Destroy+0x27
00000043`763fd170 00007ff6`658c69e3 : 00000176`fcd6cf70 00000176`fcd64f98 00000176`fcd64fd0 00007ff6`66d0d669 : testeth!std::_Ref_count_base::_Decref+0x32
00000043`763fd1a0 00007ff6`65e35cdc : 00000176`fcd64f80 00007ff6`65e354b3 00000176`fcd64f90 00007ff6`66d0cb08 : testeth!std::_Ptr_base<dev::p2p::RLPXSocket>::_Decref+0x23
00000043`763fd1d0 00007ff6`658fe7d2 : 00000176`fcd64f80 00007ff6`6762b160 00007ff6`67026796 00007ff6`66d0cb08 : testeth!std::shared_ptr<dev::p2p::RLPXSocket>::~shared_ptr<dev::p2p::RLPXSocket>+0x1c
00000043`763fd210 00007ff6`65e363a3 : 00000176`fcd64d70 00007ff6`66d0cb08 00007ff6`67642f00 00007ff6`6762b160 : testeth!dev::p2p::RLPXHandshake::~RLPXHandshake+0x42
00000043`763fd240 00007ff6`658db437 : 00000176`fcd64d70 00000000`00000000 00000000`0000000f 00000176`fca7af00 : testeth!eip8::TestHandshake::~TestHandshake+0x13
00000043`763fd270 00007ff6`6590013d : 00000176`fcd64d70 00000176`00000001 00007ff6`66d0d66a 00000000`00000000 : testeth!eip8::TestHandshake::`scalar deleting destructor'+0x17
00000043`763fd2a0 00007ff6`659a54c2 : 00000176`fca33fe0 0853fb3d`fe397519 eac6d73e`f864ce6a 80cc81f3`f741c7be : testeth!std::_Ref_count<eip8::TestHandshake>::_Destroy+0x3d
00000043`763fd2f0 00007ff6`658c6d13 : 00000176`fca33fe0 772884f1`06a45c00 7a579cb6`44104d65 3a520912`1af0e544 : testeth!std::_Ref_count_base::_Decref+0x32
00000043`763fd320 00007ff6`65e35d0c : 00000043`763fd420 e68fa515`0a334d55 c610b344`058e8a1f 8d8a52a7`8d0c7bde : testeth!std::_Ptr_base<eip8::TestHandshake>::_Decref+0x23
00000043`763fd350 00007ff6`6596077f : 00000043`763fd420 00000000`00000004 00000043`763fd488 00000000`000000ca : testeth!std::shared_ptr<eip8::TestHandshake>::~shared_ptr<eip8::TestHandshake>+0x1c
00000043`763fd390 00007ff6`65960abe : 00000043`763fd640 00000043`763fd768 00000000`000000b9 00000043`763fd758 : testeth!eip8::test_handshake_eip8_auth1::test_method+0x2bf
00000043`763fd620 00007ff6`659c01aa : 00000176`fc130000 00007ffc`da33d564 00000176`fc130000 00000000`00000000 : testeth!eip8::test_handshake_eip8_auth1_invoker+0x2fe
00000043`763fdd30 00007ff6`65bac7c2 : 00000176`85928fe0 00000043`763fde10 00000000`0000001d 00007ffc`da2e7056 : testeth!boost::detail::function::void_function_invoker0<void (__cdecl*)(void),void>::invoke+0x1a
00000043`763fdd70 00007ff6`65bad426 : 00000176`85928fd8 00007ffc`da2cd987 0000001d`00000000 00000043`763ffcf0 : testeth!boost::function0<void>::operator()+0x72
00000043`763fdde0 00007ff6`65bead23 : 00000043`763fe478 00007ffc`da1d0000 0000ddc4`001ed000 00000176`fa930000 : testeth!boost::detail::forward::operator()+0x16
