Closed Bug 22903 Opened 25 years ago Closed 25 years ago

Access Violation crashes Mozilla M12 on startup

Categories

(SeaMonkey :: General, defect, P3)

x86
Windows NT
defect

Tracking

(Not tracked)

VERIFIED DUPLICATE of bug 19165

People

(Reporter: Spyder1344, Unassigned)

References

()

Details

On a Windows NT SP6 system w/ 192MB RAM (A toshiba portege 7020CT-NT), mozilla crashes just opening "mozilla.exe" after WEBSHELL += 2 displays in the DOS window. M11 build works just fine. A Dr. Watson log file follows. It is repeatable. Application exception occurred: App: mozilla.dbg (pid=237) When: 1/1/2000 @ 23:7:55.637 Exception number: c0000005 (access violation) *----> System Information <----* Computer Name: User Name: Number of Processors: 1 Processor Type: x86 Family 6 Model 6 Stepping 10 Windows Version: 4.0 Current Build: 1381 Service Pack: 6 Current Type: Uniprocessor Free Registered Organization: Registered Owner: Lee Sam *----> Task List <----* 0 Idle.exe 2 System.exe 21 SMSS.exe 26 CSRSS.exe 35 WINLOGON.exe 41 SERVICES.exe 44 LSASS.exe 73 RPCSS.exe 84 NDDEAGNT.exe 90 explorer.exe 43 LEXBCES.exe 101 SPOOLSS.exe 117 DkService.exe 120 esserver.exe 122 Control.exe 129 PSTORES.exe 137 sens.exe 141 SYSTRAY.exe 124 SPSPWR.exe 130 PWRSAVE.exe 144 THOTKEY.exe 147 TDOCK.exe 155 TAPISRV.exe 158 comsmd.exe 161 TPASSWRD.exe 168 RASMAN.exe 172 NTVDM.exe 195 talkback.exe 237 mozilla.exe 40 DRWTSN32.exe 0 _Total.exe (00400000 - 00407000) mozilla.dbg (77f60000 - 77fbe000) dll\ntdll.dbg (60b80000 - 60bc3000) xpcom.dbg (60b50000 - 60b57000) plc3.dbg (60af0000 - 60b12000) nspr3.dbg (776d0000 - 776d8000) dll\wsock32.dbg (77f00000 - 77f5e000) dll\kernel32.dbg (776b0000 - 776c4000) dll\ws2_32.dbg (78000000 - 78048000) msvcrt.dbg (77e70000 - 77ec5000) dll\user32.dbg (77ed0000 - 77efc000) dll\gdi32.dbg (77dc0000 - 77dff000) dll\advapi32.dbg (77e10000 - 77e67000) dll\rpcrt4.dbg (776a0000 - 776a7000) dll\ws2help.dbg (77fd0000 - 77ffa000) dll\winmm.dbg (60a80000 - 60a89000) mozreg.dbg (70970000 - 70b18000) SHELL32.dbg (70bd0000 - 70c14000) SHLWAPI.dbg (71590000 - 71617000) COMCTL32.dbg (77b20000 - 77bd7000) dll\ole32.dbg (60b60000 - 60b67000) plds3.dbg (609b0000 - 609f2000) js3250.dbg (60950000 - 60960000) gkweb.dbg (60a00000 - 60a5e000) jsdom.dbg (77fc0000 - 77fc8000) dll\mmdrv.dbg (6bc00000 - 6bc0c000) C:\DDK\lib\i386\free\maestro.dll (608d0000 - 608f5000) xpinstal.dbg (60be0000 - 60bec000) zlib.dbg (60080000 - 60087000) bs.dbg (60190000 - 601bc000) fullsoft.dbg (60330000 - 60337000) jsloader.dbg (60010000 - 6002a000) appshell.dbg (600a0000 - 600ab000) chardet.dbg (60720000 - 60729000) uconv.dbg (604e0000 - 604f2000) necko.dbg (60580000 - 60586000) nkres.dbg (60530000 - 60537000) nkfile.dbg (607c0000 - 