Bug 20877

Summary: Submitting a form (having textfield) causes crash
Product: WebKit Reporter: Jyrki Wahlstedt <jyrki.wahlstedt>
Component: FormsAssignee: Nobody <webkit-unassigned>
Status: RESOLVED FIXED    
Severity: Critical CC: spam_hole
Priority: P1    
Version: 528+ (Nightly build)   
Hardware: PC   
OS: Windows XP   
Attachments:
Description Flags
The crash dump file none

Description Jyrki Wahlstedt 2008-09-15 23:12:03 PDT
Using nightly build causes crash, when a form is submitted. The crash dump follows (a long one, sorry, but that's what dear Dr. Watson gives)(this is produced with r36446, but existed at least in the previous version, and maybe before that, too):

Microsoft (R) DrWtsn32
Copyright (C) 1985-2001 Microsoft Corp. All rights reserved.



Application exception occurred:
        App: C:\DOCUME~1\FIJYRW~1\LOCALS~1\Temp\WebKitNightly\Safari.exe (pid=5872)
        When: 16.9.2008 @ 09:04:15.608
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: FINJYRWAHL5
        User Name: fijyrwahl
        Terminal Session Id: 0
        Number of Processors: 2
        Processor Type: x86 Family 6 Model 15 Stepping 11
        Windows Version: 5.1
        Current Build: 2600
        Service Pack: 2
        Current Type: Multiprocessor Free
        Registered Organization: Fujitsu
        Registered Owner: Fujitsu

*----> Task List <----*
   0 System Process
   4 System
1304 smss.exe
1352 csrss.exe
1376 winlogon.exe
1420 services.exe
1432 lsass.exe
1584 svchost.exe
1688 svchost.exe
1904 svchost.exe
1944 svchost.exe
2012 svchost.exe
 400 svchost.exe
 956 spoolsv.exe
1000 SCardSvr.exe
1264 AppleMobileDeviceService.exe
1292 mDNSResponder.exe
1496 ccmsetup.exe
1832 cvpnd.exe
1884 fsgk32st.exe
1932 FSGK32.EXE
1992 FSMA32.EXE
 260 mdclimgr.exe
 308 NHOSTSVC.EXE
 368 FSMB32.EXE
 580 mdclient.exe
 652 pg_ctl.exe
 740 Prot_srv.exe
 756 pstartSr.exe
 888 ScrumworksService.exe
 876 postgres.exe
1148 svchost.exe
1740 postgres.exe
1808 FCH32.EXE
2076 FAMEH32.EXE
2104 postgres.exe
2116 postgres.exe
2124 postgres.exe
2132 postgres.exe
2148 fsqh.exe
2384 fsaua.exe
2496 fssm32.exe
2612 FNRB32.EXE
2736 fsdfwd.exe
2744 FIH32.EXE
2792 wmiprvse.exe
2840 alg.exe
2968 ssonsvr.exe
2440 fsav32.exe
2456 Explorer.EXE
3288 SynTPEnh.exe
3092 RTHDCPL.EXE
3656 AGRSMMSG.exe
3936 igfxtray.exe
4072 hkcmd.exe
1168 igfxpers.exe
1480 igfxsrvc.exe
1836 mdtray.exe
3340 FSM32.EXE
3652 P95Tray.exe
3756 GoogleDesktop.exe
3912 jusched.exe
 324 LaunchApplication.exe
2296 GoogleDesktop.exe
2324 fsguidll.exe
3480 ServiceLayer.exe
 392 iTunesHelper.exe
3792 ctfmon.exe
 672 PcSync2.exe
2996 GoogleUpdate.exe
3192 TosBtMng.exe
3824 GoogleDesktop.exe
 384 WinCinemaMgr.exe
4420 pnagent.exe
4860 iPodService.exe
4940 TosA2dp.exe
5216 MPAPI3s.exe
5260 TosBtHid.exe
5280 TosBtHsp.exe
5380 OUTLOOK.EXE
5852 iTunes.exe
3036 LastFM.exe
 336 AppleMobileDeviceHelper.exe
 360 distnoted.exe
6068 WINWORD.EXE
1984 POWERPNT.EXE
5036 EXCEL.EXE
4260 AcroRd32.exe
6012 firefox.exe
4004 taskmgr.exe
3752 realsched.exe
5164 cmd.exe
5872 Safari.exe
3720 drwtsn32.exe