00000043`763fde10 00007ff6`65bac722 : 00000043`763fe478 00007ffc`da33d564 00000043`763fe460 00007ffc`da2cdd5d : testeth!boost::detail::function::function_obj_invoker0<boost::detail::forward,int>::invoke+0x33
00000043`763fde50 00007ff6`65b7c023 : 00000043`763fe470 00007ffc`d6501b89 00000000`00000000 00000000`00000000 : testeth!boost::function0<int>::operator()+0x72
00000043`763fdec0 00007ff6`65b19c8d : 00007ff6`67644848 00000043`763fe470 00000043`763ff6c8 00000000`00000000 : testeth!boost::detail::do_invoke<boost::shared_ptr<boost::detail::translator_holder_base>,boost::function<int __cdecl(void)> >+0x53
00000043`763fdf00 00007ff6`65b19aad : 00007ff6`67644838 00000043`763fe470 00000000`00000004 00007ff6`65bad252 : testeth!boost::execution_monitor::catch_signals+0xbd
00000043`763fdfb0 00007ff6`65b19ba5 : 00007ff6`67644838 00000043`763fe470 00007ff6`00000000 00007ff6`65b85a7c : testeth!boost::execution_monitor::execute+0x9d
00000043`763fe440 00007ff6`65b23c14 : 00007ff6`67644838 00000176`85928fd8 00007ff6`67644640 00007ff6`65bb9a36 : testeth!boost::execution_monitor::vexecute+0x55
00000043`763fe4b0 00007ff6`65be3a68 : 00007ff6`67644838 00000176`85928fd8 00000176`00000000 00007ff6`658c7900 : testeth!boost::unit_test::unit_test_monitor_t::execute_and_translate+0x174
00000043`763fe5b0 00007ff6`65be35b0 : 00007ff6`67642fb0 00000043`00010182 00000000`00000000 00000000`00000000 : testeth!boost::unit_test::framework::state::execute_test_tree+0x1368
00000043`763fea60 00007ff6`65be35b0 : 00007ff6`67642fb0 00000043`00000030 00000000`00000000 00000000`00000000 : testeth!boost::unit_test::framework::state::execute_test_tree+0xeb0
00000043`763fef10 00007ff6`65b17335 : 00007ff6`67642fb0 00007ff6`00000001 00000176`00000000 00000000`00000000 : testeth!boost::unit_test::framework::state::execute_test_tree+0xeb0
00000043`763ff3c0 00007ff6`65b2b09f : 00000043`00000001 00007ff6`67640b01 00000176`8470afb0 00000000`00006cc4 : testeth!boost::unit_test::framework::run+0xa95
00000043`763ff830 00007ff6`65b31565 : 00007ff6`65b38b00 00007ff6`00000003 00000176`8470afb0 00007ff6`658c1aba : testeth!boost::unit_test::unit_test_main+0x42f
00000043`763ffab0 00007ff6`66a87699 : 00007ff6`00000003 00000176`8470afb0 00000000`00000000 00000000`00000000 : testeth!main+0x595
00000043`763ffc80 00007ffc`d7527e94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : testeth!__scrt_common_main_seh+0x11d
00000043`763ffcc0 00007ffc`da23a251 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x14
00000043`763ffcf0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21