607d3000) ucvlatin.dbg (60380000 - 60385000) mimetype.dbg (60960000 - 6097e000) gkwidget.dbg (77d80000 - 77db2000) dll\comdlg32.dbg (76ab0000 - 76ab5000) dll\imm32.dbg (60920000 - 6093d000) gkgfxwin.dbg (60980000 - 6098c000) img3250.dbg (60620000 - 6065f000) rdf.dbg (60610000 - 60619000) profile.dbg (60900000 - 6090a000) xppref32.dbg (60890000 - 608a6000) xpc3250.dbg (60500000 - 60507000) nkabout.dbg (60940000 - 6094b000) gkplugin.dbg (77a90000 - 77a9b000) dll\version.dbg (779c0000 - 779c8000) dll\lz32.dbg (605c0000 - 605cb000) nslocale.dbg (60300000 - 60307000) history.dbg (60390000 - 603aa000) mork.dbg (60830000 - 60836000) urildr.dbg (600f0000 - 600fa000) cookie.dbg (606b0000 - 606b0000) (603f0000 - 60415000) msgbase.dbg (60a90000 - 60aac000) msgbsutl.dbg (600d0000 - 600da000) chrome.dbg (01340000 - 01470000) gkhtml.dbg (780a0000 - 780a0000) (60710000 - 60718000) ucharuti.dbg (602b0000 - 602e5000) gkparser.dbg (60090000 - 6009f000) caps.dbg (60850000 - 6085e000) wallet.dbg (605f0000 - 605fa000) oji.dbg (60a60000 - 60a71000) jsj3250.dbg (602f0000 - 602fe000) gkview.dbg (605a0000 - 605a6000) nsgif.dbg State Dump for Thread Id 0x43 eax=140480d9 ebx=000000d0 ecx=0000001a edx=0012fad0 esi=0012fad4 edi=00000000 eip=609c0537 esp=0012f874 ebp=0012f880 iopl=0 nv up ei ng nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000282 function: js_FinishCodeGenerator 609c0520 85ff test edi,edi 609c0522 59 pop ecx 609c0523 7c34 jl js_FinishCodeGenerator+0x2e15 (609c0559) 609c0525 03465c add eax,[esi+0x5c] ds:0115e4da=???????? 609c0528 ebd3 jmp js_FinishCodeGenerator+0x2db9 (609c04fd) 609c052a 8b4d10 mov ecx,[ebp+0x10] ss:0115e286=???????? 609c052d 80e307 and bl,0x7 609c0530 8ad1 mov dl,cl 609c0532 c0e203 shl dl,0x3 609c0535 0ada or bl,dl FAULT ->609c0537 8818 mov [eax],bl ds:140480d9=?? 609c0539 0fb69984b59e60 movzx ebx,byte ptr [ecx+0x609eb584] ds:609eb59e=00 609c0540 85db test ebx,ebx 609c0542 7e1a jle js_FinishCodeGenerator+0x2e1a (609c055e) 609c0544 6a00 push 0x0 609c0546 56 push esi 609c0547 ff7508 push dword ptr [ebp+0x8] ss:0115e286=???????? 609c054a e885ffffff call js_FinishCodeGenerator+0x2d90 (609c04d4) 609c054f 83c40c add esp,0xc 609c0552 85c0 test eax,eax 609c0554 7c03 jl js_FinishCodeGenerator+0x2e15 (609c0559) 609c0556 4b dec ebx *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0012f880 609bdd7d 0058e1c0 0012fad4 0000001a 0058e1c0 js3250!js_FinishCodeGenerator 0012f980 609bf683 0058e1c0 00000001 00db86e8 0058e1c0 js3250!js_FinishCodeGenerator 0012fa80 609bdcee 0058e1c0 00000000 00db86b8 0012fb98 js3250!js_FinishCodeGenerator 0012fa94 609bdded 0058e1c0 0012fad4 00db86b8 0065ecf0 js3250!js_FinishCodeGenerator 0012fb98 609d2558 0058e1c0 00db86b8 0065ecf0 00000000 js3250!js_FinishCodeGenerator 0012fc08 609b33f4 00db8688 00d45dd0 00ddb018 0012fc2c js3250!js_Parse 0012fca0 609b33ab 0058e1c0 00d45dd0 00ddb018 00d7d2c0 js3250!JS_CompileUCScriptForPrincipals 0012fcc4 60a0a350 0058e1c0 00d45dd0 0055de64 00ddbc70 js3250!JS_CompileUCScriptForPrincipals 0012fd00 60649046 00000000 00ddbc70 0000b758 00d45dd0 jsdom!NS_NewScriptGlobalObject 0012fd54 60639dc2 00ddbc70 0000b758 0058e190 60a49b68 rdf!NS_NewScriptXULDocument 0012fd7c 604e27e2 00000000 00662700 00000000 0000b758 rdf!nsQueryInterface::operator= 0012fda4 6058225e 0000b758 00662db0 00000000 00000000 necko!NSGetModule 0012fdcc 609534fc 00662db4 006631a0 00000000 00000000 nkres!nsGetServiceByProgID::operator= 0012fde8 60531f50 006638f0 006631a0 00000000 00000000 gkweb!nsQueryReferent::nsQueryReferent [omap] 0012fe10 604e217e 006631a4 00663970 00000000 00000000 nkfile!nsGetServiceByProgID::operator= 0012fe28 604e1dd0 00663220 00663240 60b6191e 00663240 necko!NSGetModule (FPO: [1,0,0]) 0012fe34 60b6191e 00663240 004625b0 00663240 60b6185c necko!NSGetModule (FPO: [1,0,1]) 0012fe44 60b6185c 00663240 0012feac 0012feb4 00000000 plds3!PL_HandleEvent (FPO: [1,0,2]) 0012fe5c 60b61b48 004625b0 77e7124c 011207bc 0000c10d plds3!PL_ProcessPendingEvents (FPO: [EBP 0x0012feac] [1,0,4]) 0012fe64 77e7124c 011207bc 0000c10d 00000000 004625b0 plds3!PL_IsQueueOnCurrentThread (FPO: [4,0,0]) 0012fec8 60011ece 00000001 004018b5 004622e0 004031b8 user32!TranslateMessageEx 0012fed0 004018b5 004622e0 004031b8 80000000 00000000 appshell!nsQueryReferent::nsQueryReferent [omap] (FPO: [1,0,0]) 0012ff14 00401554 00000001 004109e0 000002f0 7ffdf000 mozilla!nsGetInterface::operator= 0012ff4c 004026bd 00000001 004109e0 004101a0 00405000 mozilla!nsGetInterface::operator= 0012ffc0 77f1b9ea 000002f0 00161c98 7ffdf000 c0000005 mozilla!nsGetInterface::operator= 0012fff0 00000000 004025da 00000000 000000b0 00000100 kernel32!GetProcessPriorityBoost 00000000 00000000 00000000 00000000 00000000 00000000 mozilla!<nosymbols> *----> Raw Stack Dump <----* 0012f874 c0 e1 58 00 d4 fa 12 00 - e8 86 db 00 80 f9 12 00 ..X............. 0012f884 7d dd 9b 60 c0 e1 58 00 - d4 fa 12 00 1a 00 00 00 }..`..X......... 0012f894 c0 e1 58 00 d4 fa 12 00 - e8 86 db 00 5c fb 12 00 ..X.........\... 0012f8a4 18 b0 dd 00 e8 f8 12 00 - 00 00 00 00 1d 4d 9d 60 .............M.` 0012f8b4 c0 e1 58 00 18 b0 dd 00 - 5c fb 12 00 5c fb 12 00 ..X.....\...\... 0012f8c4 18 b0 dd 00 08 f9 12 00 - b8 96 db 00 01 00 00 00 ................ 0012f8d4 88 8f db 00 58 8f db 00 - 00 00 00 00 5c fb 12 00 ....X.......\... 0012f8e4 18 b0 dd 00 28 f9 12 00 - b8 96 db 00 c0 e1 58 00 ....(.........X. 0012f8f4 00 00 00 00 2c f9 12 00 - 7e 59 9d 60 c0 e1 58 00 ....,...~Y.`..X. 0012f904 01 00 00 00 b8 8f db 00 - 00 00 00 00 e8 8f db 00 ................ 