Closed Bug 272286 Opened 20 years ago Closed 17 years ago

Mozilla Crashes sometimes when loading www.spiegel.de - M17x FF10 [@ NewOrRecycledNode][@ js_FoldConstants][@ JS_GetParent][@ nsScriptSecurityManager::GetScriptPrincipal]

Categories

(Core :: JavaScript Engine, defect)

1.7 Branch
defect
Not set
critical

Tracking

()

RESOLVED WORKSFORME

People

(Reporter: mozilla, Unassigned)

References

()

Details

(Keywords: crash, Whiteboard: purifyme)

Crash Data

User-Agent:       Mozilla/5.0 (Windows; U; Windows NT 5.0; de-AT; rv:1.7.2) Gecko/20040803
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; de-AT; rv:1.7.2) Gecko/20040803

Mozilla crashes sometimes (not always) when loading www.spiegel.de
This behaviour started on Monday, 29th of november, everything was great until
yesterday. This one also happened on another PC with windows XP (Mozilla 1.7.3)
but without crash report. Crash report data from this pc: TB2251992E

Reproducible: Sometimes
Steps to Reproduce:
1. open www.spiegel.de
2. If mozilla doesn't crash, reload until it crashes
3. Mozilla crashes

Actual Results:  
Talkback agent

Expected Results:  
Mozilla loads www.spiegel.de as all the months before.

Talkback ID: TB2251992E
Stack Signature js3250.dll + 0x2dd2e (0x6102dd2e) fc7c97b4 
Product ID Mozilla17 
Build ID 2004080302 
Trigger Time 2004-11-29 12:34:27.0 
Platform Win32 
Operating System Windows NT 5.0 build 2195 
Module js3250.dll + (0002dd2e) 
URL visited http://www.spiegel.de 
User Comments Loading the page 
Since Last Crash 15828791 sec 
Total Uptime 15828791 sec 
Trigger Reason Access violation 
Source File, Line No. N/A 
Stack Trace  

js3250.dll + 0x2dd2e (0x6102dd2e)
js3250.dll + 0x2ec46 (0x6102ec46)
js3250.dll + 0x2dc06 (0x6102dc06)
js3250.dll + 0x2d7b8 (0x6102d7b8)
js3250.dll + 0x41b0 (0x610041b0)
js3250.dll + 0x411b (0x6100411b)
js3250.dll + 0x496d (0x6100496d)
gklayout.dll + 0x14d7b1 (0x6152d7b1)
gklayout.dll + 0xc3623 (0x614a3623)
gklayout.dll + 0xc341c (0x614a341c)
gklayout.dll + 0xc3bfa (0x614a3bfa)
necko.dll + 0x5e6a (0x61225e6a)
necko.dll + 0xce1f (0x6122ce1f)
xpcom.dll + 0x3cf84 (0x61d5cf84)
xpcom.dll + 0x3cf84 (0x61d5cf84)
necko.dll + 0xb61b (0x6122b61b)
necko.dll + 0xb412 (0x6122b412)
xpcom.dll + 0x1a1a3 (0x61d3a1a3)
xpcom.dll + 0x298ef (0x61d498ef)
xpcom.dll + 0x2986b (0x61d4986b)
xpcom.dll + 0x29d57 (0x61d49d57)
appshell.dll + 0x7c49 (0x61767c49)
mozilla.exe + 0x1ddd (0x00401ddd)
mozilla.exe + 0x1947 (0x00401947)
mozilla.exe + 0x2d2e (0x00402d2e)
mozilla.exe + 0xdd2e (0x0040dd2e)
KERNEL32.DLL + 0x2893d (0x77e9893d)
Assignee: general → general
Component: General → JavaScript Engine
Keywords: crash
Product: Mozilla Application Suite → Core
QA Contact: general → pschwartau
Summary: Mozilla Crashes sometimes when loading www.spiegel.de → Mozilla Crashes sometimes when loading www.spiegel.de [@ js3250.dll + 0x2dd2e]
Version: unspecified → 1.7 Branch
jay, can we get symbols for this crash or any that match its stack?

/be
We have to delete older symbols due to space limitations, so it looks like that
incident was with a build that no longer has symbols available.  However, a
quick query for that url shows quit a few crashes in "NewParseNode" and many
others with nice stack traces:
http://talkback-public.mozilla.org/talkback/fastfind.jsp?search=1&searchby=url&match=contains&searchfor=www.spiegel.de&vendor=All&product=All&platform=All&buildid=&sdate=&stime=&edate=&etime=&sortby=bbid
Can anyone reproduce this by testing the heck out of the bug URL, preferably
under a debugger?  Get me on IRC if you reproduce.

/be
Status: UNCONFIRMED → NEW
Ever confirmed: true
Another Crash Report: TB2276164X
Incident ID: 2276164
Stack Signature	NewOrRecycledNode 98a9b1b5
Product ID	Mozilla17
Build ID	2004061609
Trigger Time	2004-11-30 13:50:55.0
Platform	Win32
Operating System	Windows NT 5.0 build 2195
Module	js3250.dll + (0002dd9b)
URL visited	http://www.spiegel.de
User Comments	Going back to www.spiegel.de from another page on the same domain
Since Last Crash	5313666 sec
Total Uptime	35876857 sec
Trigger Reason	Access violation
Source File, Line No.
d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line 169
Stack Trace 	
NewOrRecycledNode 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line
169]
NewParseNode 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line
218]
Statement 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line
1944]
Statements 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line
998]
js_CompileTokenStream 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line
452]
CompileTokenStream 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsapi.c, line 3022]
JS_CompileUCScriptForPrincipals 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsapi.c, line 3103]
JS_EvaluateUCScriptForPrincipals 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsapi.c, line 3555]
nsJSContext::EvaluateString 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/dom/src/base/nsJSEnvironment.cpp,
line 948]
nsScriptLoader::EvaluateScript 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/content/base/src/nsScriptLoader.cpp,
line 660]
nsScriptLoader::ProcessRequest 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/content/base/src/nsScriptLoader.cpp,
line 574]
nsScriptLoader::OnStreamComplete 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/content/base/src/nsScriptLoader.cpp,
line 897]
nsStreamLoader::OnStopRequest 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/netwerk/base/src/nsStreamLoader.cpp,
line 144]
nsStreamListenerTee::OnStopRequest 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/netwerk/base/src/nsStreamListenerTee.cpp,
line 66]
nsCOMPtr_base::assign_with_AddRef 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpcom/glue/nsCOMPtr.cpp,
line 86]
nsCOMPtr_base::assign_with_AddRef 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpcom/glue/nsCOMPtr.cpp,
line 86]
nsInputStreamPump::OnStateStop 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/netwerk/base/src/nsInputStreamPump.cpp,
line 499]
nsInputStreamPump::OnInputStreamReady 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/netwerk/base/src/nsInputStreamPump.cpp,
line 340]
nsInputStreamReadyEvent::EventHandler 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpcom/io/nsStreamUtils.cpp,
line 215]
PL_HandleEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpcom/threads/plevent.c,
line 674]
PL_ProcessPendingEvents 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpcom/threads/plevent.c,
line 612]
_md_EventReceiverProc 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpcom/threads/plevent.c,
line 1415]
nsAppShellService::Run 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/appshell/src/nsAppShellService.cpp,
line 524]
main1 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp,
line 1313]
main 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp,
line 1783]
WinMain 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp,
line 1809]
WinMainCRTStartup()
KERNEL32.DLL + 0x2893d (0x77e9893d)
Summary: Mozilla Crashes sometimes when loading www.spiegel.de [@ js3250.dll + 0x2dd2e] → Mozilla Crashes sometimes when loading www.spiegel.de [@ NewOrRecycledNode]
I have two new Talkback IDs:

TB2996960X
TB2996960X
Incident ID: 2996960
Stack Signature	js_FoldConstants a4501646
Product ID	Mozilla17
Build ID	2004121708
Trigger Time	2005-01-11 03:58:06.0
Platform	Win32
Operating System	Windows NT 5.1 build 2600
Module	js3250.dll + (00031e33)
URL visited	http://www.spiegel.de
User Comments	I loaded the page the first time after browser crash
Since Last Crash	9 sec
Total Uptime	886587 sec
Trigger Reason	Access violation
Source File, Line No.
d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line 3332
Stack Trace 	
js_FoldConstants 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line
3332]
js_FoldConstants 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line
3324]
js_FoldConstants 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line
3338]
js_FoldConstants 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line
3324]
js_FoldConstants 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line
3378]
Statements 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line
1033]
js_CompileTokenStream 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line
452]
CompileTokenStream 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsapi.c, line 3113]
JS_CompileUCScriptForPrincipals 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsapi.c, line 3194]
JS_EvaluateUCScriptForPrincipals 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsapi.c, line 3646]
nsJSContext::EvaluateString 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/dom/src/base/nsJSEnvironment.cpp,
line 948]
nsScriptLoader::EvaluateScript 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/content/base/src/nsScriptLoader.cpp,
line 660]
nsScriptLoader::ProcessRequest 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/content/base/src/nsScriptLoader.cpp,
line 574]
nsScriptLoader::OnStreamComplete 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/content/base/src/nsScriptLoader.cpp,
line 897]
nsStreamLoader::OnStopRequest 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/netwerk/base/src/nsStreamLoader.cpp,
line 144]
nsStreamListenerTee::OnStopRequest 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/netwerk/base/src/nsStreamListenerTee.cpp,
line 66]
nsHttpChannel::OnStopRequest 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/netwerk/protocol/http/src/nsHttpChannel.cpp,
line 3653]
nsInputStreamPump::OnStateStop 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/netwerk/base/src/nsInputStreamPump.cpp,
line 499]
nsInputStreamPump::OnInputStreamReady 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/netwerk/base/src/nsInputStreamPump.cpp,
line 340]
nsInputStreamReadyEvent::EventHandler 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpcom/io/nsStreamUtils.cpp,
line 119]
PL_HandleEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpcom/threads/plevent.c,
line 674]
PL_ProcessPendingEvents 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpcom/threads/plevent.c,
line 612]
_md_EventReceiverProc 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpcom/threads/plevent.c,
line 1415]
USER32.dll + 0x3d79 (0x77d43d79)
USER32.dll + 0x3ddf (0x77d43ddf)
nsAppShellService::Run 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/appshell/src/nsAppShellService.cpp,
line 524]
main1 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp,
line 1313]
main 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp,
line 1784]
WinMain 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp,
line 1810]
WinMainCRTStartup()
kernel32.dll + 0x2141a (0x77e8141a)

