Closed
Bug 542034
Opened 16 years ago
Closed 16 years ago
[Backdoor.Ulrbot] Firefox 3.6 Crash on Startup - Safe Mode doesn't work either
Categories
(Firefox :: General, defect)
Tracking
()
VERIFIED
DUPLICATE
of bug 434403
People
(Reporter: jryutzy, Unassigned)
Details
(Keywords: crash)
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; MS-RTC LM 8; MS-RTC EA 2; InfoPath.2; .NET4.0C; .NET4.0E)
Build Identifier: 3.6
Win DBG Report:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
CommandLine: "C:\Program Files\Mozilla Firefox\firefox.exe"
Symbol search path is: *** Invalid ***
****************************************************************************
* Symbol loading may be unreliable without a symbol search path. *
* Use .symfix to have the debugger choose a symbol path. *
* After setting your symbol path, use .reload to refresh symbol locations. *
****************************************************************************
Executable search path is:
ModLoad: 00400000 004e0000 firefox.exe
ModLoad: 7c900000 7c9b2000 ntdll.dll
ModLoad: 7c800000 7c8f5000 C:\WINDOWS\system32\kernel32.dll
ModLoad: 10000000 10b2f000 C:\Program Files\Mozilla Firefox\xul.dll
ModLoad: 00280000 002f3000 C:\Program Files\Mozilla Firefox\sqlite3.dll
ModLoad: 78130000 781e0000 C:\Program Files\Mozilla Firefox\MOZCRT19.dll
ModLoad: 77c10000 77c68000 C:\WINDOWS\system32\msvcrt.dll
ModLoad: 00300000 003fa000 C:\Program Files\Mozilla Firefox\js3250.dll
ModLoad: 004e0000 00509000 C:\Program Files\Mozilla Firefox\nspr4.dll
ModLoad: 77dd0000 77e6b000 C:\WINDOWS\system32\ADVAPI32.dll
ModLoad: 77e70000 77f02000 C:\WINDOWS\system32\RPCRT4.dll
ModLoad: 77fe0000 77ff1000 C:\WINDOWS\system32\Secur32.dll
ModLoad: 71ad0000 71ad9000 C:\WINDOWS\system32\WSOCK32.dll
ModLoad: 71ab0000 71ac7000 C:\WINDOWS\system32\WS2_32.dll
ModLoad: 71aa0000 71aa8000 C:\WINDOWS\system32\WS2HELP.dll
ModLoad: 76b40000 76b6d000 C:\WINDOWS\system32\WINMM.dll
ModLoad: 7e410000 7e4a1000 C:\WINDOWS\system32\USER32.dll
ModLoad: 77f10000 77f58000 C:\WINDOWS\system32\GDI32.dll
ModLoad: 00510000 00528000 C:\Program Files\Mozilla Firefox\smime3.dll
ModLoad: 00530000 005cb000 C:\Program Files\Mozilla Firefox\nss3.dll
ModLoad: 005d0000 005e4000 C:\Program Files\Mozilla Firefox\nssutil3.dll
ModLoad: 005f0000 005f7000 C:\Program Files\Mozilla Firefox\plc4.dll
ModLoad: 00600000 00607000 C:\Program Files\Mozilla Firefox\plds4.dll
ModLoad: 00610000 00630000 C:\Program Files\Mozilla Firefox\ssl3.dll
ModLoad: 7c9c0000 7d1d7000 C:\WINDOWS\system32\SHELL32.dll
ModLoad: 77f60000 77fd6000 C:\WINDOWS\system32\SHLWAPI.dll
ModLoad: 774e0000 7761d000 C:\WINDOWS\system32\ole32.dll
ModLoad: 77c00000 77c08000 C:\WINDOWS\system32\VERSION.dll
ModLoad: 73000000 73026000 C:\WINDOWS\system32\WINSPOOL.DRV
ModLoad: 763b0000 763f9000 C:\WINDOWS\system32\COMDLG32.dll
ModLoad: 773d0000 774d3000 C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\COMCTL32.dll
ModLoad: 76390000 763ad000 C:\WINDOWS\system32\IMM32.dll
ModLoad: 76380000 76385000 C:\WINDOWS\system32\MSIMG32.dll
ModLoad: 74d90000 74dfb000 C:\WINDOWS\system32\USP10.dll
ModLoad: 77120000 771ab000 C:\WINDOWS\system32\OLEAUT32.dll
ModLoad: 00630000 00637000 C:\Program Files\Mozilla Firefox\xpcom.dll
(1aa8.16ac): Break instruction exception - code 80000003 (first chance)
eax=001a1eb4 ebx=7ffdf000 ecx=00000006 edx=00000040 esi=001a1f48 edi=001a1eb4
eip=7c90120e esp=0013fb20 ebp=0013fc94 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ntdll.dll -
ntdll!DbgBreakPoint:
7c90120e cc int 3
0:000> .sympath SRV*c:\symbols*http://symbols.mozilla.org/firefox
Symbol search path is: SRV*c:\symbols*http://symbols.mozilla.org/firefox
Expanded Symbol search path is: srv*c:\symbols*http://symbols.mozilla.org/firefox
0:000> .symfix+ c:\symbols
0:000> .reload /f
Reloading current modules
............
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
........................
0:000> .logopen /t c:\firefox-debug.log
Opened log file 'c:\firefox-debug_0fac_2010-01-25_14-06-08-003.log'
0:000> .childdbg 1
Processes created by the current process will be debugged
0:000> .tlist
0n0 System Process
0n4 System
0n1360 smss.exe
0n1436 csrss.exe
0n1472 winlogon.exe
0n1516 services.exe
0n1528 lsass.exe
0n1708 ibmpmsvc.exe
0n1736 svchost.exe
0n1800 svchost.exe
0n1204 svchost.exe
0n1312 S24EvMon.exe
0n852 svchost.exe
0n1100 svchost.exe
0n1864 spoolsv.exe
0n1932 scardsvr.exe
0n1340 svchost.exe
0n448 IPSSVC.EXE
0n472 msdtc.exe
0n576 AcPrfMgrSvc.exe
0n644 schedul2.exe
0n784 wrapper.exe
0n800 dtsslsrv.exe
0n828 cvpnd.exe
0n912 DTSRVC.exe
0n940 EvtEng.exe
0n1000 inetinfo.exe
0n1044 iviRegMgr.exe
0n1180 java.exe
0n2364 mdm.exe
0n2420 mfevtps.exe
0n2440 mnmsrvc.exe
0n2476 NetCfgSv.EXE
0n2488 rundll32.exe
0n2504 nvsvc32.exe
0n2516 omtsreco.exe
0n2592 pdisrvc.exe
0n2608 wrapper.exe
0n2652 RegSrvc.exe
0n3072 sqlwriter.exe
0n3192 sgvrfy32.exe
0n3432 java.exe
0n3440 tvt_reg_monitor_svc.exe
0n3588 TPHDEXLG.exe
0n3728 CAPM5RSK.EXE
0n3808 TpKmpSvc.exe
0n4016 rrpservice.exe
0n292 rrservice.exe
0n352 tvtsched.exe
0n616 UpdateMonitor.exe
0n632 CAPM5SWK.EXE
0n876 vmware-ufad.exe
0n1612 vmware-authd.exe
0n1996 logmon.exe
0n2152 vmount2.exe
0n2176 vmnat.exe
0n2868 AcSvc.exe
0n2944 CcmExec.exe
0n3060 mqsvc.exe
0n3940 SUService.exe
0n2988 vmnetdhcp.exe
0n3148 mqtgsvc.exe
0n2132 AgentService.exe
0n2692 APNDNProxy.exe
0n4528 SvcGuiHlpr.exe
0n5016 Core_Service.exe
0n5084 APFirstAidHost.exe
0n5128 APWebGrbHost.exe
0n5156 ssonsvr.exe
0n6064 alg.exe
0n4216 wmiprvse.exe
0n5976 explorer.exe
0n4080 Dot1XCfg.exe
0n4232 TfsComProviderSvr.exe
0n2756 TPOSDSVC.exe
0n2296 EZEJMNAP.EXE
0n1600 TpShocks.exe
0n3264 TpScrLk.exe
0n3676 LPMGR.EXE
0n3008 rundll32.exe
0n3340 TPONSCR.exe
0n3356 TpScrex.exe
0n928 SynTPLpr.exe
0n5596 SynTPEnh.exe
0n5788 tpfnf7sp.exe
0n4744 smax4pnp.exe
0n4784 LPMLCHK.EXE
0n4848 wpCtrl.exe
0n4500 rundll32.exe
0n3248 ACTray.exe
0n1200 shstat.exe
0n5436 Floater.exe
0n5360 ACWLIcon.exe
0n1508 ProcessLasso.exe
0n4364 ProcessGovernor.exe
0n4388 ctfmon.exe