STACK_COMMAND:  ~0s ; .cxr ; kb

THREAD_SHA1_HASH_MOD_FUNC:  081cc498ab6ae9b027fc1664c6fea7a05a0627e2

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  b314b11379497ff4c220b02a26a250a663302118

THREAD_SHA1_HASH_MOD:  ae4f49432ef80a98045a1ee9427a9990cc3b19cf

FOLLOWUP_IP: 
testeth!boost::asio::detail::win_mutex::lock+17 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\asio\detail\win_mutex.hpp @ 51]
00007ff6`65aec617 4883c428        add     rsp,28h

FAULT_INSTR_CODE:  28c48348

FAULTING_SOURCE_LINE:  c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\asio\detail\win_mutex.hpp

FAULTING_SOURCE_FILE:  c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\asio\detail\win_mutex.hpp

FAULTING_SOURCE_LINE_NUMBER:  51

FAULTING_SOURCE_CODE:  
    47:   // Lock the mutex.
    48:   void lock()
    49:   {
    50:     ::EnterCriticalSection(&crit_section_);
>   51:   }
    52: 
    53:   // Unlock the mutex.
    54:   void unlock()
    55:   {
    56:     ::LeaveCriticalSection(&crit_section_);


SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  testeth!boost::asio::detail::win_mutex::lock+17

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: testeth

IMAGE_NAME:  testeth.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5c5521ed

BUCKET_ID:  BREAKPOINT_AVRF_testeth!boost::asio::detail::win_mutex::lock+17

FAILURE_EXCEPTION_CODE:  80000003

FAILURE_IMAGE_NAME:  testeth.exe

BUCKET_ID_IMAGE_STR:  testeth.exe

FAILURE_MODULE_NAME:  testeth

BUCKET_ID_MODULE_STR:  testeth

FAILURE_FUNCTION_NAME:  boost::asio::detail::win_mutex::lock

BUCKET_ID_FUNCTION_STR:  boost::asio::detail::win_mutex::lock

BUCKET_ID_OFFSET:  17

BUCKET_ID_MODTIMEDATESTAMP:  5c5521ed

BUCKET_ID_MODCHECKSUM:  0

BUCKET_ID_MODVER_STR:  0.0.0.0

BUCKET_ID_PREFIX_STR:  BREAKPOINT_AVRF_

FAILURE_PROBLEM_CLASS:  BREAKPOINT

FAILURE_SYMBOL_NAME:  testeth.exe!boost::asio::detail::win_mutex::lock

FAILURE_BUCKET_ID:  BREAKPOINT_AVRF_80000003_testeth.exe!boost::asio::detail::win_mutex::lock

TARGET_TIME:  2019-02-02T04:53:12.000Z

OSBUILD:  17763

OSSERVICEPACK:  1

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt SingleUserTS

USER_LCID:  0

OSBUILD_TIMESTAMP:  2023-11-24 17:28:01

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME:  2a8f

ANALYSIS_SOURCE:  UM

FAILURE_ID_HASH_STRING:  um:breakpoint_avrf_80000003_testeth.exe!boost::asio::detail::win_mutex::lock