reporter: does this crash w/ trunk?
Summary: Mozilla Crashes sometimes when loading www.spiegel.de [@ NewOrRecycledNode] → Mozilla Crashes sometimes when loading www.spiegel.de [@ NewOrRecycledNode][@ js_FoldConstants]
I do not have any mozilla from the trunk on my machines, thus I cannot answer
your question.
The only thing I can currently provide, is another bunch of talkback IDs:

TB3173796Y
TB3115319E
TB3114782E
TB3111757Q

TB3038124Y
TB3018781Z
TB3001226M 

Hope, that helps.

Kind regards

Marco
Incident ID: 3114782
Stack Signature	JS_GetParent e3e59e3c
Product ID	Mozilla17
Build ID	2004121708
Trigger Time	2005-01-17 04:36:02.0
Platform	Win32
Operating System	Windows NT 5.1 build 2600
Module	js3250.dll + (00002cd8)
URL visited	http://www.spiegel.de
User Comments	Yet again
Since Last Crash	16624 sec
Total Uptime	1400761 sec
Trigger Reason	Access violation
Source File, Line No.
d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsapi.c, line 2052
Stack Trace 	
JS_GetParent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsapi.c, line 2052]
needsSecurityCheck 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/dom/src/base/nsDOMClassInfo.cpp,
line 3098]
nsWindowSH::GetProperty 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/dom/src/base/nsDOMClassInfo.cpp,
line 3477]
XPC_WN_Helper_GetProperty 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/xpconnect/src/xpcwrappednativejsops.cpp,
line 812]
js_GetProperty 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsobj.c, line 2766]
JS_GetProperty 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsapi.c, line 2532]
nsDOMClassInfo::PostCreate 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/dom/src/base/nsDOMClassInfo.cpp,
line 2693]
XPCWrappedNative::GetNewOrUsed 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/xpconnect/src/xpcwrappednative.cpp,
line 438]
XPCConvert::NativeInterface2JSObject 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/xpconnect/src/xpcconvert.cpp,
line 1062]
nsXPConnect::WrapNative 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/xpconnect/src/nsXPConnect.cpp,
line 569]
nsJSEventListener::HandleEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/dom/src/events/nsJSEventListener.cpp,
line 163]
nsEventListenerManager::HandleEventSubType 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/content/events/src/nsEventListenerManager.cpp,
line 1437]
nsEventListenerManager::HandleEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/content/events/src/nsEventListenerManager.cpp,
line 1516]
nsDocument::HandleDOMEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/content/base/src/nsDocument.cpp,
line 3738]
nsGenericElement::HandleDOMEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/content/base/src/nsGenericElement.cpp,
line 2003]
nsEventStateManager::DispatchMouseEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/content/events/src/nsEventStateManager.cpp,
line 2570]
nsEventStateManager::GenerateMouseEnterExit 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/content/events/src/nsEventStateManager.cpp,
line 2690]
nsEventStateManager::PreHandleEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/content/events/src/nsEventStateManager.cpp,
line 447]
PresShell::HandleEventInternal 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsPresShell.cpp,
line 6037]
PresShell::HandleEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsPresShell.cpp,
line 5934]
nsViewManager::HandleEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/view/src/nsViewManager.cpp,
line 2326]
nsViewManager::DispatchEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/view/src/nsViewManager.cpp,
line 2070]
HandleEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/view/src/nsView.cpp,
line 77]
nsWindow::DispatchEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp,
line 1071]
nsWindow::DispatchWindowEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp,
line 1088]
nsWindow::DispatchMouseEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp,
line 5261]
ChildWindow::DispatchMouseEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp,
line 5512]
nsWindow::ProcessMessage 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp,
line 4026]
nsWindow::WindowProc 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp,
line 1350]
USER32.dll + 0x86cb (0x77d486cb)
USER32.dll + 0x879f (0x77d4879f)
USER32.dll + 0x8a31 (0x77d48a31)
USER32.dll + 0x8ab4 (0x77d48ab4)
nsAppShellService::Run 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/appshell/src/nsAppShellService.cpp,
line 524]
main1 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp,
line 1313]
main 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp,
line 1784]
WinMain 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp,
line 1810]
WinMainCRTStartup()
kernel32.dll + 0x2141a (0x77e8141a)

Incident ID: 3018781
Stack Signature	nsScriptSecurityManager::GetScriptPrincipal 9e03b55e
Product ID	Mozilla17
Build ID	2004121708
Trigger Time	2005-01-12 00:57:21.0
Platform	Win32
Operating System	Windows NT 5.1 build 2600
Module	caps.dll + (0000535e)
URL visited	http://www.spiegel.de
User Comments	
Since Last Crash	61327 sec
Total Uptime	957613 sec
Trigger Reason	Access violation
Source File, Line No.
d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/caps/src/nsScriptSecurityManager.cpp,
line 1781
Stack Trace 	
nsScriptSecurityManager::GetScriptPrincipal 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/caps/src/nsScriptSecurityManager.cpp,
line 1781]
nsScriptSecurityManager::GetFramePrincipal 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/caps/src/nsScriptSecurityManager.cpp,
line 1833]
nsScriptSecurityManager::GetPrincipalAndFrame 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/caps/src/nsScriptSecurityManager.cpp,
line 1859]
nsScriptSecurityManager::GetSubjectPrincipal 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/caps/src/nsScriptSecurityManager.cpp,
line 1897]
nsScriptSecurityManager::GetSubjectPrincipal 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/caps/src/nsScriptSecurityManager.cpp,
line 1583]
nsScriptSecurityManager::SubjectPrincipalIsSystem 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/caps/src/nsScriptSecurityManager.cpp,
line 1617]
nsContentUtils::IsCallerChrome 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/content/base/src/nsContentUtils.cpp,
line 921]
PresShell::HandleEventInternal 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsPresShell.cpp,
line 6009]
PresShell::HandleEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsPresShell.cpp,
line 5934]
nsViewManager::HandleEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/view/src/nsViewManager.cpp,
line 2280]
nsViewManager::DispatchEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/view/src/nsViewManager.cpp,
line 2070]
HandleEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/view/src/nsView.cpp,
line 77]
nsWindow::DispatchEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp,
line 1071]
nsWindow::DispatchWindowEvent 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp,
line 1088]
nsWindow::DispatchFocus 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp,
line 5452]
nsWindow::ProcessMessage 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp,
line 4216]
nsWindow::WindowProc 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp,
line 1350]
USER32.dll + 0x3a50 (0x77d43a50)
USER32.dll + 0x3b1f (0x77d43b1f)
USER32.dll + 0x44f5 (0x77d444f5)
USER32.dll + 0x4525 (0x77d44525)
ntdll.dll + 0x25da3 (0x77f75da3)
USER32.dll + 0x3fd4 (0x77d43fd4)
PeekKeyAndIMEMessage 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsAppShell.cpp,
line 91]
nsAppShell::Run 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsAppShell.cpp,
line 138]
nsAppShellService::Run 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/appshell/src/nsAppShellService.cpp,
line 524]
main1 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp,
line 1313]
main 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp,
line 1784]
WinMain 
[d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp,
line 1810]
WinMainCRTStartup()
kernel32.dll + 0x2141a (0x77e8141a)
Summary: Mozilla Crashes sometimes when loading www.spiegel.de [@ NewOrRecycledNode][@ js_FoldConstants] → Mozilla Crashes sometimes when loading www.spiegel.de [@ NewOrRecycledNode][@ js_FoldConstants][@ JS_GetParent][@ nsScriptSecurityManager::GetScriptPrincipal]
Whiteboard: purifyme
The js_FoldConstants crash is a topcrasher for Mozilla 1.7.5 and Firefox 1.0. 
I'm assuming the other stack signatures mentioned here are related so marking
this topcrash+ to get some traction. Here is a link to the most recent Talkback
data for js_FoldConstants:

http://talkback-public.mozilla.org/talkback/fastfind.jsp?search=1&searchby=stacksig&match=contains&searchfor=js_FoldConstants&vendor=All&product=All&platform=All&buildid=&sdate=&stime=&edate=&etime=&sortby=bbid