0n4428 DesktopSearchService.exe
0n5208 HookManager.exe
0n5520 wmiprvse.exe
0n1236 vpngui.exe
0n5808 UdaterUI.exe
0n5568 wuauclt.exe
0n3188 Communicatork9.exe
0n3608 dllhost.exe
0n5948 dllhost.exe
0n5892 dllhost.exe
0n3836 wmiprvse.exe
0n4888 DESKTO~1.EXE
0n8084 rsvp.exe
0n7124 Notepad2.exe
0n2168 iexplore.exe
0n8056 iexplore.exe
0n2760 mmc.exe
0n7616 WINWORD.EXE
0n6448 devenv.exe
0n7024 WPFFontCache_v0400.exe
0n2144 QTAgent32.exe
0n3344 regedit.exe
0n5472 Notepad2.exe
0n3480 mstsc.exe
0n8136 OUTLOOK.EXE
0n3944 dllhost.exe
0n6916 dllhost.exe
0n7872 mmc.exe
0n4064 msiexec.exe
0n4012 windbg.exe
0n6824 firefox.exe
0:000> sxn gp
0:000> |* lm
start end module name
00280000 002f3000 sqlite3 (private pdb symbols) c:\symbols\sqlite3.pdb\6F74FD39CF1044ABA2C446D0B30A60B51\sqlite3.pdb
00300000 003fa000 js3250 (private pdb symbols) c:\symbols\js3250.pdb\6BF65EDB9FA747E680672D6C2FE8D2202\js3250.pdb
00400000 004e0000 firefox (private pdb symbols) c:\symbols\firefox.pdb\ED3EBF63531640798D9AE98B04A4FD0F2\firefox.pdb
004e0000 00509000 nspr4 (private pdb symbols) c:\symbols\nspr4.pdb\E33668709C08413AA86C08F91C7C4B8F1\nspr4.pdb
00510000 00528000 smime3 (private pdb symbols) c:\symbols\smime3.pdb\68F3D6650D5647E58E78389A97BC6D8D1\smime3.pdb
00530000 005cb000 nss3 (private pdb symbols) c:\symbols\nss3.pdb\AE56D56A749045B398FD0C34A620829E1\nss3.pdb
005d0000 005e4000 nssutil3 (private pdb symbols) c:\symbols\nssutil3.pdb\DB61F2CA17B543F0A8B0AABB61C15B6C1\nssutil3.pdb
005f0000 005f7000 plc4 (private pdb symbols) c:\symbols\plc4.pdb\8294795A98C843D1B1187D0FCFDEA74F1\plc4.pdb
00600000 00607000 plds4 (private pdb symbols) c:\symbols\plds4.pdb\99862C49C35B4D8FB9D03CE9CB7139751\plds4.pdb
00610000 00630000 ssl3 (private pdb symbols) c:\symbols\ssl3.pdb\17E19D09DB45474DAAB33AECC65565431\ssl3.pdb
00630000 00637000 xpcom (private pdb symbols) c:\symbols\xpcom.pdb\4BE824E5CCF9420E99DD5ADA4C3DCAD52\xpcom.pdb
10000000 10b2f000 xul (private pdb symbols) c:\symbols\xul.pdb\4381CFB3FC4A4A8D92FDFE30FCCEA6352\xul.pdb
71aa0000 71aa8000 WS2HELP (pdb symbols) c:\symbols\ws2help.pdb\537CE830EFE94FE3A92C95153BDB71462\ws2help.pdb
71ab0000 71ac7000 WS2_32 (pdb symbols) c:\symbols\ws2_32.pdb\07AC08831007408D919E0CCF1EA499BF2\ws2_32.pdb
71ad0000 71ad9000 WSOCK32 (pdb symbols) c:\symbols\wsock32.pdb\E7B6C17E43604822813D3B65499B6C0F2\wsock32.pdb
73000000 73026000 WINSPOOL (pdb symbols) c:\symbols\winspool.pdb\97A6ECC94EA7450CA7D375BD9DFFCA5E2\winspool.pdb
74d90000 74dfb000 USP10 (pdb symbols) c:\symbols\usp10.pdb\14C8D7F8AB3C48A4B95A73BAC9A6B02C1\usp10.pdb
76380000 76385000 MSIMG32 (pdb symbols) c:\symbols\msimg32.pdb\E28D4258D66B428EB5D74279EB57A08F2\msimg32.pdb
76390000 763ad000 IMM32 (pdb symbols) c:\symbols\imm32.pdb\2C17A49C251B4C8EB9E2AD13D7D9EA162\imm32.pdb
763b0000 763f9000 COMDLG32 (pdb symbols) c:\symbols\comdlg32.pdb\4FCBEAD63D7345998C1F92D8DBB0DC272\comdlg32.pdb
76b40000 76b6d000 WINMM (pdb symbols) c:\symbols\winmm.pdb\4FC9F179964745CAA3C78D6FADFC28322\winmm.pdb
77120000 771ab000 OLEAUT32 (pdb symbols) c:\symbols\oleaut32.pdb\659B514A88A24FB6ADB4F29A9BB066E42\oleaut32.pdb
773d0000 774d3000 COMCTL32 (pdb symbols) c:\symbols\MicrosoftWindowsCommon-Controls-6.0.2600.2982-comctl32.pdb\C0A72EE9578847AAB7770CF02FFED0941\MicrosoftWindowsCommon-Controls-6.0.2600.2982-comctl32.pdb
774e0000 7761d000 ole32 (pdb symbols) c:\symbols\ole32.pdb\683B65B246F4418796D2EE6D4C55EB112\ole32.pdb
77c00000 77c08000 VERSION (pdb symbols) c:\symbols\version.pdb\180A90C40384463E82DDC45B2C8AB76E2\version.pdb
77c10000 77c68000 msvcrt (pdb symbols) c:\symbols\msvcrt.pdb\A678F3C30DED426B839032B996987E381\msvcrt.pdb
77dd0000 77e6b000 ADVAPI32 (pdb symbols) c:\symbols\advapi32.pdb\153E2CE004564DA39D338E2AF40947A82\advapi32.pdb
77e70000 77f02000 RPCRT4 (pdb symbols) c:\symbols\rpcrt4.pdb\712BCFE9A92941E19F433CEF1BA972C82\rpcrt4.pdb
77f10000 77f58000 GDI32 (pdb symbols) c:\symbols\gdi32.pdb\39A70B1CB0294D2CAAE3582449420D622\gdi32.pdb
77f60000 77fd6000 SHLWAPI (pdb symbols) c:\symbols\shlwapi.pdb\858772C19EB14201A80F9B61D5DB69B12\shlwapi.pdb
77fe0000 77ff1000 Secur32 (pdb symbols) c:\symbols\secur32.pdb\3885BDC7EBF54106A5642E3CD45F60FE2\secur32.pdb
78130000 781e0000 MOZCRT19 (private pdb symbols) c:\symbols\MOZCRT19.pdb\0C16779262344F49BC07B2530B994EA71\MOZCRT19.pdb
7c800000 7c8f5000 kernel32 (pdb symbols) c:\symbols\kernel32.pdb\35CC603450F44929AEB29742698380BC2\kernel32.pdb
7c900000 7c9b2000 ntdll (pdb symbols) c:\symbols\ntdll.pdb\562E2BF3593E46DB8A5D3F50A5E025E92\ntdll.pdb
7c9c0000 7d1d7000 SHELL32 (pdb symbols) c:\symbols\shell32.pdb\64CF10584B774D71BBD708BE7D8A05602\shell32.pdb
7e410000 7e4a1000 USER32 (pdb symbols) c:\symbols\user32.pdb\F049F32D0C8948C0B48F7A065FC5C1B12\user32.pdb
0:000> g
ModLoad: 5cb70000 5cb96000 C:\WINDOWS\system32\ShimEng.dll
ModLoad: 5ad70000 5ada8000 C:\WINDOWS\system32\uxtheme.dll
ModLoad: 59a60000 59b01000 C:\WINDOWS\system32\dbghelp.dll
ModLoad: 74720000 7476b000 C:\WINDOWS\system32\MSCTF.dll
ModLoad: 63000000 63014000 C:\WINDOWS\system32\SynTPFcs.dll
ModLoad: 01520000 01683000 C:\WINDOWS\system32\svrltmgr.dll
ModLoad: 71b20000 71b32000 C:\WINDOWS\system32\MPR.dll
ModLoad: 76bf0000 76bfb000 C:\WINDOWS\system32\PSAPI.DLL
ModLoad: 74c80000 74cac000 C:\WINDOWS\system32\OLEACC.DLL
ModLoad: 76080000 760e5000 C:\WINDOWS\system32\MSVCP60.dll
ModLoad: 77920000 77a13000 C:\WINDOWS\system32\SETUPAPI.dll
ModLoad: 77b40000 77b62000 C:\WINDOWS\system32\apphelp.dll
ModLoad: 755c0000 755ee000 C:\WINDOWS\system32\msctfime.ime
ModLoad: 76fd0000 7704f000 C:\WINDOWS\system32\CLBCATQ.DLL
ModLoad: 77050000 77115000 C:\WINDOWS\system32\COMRes.dll
ModLoad: 01900000 01908000 C:\Program Files\Mozilla Firefox\components\browserdirprovider.dll
ModLoad: 71a50000 71a8f000 C:\WINDOWS\system32\mswsock.dll
ModLoad: 662b0000 66308000 C:\WINDOWS\system32\hnetcfg.dll
ModLoad: 71a90000 71a98000 C:\WINDOWS\System32\wshtcpip.dll
ModLoad: 76d60000 76d79000 C:\WINDOWS\system32\iphlpapi.dll
ModLoad: 73ce0000 73d01000 C:\WINDOWS\system32\t2embed.dll
