Crash when saving an image to a nearly full diskette

VERIFIED DUPLICATE of bug 35161

Status

()

Core
Networking
--
critical
VERIFIED DUPLICATE of bug 35161
17 years ago
17 years ago

People

(Reporter: Ilia, Assigned: neeti)

Tracking

Trunk
x86
Windows NT
Points:
---

Firefox Tracking Flags

(Not tracked)

Details

(URL)

(Reporter)

Description

17 years ago
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; WinNT4.0; en-US; 0.7) Gecko/20010109
BuildID:    2001010901

Mozilla crashes when saving an image (using right-click/Save Image As) on a
diskette and the image is lager than amount of free space available on the diskette


Reproducible: Always
Steps to Reproduce:
1.Browse to a page with a large image in it
(a page with a wallpaper, wiew, well-scanned art, etc.)
  Or open a local image(.jpg) file using File|Open File menu entry.
2.Wait until the image is downloaded & renedred completely.
3.Insert a nearly full diskette
(with not enough free space to save the image) into drive A:
4.Right-click on the image, choose "save image as",
than select diskette A: as a target & click "Save"


Actual Results:  Popup window with the message:
Unknown error [280520010]
is displayed;
WinNt displays the popup window with the message:
Error: Access violation [0xc0000005] address 0x60502872
and closes Mozilla.

Expected Results:  Popup window with a message such as:
Not enough space on the disk
and Mozilla continues to operate.
No file is created on the diskette.

The exact WinNT version, as displayed from My Computer/Properities)
4.00.1381
IE 5 5.00.2314.1003
PC has 132M RAM
(so no RAM shortage expected)

This is the DrWatson (WinNT crash logging utility) log of this crash:
------------------- Dr Watson log begin-------------------------------

Application exception occurred:
        App: mozilla.dbg (pid=273)
        When: 1/10/2001 @ 18:50:2.440
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: ILIAB
        User Name: ilia-b
        Number of Processors: 1
        Processor Type: x86 Family 6 Model 6 Stepping 5
        Windows Version: 4.0
        Current Build: 1381
        Service Pack: 6
        Current Type: Uniprocessor Free
        Registered Organization: Terayon
        Registered Owner: ******** (User name removed by me - Ilia)

*----> Task List <----*
   0 Idle.exe
   2 System.exe
  20 smss.exe
  24 csrss.exe
  34 winlogon.exe
  40 services.exe
  43 lsass.exe
  70 spoolss.exe
  80 defwatch.exe
  83 smartagt.exe
  89 rtvscan.exe
  99 nddeagnt.exe
 103 explorer.exe
 109 NSCAGENT.exe
 114 RpcSs.exe
 131 pstores.exe
 137 PH32SVC.exe
 144 MSTask.exe
 163 vptray.exe
 167 PHOST32.exe
 169 EM_EXEC.exe
 171 comsmd.exe
 176 DACONFIG.exe
 178 internat.exe
  73 msoffice.exe
 181 vpexrt.exe
 127 ddhelp.exe
 324 babylon.exe
 122 OUTLOOK.exe
 279 MAPISP32.exe
 273 Mozilla.exe
 308 rundll32.exe
 320 NOTEPAD.exe
 295 drwtsn32.exe
   0 _Total.exe