And a recent incident:
Incident ID: 3201215
Stack Signature	js_FoldConstants 0d7ab3c1
Product ID	Firefox10
Build ID	2004110711
Trigger Time	2005-01-21 08:29:09.0
Platform	Win32
Operating System	Windows NT 5.0 build 2195
Module	js3250.dll + (00031e33)
URL visited
http://login.yahoo.com/config/login?.partner=sbc&.done=http%3a//sbc.yahoo.com/
User Comments	
Since Last Crash	852593 sec
Total Uptime	1633376 sec
Trigger Reason	Access violation
Source File, Line No.
d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line
3316
Stack Trace 	
js_FoldConstants 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c,
line 3316]
js_FoldConstants 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c,
line 3325]
js_FoldConstants 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c,
line 3337]
Statements 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c,
line 1029]
js_CompileTokenStream 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c,
line 451]
CompileTokenStream 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/js/src/jsapi.c, line
3111]
JS_CompileUCScriptForPrincipals 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/js/src/jsapi.c, line
3192]
JS_EvaluateUCScriptForPrincipals 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/js/src/jsapi.c, line
3646]
nsJSContext::EvaluateString 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/dom/src/base/nsJSEnvironment.cpp,
line 946]
nsScriptLoader::EvaluateScript 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/content/base/src/nsScriptLoader.cpp,
line 668]
nsScriptLoader::ProcessRequest 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/content/base/src/nsScriptLoader.cpp,
line 581]
nsScriptLoader::ProcessScriptElement 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/content/base/src/nsScriptLoader.cpp,
line 527]
nsHTMLScriptElement::MaybeProcessScript 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/content/html/content/src/nsHTMLScriptElement.cpp,
line 656]
nsHTMLScriptElement::SetDocument 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/content/html/content/src/nsHTMLScriptElement.cpp,
line 469]
HTMLContentSink::ProcessSCRIPTTag 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/content/html/document/src/nsHTMLContentSink.cpp,
line 4341]
HTMLContentSink::AddLeaf 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/content/html/document/src/nsHTMLContentSink.cpp,
line 3195]
CNavDTD::AddLeaf 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/htmlparser/src/CNavDTD.cpp,
line 3787]
CNavDTD::HandleDefaultStartToken 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/htmlparser/src/CNavDTD.cpp,
line 1459]
CNavDTD::HandleStartToken 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/htmlparser/src/CNavDTD.cpp,
line 1835]
CNavDTD::HandleToken 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/htmlparser/src/CNavDTD.cpp,
line 1019]
CNavDTD::BuildModel 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/htmlparser/src/CNavDTD.cpp,
line 511]
nsParser::BuildModel 
[d:/builds/tinderbox/firefox-1.0/WINNT_5.0_Clobber/mozilla/htmlparser/src/nsParser.cpp,
line 2004]
Keywords: topcrash+
OS: Windows 2000 → All
Hardware: PC → All
Summary: Mozilla Crashes sometimes when loading www.spiegel.de [@ NewOrRecycledNode][@ js_FoldConstants][@ JS_GetParent][@ nsScriptSecurityManager::GetScriptPrincipal] → Mozilla Crashes sometimes when loading www.spiegel.de - M17x FF10 [@ NewOrRecycledNode][@ js_FoldConstants][@ JS_GetParent][@ nsScriptSecurityManager::GetScriptPrincipal]
We have a web-based case tracking system that we use which has consistently 
reproduced this issue for multiple people. I'd like to help out debugging this 
so if there is anything you need, let me know. A number of talkback ids:

TB5200307W
TB5199246Z
TB5200617Y
WFM Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.8b2) Gecko/20050511
Firefox/1.0+
Tried 10 times to reload the page.
Firefox too just crashed on loading www.spiegel.de. Here is the crashlog with an
analysis of the callstack:

Anwendungsausnahme aufgetreten:
        Anwendung: C:\Programme\Mozilla Firefox\firefox.exe (pid=2284)
        Wann: 20.05.2005 @ 14:13:14.078
        Ausnahmenummer: c0000005 (Zugriffsverletzung)

*----> Systeminformationen <----*
        Computername: ANIME
        Benutzername: Xenite
        Terminalsitzungskennung: 0
        Prozessoranzahl: 2
        Prozessortyp: x86 Family 15 Model 3 Stepping 4
        Windows-Version: 5.1
        Aktuelles Build: 2600
        Service Pack: 2
        Aktueller Typ: Multiprocessor Free
        Firma: 
        Besitzer: Steffen Motzer

*----> Taskliste <----*
   0 System Process
   4 Error 0xD0000022
 636 Error 0xD0000022
 696 Error 0xD0000022
 732 Error 0xD0000022
 776 Error 0xD0000022
 788 Error 0xD0000022
 948 Error 0xD0000022
1024 Error 0xD0000022
1144 Error 0xD0000022
1236 Error 0xD0000022
1304 Error 0xD0000022
1520 Error 0xD0000022
1844 Error 0xD0000022
2024 Error 0xD0000022
1092 Error 0xD0000022
1244 Explorer.EXE
1744 SOUNDMAN.EXE
1732 AnyDVD.exe
2052 em_exec.exe
2064 atiptaxx.exe
2076 ctfmon.exe
2092 PGPtray.exe
2284 firefox.exe
1288 dwwin.exe
3740 cmd.exe
3260 drwtsn32.exe

*----> Modulliste <----*
(0000000000400000 - 0000000000a69000: C:\Programme\Mozilla Firefox\firefox.exe
(0000000000f90000 - 0000000000f97000:
C:\Programme\System\Logitech\MouseWare\System\LgWndHk.dll
(00000000018a0000 - 00000000018ab000: C:\Programme\Gemeinsame
Dateien\Logitech\Scrolling\LgMsgHk.dll
(0000000010000000 - 0000000010009000: C:\WINDOWS\system32\PGPhk.dll
(0000000020000000 - 00000000202d9000: C:\WINDOWS\system32\xpsp2res.dll
(00000000597d0000 - 0000000059824000: C:\WINDOWS\system32\NETAPI32.dll
(000000005b0f0000 - 000000005b128000: C:\WINDOWS\system32\uxtheme.dll
(0000000060020000 - 000000006002d000: C:\Programme\Mozilla
Firefox\components\jar50.dll
(0000000060070000 - 00000000600c4000: C:\Programme\Mozilla Firefox\js3250.dll
(0000000060130000 - 0000000060156000: C:\Programme\Mozilla Firefox\nspr4.dll
(0000000060160000 - 00000000601b5000: C:\Programme\Mozilla Firefox\nss3.dll
(00000000601c0000 - 00000000601f6000: C:\PROGRA~1\MOZILL~1\nssckbi.dll
(0000000060200000 - 0000000060207000: C:\Programme\Mozilla Firefox\plc4.dll
(0000000060210000 - 0000000060216000: C:\Programme\Mozilla Firefox\plds4.dll
(0000000060230000 - 000000006024a000: C:\Programme\Mozilla Firefox\smime3.dll
(0000000060250000 - 00000000602aa000: C:\Programme\Mozilla Firefox\softokn3.dll
(00000000602b0000 - 00000000602cb000: C:\Programme\Mozilla Firefox\ssl3.dll
(00000000602d0000 - 0000000060330000: C:\Programme\Mozilla Firefox\xpcom.dll
(0000000060330000 - 0000000060344000: C:\Programme\Mozilla Firefox\xpcom_compat.dll
(0000000062e10000 - 0000000062e19000: C:\WINDOWS\system32\LPK.DLL
(0000000066710000 - 0000000066769000: C:\WINDOWS\system32\hnetcfg.dll
(00000000719b0000 - 00000000719f0000: C:\WINDOWS\system32\mswsock.dll
(00000000719f0000 - 00000000719f8000: C:\WINDOWS\System32\wshtcpip.dll
(0000000071a00000 - 0000000071a08000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071a10000 - 0000000071a27000: C:\WINDOWS\system32\WS2_32.dll
(0000000071a30000 - 0000000071a3a000: C:\WINDOWS\system32\WSOCK32.dll
(0000000072c80000 - 0000000072c88000: C:\WINDOWS\system32\msacm32.drv
(0000000072c90000 - 0000000072c99000: C:\WINDOWS\system32\wdmaud.drv
(0000000072f70000 - 0000000072f96000: C:\WINDOWS\system32\WINSPOOL.DRV
(0000000074670000 - 000000007469a000: C:\WINDOWS\system32\msimtf.dll
(00000000746a0000 - 00000000746eb000: C:\WINDOWS\system32\MSCTF.dll
(0000000075250000 - 000000007527e000: C:\WINDOWS\system32\msctfime.ime
(0000000075790000 - 00000000757fb000: C:\WINDOWS\system32\USP10.dll
(0000000075f20000 - 000000007601c000: C:\WINDOWS\system32\browseui.dll
(0000000076020000 - 0000000076085000: C:\WINDOWS\system32\MSVCP60.dll
(0000000076320000 - 0000000076325000: C:\WINDOWS\system32\msimg32.dll
(0000000076330000 - 000000007634d000: C:\WINDOWS\system32\IMM32.DLL
(0000000076350000 - 000000007639a000: C:\WINDOWS\system32\comdlg32.dll
(00000000765a0000 - 00000000765bd000: C:\WINDOWS\System32\CSCDLL.dll
(0000000076620000 - 00000000766d5000: C:\WINDOWS\system32\USERENV.dll
(0000000076880000 - 0000000076905000: C:\WINDOWS\system32\CRYPTUI.dll
(0000000076940000 - 0000000076966000: C:\WINDOWS\system32\ntshrui.dll
(0000000076ad0000 - 0000000076ae1000: C:\WINDOWS\system32\ATL.DLL
(0000000076af0000 - 0000000076b1e000: C:\WINDOWS\system32\WINMM.DLL
(0000000076bf0000 - 0000000076c1e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c50000 - 0000000076c78000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076ee0000 - 0000000076f07000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076f20000 - 0000000076f4d000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076f70000 - 0000000076f78000: C:\WINDOWS\System32\winrnr.dll
(0000000076f80000 - 0000000076f86000: C:\WINDOWS\system32\rasadhlp.dll
(0000000076f90000 - 000000007700f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077010000 - 00000000770e3000: C:\WINDOWS\system32\COMRes.dll
(00000000770f0000 - 000000007717c000: C:\WINDOWS\system32\OLEAUT32.dll
(0000000077180000 - 0000000077227000: C:\WINDOWS\system32\WININET.dll
(00000000773a0000 - 00000000774a2000:
C:\WINDOWS\WinSxS\X86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\COMCTL32.dll
(00000000774b0000 - 00000000775ed000: C:\WINDOWS\system32\ole32.dll
(0000000077730000 - 000000007789c000: C:\WINDOWS\system32\shdocvw.dll
(00000000778f0000 - 00000000779e4000: C:\WINDOWS\system32\SETUPAPI.dll
(00000000779f0000 - 0000000077a46000: C:\WINDOWS\System32\cscui.dll
(0000000077a50000 - 0000000077ae5000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077af0000 - 0000000077b02000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b10000 - 0000000077b32000: C:\WINDOWS\system32\appHelp.dll
(0000000077ba0000 - 0000000077ba7000: C:\WINDOWS\system32\midimap.dll
(0000000077bb0000 - 0000000077bc5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077bd0000 - 0000000077bd8000: C:\WINDOWS\system32\VERSION.dll
(0000000077be0000 - 0000000077c38000: C:\WINDOWS\system32\msvcrt.dll
(0000000077d10000 - 0000000077da0000: C:\WINDOWS\system32\USER32.dll
(0000000077da0000 - 0000000077e4a000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e50000 - 0000000077ee1000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077ef0000 - 0000000077f36000: C:\WINDOWS\system32\GDI32.dll
(0000000077f40000 - 0000000077fb6000: C:\WINDOWS\system32\SHLWAPI.dll
(000000007c800000 - 000000007c906000: C:\WINDOWS\system32\kernel32.dll
(000000007c910000 - 000000007c9c7000: C:\WINDOWS\system32\ntdll.dll
(000000007c9d0000 - 000000007d1ee000: C:\WINDOWS\system32\SHELL32.dll

