Closed
Bug 64924
Opened 24 years ago
Closed 24 years ago
Crash when saving an image to a nearly full diskette
Categories
(Core :: Networking, defect)
Tracking
()
People
(Reporter: iliab, Assigned: neeti)
References
()
Details
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; WinNT4.0; en-US; 0.7) Gecko/20010109
BuildID: 2001010901
Mozilla crashes when saving an image (using right-click/Save Image As) on a
diskette and the image is lager than amount of free space available on the diskette
Reproducible: Always
Steps to Reproduce:
1.Browse to a page with a large image in it
(a page with a wallpaper, wiew, well-scanned art, etc.)
Or open a local image(.jpg) file using File|Open File menu entry.
2.Wait until the image is downloaded & renedred completely.
3.Insert a nearly full diskette
(with not enough free space to save the image) into drive A:
4.Right-click on the image, choose "save image as",
than select diskette A: as a target & click "Save"
Actual Results: Popup window with the message:
Unknown error [280520010]
is displayed;
WinNt displays the popup window with the message:
Error: Access violation [0xc0000005] address 0x60502872
and closes Mozilla.
Expected Results: Popup window with a message such as:
Not enough space on the disk
and Mozilla continues to operate.
No file is created on the diskette.
The exact WinNT version, as displayed from My Computer/Properities)
4.00.1381
IE 5 5.00.2314.1003
PC has 132M RAM
(so no RAM shortage expected)
This is the DrWatson (WinNT crash logging utility) log of this crash:
------------------- Dr Watson log begin-------------------------------
Application exception occurred:
App: mozilla.dbg (pid=273)
When: 1/10/2001 @ 18:50:2.440
Exception number: c0000005 (access violation)
*----> System Information <----*
Computer Name: ILIAB
User Name: ilia-b
Number of Processors: 1
Processor Type: x86 Family 6 Model 6 Stepping 5
Windows Version: 4.0
Current Build: 1381
Service Pack: 6
Current Type: Uniprocessor Free
Registered Organization: Terayon
Registered Owner: ******** (User name removed by me - Ilia)
*----> Task List <----*
0 Idle.exe
2 System.exe
20 smss.exe
24 csrss.exe
34 winlogon.exe
40 services.exe
43 lsass.exe
70 spoolss.exe
80 defwatch.exe
83 smartagt.exe
89 rtvscan.exe
99 nddeagnt.exe
103 explorer.exe
109 NSCAGENT.exe
114 RpcSs.exe
131 pstores.exe
137 PH32SVC.exe
144 MSTask.exe
163 vptray.exe
167 PHOST32.exe
169 EM_EXEC.exe
171 comsmd.exe
176 DACONFIG.exe
178 internat.exe
73 msoffice.exe
181 vpexrt.exe
127 ddhelp.exe
324 babylon.exe
122 OUTLOOK.exe
279 MAPISP32.exe
273 Mozilla.exe
308 rundll32.exe
320 NOTEPAD.exe
295 drwtsn32.exe
0 _Total.exe
(00400000 - 00456000) mozilla.dbg
(77f60000 - 77fbe000) dll\ntdll.dbg
(60cd0000 - 60d2b000) xpcom.dbg
(60c30000 - 60c54000) nspr4.dbg
(77dc0000 - 77dff000) dll\advapi32.dbg
(77e70000 - 77ed0000) dll\kernel32.dbg
(77f00000 - 77f53000) dll\user32.dbg
(77ed0000 - 77efc000) dll\gdi32.dbg
(77e10000 - 77e67000) dll\rpcrt4.dbg
(776d0000 - 776d8000) dll\wsock32.dbg
(776b0000 - 776c4000) dll\ws2_32.dbg