0012f914 18 b0 dd 00 14 00 00 00 - 5c fb 12 00 65 be 9d 60 ........\...e..` 0012f924 c0 e1 58 00 00 00 00 00 - 60 f9 12 00 64 59 9d 60 ..X.....`...dY.` 0012f934 c0 e1 58 00 01 00 00 00 - 40 94 db 00 10 94 db 00 ..X.....@....... 0012f944 00 00 00 00 b8 96 db 00 - 88 f9 12 00 b1 4c f6 77 .............L.w 0012f954 48 05 2f 00 00 00 00 00 - 20 04 00 00 30 e2 58 00 H./..... ...0.X. 0012f964 7e 59 9d 60 c0 e1 58 00 - 01 00 00 00 70 94 db 00 ~Y.`..X.....p... 0012f974 00 00 00 00 00 00 00 00 - c0 e1 58 00 80 fa 12 00 ..........X..... 0012f984 83 f6 9b 60 c0 e1 58 00 - 01 00 00 00 e8 86 db 00 ...`..X......... 0012f994 c0 e1 58 00 2c fc 12 00 - 88 86 db 00 01 00 00 00 ..X.,........... 0012f9a4 d0 94 db 00 70 94 db 00 - 00 00 00 00 18 b0 dd 00 ....p........... State Dump for Thread Id 0xe0 eax=00000808 ebx=00000000 ecx=00da1c10 edx=00000000 esi=000000b0 edi=00000000 eip=77f682db esp=0132fea4 ebp=0132fec8 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 function: NtWaitForSingleObject 77f682d0 b8c5000000 mov eax,0xc5 77f682d5 8d542404 lea edx,[esp+0x4] ss:0235e8ab=???????? 77f682d9 cd2e int 2e 77f682db c20c00 ret 0xc 77f682de 8bc0 mov eax,eax *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0132fec8 77f04f37 000000b0 ffffffff 00000000 60b040fc ntdll!NtWaitForSingleObject ffffffff 00000000 00000000 00000000 00000000 00000000 kernel32!WaitForSingleObject *----> Raw Stack Dump <----* 0132fea4 a0 cc f1 77 b0 00 00 00 - 00 00 00 00 00 00 00 00 ...w............ 0132feb4 b4 5a 46 00 00 5b 46 00 - dc 57 46 00 01 00 00 00 .ZF..[F..WF..... 0132fec4 84 15 41 00 ff ff ff ff - 37 4f f0 77 b0 00 00 00 ..A.....7O.w.... 0132fed4 ff ff ff ff 00 00 00 00 - fc 40 b0 60 b0 00 00 00 .........@.`.... 0132fee4 ff ff ff ff c0 57 46 00 - 00 5b 46 00 4c ff 32 01 .....WF..[F.L.2. 0132fef4 00 00 00 00 5c 08 b0 60 - b4 5a 46 00 dc 57 46 00 ....\..`.ZF..WF. 0132ff04 ff ff ff ff 01 00 00 00 - b0 57 46 00 74 05 b0 60 .........WF.t..` 0132ff14 00 5b 46 00 40 5a 46 00 - c0 57 46 00 ff ff ff ff .[F.@ZF..WF..... 0132ff24 00 00 00 80 30 57 46 00 - ae fb b9 60 b0 57 46 00 ....0WF....`.WF. 0132ff34 ff ff ff ff 74 39 66 00 - d0 5a 46 00 00 00 00 00 ....t9f..ZF..... 0132ff44 00 00 00 00 00 00 00 00 - 6c ff 32 01 8f ff b9 60 ........l.2....` 0132ff54 a8 5b 46 00 e0 5a 46 00 - 00 5d 46 00 0f f6 b9 60 .[F..ZF..]F....` 0132ff64 d0 5a 46 00 00 5b 46 00 - b8 ff 32 01 a1 14 b0 60 .ZF..[F...2....` 0132ff74 e0 5a 46 00 50 0e 41 00 - 50 0e 41 00 1c 00 00 00 .ZF.P.A.P.A..... 0132ff84 00 5d 46 00 33 3e 00 78 - 00 5b 46 00 1c 00 00 00 .]F.3>.x.[F..... 0132ff94 bc f9 12 00 00 5d 46 00 - a5 dd 11 80 90 ff 32 01 .....]F.......2. 