*----> Module List <----*
(0000000000400000 - 0000000000757000: C:\DOCUME~1\FIJYRW~1\LOCALS~1\Temp\WebKitNightly\Safari.exe
(0000000000760000 - 00000000014a8000: C:\temp\webkit\WebKit-r36446\icudt40.dll
(0000000002040000 - 0000000002056000: C:\Program Files\F-Secure\FWES\Program\fsdc.dll
(0000000002ce0000 - 0000000002cf5000: c:\program files\f-secure\scanner-interface\fsgkiapi.dll
(0000000010000000 - 00000000105a6000: C:\DOCUME~1\FIJYRW~1\LOCALS~1\Temp\WebKitNightly\WebKit.dll
(0000000016000000 - 0000000016010000: C:\WINDOWS\system32\dnssd.dll
(0000000016080000 - 00000000160a5000: C:\Program Files\Bonjour\mdnsNSP.dll
(0000000020000000 - 000000002003f000: C:\Program Files\Common Files\System\wab32res.dll
(0000000034000000 - 0000000034033000: C:\Program Files\F-Secure\FSPS\program\FSLSP.DLL
(00000000470d0000 - 0000000047151000: C:\Program Files\Common Files\System\wab32.dll
(000000004a800000 - 000000004a8e0000: C:\temp\webkit\WebKit-r36446\icuuc40.dll
(000000004a900000 - 000000004a9fb000: C:\temp\webkit\WebKit-r36446\icuin40.dll
(000000004ad00000 - 000000004b8ba000: C:\Program Files\Safari\icudt36.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\uxtheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(000000005e0c0000 - 000000005e0cd000: C:\WINDOWS\system32\PSTOREC.DLL
(0000000060000000 - 0000000060083000: C:\Program Files\Safari\PubSubDLL.dll
(00000000605d0000 - 00000000605d9000: C:\WINDOWS\system32\mslbui.dll
(00000000606b0000 - 00000000607bd000: C:\WINDOWS\system32\ESENT.dll
(0000000060890000 - 0000000060896000: C:\WINDOWS\system32\msidntld.dll
(00000000608a0000 - 00000000608af000: C:\WINDOWS\system32\msident.dll
(0000000061900000 - 000000006195a000: C:\Program Files\Safari\SQLite3.dll
(0000000062300000 - 000000006240f000: C:\Program Files\Safari\libxml2.dll
(0000000063700000 - 0000000063776000: C:\Program Files\Safari\SpellChecker.dll
(0000000065500000 - 0000000065572000: C:\Program Files\Safari\CoreFoundation.dll
(0000000065a00000 - 0000000065a13000: C:\Program Files\Safari\zlib1.dll
(0000000065f00000 - 000000006626f000: C:\Program Files\Safari\CoreGraphics.dll
(00000000662b0000 - 0000000066308000: C:\WINDOWS\system32\hnetcfg.dll
(0000000069600000 - 0000000069610000: C:\Program Files\Safari\pthreadVC2.dll
(000000006a500000 - 000000006a56d000: C:\Program Files\Safari\CFNetwork.dll
(000000006b400000 - 000000006b4fd000: C:\Program Files\Safari\icuuc36.dll
(000000006e100000 - 000000006e14e000: C:\Program Files\Safari\libtidy.dll
(000000006f500000 - 000000006f549000: C:\Program Files\Safari\SafariTheme.dll
(000000006fa00000 - 000000006fad8000: C:\Program Files\Safari\icuin36.dll
(0000000071a50000 - 0000000071a8f000: C:\WINDOWS\system32\mswsock.dll
(0000000071a90000 - 0000000071a98000: C:\WINDOWS\System32\wshtcpip.dll
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\WSOCK32.dll
(0000000071bf0000 - 0000000071c03000: C:\WINDOWS\system32\SAMLIB.dll
(0000000073000000 - 0000000073026000: C:\WINDOWS\system32\WINSPOOL.DRV
(0000000073030000 - 0000000073040000: C:\WINDOWS\system32\WZCSAPI.DLL
(0000000073b30000 - 0000000073b45000: C:\WINDOWS\system32\mscms.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF.dll
(0000000074d90000 - 0000000074dfb000: C:\WINDOWS\system32\USP10.dll
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\WINSTA.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\system32\MSIMG32.dll
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.DLL
(0000000076400000 - 00000000765a6000: C:\WINDOWS\system32\netshell.dll
(0000000076790000 - 000000007679c000: C:\WINDOWS\system32\Cryptdll.dll
(0000000076880000 - 00000000768a2000: C:\WINDOWS\system32\MSOERT2.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DLL
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076c00000 - 0000000076c2e000: C:\WINDOWS\system32\credui.dll
(0000000076d30000 - 0000000076d34000: C:\WINDOWS\system32\WMI.dll
(0000000076d40000 - 0000000076d58000: C:\WINDOWS\system32\MPRAPI.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076d80000 - 0000000076d9e000: C:\WINDOWS\system32\DHCPCSVC.DLL
(0000000076e10000 - 0000000076e35000: C:\WINDOWS\system32\adsldpc.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076e90000 - 0000000076ea2000: C:\WINDOWS\system32\rasman.dll
(0000000076eb0000 - 0000000076edf000: C:\WINDOWS\system32\TAPI32.dll
(0000000076ee0000 - 0000000076f1c000: C:\WINDOWS\system32\RASAPI32.dll
(0000000076f20000 - 0000000076f47000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\system32\WTSAPI32.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fc0000 - 0000000076fc6000: C:\WINDOWS\system32\rasadhlp.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ab000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININET.dll
(00000000773d0000 - 00000000774d3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\COMCTL32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077620000 - 000000007768e000: C:\WINDOWS\system32\WZCSvc.DLL
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\Apphelp.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077cc0000 - 0000000077cf2000: C:\WINDOWS\system32\ACTIVEDS.dll
(0000000077d00000 - 0000000077d33000: C:\WINDOWS\system32\netman.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(0000000078130000 - 00000000781cb000: C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.1433_x-ww_5cf844d2\MSVCR80.dll
(000000007c420000 - 000000007c4a7000: C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.1433_x-ww_5cf844d2\MSVCP80.dll
(000000007c800000 - 000000007c8f5000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d7000: C:\WINDOWS\system32\SHELL32.dll
(000000007e410000 - 000000007e4a0000: C:\WINDOWS\system32\USER32.dll

*----> State Dump for Thread Id 0x938 <----*

eax=7f62d540 ebx=7f89d8c0 ecx=42dd0145 edx=100e6a70 esi=00000008 edi=7f5f8460
eip=00000009 esp=0012ecb4 ebp=0012ecb8 iopl=0         nv up ei pl nz ac pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000212

function: <nosymbols>
No prior disassembly possible
        00000009 ??               ???
        0000000b ??               ???
        0000000d ??               ???
        0000000f ??               ???
        00000011 ??               ???
        00000013 ??               ???
        00000015 ??               ???
        00000017 ??               ???
        00000019 ??               ???
FAULT ->00000009 ??               ???
Error 0x00000001
        0000000b ??               ???
        0000000d ??               ???
        0000000f ??               ???
        00000011 ??               ???
        00000013 ??               ???
        00000015 ??               ???
        00000017 ??               ???
        00000019 ??               ???
        0000001b ??               ???
        0000001d ??               ???