ModLoad: 73dc0000 73dc3000 C:\WINDOWS\system32\LZ32.dll
ModLoad: 01d60000 01d84000 C:\Program Files\Mozilla Firefox\components\brwsrcmp.dll
ModLoad: 76f20000 76f47000 C:\WINDOWS\system32\DNSAPI.dll
ModLoad: 76fb0000 76fb8000 C:\WINDOWS\System32\winrnr.dll
ModLoad: 76f60000 76f8c000 C:\WINDOWS\system32\WLDAP32.dll
ModLoad: 751d0000 751ee000 C:\WINDOWS\system32\wshbth.dll
ModLoad: 20000000 202c5000 C:\WINDOWS\system32\xpsp2res.dll
ModLoad: 01da0000 01dde000 C:\Program Files\Portrait Displays\Pivot Software\winphook.dll
ModLoad: 77690000 776b1000 C:\WINDOWS\system32\NTMARTA.DLL
ModLoad: 71bf0000 71c03000 C:\WINDOWS\system32\SAMLIB.dll
ModLoad: 73b30000 73b45000 C:\WINDOWS\system32\mscms.dll
(1aa8.16ac): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=0a214800 ebx=035477a0 ecx=0019e9d0 edx=00000000 esi=03dffffc edi=0447a744
eip=781477a0 esp=0013f688 ebp=0013f690 iopl=0 nv dn ei pl nz ac po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010612
MOZCRT19!TrailUpVec+0x6c:
781477a0 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
0:000> |* ~* kp
. 0 Id: 1aa8.16ac Suspend: 1 Teb: 7ffde000 Unfrozen
ChildEBP RetAddr
0013f690 100fec74 MOZCRT19!TrailUpVec+0x6c [F:\SP\vctools\crt_bld\SELF_X86\crt\src\intel\memcpy.asm @ 407]
0013f6c8 100f1deb xul!nsAString_internal::Assign(wchar_t * data = 0x00000000 "", unsigned int length = <Memory access error>)+0xb4 [e:\builds\moz2_slave\win32_build\build\xpcom\string\src\nstsubstring.cpp @ 362]
0013f6d8 10368ed7 xul!nsAString_internal::Assign(class nsAString_internal * str = 0x00000000)+0x1b [e:\builds\moz2_slave\win32_build\build\xpcom\string\src\nstsubstring.cpp @ 422]
*** WARNING: Unable to verify checksum for C:\WINDOWS\system32\svrltmgr.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\svrltmgr.dll -
0013f708 016206e6 xul!nsWindow::SetTitle+0x1a2180
WARNING: Stack unwind information not available. Following frames may be wrong.
0013f740 1008b29f svrltmgr!DllCanUnloadNow+0x145ba
0013f914 1003d57a xul!nsDocShell::SetupNewViewer(class nsIContentViewer * aNewViewer = 0x109a90d4)+0x40f [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdocshell.cpp @ 7298]
0013f92c 100927e5 xul!nsDocShell::Embed(class nsIContentViewer * aContentViewer = 0x037858c0, char * aCommand = 0x10965a66 "", class nsISupports * aExtraInfo = 0x00000000)+0x1d [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdocshell.cpp @ 5472]
0013f968 101ab57a xul!nsDocShell::CreateContentViewer(char * aContentType = 0x10a04128 ".u0???", class nsIRequest * request = 0x10a04148, class nsIStreamListener ** aContentHandler = 0x10a04188)+0x1a5 [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdocshell.cpp @ 7084]
0013f998 1005dc5b xul!nsDSURIContentListener::DoContent(char * aContentType = 0x024e19e8 "application/xhtml+xml", int aIsContentPreferred = 0, class nsIRequest * request = 0x038630e0, class nsIStreamListener ** aContentHandler = 0x038fa61c, int * aAbortProcess = 0x038630e0)+0x71 [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdsuricontentlistener.cpp @ 139]
0013f9f0 1007076c xul!nsDocumentOpenInfo::TryContentListener(class nsIURIContentListener * aListener = 0x038fa628, class nsIChannel * aChannel = 0x038630e0)+0xe8 [e:\builds\moz2_slave\win32_build\build\uriloader\base\nsuriloader.cpp @ 738]
0013fbd0 1005450f xul!nsDocumentOpenInfo::DispatchContent(class nsIRequest * request = 0x038630e0, class nsISupports * aCtxt = 0x0013fbf0)+0x1bc [e:\builds\moz2_slave\win32_build\build\uriloader\base\nsuriloader.cpp @ 434]
0013fbf0 10035613 xul!nsDocumentOpenInfo::OnStartRequest(class nsIRequest * request = 0x00000000, class nsISupports * aCtxt = 0x00000000)+0x90 [e:\builds\moz2_slave\win32_build\build\uriloader\base\nsuriloader.cpp @ 280]
0013fc04 101a56ed xul!nsJARChannel::OnStartRequest(class nsIRequest * req = 0x038ff744, class nsISupports * ctx = 0x035908e8)+0x1b [e:\builds\moz2_slave\win32_build\build\modules\libjar\nsjarchannel.cpp @ 867]
0013fc1c 101a07e5 xul!nsInputStreamPump::OnStateStart(void)+0x35 [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nsinputstreampump.cpp @ 443]
0013fc30 1008f561 xul!nsInputStreamPump::OnInputStreamReady(class nsIAsyncInputStream * stream = 0x035908e8)+0x56 [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nsinputstreampump.cpp @ 395]
0013fc40 100f9487 xul!nsInputStreamReadyEvent::Run(void)+0x1d [e:\builds\moz2_slave\win32_build\build\xpcom\io\nsstreamutils.cpp @ 192]
0013fc68 100c592a xul!nsThread::ProcessNextEvent(int mayWait = <Memory access error>, int * result = <Memory access error>)+0x247 [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 533]
0013fc80 1022bd73 xul!nsBaseAppShell::Run(void)+0x4a [e:\builds\moz2_slave\win32_build\build\widget\src\xpwidgets\nsbaseappshell.cpp @ 169]
0013fc8c 1002f83c xul!nsAppStartup::Run(void)+0x1e [e:\builds\moz2_slave\win32_build\build\toolkit\components\startup\src\nsappstartup.cpp @ 183]
0013fc94 0081f090 xul!XRE_main(int argc = 7, char ** argv = 0x00000000, struct nsXREAppData * aAppData = 0x00000000)+0xe1b [e:\builds\moz2_slave\win32_build\build\toolkit\xre\nsapprunner.cpp @ 3507]
1 Id: 1aa8.1c18 Suspend: 1 Teb: 7ffdd000 Unfrozen
ChildEBP RetAddr
00f5ff28 7c90df5a ntdll!KiFastSystemCallRet
00f5ff2c 7c8025cb ntdll!ZwWaitForSingleObject+0xc
00f5ff90 7c802532 kernel32!WaitForSingleObjectEx+0xa8
00f5ffa4 1025328b kernel32!WaitForSingleObject+0x12
00f5ffb4 7c80b699 xul!google_breakpad::ExceptionHandler::ExceptionHandlerThreadMain(void * lpParameter = 0x00000000)+0x13 [e:\builds\moz2_slave\win32_build\build\toolkit\crashreporter\google-breakpad\src\client\windows\handler\exception_handler.cc @ 279]
00f5ffec 00000000 kernel32!BaseThreadStart+0x37
2 Id: 1aa8.215c Suspend: 1 Teb: 7ffdb000 Unfrozen
ChildEBP RetAddr
018afee8 7c90d21a ntdll!KiFastSystemCallRet
018afeec 7c8023ed ntdll!NtDelayExecution+0xc
018aff44 7c802451 kernel32!SleepEx+0x61
018aff54 015f77ab kernel32!Sleep+0xf
WARNING: Stack unwind information not available. Following frames may be wrong.
