Closed Bug 29465 Opened 25 years ago Closed 24 years ago

installer fails. repeatable

Categories

(SeaMonkey :: Installer, defect, P3)

x86
Windows NT
defect

Tracking

(Not tracked)

VERIFIED WORKSFORME

People

(Reporter: landis, Assigned: ssu0262)

Details

Double click mozilla32-installer-M13.exe within Windows Explorer, starts to load 
sound starts and then Dr.Watson comes up. Setup.exe Exception: access violation 
(0xc0000005), Address: 0x0041803b.
System has 512MB RAM and 6.75GB free disk space.

DrWatson.log

Microsoft (R) Windows NT (TM) Version 4.00 DrWtsn32
Copyright (C) 1985-1996 Microsoft Corp. All rights reserved.



Application exception occurred:
        App:  (pid=310)
        When: 2/27/2000 @ 19:58:56.292
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: SERVER2
        User Name: landis
        Number of Processors: 1
        Processor Type: x86 Family 6 Model 5 Stepping 2
        Windows Version: 4.0
        Current Build: 1381
        Service Pack: 6
        Current Type: Uniprocessor Free
        Registered Organization: iis
        Registered Owner: Landis Reed

*----> Task List <----*
   0 Idle.exe
   2 System.exe
  28 smss.exe
  44 csrss.exe
  34 winlogon.exe
  48 services.exe
  51 lsass.exe
  78 spoolss.exe
  79 llssrv.exe
 101 mgasc.exe
 113 mgactrl.exe
 122 npssvc.exe
 126 LOCATOR.exe
 136 RpcSs.exe
 139 tcpsvcs.exe
 111 ZipToA.exe
 143 pstores.exe
  69 nddeagnt.exe
 159 explorer.exe
 172 SysTray.exe
 174 MGAQDESK.exe
 179 Winampa.exe
 181 starter.exe
 183 HPJETDSC.exe
 188 MFIndexer.exe
 177 qshelf98.exe
 189 Remote.exe
 162 dad9.exe
  90 ddhelp.exe
 208 netdde.exe
 249 clipsrv.exe
  47 ntvdm.exe
 268 netscape.exe
 236 Eudora.exe
 276 tapisrv.exe
 291 rasman.exe
 115 photopnt.exe
 237 wpwin9.exe
 217 ACDSee32.exe
 299 AcroEx32.exe
 206 mozilla-win32-i.exe
 310 SETUP.exe
 289 drwtsn32.exe
   0 _Total.exe

(00400000 - 00400000) 
(77f60000 - 77fbe000) dll\ntdll.dbg
(75b00000 - 75b22000) dll\msvfw32.dbg
(77e70000 - 77ec5000) dll\user32.dbg
(77f00000 - 77f5e000) dll\kernel32.dbg
(77ed0000 - 77efc000) dll\gdi32.dbg
(77dc0000 - 77dff000) dll\advapi32.dbg
(77e10000 - 77e67000) dll\rpcrt4.dbg
(77fd0000 - 77ffa000) dll\winmm.dbg
(70980000 - 70b28000) SHELL32.dbg
(710d0000 - 710f3000) SHLWAPI.dbg
(77aa0000 - 77b15000) COMCTL32.dbg
(77c00000 - 77c18000) drv\winspool.dbg
(6bd00000 - 6bd00000) 
(77a90000 - 77a9b000) dll\version.dbg
(779c0000 - 779c8000) dll\lz32.dbg
(10000000 - 10000000) 
(00d70000 - 00d70000) 
(74100000 - 74109000) drv\msacm32.dbg
(75d50000 - 75d6a000) dll\msacm32.dbg

State Dump for Thread Id 0x133

eax=e701141b ebx=00000100 ecx=0012f0d4 edx=0042032c esi=e701141b edi=77ed1000
eip=0041803b esp=0012efe4 ebp=0012eff0 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000206


function: <nosymbols>
        00418026 50               push    eax
        00418027 ffd7             call    edi
        00418029 894508           mov     [ebp+0x8],eax          
ss:0146d9f6=????????
        0041802c 8b7608           mov     esi,[esi+0x8]          
ds:e834fe21=????????
        0041802f 85f6             test    esi,esi
        00418031 7412             jz      00418045
        00418033 85db             test    ebx,ebx
        00418035 7504             jnz     0041803b
        00418037 33c0             xor     eax,eax
        00418039 eb03             jmp     0041803e
FAULT ->0041803b 8b4304           mov     eax,[ebx+0x4]          
ds:0133eb06=????????
        0041803e 50               push    eax
        0041803f 56               push    esi
        00418040 ffd7             call    edi
        00418042 894508           mov     [ebp+0x8],eax          
ss:0146d9f6=????????
        00418045 ff7508           push    dword ptr [ebp+0x8]    
ss:0146d9f6=????????
        00418048 e822050000       call    0041856f
        0041804d 5f               pop     edi
        0041804e 5e               pop     esi
        0041804f 5b               pop     ebx
        00418050 5d               pop     ebp
        00418051 c20400           ret     0x4

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0012eff0 00405df1 00000100 00404bae 0012f9cc 00404bae <nosymbols> 

*----> Raw Stack Dump <----*
0012efe4  cc f9 12 00 00 00 00 00 - ae 4b 40 00 24 f0 12 00  .........K@.$...
0012eff4  f1 5d 40 00 00 01 00 00 - ae 4b 40 00 cc f9 12 00  .]@......K@.....
0012f004  ae 4b 40 00 24 f0 12 00 - 00 00 00 00 00 00 00 00  .K@.$...........
0012f014  00 00 00 00 ec f0 12 00 - 84 da 41 00 ff ff ff ff  ..........A.....
0012f024  f8 f0 12 00 b3 1a 40 00 - d4 f0 12 00 f4 00 96 00  ......@.........
0012f034  25 00 00 00 01 00 00 00 - 00 00 00 00 10 00 00 00  %...............
0012f044  04 90 40 00 f0 bf 42 00 - c0 f0 12 00 36 6f 40 00  ..@...B.....6o@.
0012f054  09 00 00 00 00 00 00 00 - 08 00 00 00 d3 6e 40 00  .............n@.
0012f064  08 00 00 00 02 00 88 01 - ff ff ff ff a0 6e 40 00  .............n@.
0012f074  08 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0012f084  00 00 00 00 00 00 00 00 - 58 02 00 00 7c 01 00 00  ........X...|...
0012f094  58 02 00 00 7c 01 00 00 - 00 00 00 00 00 00 00 00  X...|...........
0012f0a4  58 02 00 00 7c 01 00 00 - 02 00 88 01 40 09 96 00  X...|.......@...
0012f0b4  0d c8 41 00 01 be 41 00 - 03 26 41 00 00 00 00 00  ..A...A..&A.....
0012f0c4  00 00 00 00 58 02 00 00 - 7c 01 00 00 20 0d 96 00  ....X...|... ...
0012f0d4  2c 03 42 00 1b 14 01 e7 - 1b 14 01 e7 00 00 00 00  ,.B.............
0012f0e4  cc f9 12 00 00 00 00 00 - 60 f6 12 00 8b d5 41 00  ........`.....A.
0012f0f4  00 00 00 00 b4 f5 12 00 - b9 1e 40 00 0c f6 12 00  ..........@.....
0012f104  48 fc 12 00 c0 f0 12 00 - c0 f0 12 00 01 00 00 00  H...............
0012f114  48 fc 12 00 6c f3 12 00 - 92 d6 ed 77 1e 08 01 30  H...l......w...0