*----> Stack Back Trace <----*
*** ERROR: Module load completed but symbols could not be loaded for C:\DOCUME~1\FIJYRW~1\LOCALS~1\Temp\WebKitNightly\Safari.exe
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll - 
ChildEBP RetAddr  Args to Child              
0012ecb0 7f5f8464 7f5f8460 004afb59 7f890008 0x9
0012ecb8 004afb59 7f890008 00000008 001e98c0 0x7f5f8464
7f5f8460 10460e58 00000002 7f655c00 00000040 Safari+0xafb59
10460e78 100f1510 100e68c0 100e67b0 100ddb20 WebKit!PrintingMaximumShrinkFactor+0x320
10460f04 00650076 004e0064 0074006f 00660069 WebKit!WebScrollBar__AddRef
100dda80 7c8b5710 44681024 57104645 000006c7 Safari+0x250076
24748b56 00000000 00000000 00000000 00000000 kernel32+0xb5710

*----> Raw Stack Dump <----*
000000000012ecb4  64 84 5f 7f 60 84 5f 7f - 59 fb 4a 00 08 00 89 7f  d._.`._.Y.J.....
000000000012ecc4  08 00 00 00 c0 98 1e 00 - 00 ec 12 00 c0 d8 89 7f  ................
000000000012ecd4  90 d5 62 7f 12 6d 0e 10 - 00 00 00 00 08 00 89 7f  ..b..m..........
000000000012ece4  08 00 00 00 60 98 1e 00 - 60 84 5f 7f 44 35 60 7f  ....`...`._.D5`.
000000000012ecf4  3c ef 12 00 00 00 00 00 - a8 25 ec 7f 08 00 00 00  <........%......
000000000012ed04  08 00 00 00 00 98 1e 00 - 90 d5 62 7f 40 35 60 7f  ..........b.@5`.
000000000012ed14  77 b0 15 10 50 32 15 10 - 80 84 5f 7f 08 00 00 00  w...P2...._.....
000000000012ed24  08 00 00 00 a0 97 1e 00 - 2c b1 15 10 8c ed 12 00  ........,.......
000000000012ed34  80 84 5f 7f 01 00 00 00 - 04 8e 15 10 08 00 ec 7f  .._.............
000000000012ed44  08 00 00 00 20 97 1e 00 - 01 00 00 00 15 29 50 65  .... ........)Pe
000000000012ed54  a8 25 ec 7f 20 a9 15 10 - 01 00 00 00 08 00 15 10  .%.. ...........
000000000012ed64  08 00 00 00 80 96 1e 00 - 01 00 00 00 b0 81 51 02  ..............Q.
000000000012ed74  ac ed 12 00 2f 95 53 65 - 98 00 00 00 08 00 00 04  ..../.Se........
000000000012ed84  08 00 00 00 c0 95 1e 00 - e0 e4 62 7f 01 f9 12 00  ..........b.....
000000000012ed94  04 00 00 00 07 00 00 00 - 07 00 00 00 07 00 00 00  ................
000000000012eda4  21 00 00 00 21 00 00 00 - 28 00 00 00 32 00 00 00  !...!...(...2...
000000000012edb4  32 00 00 00 32 00 00 00 - 00 00 00 00 01 00 00 00  2...2...........
000000000012edc4  00 00 c0 ff ff ff df 41 - e0 e4 62 7f 01 ed 12 00  .......A..b.....
000000000012edd4  04 00 00 00 07 00 00 00 - 07 00 00 00 07 00 00 00  ................
000000000012ede4  21 00 00 00 21 00 00 00 - 28 00 00 00 32 00 00 00  !...!...(...2...

*----> State Dump for Thread Id 0x1550 <----*

eax=630a4e1a ebx=01dafcc0 ecx=01dafd34 edx=000001a6 esi=00000000 edi=7ffde000
eip=7c90eb94 esp=01dafc98 ebp=01dafd34 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll - 
function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Program Files\Safari\CoreFoundation.dll - 
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Program Files\Safari\CFNetwork.dll - 
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Program Files\Safari\pthreadVC2.dll - 
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.1433_x-ww_5cf844d2\MSVCR80.dll - 
ChildEBP RetAddr  Args to Child              
01dafd34 7c80a075 00000001 01dafd78 00000000 ntdll!KiFastSystemCallRet
01dafd50 6552d3a3 00000001 01dafd78 00000000 kernel32!WaitForMultipleObjects+0x18
01dafebc 6552d65e 01a82d18 01aae288 00000001 CoreFoundation!CFRunLoopFinished+0x401
01dafef0 6552d736 6a561e58 00000001 00000000 CoreFoundation!CFRunLoopFinished+0x6bc
01daff10 6a534b34 6a561e58 00000000 40ac2000 CoreFoundation!CFRunLoopRunInMode+0x22
01daff48 69604212 01aae3f0 7c9106f0 01ac08b0 CFNetwork!CFURLCacheLoadMemoryFromDiskNow+0x17e
01daff74 781329bb 01ac0570 43391f62 7c90ee18 pthreadVC2+0x4212
01daffac 78132a47 7c9106f0 7c80b683 01ac0948 MSVCR80!endthreadex+0x3b
01daffec 00000000 781329e1 01ac0948 00000000 MSVCR80!endthreadex+0xc7

*----> Raw Stack Dump <----*
0000000001dafc98  ab e9 90 7c e2 94 80 7c - 01 00 00 00 c0 fc da 01  ...|...|........
0000000001dafca8  01 00 00 00 00 00 00 00 - f4 fc da 01 b9 18 11 01  ................
0000000001dafcb8  00 00 00 00 ed 10 90 7c - 3c 06 00 00 05 00 00 00  .......|<.......
0000000001dafcc8  24 fc da 01 ac fc da 01 - 1c fd da 01 18 ee 90 7c  $..............|
0000000001dafcd8  70 05 91 7c ff ff ff ff - 14 00 00 00 01 00 00 00  p..|............
0000000001dafce8  00 00 00 00 00 00 00 00 - 10 00 00 00 90 36 05 fd  .............6..
0000000001dafcf8  ff ff ff ff 00 d9 aa 01 - 00 e0 fd 7f 00 c0 fd 7f  ................
0000000001dafd08  1f ab 50 65 f4 fc da 01 - c0 fc da 01 90 e2 aa 01  ..Pe............
0000000001dafd18  01 00 00 00 b4 fc da 01 - aa d7 52 65 9c ff da 01  ..........Re....
0000000001dafd28  a8 9a 83 7c d8 95 80 7c - 00 00 00 00 50 fd da 01  ...|...|....P...
0000000001dafd38  75 a0 80 7c 01 00 00 00 - 78 fd da 01 00 00 00 00  u..|....x.......
0000000001dafd48  87 13 00 00 00 00 00 00 - bc fe da 01 a3 d3 52 65  ..............Re
0000000001dafd58  01 00 00 00 78 fd da 01 - 00 00 00 00 87 13 00 00  ....x...........
0000000001dafd68  18 2d a8 01 ed 10 90 7c - 88 e2 aa 01 10 6c 16 00  .-.....|.....l..
0000000001dafd78  3c 06 00 00 50 1d 00 00 - 05 00 00 00 78 01 51 01  <...P.......x.Q.
0000000001dafd88  2f 1d 00 00 70 02 00 00 - 00 00 00 00 35 1d 00 00  /...p.......5...
0000000001dafd98  28 00 00 00 30 6c 16 00 - 78 01 51 01 00 00 00 00  (...0l..x.Q.....
0000000001dafda8  78 01 15 00 16 1d 00 00 - 19 1d 00 00 09 1b 91 7c  x..............|
0000000001dafdb8  f8 e3 aa 01 60 6c 16 00 - 00 00 00 00 78 01 51 01  ....`l......x.Q.
0000000001dafdc8  78 01 51 01 60 6c 16 00 - 03 00 00 00 05 00 00 00  x.Q.`l..........

*----> State Dump for Thread Id 0x1738 <----*

eax=000000c0 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000000
eip=7c90eb94 esp=0274ff9c ebp=0274ffb4 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0274ffb4 7c80b683 00000000 00000000 00000000 ntdll!KiFastSystemCallRet
0274ffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000274ff9c  5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff 74 02  \..|.y.|......t.
000000000274ffac  00 00 00 00 00 00 00 80 - ec ff 74 02 83 b6 80 7c  ..........t....|
000000000274ffbc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000274ffcc  00 b0 fd 7f 00 96 aa 8a - c0 ff 74 02 00 57 f2 88  ..........t..W..
000000000274ffdc  ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00  .......|...|....
000000000274ffec  00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00  .........y.|....
000000000274fffc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000275000c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000275001c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000275002c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000275003c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000275004c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000275005c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000275006c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000275007c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000275008c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000275009c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000027500ac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000027500bc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000027500cc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x10ac <----*

eax=7c910760 ebx=00000000 ecx=00000000 edx=00000000 esi=7c97c380 edi=7c97c3a0
eip=7c90eb94 esp=0284ff70 ebp=0284ffb4 iopl=0         nv up ei ng nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000286

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0284ffb4 7c80b683 00000000 00000000 00000000 ntdll!KiFastSystemCallRet
0284ffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000284ff70  1b e3 90 7c 9d 07 91 7c - a8 05 00 00 ac ff 84 02  ...|...|........
000000000284ff80  b0 ff 84 02 98 ff 84 02 - a0 ff 84 02 00 00 00 00  ................
000000000284ff90  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000284ffa0  00 7c 28 e8 ff ff ff ff - a0 6c a9 8b f2 4e 6e 80  .|(......l...Nn.
000000000284ffb0  dc e2 90 7c ec ff 84 02 - 83 b6 80 7c 00 00 00 00  ...|.......|....
000000000284ffc0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 a0 fd 7f  ................
000000000284ffd0  00 b6 aa 8a c0 ff 84 02 - 00 57 f2 88 ff ff ff ff  .........W......
000000000284ffe0  a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
000000000284fff0  00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00  ....`..|........
0000000002850000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002850010  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002850020  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002850030  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002850040  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002850050  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002850060  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002850070  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002850080  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002850090  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000028500a0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x170c <----*

eax=000000c0 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=02bcfcec ebp=02bcffb4 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
02bcffb4 7c80b683 00000000 00000020 00000000 ntdll!KiFastSystemCallRet
02bcffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000002bcfcec  ab e9 90 7c d5 a0 92 7c - 02 00 00 00 30 fd bc 02  ...|...|....0...
0000000002bcfcfc  01 00 00 00 01 00 00 00 - 00 00 00 00 20 00 00 00  ............ ...
0000000002bcfd0c  00 00 00 00 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c  ...........|...|
0000000002bcfd1c  a0 05 00 00 0c 17 00 00 - 02 00 00 00 02 00 00 00  ................
0000000002bcfd2c  01 00 00 00 a4 05 00 00 - bc 05 00 00 00 00 00 00  ................
0000000002bcfd3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002bcfd4c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002bcfd5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002bcfd6c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002bcfd7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002bcfd8c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002bcfd9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002bcfdac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002bcfdbc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002bcfdcc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002bcfddc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002bcfdec  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002bcfdfc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002bcfe0c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002bcfe1c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x8c8 <----*

eax=02ce4a5e ebx=0318fed0 ecx=7c9105d4 edx=0000000e esi=00000000 edi=7ffde000
eip=7c90eb94 esp=0318fea8 ebp=0318ff44 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for c:\program files\f-secure\scanner-interface\fsgkiapi.dll - 
ChildEBP RetAddr  Args to Child              
0318ff44 7c80a075 00000002 0318ff84 00000000 ntdll!KiFastSystemCallRet
0318ff60 02ce54bd 00000002 0318ff84 00000000 kernel32!WaitForMultipleObjects+0x18
0318ffac 02ce4a6e 0318ffec 7c80b683 02d81e90 fsgkiapi!FSGKH_HttpBufferReadyEx+0x122b
0318ffb4 7c80b683 02d81e90 7c9106ab 7c9106eb fsgkiapi!FSGKH_HttpBufferReadyEx+0x7dc
0318ffec 00000000 02ce4a5e 02d81e90 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000318fea8  ab e9 90 7c e2 94 80 7c - 02 00 00 00 d0 fe 18 03  ...|...|........
000000000318feb8  01 00 00 00 00 00 00 00 - 00 00 00 00 98 f0 ce 02  ................
000000000318fec8  d0 3c d0 02 d0 14 ce 02 - f0 04 00 00 24 05 00 00  .<..........$...
000000000318fed8  3c 05 00 00 00 00 00 00 - 38 23 cd 02 3e 09 01 34  <.......8#..>..4
000000000318fee8  38 23 cd 02 00 00 00 00 - 14 00 00 00 01 00 00 00  8#..............
000000000318fef8  00 00 00 00 00 00 00 00 - 10 00 00 00 5c ff 18 03  ............\...
000000000318ff08  3c 24 80 7c 20 ff 18 03 - 00 e0 fd 7f 00 70 fd 7f  <$.| ........p..
000000000318ff18  d0 3c d0 02 00 00 00 00 - d0 fe 18 03 01 00 00 00  .<..............
000000000318ff28  02 00 00 00 c4 fe 18 03 - 10 00 00 00 dc ff 18 03  ................
000000000318ff38  a8 9a 83 7c d8 95 80 7c - 00 00 00 00 60 ff 18 03  ...|...|....`...
000000000318ff48  75 a0 80 7c 02 00 00 00 - 84 ff 18 03 00 00 00 00  u..|............
000000000318ff58  ff ff ff ff 00 00 00 00 - ac ff 18 03 bd 54 ce 02  .............T..
000000000318ff68  02 00 00 00 84 ff 18 03 - 00 00 00 00 ff ff ff ff  ................
000000000318ff78  ab 06 91 7c eb 06 91 7c - 90 1e d8 02 f0 04 00 00  ...|...|........
000000000318ff88  24 05 00 00 a8 00 00 00 - ff ff ff ff 00 00 00 00  $...............
000000000318ff98  ff ff ff ff 01 00 00 00 - 00 00 00 00 00 04 00 00  ................
000000000318ffa8  00 00 00 00 b4 ff 18 03 - 6e 4a ce 02 ec ff 18 03  ........nJ......
000000000318ffb8  83 b6 80 7c 90 1e d8 02 - ab 06 91 7c eb 06 91 7c  ...|.......|...|
000000000318ffc8  90 1e d8 02 00 70 fd 7f - 00 96 aa 8a c0 ff 18 03  .....p..........
000000000318ffd8  f0 d9 57 86 ff ff ff ff - a8 9a 83 7c 90 b6 80 7c  ..W........|...|

*----> State Dump for Thread Id 0x4fc <----*

eax=02ce4a46 ebx=0328fedc ecx=7c9105d4 edx=0000000e esi=00000000 edi=7ffde000
eip=7c90eb94 esp=0328feb4 ebp=0328ff50 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0328ff50 7c80a075 00000002 0328ff90 00000000 ntdll!KiFastSystemCallRet
0328ff6c 02ce45b3 00000002 0328ff90 00000000 kernel32!WaitForMultipleObjects+0x18
0328ffac 02ce4a53 0328ffec 7c80b683 02d81e90 fsgkiapi!FSGKH_HttpBufferReadyEx+0x321
0328ffb4 7c80b683 02d81e90 7c9106ab 7c9106eb fsgkiapi!FSGKH_HttpBufferReadyEx+0x7c1
0328ffec 00000000 02ce4a46 02d81e90 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000328feb4  ab e9 90 7c e2 94 80 7c - 02 00 00 00 dc fe 28 03  ...|...|......(.
000000000328fec4  01 00 00 00 00 00 00 00 - 00 00 00 00 90 1e d8 02  ................
000000000328fed4  00 00 00 00 a0 1e d8 02 - 2c 05 00 00 30 05 00 00  ........,...0...
000000000328fee4  68 3c d0 02 98 f0 ce 02 - 28 02 d9 02 01 00 00 00  h<......(.......
000000000328fef4  20 00 00 00 00 00 00 00 - 14 00 00 00 01 00 00 00   ...............
000000000328ff04  00 00 00 00 00 00 00 00 - 10 00 00 00 00 00 00 00  ................
000000000328ff14  00 00 00 00 e0 fe 28 03 - 00 e0 fd 7f 00 60 fd 7f  ......(......`..
000000000328ff24  a8 9a 83 7c 00 00 00 00 - dc fe 28 03 01 00 00 00  ...|......(.....
000000000328ff34  02 00 00 00 d0 fe 28 03 - 98 fe 28 03 dc ff 28 03  ......(...(...(.
000000000328ff44  a8 9a 83 7c d8 95 80 7c - 00 00 00 00 6c ff 28 03  ...|...|....l.(.
000000000328ff54  75 a0 80 7c 02 00 00 00 - 90 ff 28 03 00 00 00 00  u..|......(.....
000000000328ff64  ff ff ff ff 00 00 00 00 - ac ff 28 03 b3 45 ce 02  ..........(..E..
000000000328ff74  02 00 00 00 90 ff 28 03 - 00 00 00 00 ff ff ff ff  ......(.........
000000000328ff84  eb 06 91 7c 90 1e d8 02 - ab 06 91 7c 2c 05 00 00  ...|.......|,...
000000000328ff94  30 05 00 00 00 00 00 00 - 2c 05 00 00 00 00 00 00  0.......,.......
000000000328ffa4  ff 03 00 00 90 1e d9 02 - b4 ff 28 03 53 4a ce 02  ..........(.SJ..
000000000328ffb4  ec ff 28 03 83 b6 80 7c - 90 1e d8 02 ab 06 91 7c  ..(....|.......|
000000000328ffc4  eb 06 91 7c 90 1e d8 02 - 00 60 fd 7f 00 b6 aa 8a  ...|.....`......
000000000328ffd4  c0 ff 28 03 58 27 dd 82 - ff ff ff ff a8 9a 83 7c  ..(.X'.........|
000000000328ffe4  90 b6 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00  ...|............