(78000000 - 78040000)
(776a0000 - 776a7000) dll\ws2help.dbg
(60cb0000 - 60cb6000) plds4.dbg
(60ca0000 - 60ca7000) plc4.dbg
(60bf0000 - 60bf9000) mozreg.dbg
(70960000 - 70b05000) shell32.dbg
(70bd0000 - 70c14000) SHLWAPI.dbg
(71590000 - 71617000) COMCTL32.dbg
(77b20000 - 77bd7000) dll\ole32.dbg
(60ad0000 - 60b1a000) js3250.dbg
(5db00000 - 5db20000) dll\lpk.dbg
(5b780000 - 5b78e000) dll\lpkbidi.dbg
(52000000 - 52006000) dll\indicdll.dbg
(60a10000 - 60a3a000) xpinstal.dbg
(60460000 - 60466000) jsloader.dbg
(60080000 - 6009d000) appshell.dbg
(600c0000 - 600cc000) chardet.dbg
(60850000 - 6085b000) uconv.dbg
(60a80000 - 60a9d000) gkwidget.dbg
(77d80000 - 77db2000) dll\comdlg32.dbg
(77fd0000 - 77ffa000) dll\winmm.dbg
(60a50000 - 60a74000) gkgfxwin.dbg
(60aa0000 - 60aac000) img3250.dbg
(60770000 - 607ba000) rdf.dbg
(60b20000 - 60b8c000) jsdom.dbg
(60a40000 - 60a49000) xppref32.dbg
(609f0000 - 60a0a000) xpc3250.dbg
(60740000 - 6074c000) profile.dbg
(60640000 - 60689000) necko.dbg
(60d40000 - 60d4c000) zlib.dbg
(77660000 - 7766f000) dll\msafd.dbg
(77690000 - 77699000) dll\wshtcpip.dbg
(608f0000 - 60903000) ucvlatin.dbg
(60110000 - 60122000) docshell.dbg
(60960000 - 6096c000) urildr.dbg
(60750000 - 60766000) psmglue.dbg
(601c0000 - 60358000) gkhtml.dbg
(60810000 - 60817000) strres.dbg
(600f0000 - 600fe000) chrome.dbg
(60360000 - 603a1000) gkparser.dbg
(780a0000 - 780b2000)
(60840000 - 60847000) ucharuti.dbg
(60450000 - 6045d000) jar50.dbg
(606c0000 - 606cc000) nslocale.dbg
(60100000 - 6010a000) cookie.dbg
(60730000 - 6073a000) oji.dbg
(60b90000 - 60ba1000) jsj3250.dbg
(603b0000 - 603c4000) gkplugin.dbg
(77a90000 - 77a9b000) dll\version.dbg
(779c0000 - 779c8000) dll\lz32.dbg
(604d0000 - 604d9000) mozbrwsr.dbg
(60050000 - 6007c000) appcomps.dbg
(604b0000 - 604ca000) mork.dbg
(600a0000 - 600b4000) caps.dbg
(60980000 - 60990000) wallet.dbg
(603d0000 - 603e0000) gkview.dbg
(607e0000 - 607e6000) shistory.dbg
(60130000 - 60186000) editor.dbg
(60820000 - 60826000) txmgr.dbg
(606a0000 - 606a6000) nsgif.dbg
(74ff0000 - 74ffe000) dll\rnr20.dbg
(77bf0000 - 77bf7000) dll\rpcltc1.dbg
(60480000 - 60486000) lwbrk.dbg
(03020000 - 03020000)
(10000000 - 10000000)
(71190000 - 71197000) dll\msidle.dbg
(606b0000 - 606b5000) nsjpg.dbg
(60ab0000 - 60ac5000) jpeg3250.dbg
(604e0000 - 604e6000) mozfind.dbg
(60830000 - 60839000) txtsvc.dbg
(77a40000 - 77a4d000) dll\ntshrui.dbg
(77800000 - 7783a000) dll\netapi32.dbg
(77840000 - 77849000) dll\NetRap.dbg
(777e0000 - 777ed000) dll\samlib.dbg
(77720000 - 77731000) dll\mpr.dbg
(777f0000 - 777fc000) dll\ntlanman.dbg
(77890000 - 778a5000) dll\netui0.dbg
(77850000 - 7788a000) dll\netui1.dbg
(70400000 - 70477000) MLANG.dbg
(60500000 - 60506000) mozxfer.dbg
(609a0000 - 609a6000) wlltvwrs.dbg
State Dump for Thread Id 0xd8
eax=00000000 ebx=00000000 ecx=069bce60 edx=0012dce4 esi=0693526c edi=80000000
eip=60502872 esp=0012dcd0 ebp=0012fcec iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
function: NSGetModule
60502858 50 push eax
60502859 ff5214 call dword ptr [edx+0x14]
ds:010ac6ea=????????