(00400000 - 00456000) mozilla.dbg
(77f60000 - 77fbe000) dll\ntdll.dbg
(60cd0000 - 60d2b000) xpcom.dbg
(60c30000 - 60c54000) nspr4.dbg
(77dc0000 - 77dff000) dll\advapi32.dbg
(77e70000 - 77ed0000) dll\kernel32.dbg
(77f00000 - 77f53000) dll\user32.dbg
(77ed0000 - 77efc000) dll\gdi32.dbg
(77e10000 - 77e67000) dll\rpcrt4.dbg
(776d0000 - 776d8000) dll\wsock32.dbg
(776b0000 - 776c4000) dll\ws2_32.dbg
(78000000 - 78040000)
(776a0000 - 776a7000) dll\ws2help.dbg
(60cb0000 - 60cb6000) plds4.dbg
(60ca0000 - 60ca7000) plc4.dbg
(60bf0000 - 60bf9000) mozreg.dbg
(70960000 - 70b05000) shell32.dbg
(70bd0000 - 70c14000) SHLWAPI.dbg
(71590000 - 71617000) COMCTL32.dbg
(77b20000 - 77bd7000) dll\ole32.dbg
(60ad0000 - 60b1a000) js3250.dbg
(5db00000 - 5db20000) dll\lpk.dbg
(5b780000 - 5b78e000) dll\lpkbidi.dbg
(52000000 - 52006000) dll\indicdll.dbg
(60a10000 - 60a3a000) xpinstal.dbg
(60460000 - 60466000) jsloader.dbg
(60080000 - 6009d000) appshell.dbg
(600c0000 - 600cc000) chardet.dbg
(60850000 - 6085b000) uconv.dbg
(60a80000 - 60a9d000) gkwidget.dbg
(77d80000 - 77db2000) dll\comdlg32.dbg
(77fd0000 - 77ffa000) dll\winmm.dbg
(60a50000 - 60a74000) gkgfxwin.dbg
(60aa0000 - 60aac000) img3250.dbg
(60770000 - 607ba000) rdf.dbg
(60b20000 - 60b8c000) jsdom.dbg
(60a40000 - 60a49000) xppref32.dbg
(609f0000 - 60a0a000) xpc3250.dbg
(60740000 - 6074c000) profile.dbg
(60640000 - 60689000) necko.dbg
(60d40000 - 60d4c000) zlib.dbg
(77660000 - 7766f000) dll\msafd.dbg
(77690000 - 77699000) dll\wshtcpip.dbg
(608f0000 - 60903000) ucvlatin.dbg
(60110000 - 60122000) docshell.dbg
(60960000 - 6096c000) urildr.dbg
(60750000 - 60766000) psmglue.dbg
(601c0000 - 60358000) gkhtml.dbg
(60810000 - 60817000) strres.dbg
(600f0000 - 600fe000) chrome.dbg
(60360000 - 603a1000) gkparser.dbg
(780a0000 - 780b2000)
(60840000 - 60847000) ucharuti.dbg
(60450000 - 6045d000) jar50.dbg
(606c0000 - 606cc000) nslocale.dbg
(60100000 - 6010a000) cookie.dbg
(60730000 - 6073a000) oji.dbg
(60b90000 - 60ba1000) jsj3250.dbg
(603b0000 - 603c4000) gkplugin.dbg
(77a90000 - 77a9b000) dll\version.dbg
(779c0000 - 779c8000) dll\lz32.dbg
(604d0000 - 604d9000) mozbrwsr.dbg
(60050000 - 6007c000) appcomps.dbg
(604b0000 - 604ca000) mork.dbg
(600a0000 - 600b4000) caps.dbg
(60980000 - 60990000) wallet.dbg
(603d0000 - 603e0000) gkview.dbg
(607e0000 - 607e6000) shistory.dbg
(60130000 - 60186000) editor.dbg
(60820000 - 60826000) txmgr.dbg
(606a0000 - 606a6000) nsgif.dbg
(74ff0000 - 74ffe000) dll\rnr20.dbg
(77bf0000 - 77bf7000) dll\rpcltc1.dbg
(60480000 - 60486000) lwbrk.dbg
(03020000 - 03020000)
(10000000 - 10000000)
(71190000 - 71197000) dll\msidle.dbg
(606b0000 - 606b5000) nsjpg.dbg
(60ab0000 - 60ac5000) jpeg3250.dbg
(604e0000 - 604e6000) mozfind.dbg
(60830000 - 60839000) txtsvc.dbg
(77a40000 - 77a4d000) dll\ntshrui.dbg
(77800000 - 7783a000) dll\netapi32.dbg
(77840000 - 77849000) dll\NetRap.dbg
(777e0000 - 777ed000) dll\samlib.dbg
(77720000 - 77731000) dll\mpr.dbg
(777f0000 - 777fc000) dll\ntlanman.dbg
(77890000 - 778a5000) dll\netui0.dbg
(77850000 - 7788a000) dll\netui1.dbg
(70400000 - 70477000) MLANG.dbg
(60500000 - 60506000) mozxfer.dbg
(609a0000 - 609a6000) wlltvwrs.dbg

State Dump for Thread Id 0xd8

eax=00000000 ebx=00000000 ecx=069bce60 edx=0012dce4 esi=0693526c edi=80000000
eip=60502872 esp=0012dcd0 ebp=0012fcec iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246


function: NSGetModule
        60502858 50               push    eax
        60502859 ff5214           call    dword ptr [edx+0x14]
ds:010ac6ea=????????
        6050285c 8bd8             mov     ebx,eax
        6050285e 85df             test    edi,ebx
        60502860 753e             jnz     NSGetModule+0x7c0 (605028a0)
        60502862 8b4610           mov     eax,[esi+0x10]
ds:078b3c72=????????
        60502865 8d55f8           lea     edx,[ebp-0x8]
ss:010ae6f2=????????
        60502868 52               push    edx
        60502869 8d95f8dfffff     lea     edx,[ebp+0xffffdff8]
ss:0012dce4=27156424
        6050286f ff75fc           push    dword ptr [ebp-0x4]
ss:010ae6f2=????????
FAULT ->60502872 8b08             mov     ecx,[eax]
ds:00000000=????????
        60502874 52               push    edx
        60502875 50               push    eax
        60502876 ff5114           call    dword ptr [ecx+0x14]
ds:0793b866=????????
        60502879 8bd8             mov     ebx,eax
        6050287b 23c7             and     eax,edi
        6050287d 750d             jnz     NSGetModule+0x7ac (6050288c)
        6050287f 8b4df8           mov     ecx,[ebp-0x8]
ss:010ae6f2=????????
        60502882 3b4dfc           cmp     ecx,[ebp-0x4]
ss:010ae6f2=????????
        60502885 7505             jnz     NSGetModule+0x7ac (6050288c)
        60502887 294d08           sub     [ebp+0x8],ecx
ss:010ae6f2=????????
        6050288a eb21             jmp     NSGetModule+0x7cd (605028ad)

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0012fcec 606733ad 00002000 06936d90 00000000 069bc5dc mozxfer!NSGetModule
0012fd14 60646c49 06936d98 069bb900 00000000 069bc5dc necko!DupString
0012fd3c 6064675a 00000000 069fba80 60cfeee7 069fba80 necko!NSGetModule
0012fd48 60cfeee7 069fba80 00000000 00867800 60cfee55 necko!NSGetModule  (FPO:
[1,0,1])
0012fd58 60cfee55 069fba80 0050bd88 0012fd80 00867800 xpcom!PL_HandleEvent
(FPO: [1,0,2])
0012fd70 60cff0b1 00867800 0012fdc8 0012fdd0 77f013ed
xpcom!PL_ProcessPendingEvents  (FPO: [EBP 0x0050bd88] [1,0,4])
0050bd88 00000002 808785f8 a030bd88 e23278a8 a02d43b8 xpcom!PL_IsQueueNative

*----> Raw Stack Dump <----*
0012dcd0  00 20 00 00 e4 fc 12 00 - 00 00 00 00 98 6d 93 06  . ...........m..
0012dce0  20 26 c4 60 24 64 15 27 - 00 92 41 c9 38 c0 03 f3   &.`$d.'..A.8...
0012dcf0  a8 be de e4 86 52 40 04 - 00 b8 24 85 61 d5 89 ce  .....R@...$.a...
0012dd00  71 e8 00 cf af 7a a6 db - 70 32 cd 23 85 52 55 be  q....z..p2.#.RU.
0012dd10  e6 37 06 66 1d 00 6d bc - 67 ff 00 af 55 84 8c 0f  .7.f..m.g...U...
0012dd20  97 b8 90 72 c3 03 e6 04 - 10 ca 06 39 e7 18 e7 d7  ...r.......9....
0012dd30  b9 ae 88 53 76 d9 69 6b - 6a bf 1d 76 f5 f3 39 a7  ...Sv.ikj..v..9.
0012dd40  8c b3 7e f2 b2 d3 7b db - 6d 37 df 67 b6 85 df b4  ..~...{.m7.g....
0012dd50  ca 8f e6 3e e7 4c ff 00 - 09 da 70 7b 1c e7 81 e9  ...>.L....p{....
0012dd60  c7 bd 48 26 19 0e 09 20 - a3 2b 29 66 18 04 7d dc  ..H&... .+)f..}.
0012dd70  82 01 ef 81 9f 62 2b 34 - dc 6d 89 c9 38 04 e1 bc  .....b+4.m..8...
0012dd80  ce 4f 24 64 0c e3 b7 03 - 9f cb 9c 40 2e 0b f2 98  .O$d.......@....
0012dd90  f2 dc b0 11 b1 00 8d 87 - 8c 10 41 3d f3 cd 74 42  ..........A=..tB
0012dda0  97 35 f9 b4 b5 b4 d1 99 - 54 c4 c6 2d 72 cb 56 ae  .5......T..-r.V.
0012ddb0  ef ff 00 6e db 7f 9f a3 - 57 f5 dd 8e 6f de 32 b2  ...n....W...o.2.
0012ddc0  f2 ca a2 32 a4 a8 2a 44 - 7b 81 c1 ed b8 81 8c 7d  ...2..*D{......}
0012ddd0  d1 9e f5 65 67 8e 17 0f - 26 44 63 2a c0 16 62 1c  ...eg...&Dc*..b.
0012dde0  e4 67 70 3b b8 1d 89 ed - e9 c5 61 09 1f e6 2c ec  .gp;......a...,.
0012ddf0  0b 3b 05 23 aa 06 74 e5 - 78 c1 f9 63 c8 c8 c7 3d  .;.#..t.x..c...=
0012de00  f8 cc ca c4 ec 8d 06 0b - 4a 11 b2 09 e0 e4 79 87  ........J.....y.

State Dump for Thread Id 0x5c

eax=5db0b2a0 ebx=00000000 ecx=00000001 edx=00000000 esi=00000000 edi=00000000
eip=77f67b57 esp=00a1ff6c ebp=00a1ffa0 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246


function: NtNotifyChangeKey
        77f67b4c b84b000000       mov     eax,0x4b
        77f67b51 8d542404         lea     edx,[esp+0x4]
ss:0199e973=????????
        77f67b55 cd2e             int     2e
        77f67b57 c22800           ret     0x28
        77f67b5a 8bc0             mov     eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
00a1ffa0 5db0122c 00000064 00000001 00000004 00000000 ntdll!NtNotifyChangeKey
00a1ffec 00000000 00000000 00000000 00000000 00000000 lpk!LpkInitialize
00000000 00000000 00000000 00000000 00000000 00000000 mozilla!<nosymbols>

State Dump for Thread Id 0x128

eax=1730b000 ebx=00000000 ecx=00c1ffa8 edx=00000000 esi=00000044 edi=00c1fee0
eip=77f682db esp=00c1fec4 ebp=00c1fee8 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000206


function: NtWaitForSingleObject
        77f682d0 b8c5000000       mov     eax,0xc5
        77f682d5 8d542404         lea     edx,[esp+0x4]
ss:01b9e8cb=????????
        77f682d9 cd2e             int     2e
        77f682db c20c00           ret     0xc
        77f682de 8bc0             mov     eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
00c1fee8 77e74f45 00000044 0000ea60 00000000 60c464dc ntdll!NtWaitForSingleObject
0000ea60 00000000 00000000 00000000 00000000 00000000 kernel32!WaitForSingleObject

*----> Raw Stack Dump <----*
00c1fec4  9f cc e8 77 44 00 00 00 - 00 00 00 00 e0 fe c1 00  ...wD...........
00c1fed4  f4 23 81 00 90 21 81 00 - 2c 24 81 00 00 ba 3c dc  .#...!..,$....<.
00c1fee4  ff ff ff ff 60 ea 00 00 - 45 4f e7 77 44 00 00 00  ....`...EO.wD...
00c1fef4  60 ea 00 00 00 00 00 00 - dc 64 c4 60 44 00 00 00  `........d.`D...
00c1ff04  60 ea 00 00 10 24 81 00 - 90 21 81 00 20 30 c4 60  `....$...!.. 0.`
00c1ff14  00 00 00 00 2c 2a c4 60 - f4 23 81 00 2c 24 81 00  ....,*.`.#..,$..
00c1ff24  0c 46 44 00 10 24 81 00 - 0c 46 44 00 d3 2c c4 60  .FD..$...FD..,.`
00c1ff34  90 21 81 00 80 23 81 00 - 10 24 81 00 0c 46 44 00  .!...#...$...FD.
00c1ff44  a0 24 81 00 78 76 cd 60 - 80 23 81 00 0c 46 44 00  .$..xv.`.#...FD.
00c1ff54  38 22 81 00 6c 23 81 00 - b8 ff c1 00 40 20 81 00  8"..l#......@ ..
00c1ff64  5e cc cf 60 00 00 00 00 - 90 21 81 00 71 36 c4 60  ^..`.....!..q6.`
00c1ff74  60 23 81 00 e0 1e 81 00 - e0 1e 81 00 47 00 00 00  `#..........G...
00c1ff84  40 20 81 00 5a 26 00 78 - 90 21 81 00 47 00 00 00  @ ..Z&.x.!..G...
00c1ff94  00 00 00 00 40 20 81 00 - c0 7a 7c 80 90 ff c1 00  ....@ ...z|.....
00c1ffa4  8b 74 11 80 dc ff c1 00 - 03 ef 00 78 c8 e2 02 78  .t.........x...x
00c1ffb4  00 00 00 00 ec ff c1 00 - ec 4e e7 77 40 20 81 00  .........N.w@ ..
00c1ffc4  47 00 00 00 00 00 00 00 - 40 20 81 00 00 00 00 00  G.......@ ......
00c1ffd4  c4 ff c1 00 01 00 00 00 - ff ff ff ff 9c c3 ea 77  ...............w
00c1ffe4  38 e2 ea 77 00 00 00 00 - 00 00 00 00 00 00 00 00  8..w............
00c1fff4  ff 25 00 78 40 20 81 00 - 00 00 00 00 07 00 00 00  .%.x@ ..........

State Dump for Thread Id 0x100

eax=000000c0 ebx=00000000 ecx=001304c0 edx=00000000 esi=00000000 edi=0000009c
eip=77f682db esp=00e6ff44 ebp=00e6ff98 iopl=0         nv up ei ng nz ac pe cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000293


function: NtWaitForSingleObject
        77f682d0 b8c5000000       mov     eax,0xc5
        77f682d5 8d542404         lea     edx,[esp+0x4]
ss:01dee94b=00000001
        77f682d9 cd2e             int     2e
        77f682db c20c00           ret     0xc
        77f682de 8bc0             mov     eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
00e6ff98 77661e92 0000009c ffffffff 00000003 00000004 ntdll!NtWaitForSingleObject
00e6ffec 00000000 00000000 00000000 00000000 00000000 msafd!<nosymbols>
00000000 00000000 00000000 00000000 00000000 00000000 mozilla!<nosymbols>

State Dump for Thread Id 0x60

eax=00000000 ebx=7766b100 ecx=008aa800 edx=00000000 esi=00148610 edi=000000d4
eip=77f682db esp=00f6fa08 ebp=00f6fa5c iopl=0         nv up ei ng nz ac pe cy
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000293


function: NtWaitForSingleObject
        77f682d0 b8c5000000       mov     eax,0xc5
        77f682d5 8d542404         lea     edx,[esp+0x4]
ss:01eee40f=????????
        77f682d9 cd2e             int     2e
        77f682db c20c00           ret     0xc
        77f682de 8bc0             mov     eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
00f6fa5c 77664a12 000000d4 000000b0 00000001 00000004 ntdll!NtWaitForSingleObject
00f6fb84 776b9f5f 00000000 00f6fd24 00f6fc20 00f6fe28 msafd!<nosymbols>
00f6fbd4 60c487e9 00000000 00f6fd24 00f6fc20 00f6fe28 ws2_32!select

*----> Raw Stack Dump <----*
00f6fa08  ce 89 66 77 d4 00 00 00 - 01 00 00 00 34 fa f6 00  ..fw........4...
00f6fa18  20 fc f6 00 24 fd f6 00 - 9c fa f6 00 f0 f6 23 50   ...$.........#P
00f6fa28  25 7b c0 01 ff ff ff ff - ff ff ff 7f ff ff ff ff  %{..............
00f6fa38  ff ff ff 7f 00 00 00 00 - a8 ff f6 00 60 98 66 77  ............`.fw
00f6fa48  c3 49 66 77 b0 00 00 00 - 00 00 00 00 00 00 00 00  .Ifw............
00f6fa58  00 00 00 00 84 fb f6 00 - 12 4a 66 77 d4 00 00 00  .........Jfw....
00f6fa68  b0 00 00 00 01 00 00 00 - 04 00 00 00 f8 49 13 00  .............I..
00f6fa78  24 fd f6 00 c0 76 14 00 - 80 6c 23 eb ff ff ff ff  $....v...l#.....
00f6fa88  01 00 00 00 00 fa f6 00 - b0 00 00 00 19 00 00 00  ................
00f6fa98  b0 fa f6 00 01 00 00 00 - bc fa f6 00 b8 fa f6 00  ................
00f6faa8  00 00 00 00 00 00 00 00 - 00 04 00 00 44 fb f6 00  ............D...
00f6fab8  00 00 00 00 02 00 00 00 - 44 fb f6 00 00 00 00 00  ........D.......
00f6fac8  10 00 00 00 44 fb f6 00 - 00 04 00 00 00 00 00 00  ....D...........
00f6fad8  00 04 00 00 a0 a1 8a 00 - 50 9c 8a 00 44 fb f6 00  ........P...D...
00f6fae8  23 00 00 00 80 69 67 ff - 44 fb f6 00 00 00 00 00  #....ig.D.......
00f6faf8  f6 ff ff ff 01 00 00 00 - 00 00 00 00 34 a2 8a 00  ............4...
00f6fb08  00 00 00 00 78 10 c4 60 - a0 a1 8a 00 44 fb f6 00  ....x..`....D...
00f6fb18  00 04 00 00 00 00 00 00 - ff ff ff ff 88 fa f6 00  ................
00f6fb28  2c 00 00 00 03 01 00 00 - 90 fa f6 00 dd 42 c3 60  ,............B.`
00f6fb38  a0 a1 8a 00 44 fb f6 00 - 00 04 00 00 38 38 15 00  ....D.......88..

State Dump for Thread Id 0x84

eax=00000000 ebx=008aaa30 ecx=ffffffff edx=00000000 esi=77f02b55 edi=0106ff44
eip=77f3f037 esp=0106ff00 ebp=0106ff24 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246


function: GetMenuItemRect
        77f3f01c b887110000       mov     eax,0x1187
        77f3f021 8d542404         lea     edx,[esp+0x4]
ss:01fee907=ad275400
        77f3f025 cd2e             int     2e
        77f3f027 c21000           ret     0x10
        77f3f02a 8bc0             mov     eax,eax
        77f3f02c b888110000       mov     eax,0x1188
        77f3f031 8d542404         lea     edx,[esp+0x4]
ss:01fee907=ad275400
        77f3f035 cd2e             int     2e
        77f3f037 c21400           ret     0x14
        77f3f03a 8bc0             mov     eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0106ff24 60651407 0106ff44 02190286 00000000 00000000 user32!GetMenuItemRect
0106ff60 60cfcc5e 00000000 008aab80 60c43671 008a9360 necko!ExtractURLScheme
0106ff6c 60c43671 008a9360 00811ee0 00811ee0 ffffffff
xpcom!nsComponentManager::EnumerateContractIDs  (FPO: [1,0,1])
0106ff7c ffffffff 008aaa30 7800265a 008aab80 ffffffff nspr4!PRP_TryLock  (FPO:
[1,0,2])
0106ffb8 77e74eec 008aaa30 ffffffff 008aa780 008aaa30 gdi32!<nosymbols>
0106ffec 00000000 780025ff 008aaa30 00000000 04e4000d kernel32!lstrcmpiW
00000000 00000000 00000000 00000000 00000000 00000000 mozilla!<nosymbols>

*----> Raw Stack Dump <----*
0106ff00  8a 2b f0 77 44 ff 06 01 - 86 02 19 02 00 00 00 00  .+.wD...........
0106ff10  00 00 00 00 20 ff 06 01 - 44 95 8a 00 55 2b f0 77  .... ...D...U+.w
0106ff20  55 2b f0 77 60 ff 06 01 - 07 14 65 60 44 ff 06 01  U+.w`.....e`D...
0106ff30  86 02 19 02 00 00 00 00 - 00 00 00 00 6c 93 8a 00  ............l...
0106ff40  28 ac 8a 00 86 02 19 02 - 00 04 00 00 13 00 00 00  (...............
0106ff50  68 00 00 00 64 15 02 0b - 9a 01 00 00 64 01 00 00  h...d.......d...
0106ff60  b8 ff 06 01 5e cc cf 60 - 00 00 00 00 80 ab 8a 00  ....^..`........
0106ff70  71 36 c4 60 60 93 8a 00 - e0 1e 81 00 e0 1e 81 00  q6.``...........
0106ff80  ff ff ff ff 30 aa 8a 00 - 5a 26 00 78 80 ab 8a 00  ....0...Z&.x....
0106ff90  ff ff ff ff 80 a7 8a 00 - 30 aa 8a 00 00 00 00 00  ........0.......
0106ffa0  90 ff 06 01 8b 74 11 80 - dc ff 06 01 03 ef 00 78  .....t.........x
0106ffb0  c8 e2 02 78 00 00 00 00 - ec ff 06 01 ec 4e e7 77  ...x.........N.w
0106ffc0  30 aa 8a 00 ff ff ff ff - 80 a7 8a 00 30 aa 8a 00  0...........0...
0106ffd0  80 a7 8a 00 c4 ff 06 01 - 50 06 13 00 ff ff ff ff  ........P.......
0106ffe0  9c c3 ea 77 38 e2 ea 77 - 00 00 00 00 00 00 00 00  ...w8..w........
0106fff0  00 00 00 00 ff 25 00 78 - 30 aa 8a 00 00 00 00 00  .....%.x0.......
01070000  0d 00 e4 04 01 00 3f 00 - 3f 00 3f 00 3f 00 00 00  ......?.?.?.?...
01070010  00 00 00 00 00 00 00 00 - 00 00 03 01 00 00 01 00  ................
01070020  02 00 03 00 04 00 05 00 - 06 00 07 00 08 00 09 00  ................
01070030  0a 00 0b 00 0c 00 0d 00 - 0e 00 0f 00 10 00 11 00  ................

State Dump for Thread Id 0x12b

eax=0000054a ebx=00000000 ecx=7ffd7000 edx=00000000 esi=0014dc90 edi=0019fd30
eip=77f67fa7 esp=0118fdf0 ebp=0118ff90 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000202


function: ZwReplyWaitReceivePort
        77f67f9c b890000000       mov     eax,0x90
        77f67fa1 8d542404         lea     edx,[esp+0x4]
ss:0210e7f7=????????
        77f67fa5 cd2e             int     2e
        77f67fa7 c21000           ret     0x10
        77f67faa 8bc0             mov     eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0118ff90 77e15a1d 77e160f7 0014dc90 0118ffec 0012f554 ntdll!ZwReplyWaitReceivePort
00003a98 00000000 00000000 00000000 00000000 00000000 rpcrt4!NdrOleAllocate

State Dump for Thread Id 0x65

eax=00001008 ebx=00000000 ecx=00800010 edx=00000000 esi=00000098 edi=00000000
eip=77f682db esp=0299ff64 ebp=0299ff88 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246


function: NtWaitForSingleObject
        77f682d0 b8c5000000       mov     eax,0xc5
        77f682d5 8d542404         lea     edx,[esp+0x4]
ss:0391e96b=????????
        77f682d9 cd2e             int     2e
        77f682db c20c00           ret     0xc
        77f682de 8bc0             mov     eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0299ff88 77e74f45 00000098 ffffffff 00000000 776b1c09 ntdll!NtWaitForSingleObject
0299ffb8 77e74eec 0014eb20 ffffffff 00f6fcd8 0014eb20 kernel32!WaitForSingleObject
0299ffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW
00000000 00000000 00000000 00000000 00000000 00000000 mozilla!<nosymbols>

State Dump for Thread Id 0x141

eax=77e160a4 ebx=00000000 ecx=00000000 edx=00000000 esi=0014dc90 edi=0019fd30
eip=77f67fa7 esp=0565fdf0 ebp=0565ff90 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000206


function: ZwReplyWaitReceivePort
        77f67f9c b890000000       mov     eax,0x90
        77f67fa1 8d542404         lea     edx,[esp+0x4]
ss:065de7f7=0000b005
        77f67fa5 cd2e             int     2e
        77f67fa7 c21000           ret     0x10
        77f67faa 8bc0             mov     eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0565ff90 77e15a1d 77e160f7 0014dc90 0565ffec 00000000 ntdll!ZwReplyWaitReceivePort
00003a98 00000000 00000000 00000000 00000000 00000000 rpcrt4!NdrOleAllocate

*----> Raw Stack Dump <----*
0565fdf0  9f 5b e1 77 e4 00 00 00 - 6c ff 65 05 00 00 00 00  .[.w....l.e.....
0565fe00  60 b6 14 00 88 74 19 00 - 9c 96 14 00 a4 96 14 00  `....t..........
0565fe10  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0565fe20  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0565fe30  b8 00 00 00 00 00 00 00 - 00 00 00 00 88 fe 65 05  ..............e.
0565fe40  b3 28 e7 77 00 00 13 00 - 08 00 04 00 b0 00 00 00  .(.w............
0565fe50  18 f7 16 00 00 f0 fd 7f - 00 10 02 03 00 00 00 00  ................
0565fe60  00 00 00 00 00 00 00 00 - 90 fe 65 05 cb 35 03 03  ..........e..5..
0565fe70  00 00 02 03 02 00 00 00 - 00 00 00 00 18 f7 16 00  ................
0565fe80  00 f0 fd 7f 00 10 02 03 - 01 00 00 00 2c 40 03 03  ............,@..
0565fe90  10 f7 16 00 91 10 02 03 - 2c 40 03 03 65 3e f6 77  ........,@..e>.w
0565fea0  00 00 02 03 02 00 00 00 - 00 00 00 00 1c ff 65 05  ..............e.
0565feb0  00 00 00 00 92 12 f6 77 - 60 55 fa 77 98 12 f6 77  .......w`U.w...w
0565fec0  30 ff 65 05 00 00 00 00 - c8 ee 18 00 00 00 00 00  0.e.............
0565fed0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0565fee0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0565fef0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0565ff00  00 00 00 00 c0 fe 65 05 - 00 00 00 00 ff ff ff ff  ......e.........
0565ff10  d4 2c f9 77 e8 d0 f9 77 - ff ff ff ff 00 00 00 00  .,.w...w........
0565ff20  d3 63 f7 77 db 63 f7 77 - 30 ff 65 05 01 00 00 00  .c.w.c.w0.e.....

State Dump for Thread Id 0xfa

eax=00004008 ebx=00000000 ecx=00800010 edx=00000000 esi=000001e8 edi=00000000
eip=77f682db esp=0985fe98 ebp=0985febc iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246


function: NtWaitForSingleObject
        77f682d0 b8c5000000       mov     eax,0xc5
        77f682d5 8d542404         lea     edx,[esp+0x4]
ss:0a7de89f=????????
        77f682d9 cd2e             int     2e
        77f682db c20c00           ret     0xc
        77f682de 8bc0             mov     eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0985febc 77e74f45 000001e8 ffffffff 00000000 60c464dc ntdll!NtWaitForSingleObject
ffffffff 00000000 00000000 00000000 00000000 00000000 kernel32!WaitForSingleObject

Comment 1

17 years ago
stack logically implicates necko.
Assignee: asa → neeti
Component: Browser-General → Networking
QA Contact: doronr → tever

Comment 2

17 years ago
There is related bug 50697 "Solaris/Linux crash when saving file if over disk
quota/out of disk space". It was later marked OS: All, but then marked dup of
bug 35161, "Choosing "Save Page As" to a read-only destination crashes"

Seems the medium/filetype is of less imporance here - the crash is a general
problem occuring when for some reason the medium can't be written to, whether
that be full quota, disk-space or missing write-access.

Judging by other dups on 35161 and comments there, this in effect is a also dup
of bug 35161. Marking as such.

*** This bug has been marked as a duplicate of 35161 ***
Status: UNCONFIRMED → RESOLVED
Last Resolved: 17 years ago
Resolution: --- → DUPLICATE

Comment 3

17 years ago
verified
Status: RESOLVED → VERIFIED
You need to log in before you can comment on or make changes to this bug.