*----> State Dump for Thread Id 0x1630 <----*

eax=02ce3b00 ebx=0339fee4 ecx=00000020 edx=0328fffc esi=00000000 edi=7ffde000
eip=7c90eb94 esp=0339febc ebp=0339ff58 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0339ff58 7c80a075 00000002 0339ff9c 00000000 ntdll!KiFastSystemCallRet
0339ff74 02ce3aba 00000002 0339ff9c 00000000 kernel32!WaitForMultipleObjects+0x18
0339ffa4 02ce3b1b 7c810659 00000018 0339ffec fsgkiapi!FSGKH_OpenServerConnection+0x943
0339ffb4 7c80b683 02d81e90 7c810659 00000018 fsgkiapi!FSGKH_OpenServerConnection+0x9a4
0339ffec 00000000 02ce3b00 02d81e90 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000339febc  ab e9 90 7c e2 94 80 7c - 02 00 00 00 e4 fe 39 03  ...|...|......9.
000000000339fecc  01 00 00 00 00 00 00 00 - 00 00 00 00 90 1e d8 02  ................
000000000339fedc  90 1e d8 02 90 1e d8 02 - 2c 05 00 00 dc 04 00 00  ........,.......
000000000339feec  67 00 73 00 20 00 74 00 - 6f 00 20 00 43 00 68 00  g.s. .t.o. .C.h.
000000000339fefc  69 00 6c 00 64 00 20 00 - 14 00 00 00 01 00 00 00  i.l.d. .........
000000000339ff0c  00 00 00 00 00 00 00 00 - 10 00 00 00 38 f5 df ff  ............8...
000000000339ff1c  04 4b 54 80 00 7a c9 85 - 00 e0 fd 7f 00 50 fd 7f  .KT..z.......P..
000000000339ff2c  b0 7a c9 85 00 00 00 00 - e4 fe 39 03 ac 18 64 80  .z........9...d.
000000000339ff3c  02 00 00 00 d8 fe 39 03 - 00 50 fd 7f dc ff 39 03  ......9..P....9.
000000000339ff4c  a8 9a 83 7c d8 95 80 7c - 00 00 00 00 74 ff 39 03  ...|...|....t.9.
000000000339ff5c  75 a0 80 7c 02 00 00 00 - 9c ff 39 03 00 00 00 00  u..|......9.....
000000000339ff6c  ff ff ff ff 00 00 00 00 - a4 ff 39 03 ba 3a ce 02  ..........9..:..
000000000339ff7c  02 00 00 00 9c ff 39 03 - 00 00 00 00 ff ff ff ff  ......9.........
000000000339ff8c  90 1e d8 02 f8 1e d8 02 - 42 24 50 80 00 00 00 00  ........B$P.....
000000000339ff9c  2c 05 00 00 dc 04 00 00 - b4 ff 39 03 1b 3b ce 02  ,.........9..;..
000000000339ffac  59 06 81 7c 18 00 00 00 - ec ff 39 03 83 b6 80 7c  Y..|......9....|
000000000339ffbc  90 1e d8 02 59 06 81 7c - 18 00 00 00 90 1e d8 02  ....Y..|........
000000000339ffcc  00 50 fd 7f 00 b6 aa 8a - c0 ff 39 03 78 62 cf 88  .P........9.xb..
000000000339ffdc  ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00  .......|...|....
000000000339ffec  00 00 00 00 00 00 00 00 - 00 3b ce 02 90 1e d8 02  .........;......

*----> State Dump for Thread Id 0x2e0 <----*

eax=00000004 ebx=7c80bfad ecx=00000009 edx=000000d7 esi=000003a0 edi=00000000
eip=7c90eb94 esp=03a5fe7c ebp=03a5fee0 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
03a5fee0 7c802532 000003a0 ffffffff 00000000 ntdll!KiFastSystemCallRet
03a5fef4 100d0d07 000003a0 ffffffff 7fef4800 kernel32!WaitForSingleObject+0x12
03a5ff14 10130671 7fef4828 7fef4800 7fef4860 WebKit!WTF__ThreadCondition__wait+0x37 (FPO: [EBP 0x7fef4800] [1,1,0])
03a5ff30 10131775 1050f870 0007fe91 03a5ff74 WebKit!WebCore__IconDatabase__syncThreadMainLoop+0xf1
03a5ff50 100b88ce 7fef4800 024511b8 00000088 WebKit!WebCore__IconDatabase__iconDatabaseSyncThread+0x1a5
03a5ff74 781329bb 7fe91120 41461f62 024511b8 WebKit!WTF__wtfThreadEntryPoint+0x5e
03a5ffac 78132a47 00000088 7c80b683 02468118 MSVCR80!endthreadex+0x3b
03a5ffec 00000000 781329e1 02468118 00000000 MSVCR80!endthreadex+0xc7