018aff7c 01630a0c svrltmgr+0xd77ab
018affb4 7c80b699 svrltmgr!DllCanUnloadNow+0x248e0
018affec 00000000 kernel32!BaseThreadStart+0x37
3 Id: 1aa8.fb8 Suspend: 1 Teb: 7ffdc000 Unfrozen
ChildEBP RetAddr
017afbe4 7c90d21a ntdll!KiFastSystemCallRet
017afbe8 7c8023ed ntdll!NtDelayExecution+0xc
017afc40 7c802451 kernel32!SleepEx+0x61
017afc50 015dc713 kernel32!Sleep+0xf
WARNING: Stack unwind information not available. Following frames may be wrong.
017aff7c 01630a0c svrltmgr+0xbc713
017affb4 7c80b699 svrltmgr!DllCanUnloadNow+0x248e0
017affec 00000000 kernel32!BaseThreadStart+0x37
4 Id: 1aa8.20a8 Suspend: 1 Teb: 7ffda000 Unfrozen
ChildEBP RetAddr
01a4ff78 7c90da4a ntdll!KiFastSystemCallRet
01a4ff7c 71a5d320 ntdll!NtRemoveIoCompletion+0xc
01a4ffb4 7c80b699 mswsock!SockAsyncThread+0x5a
01a4ffec 00000000 kernel32!BaseThreadStart+0x37
5 Id: 1aa8.2154 Suspend: 1 Teb: 7ffd9000 Unfrozen
ChildEBP RetAddr
01b4cc34 7c90df5a ntdll!KiFastSystemCallRet
01b4cc38 71a5402b ntdll!ZwWaitForSingleObject+0xc
01b4cc74 71a55fa7 mswsock!SockWaitForSingleObject+0x1a0
01b4cd68 71ab2e67 mswsock!WSPSelect+0x25f
01b4cdb8 004fb6dd WS2_32!select+0xb8
01b4fe18 100a1622 nspr4!_PR_MD_PR_POLL(struct PRPollDesc * pds = <Memory access error>, int npds = <Memory access error>, unsigned int timeout = <Memory access error>)+0x38d [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w32poll.c @ 279]
01b4fe3c 100a170b xul!nsSocketTransportService::Poll(int wait = 0, unsigned int * interval = 0x00000000)+0x62 [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nssockettransportservice2.cpp @ 355]
01b4fe64 100a6151 xul!nsSocketTransportService::DoPollIteration(int wait = <Memory access error>)+0xab [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nssockettransportservice2.cpp @ 661]
01b4fe74 100f95ed xul!nsSocketTransportService::OnProcessNextEvent(class nsIThreadInternal * thread = <Memory access error>, int mayWait = <Memory access error>, unsigned int depth = <Memory access error>)+0x51 [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nssockettransportservice2.cpp @ 539]
01b4fe9c 100757b4 xul!nsThread::ProcessNextEvent(int mayWait = <Memory access error>, int * result = <Memory access error>)+0x3ad [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 508]
01b4febc 100580c8 xul!NS_ProcessPendingEvents_P(class nsIThread * thread = 0x0080c008, unsigned int timeout = 0x81eba0)+0x25 [e:\builds\moz2_slave\win32_build\build\obj-firefox\xpcom\build\nsthreadutils.cpp @ 200]
01b4feec 100f9487 xul!nsSocketTransportService::Run(void)+0xa0 [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nssockettransportservice2.cpp @ 581]
01b4ff14 1005814a xul!nsThread::ProcessNextEvent(int mayWait = <Memory access error>, int * result = <Memory access error>)+0x247 [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 533]
00000000 00000000 xul!NS_ProcessNextEvent_P(class nsIThread * thread = <Memory access error>, int mayWait = <Memory access error>)+0x1b [e:\builds\moz2_slave\win32_build\build\obj-firefox\xpcom\build\nsthreadutils.cpp @ 250]
6 Id: 1aa8.2160 Suspend: 1 Teb: 7ffd8000 Unfrozen
ChildEBP RetAddr
01c4fdec 7c90df4a ntdll!KiFastSystemCallRet
01c4fdf0 7c8094fe ntdll!ZwWaitForMultipleObjects+0xc
01c4fe8c 7c80a085 kernel32!WaitForMultipleObjectsEx+0x12c
01c4fea8 1024b2a6 kernel32!WaitForMultipleObjects+0x18
01c4feec 100f9487 xul!nsNotifyAddrListener::Run(void)+0x68 [e:\builds\moz2_slave\win32_build\build\netwerk\system\win32\nsnotifyaddrlistener.cpp @ 186]
01c4ff14 1005814a xul!nsThread::ProcessNextEvent(int mayWait = <Memory access error>, int * result = <Memory access error>)+0x247 [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 533]
00000000 00000000 xul!NS_ProcessNextEvent_P(class nsIThread * thread = <Memory access error>, int mayWait = <Memory access error>)+0x1b [e:\builds\moz2_slave\win32_build\build\obj-firefox\xpcom\build\nsthreadutils.cpp @ 250]
7 Id: 1aa8.2170 Suspend: 1 Teb: 7ffd6000 Unfrozen
ChildEBP RetAddr
01fffe6c 7c90df5a ntdll!KiFastSystemCallRet
01fffe70 7c8025cb ntdll!ZwWaitForSingleObject+0xc
01fffed4 7c802532 kernel32!WaitForSingleObjectEx+0xa8
01fffee8 004f9cbb kernel32!WaitForSingleObject+0x12
01ffff04 004f5c29 nspr4!_PR_MD_WAIT_CV(struct _MDCVar * cv = 0xffffffff, struct _MDLock * lock = 0x00000000, unsigned int timeout = 0)+0x8b [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w95cv.c @ 282]
01ffff1c 004f5d22 nspr4!_PR_WaitCondVar(struct PRThread * thread = 0x10021ddc, struct PRCondVar * cvar = 0x00005eb1, struct PRLock * lock = 0x00000000, unsigned int timeout = 0x38f5ff0)+0x59 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 205]
01ffff34 1025449e nspr4!PR_WaitCondVar(struct PRCondVar * cvar = 0x10021ddc, unsigned int timeout = 0x5eb1)+0x22 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 547]
01ffff50 004f64fb xul!XPCJSRuntime::WatchdogMain(void * arg = 0x10021ddc)+0x3d [e:\builds\moz2_slave\win32_build\build\js\src\xpconnect\src\xpcjsruntime.cpp @ 806]
01ffff6c 004f863d nspr4!_PR_NativeRunThread(void * arg = 0x78132cb6)+0xdb [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\pruthr.c @ 448]
01ffff74 78132c28 nspr4!pr_root(void * arg = 0x78132cb6)+0xd [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w95thred.c @ 122]
01ffffac 78132cb6 MOZCRT19!_callthreadstartex(void)+0x48 [e:\builds\moz2_slave\win32_build\build\obj-firefox\memory\jemalloc\crtsrc\threadex.c @ 348]
01ffffb4 7c80b699 MOZCRT19!_threadstartex(void * ptd = 0x00000000)+0x66 [e:\builds\moz2_slave\win32_build\build\obj-firefox\memory\jemalloc\crtsrc\threadex.c @ 326]
01ffffec 00000000 kernel32!BaseThreadStart+0x37
8 Id: 1aa8.2174 Suspend: 1 Teb: 7ffd7000 Unfrozen
ChildEBP RetAddr
01d5fe68 7c90df5a ntdll!KiFastSystemCallRet
01d5fe6c 7c8025cb ntdll!ZwWaitForSingleObject+0xc
01d5fed0 7c802532 kernel32!WaitForSingleObjectEx+0xa8
01d5fee4 004f9cbb kernel32!WaitForSingleObject+0x12
01d5ff00 004f5c29 nspr4!_PR_MD_WAIT_CV(struct _MDCVar * cv = 0xffffffff, struct _MDLock * lock = 0x00000000, unsigned int timeout = 0)+0x8b [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w95cv.c @ 282]
01d5ff18 004f5d22 nspr4!_PR_WaitCondVar(struct PRThread * thread = 0x8b000028, struct PRCondVar * cvar = 0x8b0c247c, struct PRLock * lock = 0x1c478df0, unsigned int timeout = 0x6c15ff50)+0x59 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 205]
01d5ff30 003012c8 nspr4!PR_WaitCondVar(struct PRCondVar * cvar = 0x8b000028, unsigned int timeout = 0x8b0c247c)+0x22 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 547]
01d5ff48 0030129a js3250!JSBackgroundThread::work(void)+0x28 [e:\builds\moz2_slave\win32_build\build\js\src\jstask.cpp @ 93]
01d5ff50 004f64fb js3250!start(void * arg = 0x78132cb6)+0xa [e:\builds\moz2_slave\win32_build\build\js\src\jstask.cpp @ 43]
01d5ff6c 004f863d nspr4!_PR_NativeRunThread(void * arg = 0x78132cb6)+0xdb [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\pruthr.c @ 448]
01d5ff74 78132c28 nspr4!pr_root(void * arg = 0x78132cb6)+0xd [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w95thred.c @ 122]
01d5ffac 78132cb6 MOZCRT19!_callthreadstartex(void)+0x48 [e:\builds\moz2_slave\win32_build\build\obj-firefox\memory\jemalloc\crtsrc\threadex.c @ 348]
01d5ffb4 7c80b699 MOZCRT19!_threadstartex(void * ptd = 0x00000000)+0x66 [e:\builds\moz2_slave\win32_build\build\obj-firefox\memory\jemalloc\crtsrc\threadex.c @ 326]
01d5ffec 00000000 kernel32!BaseThreadStart+0x37
9 Id: 1aa8.217c Suspend: 1 Teb: 7ffd5000 Unfrozen
ChildEBP RetAddr
022ffdf8 7c90df5a ntdll!KiFastSystemCallRet
022ffdfc 7c8025cb ntdll!ZwWaitForSingleObject+0xc
022ffe60 7c802532 kernel32!WaitForSingleObjectEx+0xa8
022ffe74 004f9cbb kernel32!WaitForSingleObject+0x12
022ffe90 004f5c29 nspr4!_PR_MD_WAIT_CV(struct _MDCVar * cv = 0xffffffff, struct _MDLock * lock = 0x00000000, unsigned int timeout = 0)+0x8b [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w95cv.c @ 282]
022ffea8 004f5d22 nspr4!_PR_WaitCondVar(struct PRThread * thread = 0x100f9487, struct PRCondVar * cvar = 0x0083d6c0, struct PRLock * lock = 0x10a992e8, unsigned int timeout = 0x22fff28)+0x59 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 205]
022ffec0 100c860b nspr4!PR_WaitCondVar(struct PRCondVar * cvar = 0x100f9487, unsigned int timeout = 0x83d6c0)+0x22 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 547]
022ffeec 100f9487 xul!TimerThread::Run(void)+0x9b [e:\builds\moz2_slave\win32_build\build\xpcom\threads\timerthread.cpp @ 344]
022fff14 1005814a xul!nsThread::ProcessNextEvent(int mayWait = <Memory access error>, int * result = <Memory access error>)+0x247 [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 533]
00000000 00000000 xul!NS_ProcessNextEvent_P(class nsIThread * thread = <Memory access error>, int mayWait = <Memory access error>)+0x1b [e:\builds\moz2_slave\win32_build\build\obj-firefox\xpcom\build\nsthreadutils.cpp @ 250]
10 Id: 1aa8.1ad8 Suspend: 1 Teb: 7ffd4000 Unfrozen
ChildEBP RetAddr
027ffdd4 7c90df5a ntdll!KiFastSystemCallRet
027ffdd8 7c8025cb ntdll!ZwWaitForSingleObject+0xc
027ffe3c 7c802532 kernel32!WaitForSingleObjectEx+0xa8
027ffe50 004f9cbb kernel32!WaitForSingleObject+0x12
027ffe6c 004f5c29 nspr4!_PR_MD_WAIT_CV(struct _MDCVar * cv = 0xffffffff, struct _MDLock * lock = 0x00000000, unsigned int timeout = 0)+0x8b [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w95cv.c @ 282]
027ffe84 004f5a13 nspr4!_PR_WaitCondVar(struct PRThread * thread = 0x100f9487, struct PRCondVar * cvar = 0x025d7a84, struct PRLock * lock = 0x10a992e8, unsigned int timeout = 0x27fff28)+0x59 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 205]
027ffea0 1008445c nspr4!PR_Wait(struct PRMonitor * mon = 0x100f9487, unsigned int ticks = 0x25d7a84)+0x33 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\prmon.c @ 184]
027ffeec 100f9487 xul!nsThreadPool::Run(void)+0x13c [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthreadpool.cpp @ 211]
027fff14 1005814a xul!nsThread::ProcessNextEvent(int mayWait = <Memory access error>, int * result = <Memory access error>)+0x247 [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 533]
00000000 00000000 xul!NS_ProcessNextEvent_P(class nsIThread * thread = <Memory access error>, int mayWait = <Memory access error>)+0x1b [e:\builds\moz2_slave\win32_build\build\obj-firefox\xpcom\build\nsthreadutils.cpp @ 250]
11 Id: 1aa8.2180 Suspend: 1 Teb: 7ffaf000 Unfrozen
ChildEBP RetAddr
02b7fe18 7c90daaa ntdll!KiFastSystemCallRet
02b7fe1c 77e76713 ntdll!NtReplyWaitReceivePortEx+0xc
02b7ff80 77e76c2b RPCRT4!LRPC_ADDRESS::ReceiveLotsaCalls+0xf4
02b7ff88 77e76a4d RPCRT4!RecvLotsaCallsWrapper+0xd
02b7ffa8 77e76c13 RPCRT4!BaseCachedThreadRoutine+0x79
02b7ffb4 7c80b699 RPCRT4!ThreadStartRoutine+0x1a
02b7ffec 00000000 kernel32!BaseThreadStart+0x37
12 Id: 1aa8.2178 Suspend: 1 Teb: 7ffae000 Unfrozen
ChildEBP RetAddr
02c7ff1c 7c90d21a ntdll!KiFastSystemCallRet
02c7ff20 7c8023ed ntdll!NtDelayExecution+0xc
02c7ff78 7c802451 kernel32!SleepEx+0x61
02c7ff88 774fe31d kernel32!Sleep+0xf
02c7ff94 774fe3dc ole32!CROIDTable::WorkerThreadLoop+0x14
02c7ffa8 774fe444 ole32!CRpcThread::WorkerLoop+0x1e
02c7ffb4 7c80b699 ole32!CRpcThreadCache::RpcWorkerThreadEntry+0x1b
02c7ffec 00000000 kernel32!BaseThreadStart+0x37
13 Id: 1aa8.42c Suspend: 1 Teb: 7ffad000 Unfrozen
ChildEBP RetAddr
032ffe1c 7c90df5a ntdll!KiFastSystemCallRet