*----> Statusabbild für Threadkennung 0x8e8 <----*

eax=01c46b30 ebx=00000000 ecx=0012f188 edx=0012f288 esi=00000000 edi=00300033
eip=600a1fb1 esp=0012f178 ebp=0012f190 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00200206

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\Programme\Mozilla Firefox\js3250.dll - 
Funktion: js3250!js_CompileTokenStream
        600a1f9e 50               push    eax
        600a1f9f e80b30fdff       call    js3250!JS_ReportErrorNumber (60074faf)
        600a1fa4 83c410           add     esp,0x10
        600a1fa7 33c0             xor     eax,eax
        600a1fa9 5f               pop     edi
        600a1faa 5e               pop     esi
        600a1fab 5b               pop     ebx
        600a1fac c9               leave
        600a1fad c3               ret
        600a1fae 8b7d0c           mov     edi,[ebp+0xc]
FEHLER ->600a1fb1 8b4714           mov     eax,[edi+0x14]   
ds:0023:00300047=????????
        600a1fb4 83f8fd           cmp     eax,0xfffffffd
        600a1fb7 0f8421010000     je   js3250!js_CompileTokenStream+0x3c65
(600a20de)
        600a1fbd 83f8fe           cmp     eax,0xfffffffe
        600a1fc0 0f84f1000000     je   js3250!js_CompileTokenStream+0x3c3e
(600a20b7)
        600a1fc6 83f8ff           cmp     eax,0xffffffff
        600a1fc9 0f8487000000     je   js3250!js_CompileTokenStream+0x3bdd
(600a2056)
        600a1fcf 83f801           cmp     eax,0x1
        600a1fd2 747d             jz   js3250!js_CompileTokenStream+0x3bd8
(600a2051)
        600a1fd4 83f802           cmp     eax,0x2
        600a1fd7 7451             jz   js3250!js_CompileTokenStream+0x3bb1
(600a202a)

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** WARNING: Unable to verify checksum for C:\Programme\Mozilla Firefox\firefox.exe
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\Programme\Mozilla Firefox\firefox.exe - 
ChildEBP RetAddr  Args to Child              
0012f190 600a20ca 01c46b30 00300033 0012f304 js3250!js_CompileTokenStream+0x3b38
0012f1bc 600a2015 01c46b30 03e85a98 0012f304 js3250!js_CompileTokenStream+0x3c51
0012f1e8 600a20ca 01c46b30 03e859d8 0012f304 js3250!js_CompileTokenStream+0x3b9c
0012f214 600a207a 01c46b30 02a6bd98 0012f304 js3250!js_CompileTokenStream+0x3c51
0012f240 6009e9d6 01c46b30 02a6bd68 0012f304 js3250!js_CompileTokenStream+0x3c01
0012f264 6009e508 00000001 02a6bd68 0012f304 js3250!js_CompileTokenStream+0x55d
0012f2e0 60074394 01c46b30 01bf03b0 02a6b9f0 js3250!js_CompileTokenStream+0x8f
0012f404 600742ff 01c46b30 01bf03b0 02a6b9f0
js3250!JS_CompileUCScriptForPrincipals+0xcc
0012f428 60074b51 01c46b30 01bf03b0 02c0ab70
js3250!JS_CompileUCScriptForPrincipals+0x37
0012f458 005fa68b 01c46b30 01bf03b0 02c0ab70
js3250!JS_EvaluateUCScriptForPrincipals+0x31
0012f4c0 0068d675 03e97efc 01bf03b0 02c0ab68
firefox!nsRegionRectIterator__Reset+0x1b708
0012f5f0 0068d46e 03e97ee8 03e97efc 033d3748 firefox!nsPrintSession__Init+0x49ef8
0012f6a4 0068dc4c 03e97ee8 6030d247 03ebf250 firefox!nsPrintSession__Init+0x49cf1
0012f7e0 0044d649 00000000 00000000 03e97ee8 firefox!nsPrintSession__Init+0x4a4cf
0012f810 00457128 03ebf274 02be4528 03e97ee8 firefox!JVM_GetJSSecurityContext+0xab1c
0012f858 00453dfb 00000000 02896310 00000000
firefox!nsPrintSettings__SetShowPrintProgress+0x2feb
02896324 00000000 00000000 00000000 00000000
firefox!JVM_GetJSSecurityContext+0x112ce

*----> Raw Stack Dump <----*
000000000012f178  98 5a e8 03 38 aa b8 02 - 33 00 30 00 9e 36 7d 00 
.Z..8...3.0..6}.
000000000012f188  00 00 00 00 00 00 00 00 - bc f1 12 00 ca 20 0a 60 
............. .`
000000000012f198  30 6b c4 01 33 00 30 00 - 04 f3 12 00 d8 59 e8 03 
0k..3.0......Y..
000000000012f1a8  68 5a e8 03 98 5a e8 03 - 9a 25 0a 60 78 59 e8 03 
hZ...Z...%.`xY..
000000000012f1b8  00 00 00 00 e8 f1 12 00 - 15 20 0a 60 30 6b c4 01  .........
.`0k..
000000000012f1c8  98 5a e8 03 04 f3 12 00 - 98 bd a6 02 70 60 50 03 
.Z..........p`P.
000000000012f1d8  d8 59 e8 03 40 f2 12 00 - 35 fe 09 60 00 00 00 00 
.Y..@...5..`....
000000000012f1e8  14 f2 12 00 ca 20 0a 60 - 30 6b c4 01 d8 59 e8 03  .....
.`0k...Y..
000000000012f1f8  04 f3 12 00 68 bd a6 02 - 00 00 00 00 00 00 00 00 
....h...........
000000000012f208  f0 b9 a6 02 30 6b c4 01 - 00 00 00 00 40 f2 12 00 
....0k......@...
000000000012f218  7a 20 0a 60 30 6b c4 01 - 98 bd a6 02 04 f3 12 00  z
.`0k..........
000000000012f228  b8 bc a6 02 f0 b9 a6 02 - 30 6b c4 01 f0 b9 a6 02 
........0k......
000000000012f238  30 6b c4 01 00 00 00 00 - 64 f2 12 00 d6 e9 09 60 
0k......d......`
000000000012f248  30 6b c4 01 68 bd a6 02 - 04 f3 12 00 00 00 00 00 
0k..h...........
000000000012f258  30 6b c4 01 00 00 00 00 - 50 00 15 01 e0 f2 12 00 
0k......P.......
000000000012f268  08 e5 09 60 01 00 00 00 - 68 bd a6 02 04 f3 12 00 
...`....h.......
000000000012f278  50 00 15 01 00 00 00 00 - f0 b9 a6 02 00 00 00 00 
P...............
000000000012f288  00 00 00 00 00 00 00 00 - b0 03 bf 01 00 00 00 00 
................
000000000012f298  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000012f2a8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................