*----> Raw Stack Dump <----*
0000000003a5fe7c  c0 e9 90 7c cb 25 80 7c - a0 03 00 00 00 00 00 00  ...|.%.|........
0000000003a5fe8c  00 00 00 00 20 25 80 7c - 44 48 ef 7f ad bf 80 7c  .... %.|DH.....|
0000000003a5fe9c  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003a5feac  10 00 00 00 00 00 00 00 - 00 00 00 00 00 e0 fd 7f  ................
0000000003a5febc  00 40 fd 7f 00 00 00 00 - 00 00 00 00 90 fe a5 03  .@..............
0000000003a5fecc  64 49 ef 7f 9c ff a5 03 - a8 9a 83 7c f8 25 80 7c  dI.........|.%.|
0000000003a5fedc  00 00 00 00 f4 fe a5 03 - 32 25 80 7c a0 03 00 00  ........2%.|....
0000000003a5feec  ff ff ff ff 00 00 00 00 - 28 48 ef 7f 07 0d 0d 10  ........(H......
0000000003a5fefc  a0 03 00 00 ff ff ff ff - 00 48 ef 7f 00 48 ef 7f  .........H...H..
0000000003a5ff0c  28 48 ef 7f 00 48 ef 7f - 44 48 ef 7f 71 06 13 10  (H...H..DH..q...
0000000003a5ff1c  28 48 ef 7f 00 48 ef 7f - 60 48 ef 7f 28 48 ef 7f  (H...H..`H..(H..
0000000003a5ff2c  64 49 ef 7f 00 48 ef 00 - 75 17 13 10 70 f8 50 10  dI...H..u...p.P.
0000000003a5ff3c  91 fe 07 00 74 ff a5 03 - 20 11 e9 7f d0 05 f1 7f  ....t... .......
0000000003a5ff4c  c8 88 0b 10 70 f8 50 10 - ce 88 0b 10 00 48 ef 7f  ....p.P......H..
0000000003a5ff5c  b8 11 45 02 88 00 00 00 - 18 81 46 02 90 17 13 10  ..E.......F.....
0000000003a5ff6c  00 48 ef 7f 88 00 00 00 - ac ff a5 03 bb 29 13 78  .H...........).x
0000000003a5ff7c  20 11 e9 7f 62 1f 46 41 - b8 11 45 02 88 00 00 00   ...b.FA..E.....
0000000003a5ff8c  18 81 46 02 80 ff a5 03 - 80 ff a5 03 dc ff a5 03  ..F.............
0000000003a5ff9c  dc ff a5 03 ed 8c 13 78 - 76 ab f8 3a 00 00 00 00  .......xv..:....
0000000003a5ffac  ec ff a5 03 47 2a 13 78 - 88 00 00 00 83 b6 80 7c  ....G*.x.......|

*----> State Dump for Thread Id 0x179c <----*

eax=03b8f40c ebx=03b8f860 ecx=01c917c2 edx=092cd87d esi=00000000 edi=7ffde000
eip=7c90eb94 esp=03b8f838 ebp=03b8f8d4 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Program Files\Safari\PubSubDLL.dll - 
ChildEBP RetAddr  Args to Child              
03b8f8d4 7c80a075 00000001 03b8f918 00000000 ntdll!KiFastSystemCallRet
03b8f8f0 6552d3a3 00000001 03b8f918 00000000 kernel32!WaitForMultipleObjects+0x18
03b8fa5c 6552d65e 02532a80 0251a880 00000000 CoreFoundation!CFRunLoopFinished+0x401
03b8fa90 6552d702 65569924 00000000 20000000 CoreFoundation!CFRunLoopFinished+0x6bc
03b8fab0 60001c1d 784128d3 00000000 0251a630 CoreFoundation!CFRunLoopRun+0x26
03b8ff48 60005ad3 784128ef 00000000 0052649c PubSubDLL+0x1c1d
03b8ff74 781329bb 0251a630 415b1f62 00000000 PubSubDLL+0x5ad3
03b8ffac 78132a47 0052649c 7c80b683 02468118 MSVCR80!endthreadex+0x3b
03b8ffec 00000000 781329e1 02468118 00000000 MSVCR80!endthreadex+0xc7

*----> Raw Stack Dump <----*
0000000003b8f838  ab e9 90 7c e2 94 80 7c - 01 00 00 00 60 f8 b8 03  ...|...|....`...
0000000003b8f848  01 00 00 00 00 00 00 00 - 94 f8 b8 03 01 ab 80 4d  ...............M
0000000003b8f858  00 00 00 00 ed 10 90 7c - 80 02 00 00 88 28 00 04  .......|.....(..
0000000003b8f868  3c 3a 54 02 38 3a 54 02 - 38 3a 54 02 00 00 00 00  <:T.8:T.8:T.....
0000000003b8f878  a0 f8 b8 03 12 29 50 65 - 14 00 00 00 01 00 00 00  .....)Pe........
0000000003b8f888  00 00 00 00 00 00 00 00 - 10 00 00 00 c0 24 7c 27  .............$|'
0000000003b8f898  ff ff ff ff 38 3a 54 02 - 00 e0 fd 7f 00 f0 fa 7f  ....8:T.........
0000000003b8f8a8  50 36 54 02 94 f8 b8 03 - 60 f8 b8 03 88 a8 51 02  P6T.....`.....Q.
0000000003b8f8b8  01 00 00 00 54 f8 b8 03 - aa d7 52 65 3c ff b8 03  ....T.....Re<...
0000000003b8f8c8  a8 9a 83 7c d8 95 80 7c - 00 00 00 00 f0 f8 b8 03  ...|...|........
0000000003b8f8d8  75 a0 80 7c 01 00 00 00 - 18 f9 b8 03 00 00 00 00  u..|............
0000000003b8f8e8  f4 8a 05 00 00 00 00 00 - 5c fa b8 03 a3 d3 52 65  ........\.....Re
0000000003b8f8f8  01 00 00 00 18 f9 b8 03 - 00 00 00 00 f4 8a 05 00  ................
0000000003b8f908  80 2a 53 02 ed 10 90 7c - 80 a8 51 02 c8 05 91 7c  .*S....|..Q....|
0000000003b8f918  80 02 00 00 e8 f9 b8 03 - 51 05 91 7c 58 09 51 01  ........Q..|X.Q.
0000000003b8f928  6d 05 91 7c ac d2 54 02 - a8 d2 54 02 44 f9 b8 03  m..|..T...T.D...
0000000003b8f938  00 00 00 00 c8 05 91 7c - f8 8a 59 02 10 fa b8 03  .......|..Y.....
0000000003b8f948  51 05 91 7c 18 07 51 01 - 6d 05 91 7c 04 8b 59 02  Q..|..Q.m..|..Y.
0000000003b8f958  00 8b 59 02 ff ff 00 00 - ac f9 b8 03 18 ee 90 7c  ..Y............|
0000000003b8f968  70 05 91 7c ff ff ff ff - 6d 05 91 7c 39 4c 13 78  p..|....m..|9L.x