6050285c 8bd8 mov ebx,eax
6050285e 85df test edi,ebx
60502860 753e jnz NSGetModule+0x7c0 (605028a0)
60502862 8b4610 mov eax,[esi+0x10]
ds:078b3c72=????????
60502865 8d55f8 lea edx,[ebp-0x8]
ss:010ae6f2=????????
60502868 52 push edx
60502869 8d95f8dfffff lea edx,[ebp+0xffffdff8]
ss:0012dce4=27156424
6050286f ff75fc push dword ptr [ebp-0x4]
ss:010ae6f2=????????
FAULT ->60502872 8b08 mov ecx,[eax]
ds:00000000=????????
60502874 52 push edx
60502875 50 push eax
60502876 ff5114 call dword ptr [ecx+0x14]
ds:0793b866=????????
60502879 8bd8 mov ebx,eax
6050287b 23c7 and eax,edi
6050287d 750d jnz NSGetModule+0x7ac (6050288c)
6050287f 8b4df8 mov ecx,[ebp-0x8]
ss:010ae6f2=????????
60502882 3b4dfc cmp ecx,[ebp-0x4]
ss:010ae6f2=????????
60502885 7505 jnz NSGetModule+0x7ac (6050288c)
60502887 294d08 sub [ebp+0x8],ecx
ss:010ae6f2=????????
6050288a eb21 jmp NSGetModule+0x7cd (605028ad)
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012fcec 606733ad 00002000 06936d90 00000000 069bc5dc mozxfer!NSGetModule
0012fd14 60646c49 06936d98 069bb900 00000000 069bc5dc necko!DupString
0012fd3c 6064675a 00000000 069fba80 60cfeee7 069fba80 necko!NSGetModule
0012fd48 60cfeee7 069fba80 00000000 00867800 60cfee55 necko!NSGetModule (FPO:
[1,0,1])
0012fd58 60cfee55 069fba80 0050bd88 0012fd80 00867800 xpcom!PL_HandleEvent
(FPO: [1,0,2])
0012fd70 60cff0b1 00867800 0012fdc8 0012fdd0 77f013ed
xpcom!PL_ProcessPendingEvents (FPO: [EBP 0x0050bd88] [1,0,4])
0050bd88 00000002 808785f8 a030bd88 e23278a8 a02d43b8 xpcom!PL_IsQueueNative
*----> Raw Stack Dump <----*
0012dcd0 00 20 00 00 e4 fc 12 00 - 00 00 00 00 98 6d 93 06 . ...........m..
0012dce0 20 26 c4 60 24 64 15 27 - 00 92 41 c9 38 c0 03 f3 &.`$d.'..A.8...
0012dcf0 a8 be de e4 86 52 40 04 - 00 b8 24 85 61 d5 89 ce .....R@...$.a...
0012dd00 71 e8 00 cf af 7a a6 db - 70 32 cd 23 85 52 55 be q....z..p2.#.RU.
0012dd10 e6 37 06 66 1d 00 6d bc - 67 ff 00 af 55 84 8c 0f .7.f..m.g...U...
0012dd20 97 b8 90 72 c3 03 e6 04 - 10 ca 06 39 e7 18 e7 d7 ...r.......9....
0012dd30 b9 ae 88 53 76 d9 69 6b - 6a bf 1d 76 f5 f3 39 a7 ...Sv.ikj..v..9.
0012dd40 8c b3 7e f2 b2 d3 7b db - 6d 37 df 67 b6 85 df b4 ..~...{.m7.g....
0012dd50 ca 8f e6 3e e7 4c ff 00 - 09 da 70 7b 1c e7 81 e9 ...>.L....p{....
0012dd60 c7 bd 48 26 19 0e 09 20 - a3 2b 29 66 18 04 7d dc ..H&... .+)f..}.