*----> Statusabbild für Threadkennung 0x8f0 <----*

eax=99ca5000 ebx=0027770c ecx=7c920833 edx=00000110 esi=000000f0 edi=00000000
eip=7c91eb94 esp=0111fe60 ebp=0111fec4 iopl=0         nv up ei ng nz ac po cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000297

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\WINDOWS\system32\ntdll.dll - 
Funktion: ntdll!KiFastSystemCallRet
        7c91eb89 90               nop
        7c91eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c91eb8b 8bd4             mov     edx,esp
        7c91eb8d 0f34             sysenter
        7c91eb8f 90               nop
        7c91eb90 90               nop
        7c91eb91 90               nop
        7c91eb92 90               nop
        7c91eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c91eb94 c3               ret
        7c91eb95 8da42400000000   lea     esp,[esp]
        7c91eb9c 8d642400         lea     esp,[esp]
        7c91eba0 90               nop
        7c91eba1 90               nop
        7c91eba2 90               nop
        7c91eba3 90               nop
        7c91eba4 90               nop
        ntdll!KiIntSystemCall:
        7c91eba5 8d542408         lea     edx,[esp+0x8]
        7c91eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\WINDOWS\system32\kernel32.dll - 
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\Programme\Mozilla Firefox\nspr4.dll - 
ChildEBP RetAddr  Args to Child              
0111fec4 7c802542 000000f0 0000ea60 00000000 ntdll!KiFastSystemCallRet
0111fed8 60147e6c 000000f0 0000ea60 002776f0 kernel32!WaitForSingleObject+0x12
0000ea60 00000000 00000000 00000000 00000000 nspr4!PR_MD_WAIT_CV+0x5c

*----> Raw Stack Dump <----*
000000000111fe60  c0 e9 91 7c db 25 80 7c - f0 00 00 00 00 00 00 00 
...|.%.|........
000000000111fe70  94 fe 11 01 f4 77 27 00 - c0 78 27 00 0c 77 27 00 
.....w'..x'..w'.
000000000111fe80  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000111fe90  10 00 00 00 00 ba 3c dc - ff ff ff ff 00 60 fd 7f 
......<......`..
000000000111fea0  00 e0 fd 7f 94 fe 11 01 - 00 10 c3 02 74 fe 11 01 
............t...
000000000111feb0  98 18 01 00 a4 ff 11 01 - f3 99 83 7c 08 26 80 7c 
...........|.&.|
000000000111fec0  00 00 00 00 d8 fe 11 01 - 42 25 80 7c f0 00 00 00 
........B%.|....
000000000111fed0  60 ea 00 00 00 00 00 00 - 60 ea 00 00 6c 7e 14 60 
`.......`...l~.`
000000000111fee0  f0 00 00 00 60 ea 00 00 - f0 76 27 00 c0 78 27 00 
....`....v'..x'.
000000000111fef0  54 ff 11 01 f0 76 27 00 - 0c 42 14 60 f4 77 27 00 
T....v'..B.`.w'.
000000000111ff00  0c 77 27 00 94 5d 59 00 - c0 45 14 60 94 5d 59 00 
.w'..]Y..E.`.]Y.
000000000111ff10  53 43 14 60 c0 78 27 00 - 80 77 27 00 f0 76 27 00 
SC.`.x'..w'..v'.
000000000111ff20  94 5d 59 00 f0 69 27 00 - 60 ce 2f 60 80 77 27 00 
.]Y..i'.`./`.w'.
000000000111ff30  94 5d 59 00 6c 79 27 00 - 1c 78 27 00 d0 7a 27 00 
.]Y.ly'..x'..z'.
000000000111ff40  98 35 31 60 c0 98 32 60 - 0a 00 00 00 01 00 00 00 
.51`..2`........
000000000111ff50  01 00 00 00 b4 ff 11 01 - 71 73 2f 60 00 00 00 00 
........qs/`....
000000000111ff60  c0 78 27 00 21 4c 14 60 - 10 78 27 00 e0 44 27 00 
.x'.!L.`.x'..D'.
000000000111ff70  e0 44 27 00 a4 d0 bf 77 - 08 7c 27 00 4b 6d 14 60 
.D'....w.|'.Km.`
000000000111ff80  c0 78 27 00 b0 a3 c0 77 - c0 78 27 00 a4 d0 bf 77 
.x'....w.x'....w
000000000111ff90  00 00 27 00 d0 7a 27 00 - 00 00 00 00 8c ff 11 01 
..'..z'.........

*----> Statusabbild für Threadkennung 0x8f4 <----*

eax=01443f20 ebx=c0000000 ecx=01500002 edx=014f0001 esi=00000000 edi=719e7558
eip=7c91eb94 esp=0157ff7c ebp=0157ffb4 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

Funktion: ntdll!KiFastSystemCallRet
        7c91eb89 90               nop
        7c91eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c91eb8b 8bd4             mov     edx,esp
        7c91eb8d 0f34             sysenter
        7c91eb8f 90               nop
        7c91eb90 90               nop
        7c91eb91 90               nop
        7c91eb92 90               nop
        7c91eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c91eb94 c3               ret
        7c91eb95 8da42400000000   lea     esp,[esp]
        7c91eb9c 8d642400         lea     esp,[esp]
        7c91eba0 90               nop
        7c91eba1 90               nop
        7c91eba2 90               nop
        7c91eba3 90               nop
        7c91eba4 90               nop
        ntdll!KiIntSystemCall:
        7c91eba5 8d542408         lea     edx,[esp+0x8]
        7c91eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0157ffb4 7c80b50b 719bd8ec 0012f20c 7c91ee18 ntdll!KiFastSystemCallRet
0157ffec 00000000 719bd5af 00169580 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000157ff7c  1b e3 91 7c 09 d6 9b 71 - 8c 01 00 00 bc ff 57 01 
...|...q......W.
000000000157ff8c  b0 ff 57 01 a4 ff 57 01 - 50 d6 9b 71 0c f2 12 00 
..W...W.P..q....
000000000157ff9c  18 ee 91 7c 80 95 16 00 - 00 00 00 00 00 00 00 00 
...|............
000000000157ffac  00 00 9b 71 d0 2c 44 01 - ec ff 57 01 0b b5 80 7c 
...q.,D...W....|
000000000157ffbc  ec d8 9b 71 0c f2 12 00 - 18 ee 91 7c 80 95 16 00 
...q.......|....
000000000157ffcc  00 d0 fd 7f 00 e6 7b 86 - c0 ff 57 01 d0 99 3f 86 
......{...W...?.
000000000157ffdc  ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 
.......|...|....
000000000157ffec  00 00 00 00 00 00 00 00 - af d5 9b 71 80 95 16 00 
...........q....
000000000157fffc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000158000c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000158001c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000158002c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000158003c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000158004c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000158005c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000158006c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000158007c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000158008c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000158009c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
00000000015800ac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................

*----> Statusabbild für Threadkennung 0x8fc <----*

eax=00961c84 ebx=00169620 ecx=02add048 edx=0167fdc0 esi=7fffffff edi=ffffffff
eip=7c91eb94 esp=0167cd44 ebp=0167cd80 iopl=0         nv up ei ng nz ac po cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000297

Funktion: ntdll!KiFastSystemCallRet
        7c91eb89 90               nop
        7c91eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c91eb8b 8bd4             mov     edx,esp
        7c91eb8d 0f34             sysenter
        7c91eb8f 90               nop
        7c91eb90 90               nop
        7c91eb91 90               nop
        7c91eb92 90               nop
        7c91eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c91eb94 c3               ret
        7c91eb95 8da42400000000   lea     esp,[esp]
        7c91eb9c 8d642400         lea     esp,[esp]
        7c91eba0 90               nop
        7c91eba1 90               nop
        7c91eba2 90               nop
        7c91eba3 90               nop
        7c91eba4 90               nop
        ntdll!KiIntSystemCall:
        7c91eba5 8d542408         lea     edx,[esp+0x8]
        7c91eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\WINDOWS\system32\mswsock.dll - 
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\WINDOWS\system32\WS2_32.dll - 
ChildEBP RetAddr  Args to Child              
0167cd80 719b5fa7 000001b0 00000184 00000000 ntdll!KiFastSystemCallRet
0167ce74 71a12e67 00000000 0167df20 00000000 mswsock+0x5fa7
0167cec4 60149979 00000000 0167df20 00000000 WS2_32!select+0xa7
00000000 00000000 00000000 00000000 00000000 nspr4+0x19979

*----> Raw Stack Dump <----*
000000000167cd44  c0 e9 91 7c 33 40 9b 71 - b0 01 00 00 01 00 00 00 
...|3@.q........
000000000167cd54  6c cd 67 01 24 ce 67 01 - 20 df 67 01 14 ce 67 01  l.g.$.g.
.g...g.
000000000167cd64  c2 98 9d 17 35 5d c5 01 - ff ff ff ff ff ff ff 7f 
....5]..........
000000000167cd74  20 96 16 00 00 00 00 00 - 00 00 00 00 74 ce 67 01  
...........t.g.
000000000167cd84  a7 5f 9b 71 b0 01 00 00 - 84 01 00 00 00 00 00 00 
._.q............
000000000167cd94  04 00 00 00 00 00 00 00 - 90 67 29 00 00 00 00 00 
.........g).....
000000000167cda4  78 01 29 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
x.).............
000000000167cdb4  01 00 00 00 19 d9 91 7c - 7b e0 80 7c ff ff ff ff 
.......|{..|....
000000000167cdc4  00 00 00 00 1c 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000167cdd4  00 00 00 00 8b e0 80 7c - d0 67 29 00 00 00 00 00 
.......|.g).....
000000000167cde4  a8 ce 67 01 dc cd 67 01 - c8 67 29 00 1c 00 00 00 
..g...g..g).....
000000000167cdf4  20 96 16 00 30 ce 67 01 - 00 00 00 00 00 00 00 00  
...0.g.........
000000000167ce04  00 00 00 00 14 ce 67 01 - 00 00 00 00 00 00 00 00 
......g.........
000000000167ce14  ff ff ff ff ff ff ff 7f - 01 00 00 00 00 00 00 00 
................
000000000167ce24  84 01 00 00 19 00 00 00 - 00 00 00 00 f0 04 00 00 
................
000000000167ce34  19 00 00 00 00 00 00 00 - f0 04 00 00 02 01 00 00 
................
000000000167ce44  5c ce 67 01 a8 04 00 00 - 02 01 00 00 d0 67 29 00 
\.g..........g).
000000000167ce54  84 ce 67 01 38 64 00 00 - 98 cd 67 01 0c 15 a0 71 
..g.8d....g....q
000000000167ce64  b4 ce 67 01 c8 71 9d 71 - 68 2e 9b 71 ff ff ff ff 
..g..q.qh..q....
000000000167ce74  c4 ce 67 01 67 2e a1 71 - 00 00 00 00 20 df 67 01 
..g.g..q.... .g.