032ffe20 7c8025cb ntdll!ZwWaitForSingleObject+0xc
032ffe84 7c802532 kernel32!WaitForSingleObjectEx+0xa8
032ffe98 004f9cbb kernel32!WaitForSingleObject+0x12
032ffeb4 004f5c29 nspr4!_PR_MD_WAIT_CV(struct _MDCVar * cv = 0xffffffff, struct _MDLock * lock = 0x00000000, unsigned int timeout = 0)+0x8b [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\md\windows\w95cv.c @ 282]
032ffecc 004f5a13 nspr4!_PR_WaitCondVar(struct PRThread * thread = <Memory access error>, struct PRCondVar * cvar = <Memory access error>, struct PRLock * lock = <Memory access error>, unsigned int timeout = <Memory access error>)+0x59 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\combined\prucv.c @ 205]
032ffee8 100f9663 nspr4!PR_Wait(struct PRMonitor * mon = <Memory access error>, unsigned int ticks = <Memory access error>)+0x33 [e:\builds\moz2_slave\win32_build\build\nsprpub\pr\src\threads\prmon.c @ 184]
032fff14 1005814a xul!nsThread::ProcessNextEvent(int mayWait = <Memory access error>, int * result = <Memory access error>)+0x423 [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 521]
00000000 00000000 xul!NS_ProcessNextEvent_P(class nsIThread * thread = <Memory access error>, int mayWait = <Memory access error>)+0x1b [e:\builds\moz2_slave\win32_build\build\obj-firefox\xpcom\build\nsthreadutils.cpp @ 250]
0:000> |* !analyze -v -f
*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************
*** WARNING: Unable to verify checksum for C:\Program Files\Portrait Displays\Pivot Software\winphook.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\Portrait Displays\Pivot Software\winphook.dll -
*** ERROR: Module load completed but symbols could not be loaded for C:\WINDOWS\system32\xpsp2res.dll
*** WARNING: Unable to verify checksum for C:\WINDOWS\system32\SynTPFcs.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\SynTPFcs.dll -
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: kernel32!pNlsUserInfo ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: kernel32!pNlsUserInfo ***
*** ***
*************************************************************************
FAULTING_IP:
MOZCRT19!TrailUpVec+6c [F:\SP\vctools\crt_bld\SELF_X86\crt\src\intel\memcpy.asm @ 407]
781477a0 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 781477a0 (MOZCRT19!TrailUpVec+0x0000006c)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 03dffffc
Attempt to read from address 03dffffc
FAULTING_THREAD: 000016ac
DEFAULT_BUCKET_ID: STRING_DEREFERENCE
PROCESS_NAME: firefox.exe
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 03dffffc
READ_ADDRESS: 03dffffc
FOLLOWUP_IP:
MOZCRT19!TrailUpVec+6c [F:\SP\vctools\crt_bld\SELF_X86\crt\src\intel\memcpy.asm @ 407]
781477a0 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
NTGLOBALFLAG: 70
APPLICATION_VERIFIER_FLAGS: 0
PRIMARY_PROBLEM_CLASS: STRING_DEREFERENCE
BUGCHECK_STR: APPLICATION_FAULT_STRING_DEREFERENCE_INVALID_POINTER_READ
LAST_CONTROL_TRANSFER: from 100fec74 to 781477a0
STACK_TEXT:
0013f690 100fec74 03e00008 037858c0 06a8ef40 MOZCRT19!TrailUpVec+0x6c [F:\SP\vctools\crt_bld\SELF_X86\crt\src\intel\memcpy.asm @ 407]
0013f6c8 100f1deb 00000005 021b8920 00000000 xul!nsAString_internal::Assign+0xb4 [e:\builds\moz2_slave\win32_build\build\xpcom\string\src\nstsubstring.cpp @ 362]
0013f6d8 10368ed7 69fe321f 021b8920 00000000 xul!nsAString_internal::Assign+0x1b [e:\builds\moz2_slave\win32_build\build\xpcom\string\src\nstsubstring.cpp @ 422]
0013f708 016206e6 00000000 021b8920 021b87d0 xul!nsWindow::SetTitle+0x1a2180
WARNING: Stack unwind information not available. Following frames may be wrong.
0013f740 1008b29f 037858c0 0300e120 0013f7b4 svrltmgr!DllCanUnloadNow+0x145ba
0013f914 1003d57a 021b87d0 037858c0 038630e0 xul!nsDocShell::SetupNewViewer+0x40f [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdocshell.cpp @ 7298]
0013f92c 100927e5 021b8888 037858c0 10965a66 xul!nsDocShell::Embed+0x1d [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdocshell.cpp @ 5472]
0013f968 101ab57a 021b87d0 024e19e8 038630e0 xul!nsDocShell::CreateContentViewer+0x1a5 [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdocshell.cpp @ 7084]
0013f998 1005dc5b 00391000 024e19e8 00000000 xul!nsDSURIContentListener::DoContent+0x71 [e:\builds\moz2_slave\win32_build\build\docshell\base\nsdsuricontentlistener.cpp @ 139]
0013f9f0 1007076c 038fa628 038630e0 038630e0 xul!nsDocumentOpenInfo::TryContentListener+0xe8 [e:\builds\moz2_slave\win32_build\build\uriloader\base\nsuriloader.cpp @ 738]
0013fbd0 1005450f 038630e0 80000000 038630e0 xul!nsDocumentOpenInfo::DispatchContent+0x1bc [e:\builds\moz2_slave\win32_build\build\uriloader\base\nsuriloader.cpp @ 434]
0013fbf0 10035613 038fa610 00000000 00000000 xul!nsDocumentOpenInfo::OnStartRequest+0x90 [e:\builds\moz2_slave\win32_build\build\uriloader\base\nsuriloader.cpp @ 280]
0013fc04 101a56ed 038630e8 038ff740 00000000 xul!nsJARChannel::OnStartRequest+0x1b [e:\builds\moz2_slave\win32_build\build\modules\libjar\nsjarchannel.cpp @ 867]
0013fc1c 101a07e5 0081e760 0313a490 0081d410 xul!nsInputStreamPump::OnStateStart+0x35 [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nsinputstreampump.cpp @ 443]
0013fc30 1008f561 038ff744 035908e8 0081e740 xul!nsInputStreamPump::OnInputStreamReady+0x56 [e:\builds\moz2_slave\win32_build\build\netwerk\base\src\nsinputstreampump.cpp @ 395]
0013fc40 100f9487 0313a480 008ce3c0 0013ff34 xul!nsInputStreamReadyEvent::Run+0x1d [e:\builds\moz2_slave\win32_build\build\xpcom\io\nsstreamutils.cpp @ 192]
0013fc68 100c592a 0313a480 00000001 0013fc88 xul!nsThread::ProcessNextEvent+0x247 [e:\builds\moz2_slave\win32_build\build\xpcom\threads\nsthread.cpp @ 533]