0012dd70 82 01 ef 81 9f 62 2b 34 - dc 6d 89 c9 38 04 e1 bc .....b+4.m..8...
0012dd80 ce 4f 24 64 0c e3 b7 03 - 9f cb 9c 40 2e 0b f2 98 .O$d.......@....
0012dd90 f2 dc b0 11 b1 00 8d 87 - 8c 10 41 3d f3 cd 74 42 ..........A=..tB
0012dda0 97 35 f9 b4 b5 b4 d1 99 - 54 c4 c6 2d 72 cb 56 ae .5......T..-r.V.
0012ddb0 ef ff 00 6e db 7f 9f a3 - 57 f5 dd 8e 6f de 32 b2 ...n....W...o.2.
0012ddc0 f2 ca a2 32 a4 a8 2a 44 - 7b 81 c1 ed b8 81 8c 7d ...2..*D{......}
0012ddd0 d1 9e f5 65 67 8e 17 0f - 26 44 63 2a c0 16 62 1c ...eg...&Dc*..b.
0012dde0 e4 67 70 3b b8 1d 89 ed - e9 c5 61 09 1f e6 2c ec .gp;......a...,.
0012ddf0 0b 3b 05 23 aa 06 74 e5 - 78 c1 f9 63 c8 c8 c7 3d .;.#..t.x..c...=
0012de00 f8 cc ca c4 ec 8d 06 0b - 4a 11 b2 09 e0 e4 79 87 ........J.....y.
State Dump for Thread Id 0x5c
eax=5db0b2a0 ebx=00000000 ecx=00000001 edx=00000000 esi=00000000 edi=00000000
eip=77f67b57 esp=00a1ff6c ebp=00a1ffa0 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
function: NtNotifyChangeKey
77f67b4c b84b000000 mov eax,0x4b
77f67b51 8d542404 lea edx,[esp+0x4]
ss:0199e973=????????
77f67b55 cd2e int 2e
77f67b57 c22800 ret 0x28
77f67b5a 8bc0 mov eax,eax
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00a1ffa0 5db0122c 00000064 00000001 00000004 00000000 ntdll!NtNotifyChangeKey
00a1ffec 00000000 00000000 00000000 00000000 00000000 lpk!LpkInitialize
00000000 00000000 00000000 00000000 00000000 00000000 mozilla!<nosymbols>
State Dump for Thread Id 0x128
eax=1730b000 ebx=00000000 ecx=00c1ffa8 edx=00000000 esi=00000044 edi=00c1fee0
eip=77f682db esp=00c1fec4 ebp=00c1fee8 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
function: NtWaitForSingleObject
77f682d0 b8c5000000 mov eax,0xc5
77f682d5 8d542404 lea edx,[esp+0x4]
ss:01b9e8cb=????????
77f682d9 cd2e int 2e
77f682db c20c00 ret 0xc
77f682de 8bc0 mov eax,eax
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00c1fee8 77e74f45 00000044 0000ea60 00000000 60c464dc ntdll!NtWaitForSingleObject
0000ea60 00000000 00000000 00000000 00000000 00000000 kernel32!WaitForSingleObject
*----> Raw Stack Dump <----*
00c1fec4 9f cc e8 77 44 00 00 00 - 00 00 00 00 e0 fe c1 00 ...wD...........
00c1fed4 f4 23 81 00 90 21 81 00 - 2c 24 81 00 00 ba 3c dc .#...!..,$....<.
00c1fee4 ff ff ff ff 60 ea 00 00 - 45 4f e7 77 44 00 00 00 ....`...EO.wD...
00c1fef4 60 ea 00 00 00 00 00 00 - dc 64 c4 60 44 00 00 00 `........d.`D...
00c1ff04 60 ea 00 00 10 24 81 00 - 90 21 81 00 20 30 c4 60 `....$...!.. 0.`
00c1ff14 00 00 00 00 2c 2a c4 60 - f4 23 81 00 2c 24 81 00 ....,*.`.#..,$..
00c1ff24 0c 46 44 00 10 24 81 00 - 0c 46 44 00 d3 2c c4 60 .FD..$...FD..,.`
00c1ff34 90 21 81 00 80 23 81 00 - 10 24 81 00 0c 46 44 00 .!...#...$...FD.
00c1ff44 a0 24 81 00 78 76 cd 60 - 80 23 81 00 0c 46 44 00 .$..xv.`.#...FD.
00c1ff54 38 22 81 00 6c 23 81 00 - b8 ff c1 00 40 20 81 00 8"..l#......@ ..
00c1ff64 5e cc cf 60 00 00 00 00 - 90 21 81 00 71 36 c4 60 ^..`.....!..q6.`
00c1ff74 60 23 81 00 e0 1e 81 00 - e0 1e 81 00 47 00 00 00 `#..........G...
00c1ff84 40 20 81 00 5a 26 00 78 - 90 21 81 00 47 00 00 00 @ ..Z&.x.!..G...
00c1ff94 00 00 00 00 40 20 81 00 - c0 7a 7c 80 90 ff c1 00 ....@ ...z|.....
00c1ffa4 8b 74 11 80 dc ff c1 00 - 03 ef 00 78 c8 e2 02 78 .t.........x...x
00c1ffb4 00 00 00 00 ec ff c1 00 - ec 4e e7 77 40 20 81 00 .........N.w@ ..
00c1ffc4 47 00 00 00 00 00 00 00 - 40 20 81 00 00 00 00 00 G.......@ ......
00c1ffd4 c4 ff c1 00 01 00 00 00 - ff ff ff ff 9c c3 ea 77 ...............w
00c1ffe4 38 e2 ea 77 00 00 00 00 - 00 00 00 00 00 00 00 00 8..w............
00c1fff4 ff 25 00 78 40 20 81 00 - 00 00 00 00 07 00 00 00 .%.x@ ..........
State Dump for Thread Id 0x100
eax=000000c0 ebx=00000000 ecx=001304c0 edx=00000000 esi=00000000 edi=0000009c
eip=77f682db esp=00e6ff44 ebp=00e6ff98 iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000293
function: NtWaitForSingleObject
77f682d0 b8c5000000 mov eax,0xc5
77f682d5 8d542404 lea edx,[esp+0x4]
ss:01dee94b=00000001
77f682d9 cd2e int 2e
77f682db c20c00 ret 0xc
77f682de 8bc0 mov eax,eax
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00e6ff98 77661e92 0000009c ffffffff 00000003 00000004 ntdll!NtWaitForSingleObject
00e6ffec 00000000 00000000 00000000 00000000 00000000 msafd!<nosymbols>
00000000 00000000 00000000 00000000 00000000 00000000 mozilla!<nosymbols>
State Dump for Thread Id 0x60
eax=00000000 ebx=7766b100 ecx=008aa800 edx=00000000 esi=00148610 edi=000000d4
eip=77f682db esp=00f6fa08 ebp=00f6fa5c iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000293
function: NtWaitForSingleObject
77f682d0 b8c5000000 mov eax,0xc5
77f682d5 8d542404 lea edx,[esp+0x4]
ss:01eee40f=????????
77f682d9 cd2e int 2e
77f682db c20c00 ret 0xc
77f682de 8bc0 mov eax,eax
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00f6fa5c 77664a12 000000d4 000000b0 00000001 00000004 ntdll!NtWaitForSingleObject
00f6fb84 776b9f5f 00000000 00f6fd24 00f6fc20 00f6fe28 msafd!<nosymbols>
00f6fbd4 60c487e9 00000000 00f6fd24 00f6fc20 00f6fe28 ws2_32!select
*----> Raw Stack Dump <----*
00f6fa08 ce 89 66 77 d4 00 00 00 - 01 00 00 00 34 fa f6 00 ..fw........4...
00f6fa18 20 fc f6 00 24 fd f6 00 - 9c fa f6 00 f0 f6 23 50 ...$.........#P
00f6fa28 25 7b c0 01 ff ff ff ff - ff ff ff 7f ff ff ff ff %{..............
00f6fa38 ff ff ff 7f 00 00 00 00 - a8 ff f6 00 60 98 66 77 ............`.fw
00f6fa48 c3 49 66 77 b0 00 00 00 - 00 00 00 00 00 00 00 00 .Ifw............
00f6fa58 00 00 00 00 84 fb f6 00 - 12 4a 66 77 d4 00 00 00 .........Jfw....
00f6fa68 b0 00 00 00 01 00 00 00 - 04 00 00 00 f8 49 13 00 .............I..
00f6fa78 24 fd f6 00 c0 76 14 00 - 80 6c 23 eb ff ff ff ff $....v...l#.....
00f6fa88 01 00 00 00 00 fa f6 00 - b0 00 00 00 19 00 00 00 ................
00f6fa98 b0 fa f6 00 01 00 00 00 - bc fa f6 00 b8 fa f6 00 ................
00f6faa8 00 00 00 00 00 00 00 00 - 00 04 00 00 44 fb f6 00 ............D...
00f6fab8 00 00 00 00 02 00 00 00 - 44 fb f6 00 00 00 00 00 ........D.......
00f6fac8 10 00 00 00 44 fb f6 00 - 00 04 00 00 00 00 00 00 ....D...........
00f6fad8 00 04 00 00 a0 a1 8a 00 - 50 9c 8a 00 44 fb f6 00 ........P...D...
00f6fae8 23 00 00 00 80 69 67 ff - 44 fb f6 00 00 00 00 00 #....ig.D.......
00f6faf8 f6 ff ff ff 01 00 00 00 - 00 00 00 00 34 a2 8a 00 ............4...
00f6fb08 00 00 00 00 78 10 c4 60 - a0 a1 8a 00 44 fb f6 00 ....x..`....D...
00f6fb18 00 04 00 00 00 00 00 00 - ff ff ff ff 88 fa f6 00 ................
00f6fb28 2c 00 00 00 03 01 00 00 - 90 fa f6 00 dd 42 c3 60 ,............B.`
00f6fb38 a0 a1 8a 00 44 fb f6 00 - 00 04 00 00 38 38 15 00 ....D.......88..
State Dump for Thread Id 0x84
eax=00000000 ebx=008aaa30 ecx=ffffffff edx=00000000 esi=77f02b55 edi=0106ff44
eip=77f3f037 esp=0106ff00 ebp=0106ff24 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
function: GetMenuItemRect
77f3f01c b887110000 mov eax,0x1187
77f3f021 8d542404 lea edx,[esp+0x4]
ss:01fee907=ad275400
77f3f025 cd2e int 2e
77f3f027 c21000 ret 0x10
77f3f02a 8bc0 mov eax,eax
77f3f02c b888110000 mov eax,0x1188
77f3f031 8d542404 lea edx,[esp+0x4]
ss:01fee907=ad275400
77f3f035 cd2e int 2e
77f3f037 c21400 ret 0x14
77f3f03a 8bc0 mov eax,eax
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0106ff24 60651407 0106ff44 02190286 00000000 00000000 user32!GetMenuItemRect
0106ff60 60cfcc5e 00000000 008aab80 60c43671 008a9360 necko!ExtractURLScheme
0106ff6c 60c43671 008a9360 00811ee0 00811ee0 ffffffff
xpcom!nsComponentManager::EnumerateContractIDs (FPO: [1,0,1])
0106ff7c ffffffff 008aaa30 7800265a 008aab80 ffffffff nspr4!PRP_TryLock (FPO:
[1,0,2])
0106ffb8 77e74eec 008aaa30 ffffffff 008aa780 008aaa30 gdi32!<nosymbols>
0106ffec 00000000 780025ff 008aaa30 00000000 04e4000d kernel32!lstrcmpiW
00000000 00000000 00000000 00000000 00000000 00000000 mozilla!<nosymbols>
*----> Raw Stack Dump <----*
0106ff00 8a 2b f0 77 44 ff 06 01 - 86 02 19 02 00 00 00 00 .+.wD...........
0106ff10 00 00 00 00 20 ff 06 01 - 44 95 8a 00 55 2b f0 77 .... ...D...U+.w
0106ff20 55 2b f0 77 60 ff 06 01 - 07 14 65 60 44 ff 06 01 U+.w`.....e`D...
0106ff30 86 02 19 02 00 00 00 00 - 00 00 00 00 6c 93 8a 00 ............l...
0106ff40 28 ac 8a 00 86 02 19 02 - 00 04 00 00 13 00 00 00 (...............
0106ff50 68 00 00 00 64 15 02 0b - 9a 01 00 00 64 01 00 00 h...d.......d...
0106ff60 b8 ff 06 01 5e cc cf 60 - 00 00 00 00 80 ab 8a 00 ....^..`........
0106ff70 71 36 c4 60 60 93 8a 00 - e0 1e 81 00 e0 1e 81 00 q6.``...........
0106ff80 ff ff ff ff 30 aa 8a 00 - 5a 26 00 78 80 ab 8a 00 ....0...Z&.x....
0106ff90 ff ff ff ff 80 a7 8a 00 - 30 aa 8a 00 00 00 00 00 ........0.......
0106ffa0 90 ff 06 01 8b 74 11 80 - dc ff 06 01 03 ef 00 78 .....t.........x
0106ffb0 c8 e2 02 78 00 00 00 00 - ec ff 06 01 ec 4e e7 77 ...x.........N.w
0106ffc0 30 aa 8a 00 ff ff ff ff - 80 a7 8a 00 30 aa 8a 00 0...........0...
0106ffd0 80 a7 8a 00 c4 ff 06 01 - 50 06 13 00 ff ff ff ff ........P.......
0106ffe0 9c c3 ea 77 38 e2 ea 77 - 00 00 00 00 00 00 00 00 ...w8..w........
0106fff0 00 00 00 00 ff 25 00 78 - 30 aa 8a 00 00 00 00 00 .....%.x0.......
01070000 0d 00 e4 04 01 00 3f 00 - 3f 00 3f 00 3f 00 00 00 ......?.?.?.?...
01070010 00 00 00 00 00 00 00 00 - 00 00 03 01 00 00 01 00 ................
01070020 02 00 03 00 04 00 05 00 - 06 00 07 00 08 00 09 00 ................
01070030 0a 00 0b 00 0c 00 0d 00 - 0e 00 0f 00 10 00 11 00 ................
State Dump for Thread Id 0x12b
eax=0000054a ebx=00000000 ecx=7ffd7000 edx=00000000 esi=0014dc90 edi=0019fd30
eip=77f67fa7 esp=0118fdf0 ebp=0118ff90 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202
function: ZwReplyWaitReceivePort
77f67f9c b890000000 mov eax,0x90
77f67fa1 8d542404 lea edx,[esp+0x4]
ss:0210e7f7=????????
77f67fa5 cd2e int 2e
77f67fa7 c21000 ret 0x10
77f67faa 8bc0 mov eax,eax
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0118ff90 77e15a1d 77e160f7 0014dc90 0118ffec 0012f554 ntdll!ZwReplyWaitReceivePort
00003a98 00000000 00000000 00000000 00000000 00000000 rpcrt4!NdrOleAllocate
State Dump for Thread Id 0x65
eax=00001008 ebx=00000000 ecx=00800010 edx=00000000 esi=00000098 edi=00000000
eip=77f682db esp=0299ff64 ebp=0299ff88 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
function: NtWaitForSingleObject
77f682d0 b8c5000000 mov eax,0xc5
77f682d5 8d542404 lea edx,[esp+0x4]
ss:0391e96b=????????
77f682d9 cd2e int 2e
77f682db c20c00 ret 0xc
77f682de 8bc0 mov eax,eax
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0299ff88 77e74f45 00000098 ffffffff 00000000 776b1c09 ntdll!NtWaitForSingleObject
0299ffb8 77e74eec 0014eb20 ffffffff 00f6fcd8 0014eb20 kernel32!WaitForSingleObject
0299ffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW
00000000 00000000 00000000 00000000 00000000 00000000 mozilla!<nosymbols>
State Dump for Thread Id 0x141
eax=77e160a4 ebx=00000000 ecx=00000000 edx=00000000 esi=0014dc90 edi=0019fd30
eip=77f67fa7 esp=0565fdf0 ebp=0565ff90 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
function: ZwReplyWaitReceivePort
77f67f9c b890000000 mov eax,0x90
77f67fa1 8d542404 lea edx,[esp+0x4]
ss:065de7f7=0000b005
77f67fa5 cd2e int 2e
77f67fa7 c21000 ret 0x10
77f67faa 8bc0 mov eax,eax
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0565ff90 77e15a1d 77e160f7 0014dc90 0565ffec 00000000 ntdll!ZwReplyWaitReceivePort
00003a98 00000000 00000000 00000000 00000000 00000000 rpcrt4!NdrOleAllocate
*----> Raw Stack Dump <----*
0565fdf0 9f 5b e1 77 e4 00 00 00 - 6c ff 65 05 00 00 00 00 .[.w....l.e.....
0565fe00 60 b6 14 00 88 74 19 00 - 9c 96 14 00 a4 96 14 00 `....t..........
0565fe10 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0565fe20 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0565fe30 b8 00 00 00 00 00 00 00 - 00 00 00 00 88 fe 65 05 ..............e.
0565fe40 b3 28 e7 77 00 00 13 00 - 08 00 04 00 b0 00 00 00 .(.w............
0565fe50 18 f7 16 00 00 f0 fd 7f - 00 10 02 03 00 00 00 00 ................
0565fe60 00 00 00 00 00 00 00 00 - 90 fe 65 05 cb 35 03 03 ..........e..5..
0565fe70 00 00 02 03 02 00 00 00 - 00 00 00 00 18 f7 16 00 ................
0565fe80 00 f0 fd 7f 00 10 02 03 - 01 00 00 00 2c 40 03 03 ............,@..
0565fe90 10 f7 16 00 91 10 02 03 - 2c 40 03 03 65 3e f6 77 ........,@..e>.w
0565fea0 00 00 02 03 02 00 00 00 - 00 00 00 00 1c ff 65 05 ..............e.
0565feb0 00 00 00 00 92 12 f6 77 - 60 55 fa 77 98 12 f6 77 .......w`U.w...w
0565fec0 30 ff 65 05 00 00 00 00 - c8 ee 18 00 00 00 00 00 0.e.............
0565fed0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0565fee0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0565fef0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0565ff00 00 00 00 00 c0 fe 65 05 - 00 00 00 00 ff ff ff ff ......e.........
0565ff10 d4 2c f9 77 e8 d0 f9 77 - ff ff ff ff 00 00 00 00 .,.w...w........
0565ff20 d3 63 f7 77 db 63 f7 77 - 30 ff 65 05 01 00 00 00 .c.w.c.w0.e.....
State Dump for Thread Id 0xfa
eax=00004008 ebx=00000000 ecx=00800010 edx=00000000 esi=000001e8 edi=00000000
eip=77f682db esp=0985fe98 ebp=0985febc iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
function: NtWaitForSingleObject
77f682d0 b8c5000000 mov eax,0xc5
77f682d5 8d542404 lea edx,[esp+0x4]
ss:0a7de89f=????????
77f682d9 cd2e int 2e
77f682db c20c00 ret 0xc
77f682de 8bc0 mov eax,eax
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0985febc 77e74f45 000001e8 ffffffff 00000000 60c464dc ntdll!NtWaitForSingleObject
ffffffff 00000000 00000000 00000000 00000000 00000000 kernel32!WaitForSingleObject
stack logically implicates necko.
Assignee: asa → neeti
Component: Browser-General → Networking
QA Contact: doronr → tever
There is related bug 50697 "Solaris/Linux crash when saving file if over disk
quota/out of disk space". It was later marked OS: All, but then marked dup of
bug 35161, "Choosing "Save Page As" to a read-only destination crashes"
Seems the medium/filetype is of less imporance here - the crash is a general
problem occuring when for some reason the medium can't be written to, whether
that be full quota, disk-space or missing write-access.
Judging by other dups on 35161 and comments there, this in effect is a also dup
of bug 35161. Marking as such.
*** This bug has been marked as a duplicate of 35161 ***
Status: UNCONFIRMED → RESOLVED
Closed: 24 years ago
Resolution: --- → DUPLICATE
You need to log in
before you can comment on or make changes to this bug.
Description
•