FAILURE_ID_HASH:  {da664743-e1f3-dee5-b4f5-9d301e0f49a9}

Followup:     MachineOwner
---------

0:000> !heap -p -a 00000176fc8c5fe8
    address 00000176fc8c5fe8 found in
    _DPH_HEAP_ROOT @ 176fc131000
    in free-ed allocation (  DPH_HEAP_BLOCK:         VirtAddr         VirtSize)
                                176914426e8:      176fc8c5000             2000
    00007ffcda2d7608 ntdll!RtlDebugFreeHeap+0x000000000000003c
    00007ffcda27dd5e ntdll!RtlpFreeHeap+0x000000000009975e
    00007ffcda1e286e ntdll!RtlFreeHeap+0x00000000000003ee
    00007ffc9ebeb7b2 vrfcore!VfCoreRtlFreeHeap+0x0000000000000022
    00007ffc90f77f1a vfbasics!AVrfpRtlFreeHeap+0x000000000000010a
    00007ffcd64edf7b ucrtbase!_free_base+0x000000000000001b
    00007ff665e38d11 testeth!boost::asio::stream_socket_service<boost::asio::ip::tcp>::`scalar deleting destructor'+0x0000000000000031
    00007ff6658fd579 testeth!boost::asio::detail::service_registry::destroy+0x0000000000000039 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\asio\detail\impl\service_registry.ipp @ 101]
    00007ff6658ff4c5 testeth!boost::asio::detail::service_registry::~service_registry+0x0000000000000075 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\asio\detail\impl\service_registry.ipp @ 45]
    00007ff6658e4507 testeth!boost::asio::detail::service_registry::`scalar deleting destructor'+0x0000000000000017
    00007ff665e365e8 testeth!boost::asio::io_service::~io_service+0x0000000000000038 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\asio\impl\io_service.ipp @ 53]
    00007ff66595eff7 testeth!eip8::TestHandshake::runWithInput+0x00000000000003d7 [c:\users\nilse\documents\code\aleth_ref\test\unittests\libp2p\eip-8.cpp @ 383]
    00007ff6659605ed testeth!eip8::test_handshake_eip8_auth1::test_method+0x000000000000012d [c:\users\nilse\documents\code\aleth_ref\test\unittests\libp2p\eip-8.cpp @ 201]
    00007ff665960abe testeth!eip8::test_handshake_eip8_auth1_invoker+0x00000000000002fe [c:\users\nilse\documents\code\aleth_ref\test\unittests\libp2p\eip-8.cpp @ 185]
    00007ff6659c01aa testeth!boost::detail::function::void_function_invoker0<void (__cdecl*)(void),void>::invoke+0x000000000000001a [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\function\function_template.hpp @ 119]
    00007ff665bac7c2 testeth!boost::function0<void>::operator()+0x0000000000000072 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\function\function_template.hpp @ 761]
    00007ff665bad426 testeth!boost::detail::forward::operator()+0x0000000000000016 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\execution_monitor.ipp @ 1300]
    00007ff665bead23 testeth!boost::detail::function::function_obj_invoker0<boost::detail::forward,int>::invoke+0x0000000000000033 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\function\function_template.hpp @ 139]
    00007ff665bac722 testeth!boost::function0<int>::operator()+0x0000000000000072 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\function\function_template.hpp @ 761]
    00007ff665b7c023 testeth!boost::detail::do_invoke<boost::shared_ptr<boost::detail::translator_holder_base>,boost::function<int __cdecl(void)> >+0x0000000000000053 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\execution_monitor.ipp @ 281]
    00007ff665b19c8d testeth!boost::execution_monitor::catch_signals+0x00000000000000bd [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\execution_monitor.ipp @ 1139]
    00007ff665b19aad testeth!boost::execution_monitor::execute+0x000000000000009d [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\execution_monitor.ipp @ 1203]
    00007ff665b19ba5 testeth!boost::execution_monitor::vexecute+0x0000000000000055 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\execution_monitor.ipp @ 1309]
    00007ff665b23c14 testeth!boost::unit_test::unit_test_monitor_t::execute_and_translate+0x0000000000000174 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\unit_test_monitor.ipp @ 46]
    00007ff665be3a68 testeth!boost::unit_test::framework::state::execute_test_tree+0x0000000000001368 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\framework.ipp @ 771]
    00007ff665be35b0 testeth!boost::unit_test::framework::state::execute_test_tree+0x0000000000000eb0 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\framework.ipp @ 717]
    00007ff665be35b0 testeth!boost::unit_test::framework::state::execute_test_tree+0x0000000000000eb0 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\framework.ipp @ 717]
    00007ff665b17335 testeth!boost::unit_test::framework::run+0x0000000000000a95 [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\framework.ipp @ 1577]
    00007ff665b2b09f testeth!boost::unit_test::unit_test_main+0x000000000000042f [c:\.hunter\_base\c4cfcc0\136a2da\402d68a\install\include\boost\test\impl\unit_test_main.ipp @ 233]
    00007ff665b31565 testeth!main+0x0000000000000595 [c:\users\nilse\documents\code\aleth_ref\test\tools\libtesteth\boosttest.cpp @ 175]
    00007ff666a87699 testeth!__scrt_common_main_seh+0x000000000000011d [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 253]
    00007ffcd7527e94 KERNEL32!BaseThreadInitThunk+0x0000000000000014

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants