Closed Bug 536809 Opened 15 years ago Closed 15 years ago

Assertion failure: (cx)->requestDepth || (cx)->thread == (cx)->runtime->gcThread

Categories

(Core :: JavaScript Engine, defect)

1.9.1 Branch
x86
Windows XP
defect
Not set
critical

Tracking

()

RESOLVED DUPLICATE of bug 536478

People

(Reporter: cbook, Unassigned)

References

()

Details

(Keywords: assertion, Whiteboard: [crashkill][crash-automation])

Assertion failure: (cx)->requestDepth || (cx)->thread == (cx)->runtime->gcThread , at c:/work/mozilla/builds/1.9.1/mozilla/js/src/jsapi.cpp:1194 Steps to reproduce: -> Latest 1.9.1 Debug Build -> Load http://www.nytimes.com/timesskimmer/ after 104 seconds or less --> Assertion failure: (cx)->requestDepth || (cx)->thread == (cx)->runtime->gcThread , at c:/work/mozilla/builds/1.9.1/mozilla/js/src/jsapi.cpp:1194 (950.e58): Break instruction exception - code 80000003 (!!! second chance !!!) eax=00000090 ebx=0736dfb0 ecx=1cdab88d edx=10313d38 esi=0ab7ff50 edi=00d103c0 eip=7c90120e esp=0ab7fdf0 ebp=0ab7fdf4 iopl=0 nv up ei pl nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202 Exploitability Classification: UNKNOWN Recommended Bug Title: Breakpoint starting at ntdll!DbgBreakPoint+0x000000000000 0000 called from js3250!JS_SetGlobalObject+0x000000000000003a (Hash=0x5f347532.0 x26206037) While a breakpoint itself is probably not exploitable, it may also be an indicat ion that an attacker is testing a target. In either case breakpoints should not exist in production code. ChildEBP RetAddr WARNING: Stack unwind information not available. Following frames may be wrong. 0ab7fdf4 004a7a1a ntdll!DbgBreakPoint 0ab7fe08 01eb27c2 js3250!JS_SetGlobalObject+0x3a 0ab7fe30 0030036a gklayout!nsDOMWorkerRunnable::Run+0x122 0ab7feac 0030601a xpcom_core!nsThreadPool::Run+0x2aa 0ab7fee8 00296b63 xpcom_core!nsThread::ProcessNextEvent+0x1fa 0ab7ff04 003050ee xpcom_core!NS_ProcessNextEvent_P+0x53 0ab7ff44 00453807 xpcom_core!nsThread::ThreadFunc+0xce 0ab7ff58 00458d53 nspr4!_PR_NativeRunThread+0xf7 0ab7ff6c 102048d1 nspr4!pr_root+0x23 0ab7ffa8 10204877 MSVCR80D!beginthreadex+0x221 0ab7ffb4 7c80b729 MSVCR80D!beginthreadex+0x1c7 0ab7ffec 00000000 kernel32!GetModuleFileNameA+0x1ba quit:
Uh, ben, that's this bug.
...I think bent meant bug 536478. :-)
Status: NEW → RESOLVED
Closed: 15 years ago
Resolution: --- → DUPLICATE
blocking1.9.1: ? → ---
Group: core-security
You need to log in before you can comment on or make changes to this bug.