*----> Statusabbild für Threadkennung 0x900 <----*

eax=02a015e0 ebx=011b58ac ecx=00000028 edx=8c210057 esi=000001c8 edi=00000000
eip=7c91eb94 esp=0187fe70 ebp=0187fed4 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

Funktion: ntdll!KiFastSystemCallRet
        7c91eb89 90               nop
        7c91eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c91eb8b 8bd4             mov     edx,esp
        7c91eb8d 0f34             sysenter
        7c91eb8f 90               nop
        7c91eb90 90               nop
        7c91eb91 90               nop
        7c91eb92 90               nop
        7c91eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c91eb94 c3               ret
        7c91eb95 8da42400000000   lea     esp,[esp]
        7c91eb9c 8d642400         lea     esp,[esp]
        7c91eba0 90               nop
        7c91eba1 90               nop
        7c91eba2 90               nop
        7c91eba3 90               nop
        7c91eba4 90               nop
        ntdll!KiIntSystemCall:
        7c91eba5 8d542408         lea     edx,[esp+0x8]
        7c91eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0187fed4 7c802542 000001c8 ffffffff 00000000 ntdll!KiFastSystemCallRet
0187fee8 60147e6c 000001c8 ffffffff 011b5890 kernel32!WaitForSingleObject+0x12
ffffffff 00000000 00000000 00000000 00000000 nspr4!PR_MD_WAIT_CV+0x5c

*----> Raw Stack Dump <----*
000000000187fe70  c0 e9 91 7c db 25 80 7c - c8 01 00 00 00 00 00 00 
...|.%.|........
000000000187fe80  00 00 00 00 1c 6c 1b 01 - 00 6d 1b 01 ac 58 1b 01 
.....l...m...X..
000000000187fe90  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000187fea0  10 00 00 00 00 00 00 00 - 00 00 00 00 00 60 fd 7f 
.............`..
000000000187feb0  00 a0 fd 7f 00 00 00 00 - 00 00 00 00 84 fe 87 01 
................
000000000187fec0  00 00 00 00 a4 ff 87 01 - f3 99 83 7c 08 26 80 7c 
...........|.&.|
000000000187fed0  00 00 00 00 e8 fe 87 01 - 42 25 80 7c c8 01 00 00 
........B%.|....
000000000187fee0  ff ff ff ff 00 00 00 00 - ff ff ff ff 6c 7e 14 60 
............l~.`
000000000187fef0  c8 01 00 00 ff ff ff ff - 90 58 1b 01 00 6d 1b 01 
.........X...m..
000000000187ff00  08 6b 1b 01 90 58 1b 01 - 0c 42 14 60 1c 6c 1b 01 
.k...X...B.`.l..
000000000187ff10  ac 58 1b 01 ff ff ff ff - 00 45 b2 01 ff ff ff ff 
.X.......E......
000000000187ff20  53 43 14 60 00 6d 1b 01 - a8 6b 1b 01 90 58 1b 01 
SC.`.m...k...X..
000000000187ff30  ff ff ff ff e8 6a 1b 01 - 90 a7 2f 60 a8 6b 1b 01 
.....j..../`.k..
000000000187ff40  ff ff ff ff ac 6d 1b 01 - 5c 6c 1b 01 b4 ff 87 01 
.....m..\l......
000000000187ff50  28 6f 1b 01 ff ff ff ff - 71 73 2f 60 ca c7 ee 09 
(o......qs/`....
000000000187ff60  00 6d 1b 01 21 4c 14 60 - 50 6c 1b 01 e0 44 27 00 
.m..!L.`Pl...D'.
000000000187ff70  e0 44 27 00 64 f9 77 01 - 50 56 1b 01 4b 6d 14 60 
.D'.d.w.PV..Km.`
000000000187ff80  00 6d 1b 01 b0 a3 c0 77 - 00 6d 1b 01 64 f9 77 01 
.m.....w.m..d.w.
000000000187ff90  00 00 00 00 28 6f 1b 01 - 00 00 00 00 8c ff 87 01 
....(o..........
000000000187ffa0  00 00 00 00 dc ff 87 01 - 94 5c c0 77 d8 40 be 77 
.........\.w.@.w

*----> Statusabbild für Threadkennung 0x904 <----*

eax=00000102 ebx=00000000 ecx=019afe1c edx=7c91eb94 esi=001532b0 edi=00153354
eip=7c91eb94 esp=019afe1c ebp=019aff80 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

Funktion: ntdll!KiFastSystemCallRet
        7c91eb89 90               nop
        7c91eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c91eb8b 8bd4             mov     edx,esp
        7c91eb8d 0f34             sysenter
        7c91eb8f 90               nop
        7c91eb90 90               nop
        7c91eb91 90               nop
        7c91eb92 90               nop
        7c91eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c91eb94 c3               ret
        7c91eb95 8da42400000000   lea     esp,[esp]
        7c91eb9c 8d642400         lea     esp,[esp]
        7c91eba0 90               nop
        7c91eba1 90               nop
        7c91eba2 90               nop
        7c91eba3 90               nop
        7c91eba4 90               nop
        ntdll!KiIntSystemCall:
        7c91eba5 8d542408         lea     edx,[esp+0x8]
        7c91eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\WINDOWS\system32\RPCRT4.dll - 
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
019aff80 77e56c22 019affa8 77e56a3b 001532b0 ntdll!KiFastSystemCallRet
019aff88 77e56a3b 001532b0 00000000 0012ec50 RPCRT4!I_RpcBCacheFree+0x5ea
019affa8 77e56c0a 0015e358 019affec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
019affb4 7c80b50b 00164368 00000000 0012ec50 RPCRT4!I_RpcBCacheFree+0x5d2
019affec 00000000 77e56bf0 00164368 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000019afe1c  99 e3 91 7c 03 67 e5 77 - ec 01 00 00 70 ff 9a 01 
...|.g.w....p...
00000000019afe2c  00 00 00 00 f8 4f 18 00 - 4c ff 9a 01 30 eb 2a b8 
.....O..L...0.*.
00000000019afe3c  00 00 00 00 05 c6 4d 80 - 30 ec 2a b8 30 ec 2a b8 
......M.0.*.0.*.
00000000019afe4c  00 00 00 00 02 00 00 00 - 00 00 37 86 00 03 1f 00 
..........7.....
00000000019afe5c  4c eb 2a b8 0f b4 56 80 - 00 00 00 02 30 ec 2a b8 
L.*...V.....0.*.
00000000019afe6c  13 00 00 00 cf 51 58 80 - 30 ec 2a b8 34 c8 47 86 
.....QX.0.*.4.G.
00000000019afe7c  f0 c5 47 86 a0 5d 36 86 - c4 ec 2a b8 34 c8 47 86 
..G..]6...*.4.G.
00000000019afe8c  f0 c5 47 86 00 5d 36 86 - 38 f5 df ff 66 c7 4d 80 
..G..]6.8...f.M.
00000000019afe9c  00 00 00 00 43 0d 70 80 - 28 ec 2a b8 27 04 70 80 
....C.p.(.*.'.p.
00000000019afeac  00 0d db ba 00 00 00 00 - 18 ed 2a b8 b4 f8 77 01 
..........*...w.
00000000019afebc  a0 f8 77 01 da 4a 09 00 - 00 00 00 00 00 00 00 00 
..w..J..........
00000000019afecc  06 02 00 00 a8 56 4d 86 - e8 55 36 86 40 75 ac f7 
.....VM..U6.@u..
00000000019afedc  34 ca 4d 80 00 00 00 00 - 00 00 00 00 00 00 00 00 
4.M.............
00000000019afeec  dc eb 2a b8 ff ff ff ff - 40 f5 df ff 00 00 00 00 
..*.....@.......
00000000019afefc  10 04 70 80 44 58 4d 86 - 28 ec 2a b8 00 00 00 00 
..p.DXM.(.*.....
00000000019aff0c  27 04 70 80 08 00 00 00 - 46 02 00 00 e8 1b 4e 80 
'.p.....F.....N.
00000000019aff1c  18 57 4d 86 a8 56 4d 86 - 1e 1c 4e 80 14 58 4d 86 
.WM..VM...N..XM.
00000000019aff2c  a8 56 4d 86 80 ff 9a 01 - 99 66 e5 77 4c ff 9a 01 
.VM......f.wL...
00000000019aff3c  a9 66 e5 77 ed 10 91 7c - 20 d7 16 00 68 43 16 00  .f.w...|
...hC..
00000000019aff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff 
../M.....]......