0013fc80 1022bd73 00000001 004ebdd0 1002f83c xul!nsBaseAppShell::Run+0x4a [e:\builds\moz2_slave\win32_build\build\widget\src\xpwidgets\nsbaseappshell.cpp @ 169]
0013fc8c 1002f83c 008c9550 0081f090 00000001 xul!nsAppStartup::Run+0x1e [e:\builds\moz2_slave\win32_build\build\toolkit\components\startup\src\nsappstartup.cpp @ 183]
0013fc94 0081f090 00000001 0081f098 00833010 xul!XRE_main+0xe1b [e:\builds\moz2_slave\win32_build\build\toolkit\xre\nsapprunner.cpp @ 3507]
0013fc98 00000000 0081f098 00833010 00000000 0x81f090
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: MOZCRT19!TrailUpVec+6c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: MOZCRT19
IMAGE_NAME: MOZCRT19.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 4b50df3e
STACK_COMMAND: ~0s ; kb
FAILURE_BUCKET_ID: STRING_DEREFERENCE_c0000005_MOZCRT19.dll!TrailUpVec
BUCKET_ID: APPLICATION_FAULT_STRING_DEREFERENCE_INVALID_POINTER_READ_MOZCRT19!TrailUpVec+6c
WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/firefox_exe/1_9_2_3667/4b5102f0/MOZCRT19_dll/8_0_0_0/4b50df3e/c0000005/000177a0.htm?Retriage=1
Followup: MachineOwner
---------
0:000> |* lm
start end module name
00280000 002f3000 sqlite3 (private pdb symbols) c:\symbols\sqlite3.pdb\6F74FD39CF1044ABA2C446D0B30A60B51\sqlite3.pdb
00300000 003fa000 js3250 (private pdb symbols) c:\symbols\js3250.pdb\6BF65EDB9FA747E680672D6C2FE8D2202\js3250.pdb
00400000 004e0000 firefox (private pdb symbols) c:\symbols\firefox.pdb\ED3EBF63531640798D9AE98B04A4FD0F2\firefox.pdb
004e0000 00509000 nspr4 (private pdb symbols) c:\symbols\nspr4.pdb\E33668709C08413AA86C08F91C7C4B8F1\nspr4.pdb
00510000 00528000 smime3 (private pdb symbols) c:\symbols\smime3.pdb\68F3D6650D5647E58E78389A97BC6D8D1\smime3.pdb
00530000 005cb000 nss3 (private pdb symbols) c:\symbols\nss3.pdb\AE56D56A749045B398FD0C34A620829E1\nss3.pdb
005d0000 005e4000 nssutil3 (private pdb symbols) c:\symbols\nssutil3.pdb\DB61F2CA17B543F0A8B0AABB61C15B6C1\nssutil3.pdb
005f0000 005f7000 plc4 (private pdb symbols) c:\symbols\plc4.pdb\8294795A98C843D1B1187D0FCFDEA74F1\plc4.pdb
00600000 00607000 plds4 (private pdb symbols) c:\symbols\plds4.pdb\99862C49C35B4D8FB9D03CE9CB7139751\plds4.pdb
00610000 00630000 ssl3 (private pdb symbols) c:\symbols\ssl3.pdb\17E19D09DB45474DAAB33AECC65565431\ssl3.pdb
00630000 00637000 xpcom (private pdb symbols) c:\symbols\xpcom.pdb\4BE824E5CCF9420E99DD5ADA4C3DCAD52\xpcom.pdb
01520000 01683000 svrltmgr C (export symbols) C:\WINDOWS\system32\svrltmgr.dll
01900000 01908000 browserdirprovider (private pdb symbols) c:\symbols\browserdirprovider.pdb\0F7C390038694BE8BD3462D082F0AC242\browserdirprovider.pdb
01d60000 01d84000 brwsrcmp (private pdb symbols) c:\symbols\brwsrcmp.pdb\B808CE621B344B98A4147F2E8A8A5B1D2\brwsrcmp.pdb
01da0000 01dde000 winphook C (export symbols) C:\Program Files\Portrait Displays\Pivot Software\winphook.dll
10000000 10b2f000 xul (private pdb symbols) c:\symbols\xul.pdb\4381CFB3FC4A4A8D92FDFE30FCCEA6352\xul.pdb
20000000 202c5000 xpsp2res (no symbols)
59a60000 59b01000 dbghelp (pdb symbols) c:\symbols\dbghelp.pdb\39559573E21B46F28E286923BE9E6A761\dbghelp.pdb
5ad70000 5ada8000 uxtheme (pdb symbols) c:\symbols\uxtheme.pdb\B982B8FE390B4359AD3CCECC16C0D59F2\uxtheme.pdb
63000000 63014000 SynTPFcs C (export symbols) C:\WINDOWS\system32\SynTPFcs.dll
662b0000 66308000 hnetcfg (pdb symbols) c:\symbols\HNetCfg.pdb\F662D314F374499784BC0592B8DB8BEF1\HNetCfg.pdb
71a50000 71a8f000 mswsock (pdb symbols) c:\symbols\mswsock.pdb\A4498D6206924821886386DFC229EBFD2\mswsock.pdb
71a90000 71a98000 wshtcpip (pdb symbols) c:\symbols\wshtcpip.pdb\DE010D61873545F49D43D91367E871DC2\wshtcpip.pdb
71aa0000 71aa8000 WS2HELP (pdb symbols) c:\symbols\ws2help.pdb\537CE830EFE94FE3A92C95153BDB71462\ws2help.pdb
71ab0000 71ac7000 WS2_32 (pdb symbols) c:\symbols\ws2_32.pdb\07AC08831007408D919E0CCF1EA499BF2\ws2_32.pdb
71ad0000 71ad9000 WSOCK32 (pdb symbols) c:\symbols\wsock32.pdb\E7B6C17E43604822813D3B65499B6C0F2\wsock32.pdb
71b20000 71b32000 MPR (pdb symbols) c:\symbols\mpr.pdb\637FC2DC1D0A490799B088562BF4F29A2\mpr.pdb
71bf0000 71c03000 SAMLIB (pdb symbols) c:\symbols\samlib.pdb\F9B2D6E42DB945738810D62273B3B9532\samlib.pdb
73000000 73026000 WINSPOOL (pdb symbols) c:\symbols\winspool.pdb\97A6ECC94EA7450CA7D375BD9DFFCA5E2\winspool.pdb
73b30000 73b45000 mscms (pdb symbols) c:\symbols\mscms.pdb\F3F067B1758C4D6A87D1B65EA72CD4552\mscms.pdb
73ce0000 73d01000 t2embed (pdb symbols) c:\symbols\t2embed.pdb\9BE96616291243738EC72E445919E3461\t2embed.pdb
73dc0000 73dc3000 LZ32 (pdb symbols) c:\symbols\lz32.pdb\3B7D84BD1\lz32.pdb
74720000 7476b000 MSCTF (pdb symbols) c:\symbols\msctf.pdb\CC9DF849A66C4661BFB9BC1F296CE5ED2\msctf.pdb
74c80000 74cac000 OLEACC (pdb symbols) c:\symbols\oleacc.pdb\3B7DE0CF2\oleacc.pdb
74d90000 74dfb000 USP10 (pdb symbols) c:\symbols\usp10.pdb\14C8D7F8AB3C48A4B95A73BAC9A6B02C1\usp10.pdb
751d0000 751ee000 wshbth (pdb symbols) c:\symbols\wshbth.pdb\3D402521759C46F69DFC411B4851B7D61\wshbth.pdb
755c0000 755ee000 msctfime (pdb symbols) c:\symbols\msctfime.pdb\ECE04C0393764AD0B3E9658C0D8BA88D1\msctfime.pdb
76080000 760e5000 MSVCP60 (pdb symbols) c:\symbols\msvcp60.pdb\05634FA32C174AF59217BF843193D0A42\msvcp60.pdb
76380000 76385000 MSIMG32 (pdb symbols) c:\symbols\msimg32.pdb\E28D4258D66B428EB5D74279EB57A08F2\msimg32.pdb
76390000 763ad000 IMM32 (pdb symbols) c:\symbols\imm32.pdb\2C17A49C251B4C8EB9E2AD13D7D9EA162\imm32.pdb
763b0000 763f9000 COMDLG32 (pdb symbols) c:\symbols\comdlg32.pdb\4FCBEAD63D7345998C1F92D8DBB0DC272\comdlg32.pdb
76b40000 76b6d000 WINMM (pdb symbols) c:\symbols\winmm.pdb\4FC9F179964745CAA3C78D6FADFC28322\winmm.pdb
76bf0000 76bfb000 PSAPI (pdb symbols) c:\symbols\psapi.pdb\A5C3A1F9689F43D8AD228A09293889702\psapi.pdb