State Dump for Thread Id 0x13d

eax=0048a3aa ebx=0000006c ecx=00092586 edx=00000000 esi=00000000 edi=012eff9c
eip=77e72397 esp=012eff58 ebp=012eff7c iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246


function: InvalidateRect
        77e7237e b89e110000       mov     eax,0x119e
        77e72383 8d542404         lea     edx,[esp+0x4]          
ss:0262e95f=????????
        77e72387 cd2e             int     2e
        77e72389 c20c00           ret     0xc
        77e7238c b885110000       mov     eax,0x1185
        77e72391 8d542404         lea     edx,[esp+0x4]          
ss:0262e95f=????????
        77e72395 cd2e             int     2e
        77e72397 c21400           ret     0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
012eff7c 77fde541 012eff9c 00000000 00000000 00000000 user32!InvalidateRect 
012effb8 77f04ede 0000006c 00000001 0012ee98 0000006c winmm!mciGetYieldProc 
012effec 00000000 77fde4b2 0000006c 00000000 000000b0 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols> 

*----> Raw Stack Dump <----*
012eff58  15 27 e7 77 9c ff 2e 01 - 00 00 00 00 00 00 00 00  .'.w............
012eff68  00 00 00 00 78 ff 2e 01 - 01 00 00 00 00 00 00 00  ....x...........
012eff78  00 00 00 00 b8 ff 2e 01 - 41 e5 fd 77 9c ff 2e 01  ........A..w....
012eff88  00 00 00 00 00 00 00 00 - 00 00 00 00 01 00 00 00  ................
012eff98  98 ee 12 00 3c 0c 68 00 - bb 03 00 00 b0 2b 13 00  ....<.h......+..
012effa8  00 00 00 00 9b b7 e7 0a - 4f 02 00 00 44 01 00 00  ........O...D...
012effb8  ec ff 2e 01 de 4e f0 77 - 6c 00 00 00 01 00 00 00  .....N.wl.......
012effc8  98 ee 12 00 6c 00 00 00 - 98 ee 12 00 c4 ff 2e 01  ....l...........
012effd8  f0 ee 12 00 ff ff ff ff - 44 b9 f3 77 38 d2 f3 77  ........D..w8..w
012effe8  00 00 00 00 00 00 00 00 - 00 00 00 00 b2 e4 fd 77  ...............w
012efff8  6c 00 00 00 00 00 00 00 - b0 00 00 00 00 01 00 00  l...............
012f0008  ff ee ff ee 02 10 00 00 - 00 00 00 00 00 fe 00 00  ................
012f0018  00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00  ..... ....... ..
012f0028  5b 00 00 00 ff ef fd 7f - 05 00 48 05 00 00 00 00  [.........H.....
012f0038  00 00 00 00 00 00 00 00 - 00 00 00 00 d8 04 2f 01  ............../.
012f0048  0f 00 00 00 f8 ff ff ff - 50 00 2f 01 50 00 2f 01  ........P./.P./.
012f0058  80 05 2f 01 00 00 00 00 - 00 00 00 00 00 00 00 00  ../.............
012f0068  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
012f0078  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
012f0088  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

State Dump for Thread Id 0xcf

eax=77fd694a ebx=00000001 ecx=00130000 edx=00000000 esi=0000001c edi=00000000
eip=77f682db esp=017fff54 ebp=017fff78 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246


function: NtWaitForSingleObject
        77f682d0 b8c5000000       mov     eax,0xc5
        77f682d5 8d542404         lea     edx,[esp+0x4]          
ss:02b3e95b=????????
        77f682d9 cd2e             int     2e
        77f682db c20c00           ret     0xc
        77f682de 8bc0             mov     eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
017fff78 6bd06cc5 0000001c ffffffff 00000001 017fffb8 
ntdll!NtWaitForSingleObject
lreed,  can you provide the url to where you downloaded this installer from?  
and also the build number if possible?
lreed@surfmi.net

Can you check with the latest nightly build to see if this crash still occures? 
There have been several fixes to the installer.  Try one from March 20, 2000 
on...
I'm trying to clear up unconfirmed bugs, lreed@surfmi.net, are you still seeing 
this with any recent builds? If I get no responce I'll set to worksforme, as 
this bug has been sitting idle for about 2 months.
No responce, setting as worksforme
Status: UNCONFIRMED → RESOLVED
Closed: 24 years ago
Resolution: --- → WORKSFORME
ok
Status: RESOLVED → VERIFIED
Product: Browser → Seamonkey
You need to log in before you can comment on or make changes to this bug.