*----> Statusabbild für Threadkennung 0xa58 <----*

eax=00000102 ebx=00000000 ecx=00000102 edx=7c91eb94 esi=001532b0 edi=00153354
eip=7c91eb94 esp=021dfe1c ebp=021dff80 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

Funktion: ntdll!KiFastSystemCallRet
        7c91eb89 90               nop
        7c91eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c91eb8b 8bd4             mov     edx,esp
        7c91eb8d 0f34             sysenter
        7c91eb8f 90               nop
        7c91eb90 90               nop
        7c91eb91 90               nop
        7c91eb92 90               nop
        7c91eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c91eb94 c3               ret
        7c91eb95 8da42400000000   lea     esp,[esp]
        7c91eb9c 8d642400         lea     esp,[esp]
        7c91eba0 90               nop
        7c91eba1 90               nop
        7c91eba2 90               nop
        7c91eba3 90               nop
        7c91eba4 90               nop
        ntdll!KiIntSystemCall:
        7c91eba5 8d542408         lea     edx,[esp+0x8]
        7c91eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
021dff80 77e56c22 021dffa8 77e56a3b 001532b0 ntdll!KiFastSystemCallRet
021dff88 77e56a3b 001532b0 00000000 013d4590 RPCRT4!I_RpcBCacheFree+0x5ea
021dffa8 77e56c0a 0015e358 021dffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
021dffb4 7c80b50b 00176440 00000000 013d4590 RPCRT4!I_RpcBCacheFree+0x5d2
021dffec 00000000 77e56bf0 00176440 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000021dfe1c  99 e3 91 7c 03 67 e5 77 - ec 01 00 00 70 ff 1d 02 
...|.g.w....p...
00000000021dfe2c  00 00 00 00 e8 d7 16 00 - 4c ff 1d 02 00 00 00 00 
........L.......
00000000021dfe3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
00000000021dfe4c  00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 
................
00000000021dfe5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
00000000021dfe6c  07 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
00000000021dfe7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
00000000021dfe8c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
00000000021dfe9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
00000000021dfeac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
00000000021dfebc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
00000000021dfecc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
00000000021dfedc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
00000000021dfeec  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
00000000021dfefc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
00000000021dff0c  00 00 00 00 00 00 00 00 - 00 00 00 00 38 75 ac f7 
............8u..
00000000021dff1c  66 c7 4d 80 00 a4 3b 86 - 2f c5 4d 80 64 a6 3b 86 
f.M...;./.M.d.;.
00000000021dff2c  f8 a4 3b 86 80 ff 1d 02 - 99 66 e5 77 4c ff 1d 02 
..;......f.wL...
00000000021dff3c  a9 66 e5 77 ed 10 91 7c - 88 5f 17 00 40 64 17 00 
.f.w...|._..@d..
00000000021dff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff 
../M.....]......

*----> Statusabbild für Threadkennung 0x604 <----*

eax=7c93798d ebx=00000000 ecx=00000000 edx=7ffdfc00 esi=00000000 edi=00000000
eip=7c91eb94 esp=02e7ff9c ebp=02e7ffb4 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

Funktion: ntdll!KiFastSystemCallRet
        7c91eb89 90               nop
        7c91eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c91eb8b 8bd4             mov     edx,esp
        7c91eb8d 0f34             sysenter
        7c91eb8f 90               nop
        7c91eb90 90               nop
        7c91eb91 90               nop
        7c91eb92 90               nop
        7c91eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c91eb94 c3               ret
        7c91eb95 8da42400000000   lea     esp,[esp]
        7c91eb9c 8d642400         lea     esp,[esp]
        7c91eba0 90               nop
        7c91eba1 90               nop
        7c91eba2 90               nop
        7c91eba3 90               nop
        7c91eba4 90               nop
        ntdll!KiIntSystemCall:
        7c91eba5 8d542408         lea     edx,[esp+0x8]
        7c91eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
02e7ffb4 7c80b50b 00000000 00000000 00000000 ntdll!KiFastSystemCallRet
02e7ffec 00000000 7c93798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000002e7ff9c  5c d8 91 7c d4 79 93 7c - 01 00 00 00 ac ff e7 02 
\..|.y.|........
0000000002e7ffac  00 00 00 00 00 00 00 80 - ec ff e7 02 0b b5 80 7c 
...............|
0000000002e7ffbc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
0000000002e7ffcc  00 50 fd 7f 00 e6 7b 86 - c0 ff e7 02 d0 1f 42 86 
.P....{.......B.
0000000002e7ffdc  ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 
.......|...|....
0000000002e7ffec  00 00 00 00 00 00 00 00 - 8d 79 93 7c 00 00 00 00 
.........y.|....
0000000002e7fffc  00 00 00 00 70 08 00 00 - 01 00 00 00 00 00 00 00 
....p...........
0000000002e8000c  08 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
0000000002e8001c  00 00 00 00 00 00 00 00 - 5c 00 5c 00 3f 00 5c 00 
........\.\.?.\.
0000000002e8002c  70 00 63 00 69 00 23 00 - 76 00 65 00 6e 00 5f 00 
p.c.i.#.v.e.n._.
0000000002e8003c  38 00 30 00 38 00 36 00 - 26 00 64 00 65 00 76 00 
8.0.8.6.&.d.e.v.
0000000002e8004c  5f 00 32 00 34 00 64 00 - 35 00 26 00 73 00 75 00 
_.2.4.d.5.&.s.u.
0000000002e8005c  62 00 73 00 79 00 73 00 - 5f 00 38 00 31 00 32 00 
b.s.y.s._.8.1.2.
0000000002e8006c  61 00 31 00 30 00 34 00 - 33 00 26 00 72 00 65 00 
a.1.0.4.3.&.r.e.
0000000002e8007c  76 00 5f 00 30 00 32 00 - 23 00 33 00 26 00 32 00 
v._.0.2.#.3.&.2.
0000000002e8008c  36 00 37 00 61 00 36 00 - 31 00 36 00 61 00 26 00 
6.7.a.6.1.6.a.&.
0000000002e8009c  30 00 26 00 66 00 64 00 - 23 00 7b 00 36 00 39 00 
0.&.f.d.#.{.6.9.
0000000002e800ac  39 00 34 00 61 00 64 00 - 30 00 34 00 2d 00 39 00 
9.4.a.d.0.4.-.9.
0000000002e800bc  33 00 65 00 66 00 2d 00 - 31 00 31 00 64 00 30 00 
3.e.f.-.1.1.d.0.
0000000002e800cc  2d 00 61 00 33 00 63 00 - 63 00 2d 00 30 00 30 00 
-.a.3.c.c.-.0.0.

*----> Statusabbild für Threadkennung 0x954 <----*

eax=72c930e8 ebx=044ffef8 ecx=000000ad edx=00000000 esi=00000000 edi=7ffd6000
eip=7c91eb94 esp=044ffed0 ebp=044fff6c iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

Funktion: ntdll!KiFastSystemCallRet
        7c91eb89 90               nop
        7c91eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c91eb8b 8bd4             mov     edx,esp
        7c91eb8d 0f34             sysenter
        7c91eb8f 90               nop
        7c91eb90 90               nop
        7c91eb91 90               nop
        7c91eb92 90               nop
        7c91eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c91eb94 c3               ret
        7c91eb95 8da42400000000   lea     esp,[esp]
        7c91eb9c 8d642400         lea     esp,[esp]
        7c91eba0 90               nop
        7c91eba1 90               nop
        7c91eba2 90               nop
        7c91eba3 90               nop
        7c91eba4 90               nop
        ntdll!KiIntSystemCall:
        7c91eba5 8d542408         lea     edx,[esp+0x8]
        7c91eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\WINDOWS\system32\wdmaud.drv - 
ChildEBP RetAddr  Args to Child              
044fff6c 7c809c86 00000002 044fffa4 00000000 ntdll!KiFastSystemCallRet
044fff88 72c9312a 00000002 044fffa4 00000000 kernel32!WaitForMultipleObjects+0x18
044fffb4 7c80b50b 00000000 00150280 00150000 wdmaud!midMessage+0x348
044fffec 00000000 72c930e8 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000044ffed0  ab e9 91 7c f2 94 80 7c - 02 00 00 00 f8 fe 4f 04 
...|...|......O.
00000000044ffee0  01 00 00 00 00 00 00 00 - 00 00 00 00 80 02 15 00 
................
00000000044ffef0  00 00 00 00 00 00 00 00 - 90 05 00 00 0c 05 00 00 
................
00000000044fff00  bc 01 51 86 28 ec 39 b8 - 00 00 00 00 27 04 70 80 
..Q.(.9.....'.p.
00000000044fff10  08 00 00 00 46 02 00 00 - 14 00 00 00 01 00 00 00 
....F...........
00000000044fff20  00 00 00 00 00 00 00 00 - 10 00 00 00 20 00 51 86 
............ .Q.
00000000044fff30  54 00 51 86 00 00 00 00 - 00 60 fd 7f 00 80 fd 7f 
T.Q......`......
00000000044fff40  20 00 51 86 00 00 00 00 - f8 fe 4f 04 3c b9 4f 80  
.Q.......O.<.O.
00000000044fff50  02 00 00 00 ec fe 4f 04 - 00 00 00 00 dc ff 4f 04 
......O.......O.
00000000044fff60  f3 99 83 7c 90 95 80 7c - 00 00 00 00 88 ff 4f 04 
...|...|......O.
00000000044fff70  86 9c 80 7c 02 00 00 00 - a4 ff 4f 04 00 00 00 00 
...|......O.....
00000000044fff80  ff ff ff ff 00 00 00 00 - b4 ff 4f 04 2a 31 c9 72 
..........O.*1.r
00000000044fff90  02 00 00 00 a4 ff 4f 04 - 00 00 00 00 ff ff ff ff 
......O.........
00000000044fffa0  00 00 15 00 90 05 00 00 - 0c 05 00 00 f2 0e 70 80 
..............p.
00000000044fffb0  dc e2 91 7c ec ff 4f 04 - 0b b5 80 7c 00 00 00 00 
...|..O....|....
00000000044fffc0  80 02 15 00 00 00 15 00 - 00 00 00 00 00 80 fd 7f 
................
00000000044fffd0  00 e6 7b 86 c0 ff 4f 04 - c8 a4 3a 86 ff ff ff ff 
..{...O...:.....
00000000044fffe0  f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 
...|...|........
00000000044ffff0  00 00 00 00 e8 30 c9 72 - 00 00 00 00 00 00 00 00 
.....0.r........
0000000004500000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................