76d60000 76d79000 iphlpapi (pdb symbols) c:\symbols\iphlpapi.pdb\75633416EBA947AA8A004B4DFD57AC7B2\iphlpapi.pdb
76f20000 76f47000 DNSAPI (pdb symbols) c:\symbols\dnsapi.pdb\63ED7C27F10F4CB49AA200F064C9E1762\dnsapi.pdb
76f60000 76f8c000 WLDAP32 (pdb symbols) c:\symbols\wldap32.pdb\025E111A192144B0A76E5D156BA8A6A52\wldap32.pdb
76fb0000 76fb8000 winrnr (pdb symbols) c:\symbols\winrnr.pdb\A5953730A3504120BCEB95B11D0D3B972\winrnr.pdb
76fd0000 7704f000 CLBCATQ (pdb symbols) c:\symbols\clbcatq.pdb\58D394694EFA45DE961F5C692B3211BC2\clbcatq.pdb
77050000 77115000 COMRes (pdb symbols) c:\symbols\COMRes.pdb\D81244C41029461FAABC731CFDDF0AE08\COMRes.pdb
77120000 771ab000 OLEAUT32 (pdb symbols) c:\symbols\oleaut32.pdb\659B514A88A24FB6ADB4F29A9BB066E42\oleaut32.pdb
773d0000 774d3000 COMCTL32 (pdb symbols) c:\symbols\MicrosoftWindowsCommon-Controls-6.0.2600.2982-comctl32.pdb\C0A72EE9578847AAB7770CF02FFED0941\MicrosoftWindowsCommon-Controls-6.0.2600.2982-comctl32.pdb
774e0000 7761d000 ole32 (pdb symbols) c:\symbols\ole32.pdb\683B65B246F4418796D2EE6D4C55EB112\ole32.pdb
77690000 776b1000 NTMARTA (pdb symbols) c:\symbols\ntmarta.pdb\A2640002C8D24BB5A3293B95A9708F072\ntmarta.pdb
77920000 77a13000 SETUPAPI (pdb symbols) c:\symbols\setupapi.pdb\B088BF8A977643268B32931FF2715FAB2\setupapi.pdb
77b40000 77b62000 apphelp (pdb symbols) c:\symbols\apphelp.pdb\0370CEDB12904493A902B6993666835C2\apphelp.pdb
77c00000 77c08000 VERSION (pdb symbols) c:\symbols\version.pdb\180A90C40384463E82DDC45B2C8AB76E2\version.pdb
77c10000 77c68000 msvcrt (pdb symbols) c:\symbols\msvcrt.pdb\A678F3C30DED426B839032B996987E381\msvcrt.pdb
77dd0000 77e6b000 ADVAPI32 (pdb symbols) c:\symbols\advapi32.pdb\153E2CE004564DA39D338E2AF40947A82\advapi32.pdb
77e70000 77f02000 RPCRT4 (pdb symbols) c:\symbols\rpcrt4.pdb\712BCFE9A92941E19F433CEF1BA972C82\rpcrt4.pdb
77f10000 77f58000 GDI32 (pdb symbols) c:\symbols\gdi32.pdb\39A70B1CB0294D2CAAE3582449420D622\gdi32.pdb
77f60000 77fd6000 SHLWAPI (pdb symbols) c:\symbols\shlwapi.pdb\858772C19EB14201A80F9B61D5DB69B12\shlwapi.pdb
77fe0000 77ff1000 Secur32 (pdb symbols) c:\symbols\secur32.pdb\3885BDC7EBF54106A5642E3CD45F60FE2\secur32.pdb
78130000 781e0000 MOZCRT19 (private pdb symbols) c:\symbols\MOZCRT19.pdb\0C16779262344F49BC07B2530B994EA71\MOZCRT19.pdb
7c800000 7c8f5000 kernel32 (pdb symbols) c:\symbols\kernel32.pdb\35CC603450F44929AEB29742698380BC2\kernel32.pdb
7c900000 7c9b2000 ntdll (pdb symbols) c:\symbols\ntdll.pdb\562E2BF3593E46DB8A5D3F50A5E025E92\ntdll.pdb
7c9c0000 7d1d7000 SHELL32 (pdb symbols) c:\symbols\shell32.pdb\64CF10584B774D71BBD708BE7D8A05602\shell32.pdb
7e410000 7e4a1000 USER32 (pdb symbols) c:\symbols\user32.pdb\F049F32D0C8948C0B48F7A065FC5C1B12\user32.pdb
Unloaded modules:
5cb70000 5cb96000 ShimEng.dll
Reproducible: Always
Steps to Reproduce:
1.Launch Firefox
2.Crashes with crash report screen. Even in safe mode.
3.
Windows XP SP3
McAfee but on access scanning is disabled
Comment 1•16 years ago
|
||
Please don't stick the stacktrace in the bug comments. it makes the bug hard to read. use an attachment from now on.
Keywords: crash
Version: unspecified → 3.6 Branch
Comment 2•16 years ago
|
||
Channeling timeless, who is currently stuck in a fight with bugzilla:
http://www.threatexpert.com/report.aspx?md5=7afe5fab3905b8c7ffbe5ec272db06aa
You have a bot problem. Please take your computer to the cleaners.
http://support.mozilla.com can probably help.
http://www.google.com/search?q=svrltmgr&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:unofficial&client=firefox-a
#
svrltmgr.dll | ThreatExpert statistics
Across all ThreatExpert reports, the file "svrltmgr.dll" has always been ... The file "svrltmgr.dll" is known to be created under the following filename: ...
www.threatexpert.com/files/svrltmgr.dll.html - Cached - Similar -
#
ThreatExpert Report: Backdoor.Win32.Ulrbot, Backdoor.Ulrbot ...
10 Dec 2008 ... 5, %System%\svrltmgr.dll, 1302528 bytes ... (Default) = "%System%\svrltmgr.dll"; ThreadingModel = "Apartment" ...
www.threatexpert.com/report.aspx?md5... - Cached - Similar -
Summary: Firefox 3.6 Crash on Startup - Safe Mode doesn't work either → [Backdoor.Ulrbot] Firefox 3.6 Crash on Startup - Safe Mode doesn't work either
Marien,
svrltmgr.dll is part of the spectorsoft application which our company uses to monitor employees computer usage:
Here is mentions the file specifically as part of spector:
http://www.spectorsoft.com/products/Spector360_Windows/help/v62/deployment/Antivirus_Client_Install.htm
Thanks to all for their thoughts so far.
UPDATE Marien,
Although the svrltmgr.dll is a legitimate dll for the spector software our company uses I thought you were on to something. So, I renamed it to zz_svrltgr.dll_thisbreaksfirefox and firefox then worked!!!
Thanks a million Marien. I've fought with this stupid .dll for several months. For some reason firefox 3.1.x worked but 3.5.x and 3.6 didn't work with this crazy dll.
Comment 5•16 years ago
|
||
Please note Spector has been known to cause crashes starting with Firefox 3. See bug 434403, especially bug 434403 comment 116 and the nearby comments from Boris Zbarsky. Spector seems to be accessing Firefox internals in a way that is going to break (requiring a Spector update) on most significant Firefox upgrades. This is not something that can be fixed on the Firefox side.
In fact with SetupNewViewer and Spector mentioned in both bug reports I'm going to go ahead and mark this a duplicate.
Status: UNCONFIRMED → RESOLVED
Closed: 16 years ago
Resolution: --- → DUPLICATE
You need to log in
before you can comment on or make changes to this bug.
Description
•