0132ffa4 8b 74 11 80 dc ff 32 01 - 0c 88 00 78 38 63 03 78 .t....2....x8c.x 0132ffb4 00 00 00 00 ec ff 32 01 - de 4e f0 77 00 5d 46 00 ......2..N.w.]F. 0132ffc4 1c 00 00 00 bc f9 12 00 - 00 5d 46 00 bc f9 12 00 .........]F..... 0132ffd4 c4 ff 32 01 d7 75 b8 60 - ff ff ff ff 44 b9 f3 77 ..2..u.`....D..w State Dump for Thread Id 0x4c eax=7ffdc000 ebx=00000000 ecx=00000001 edx=00000000 esi=001428a0 edi=001429a8 eip=77f67fa7 esp=0156fdf0 ebp=0156ff90 iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202 function: ZwReplyWaitReceivePort 77f67f9c b890000000 mov eax,0x90 77f67fa1 8d542404 lea edx,[esp+0x4] ss:0259e7f7=???????? 77f67fa5 cd2e int 2e 77f67fa7 c21000 ret 0x10 77f67faa 8bc0 mov eax,eax *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0156ff90 77e15a1d 77e160f7 001428a0 0156ffec ffffffff ntdll!ZwReplyWaitReceivePort 00003a98 00000000 00000000 00000000 00000000 00000000 rpcrt4!NdrOleAllocate *----> Raw Stack Dump <----* 0156fdf0 9f 5b e1 77 cc 00 00 00 - 6c ff 56 01 00 00 00 00 .[.w....l.V..... 0156fe00 b0 2c 14 00 a8 29 14 00 - 4c 1c 14 00 54 1c 14 00 .,...)..L...T... 0156fe10 00 00 00 00 0c ff 56 01 - 44 b9 f3 77 20 cc f3 77 ......V.D..w ..w 0156fe20 ff ff ff ff 68 fe 56 01 - 31 70 19 60 b0 2a 14 00 ....h.V.1p.`.*.. 0156fe30 00 00 00 00 68 4c 13 00 - 1a 72 19 60 4c 00 00 00 ....hL...r.`L... 0156fe40 b0 2a 14 00 68 fe 56 01 - 5d 71 19 60 01 00 00 00 .*..h.V.]q.`.... 0156fe50 b0 2a 14 00 00 00 00 00 - 68 4c 13 00 00 00 19 60 .*......hL.....` 0156fe60 68 4c 13 00 4c 00 00 00 - 78 fe 56 01 01 00 00 00 hL..L...x.V..... 0156fe70 00 00 00 00 02 00 00 00 - 98 fe 56 01 d7 21 97 60 ..........V..!.` 0156fe80 00 00 96 60 02 00 00 00 - 00 00 00 00 e8 b9 13 00 ...`............ 0156fe90 26 30 a9 77 0b 00 00 00 - 00 00 00 00 65 3e f6 77 &0.w........e>.w 0156fea0 00 00 a9 77 02 00 00 00 - 00 00 00 00 1c ff 56 01 ...w..........V. 0156feb0 00 00 00 00 92 12 f6 77 - 60 55 fa 77 98 12 f6 77 .......w`U.w...w 0156fec0 30 ff 56 01 c4 f7 12 00 - 20 f3 13 00 00 00 00 00 0.V..... ....... 0156fed0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0156fee0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0156fef0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0156ff00 00 00 00 00 c0 fe 56 01 - 00 00 00 00 ff ff ff ff ......V......... 0156ff10 d4 2c f9 77 e8 d0 f9 77 - ff ff ff ff 00 00 00 00 .,.w...w........ 0156ff20 d3 63 f7 77 db 63 f7 77 - 30 ff 56 01 01 00 00 00 .c.w.c.w0.V.....
QA Contact: nobody → cpratt
what version of the msvcrt.dll is in your \system32 folder?
Status: NEW → RESOLVED
Closed: 25 years ago
Resolution: --- → DUPLICATE
See bug 19165 for details on how to solve this crasher. *** This bug has been marked as a duplicate of 19165 ***
Status: RESOLVED → VERIFIED
Verified duplicate based on personal E-mail with bug reporter.
Product: Browser → Seamonkey
You need to log in before you can comment on or make changes to this bug.