*----> Statusabbild für Threadkennung 0xf70 <----*

eax=774cd888 ebx=00007530 ecx=7c920e91 edx=00270218 esi=000002f0 edi=00000000
eip=7c91eb94 esp=045fff28 ebp=045fff8c iopl=0         nv up ei ng nz ac po cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000297

Funktion: ntdll!KiFastSystemCallRet
        7c91eb89 90               nop
        7c91eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c91eb8b 8bd4             mov     edx,esp
        7c91eb8d 0f34             sysenter
        7c91eb8f 90               nop
        7c91eb90 90               nop
        7c91eb91 90               nop
        7c91eb92 90               nop
        7c91eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c91eb94 c3               ret
        7c91eb95 8da42400000000   lea     esp,[esp]
        7c91eb9c 8d642400         lea     esp,[esp]
        7c91eba0 90               nop
        7c91eba1 90               nop
        7c91eba2 90               nop
        7c91eba3 90               nop
        7c91eba4 90               nop
        ntdll!KiIntSystemCall:
        7c91eba5 8d542408         lea     edx,[esp+0x8]
        7c91eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\WINDOWS\system32\ole32.dll - 
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
045fff8c 774cd866 000002f0 00007530 00000000 ntdll!KiFastSystemCallRet
045fffb4 7c80b50b 0318ffd8 00000000 0012f2e8 ole32!IsValidInterface+0x44d
045fffec 00000000 774cd888 0318ffd8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000045fff28  c0 e9 91 7c db 25 80 7c - f0 02 00 00 00 00 00 00 
...|.%.|........
00000000045fff38  5c ff 5f 04 50 25 80 7c - d8 ff 18 03 30 75 00 00 
\._.P%.|....0u..
00000000045fff48  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 
................
00000000045fff58  10 00 00 00 00 5d 1e ee - ff ff ff ff 00 60 fd 7f 
.....].......`..
00000000045fff68  00 f0 fa 7f 5c ff 5f 04 - 58 24 80 7c 3c ff 5f 04 
....\._.X$.|<._.
00000000045fff78  0f 24 80 7c dc ff 5f 04 - f3 99 83 7c 08 26 80 7c 
.$.|.._....|.&.|
00000000045fff88  00 00 00 00 b4 ff 5f 04 - 66 d8 4c 77 f0 02 00 00 
......_.f.Lw....
00000000045fff98  30 75 00 00 00 00 00 00 - 00 00 00 00 d8 ff 18 03 
0u..............
00000000045fffa8  00 00 4b 77 a3 d8 4c 77 - e8 f2 12 00 ec ff 5f 04 
..Kw..Lw......_.
00000000045fffb8  0b b5 80 7c d8 ff 18 03 - 00 00 00 00 e8 f2 12 00 
...|............
00000000045fffc8  d8 ff 18 03 00 f0 fa 7f - 00 e6 7b 86 c0 ff 5f 04 
..........{..._.
00000000045fffd8  18 3e 46 86 ff ff ff ff - f3 99 83 7c 18 b5 80 7c 
.>F........|...|
00000000045fffe8  00 00 00 00 00 00 00 00 - 00 00 00 00 88 d8 4c 77 
..............Lw
00000000045ffff8  d8 ff 18 03 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
0000000004600008  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
0000000004600018  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
0000000004600028  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
0000000004600038  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
0000000004600048  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
0000000004600058  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................

The thread crashed in js_FoldConstants:
 *----> Statusabbild für Threadkennung 0x8e8 <----*

eax=01c46b30 ebx=00000000 ecx=0012f188 edx=0012f288 esi=00000000 edi=00300033
eip=600a1fb1 esp=0012f178 ebp=0012f190 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00200206

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\Programme\Mozilla Firefox\js3250.dll - 
Funktion: js3250!js_CompileTokenStream
        600a1f9e 50               push    eax
        600a1f9f e80b30fdff       call    js3250!JS_ReportErrorNumber (60074faf)
        600a1fa4 83c410           add     esp,0x10
        600a1fa7 33c0             xor     eax,eax
        600a1fa9 5f               pop     edi
        600a1faa 5e               pop     esi
        600a1fab 5b               pop     ebx
        600a1fac c9               leave
        600a1fad c3               ret
        600a1fae 8b7d0c           mov     edi,[ebp+0xc]
FEHLER ->600a1fb1 8b4714           mov     eax,[edi+0x14]   
ds:0023:00300047=????????
        600a1fb4 83f8fd           cmp     eax,0xfffffffd
        600a1fb7 0f8421010000     je   js3250!js_CompileTokenStream+0x3c65
(600a20de)
        600a1fbd 83f8fe           cmp     eax,0xfffffffe
        600a1fc0 0f84f1000000     je   js3250!js_CompileTokenStream+0x3c3e
(600a20b7)
        600a1fc6 83f8ff           cmp     eax,0xffffffff
        600a1fc9 0f8487000000     je   js3250!js_CompileTokenStream+0x3bdd
(600a2056)
        600a1fcf 83f801           cmp     eax,0x1
        600a1fd2 747d             jz   js3250!js_CompileTokenStream+0x3bd8
(600a2051)
        600a1fd4 83f802           cmp     eax,0x2
        600a1fd7 7451             jz   js3250!js_CompileTokenStream+0x3bb1
(600a202a)

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** WARNING: Unable to verify checksum for C:\Programme\Mozilla Firefox\firefox.exe
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\Programme\Mozilla Firefox\firefox.exe - 
ChildEBP RetAddr  Args to Child              
js_FoldConstants:
called in case PN_LIST:
0012f190 600a20ca 01c46b30 00300033 0012f304 js3250!js_CompileTokenStream+0x3b38
js_FoldConstants:
called in case PN_TERNARY by "if (pn2 && !js_FoldConstants(cx, pn2, tc))":
0012f1bc 600a2015 01c46b30 03e85a98 0012f304 js3250!js_CompileTokenStream+0x3c51
js_FoldConstants
called in case PN_LIST:
0012f1e8 600a20ca 01c46b30 03e859d8 0012f304 js3250!js_CompileTokenStream+0x3b9c
js_FoldConstants:
0012f214 600a207a 01c46b30 02a6bd98 0012f304 js3250!js_CompileTokenStream+0x3c51
Statements:
0012f240 6009e9d6 01c46b30 02a6bd68 0012f304 js3250!js_CompileTokenStream+0x3c01
js_CompileTokenStream:
0012f264 6009e508 00000001 02a6bd68 0012f304 js3250!js_CompileTokenStream+0x55d
CompileTokenStream:
0012f2e0 60074394 01c46b30 01bf03b0 02a6b9f0 js3250!js_CompileTokenStream+0x8f

The thread crashes because the linked list passed by js_FoldConstants (case
PN_TERNARY) in pn2 (0x03e85a98) somewhere contains an invalid link pn2->pn_next
(0x00300033) !
-> default qa
QA Contact: pschwartau → general
*** Bug 265749 has been marked as a duplicate of this bug. ***
*** Bug 303875 has been marked as a duplicate of this bug. ***
not sure if it's the same, but I was hit with a crash with a stack sig of:
nsScriptSecurityManager::GetScriptPrincipal c3816d9a

see TB15221272W
ff 2.0.0.6 FoldConstantsis #186 is crasher list, but none of other other stacks appear in the top 500
George Oprica "I have not seen that crash in a long time..."

earthsound "I haven't seen that particular problem since I reported it back in 2006, afaik."

no crashes on talkback with URL www.spiegel.de have the stack listed in this summary. so closing this WFM.
Status: NEW → RESOLVED
Closed: 17 years ago
Keywords: topcrash+
Resolution: --- → WORKSFORME
Crash Signature: [@ NewOrRecycledNode] [@ js_FoldConstants] [@ JS_GetParent] [@ nsScriptSecurityManager::GetScriptPrincipal]
You need to log in before you can comment on or make changes to this bug.