*----> State Dump for Thread Id 0xbb8 <----*

eax=619605a1 ebx=0490fcb8 ecx=0490fd2c edx=000001a6 esi=00000000 edi=7ffde000
eip=7c90eb94 esp=0490fc90 ebp=0490fd2c iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0490fd2c 7c80a075 00000001 0490fd70 00000000 ntdll!KiFastSystemCallRet
0490fd48 6552d3a3 00000001 0490fd70 00000000 kernel32!WaitForMultipleObjects+0x18
0490feb4 6552d65e 02532580 025191b0 00000000 CoreFoundation!CFRunLoopFinished+0x401
0490fee8 6552d702 65569924 00000000 20000000 CoreFoundation!CFRunLoopFinished+0x6bc
0490ff0c 101633d9 02532580 0253c648 65569924 CoreFoundation!CFRunLoopRun+0x26
0490ff50 100b88ce 00000000 0012efd8 0012efd0 WebKit!WebCore__runLoaderThread+0x69
0490ff74 781329bb 7fe91fc8 46731f62 0012efd8 WebKit!WTF__wtfThreadEntryPoint+0x5e
0490ffac 78132a47 0012efd0 7c80b683 02468118 MSVCR80!endthreadex+0x3b
0490ffec 00000000 781329e1 02468118 00000000 MSVCR80!endthreadex+0xc7

*----> Raw Stack Dump <----*
000000000490fc90  ab e9 90 7c e2 94 80 7c - 01 00 00 00 b8 fc 90 04  ...|...|........
000000000490fca0  01 00 00 00 00 00 00 00 - ec fc 90 04 da 58 66 06  .............Xf.
000000000490fcb0  00 00 00 00 ed 10 90 7c - 6c 02 00 00 04 a5 56 65  .......|l.....Ve
000000000490fcc0  ff ff 00 00 b4 f5 9d 04 - ff ff 00 00 78 e1 1a 00  ............x...
000000000490fcd0  d8 dd 1a 00 b4 fc 90 04 - 14 00 00 00 01 00 00 00  ................
000000000490fce0  00 00 00 00 00 00 00 00 - 10 00 00 00 50 20 1f ee  ............P ..
000000000490fcf0  ff ff ff ff 48 c6 53 02 - 00 e0 fd 7f 00 e0 fa 7f  ....H.S.........
000000000490fd00  1f ab 50 65 ec fc 90 04 - b8 fc 90 04 b8 91 51 02  ..Pe..........Q.
000000000490fd10  01 00 00 00 ac fc 90 04 - aa d7 52 65 9c ff 90 04  ..........Re....
000000000490fd20  a8 9a 83 7c d8 95 80 7c - 00 00 00 00 48 fd 90 04  ...|...|....H...
000000000490fd30  75 a0 80 7c 01 00 00 00 - 70 fd 90 04 00 00 00 00  u..|....p.......
000000000490fd40  2b 75 00 00 00 00 00 00 - b4 fe 90 04 a3 d3 52 65  +u............Re
000000000490fd50  01 00 00 00 70 fd 90 04 - 00 00 00 00 2b 75 00 00  ....p.......+u..
000000000490fd60  80 25 53 02 ed 10 90 7c - b0 91 51 02 68 09 1a 00  .%S....|..Q.h...
000000000490fd70  6c 02 00 00 6c 02 00 00 - 6c 02 00 00 78 01 15 00  l...l...l...x...
000000000490fd80  b8 01 51 01 08 00 00 00 - 68 01 15 00 d0 01 51 01  ..Q.....h.....Q.
000000000490fd90  00 00 00 00 e8 01 51 01 - 28 00 00 00 90 09 1a 00  ......Q.(.......
000000000490fda0  60 09 1a 00 78 01 15 00 - 01 00 00 00 03 00 00 00  `...x...........
000000000490fdb0  01 00 00 00 ac fb 90 04 - 05 00 00 00 00 fe 90 04  ................
000000000490fdc0  18 ee 90 7c f0 06 91 7c - 03 00 00 00 eb 06 91 7c  ...|...|.......|

*----> State Dump for Thread Id 0x1248 <----*

eax=60e25282 ebx=0522fcf8 ecx=0522fd6c edx=000001a6 esi=00000000 edi=7ffde000
eip=7c90eb94 esp=0522fcd0 ebp=0522fd6c iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0522fd6c 7c80a075 00000002 0522fdb0 00000000 ntdll!KiFastSystemCallRet
0522fd88 6552d3a3 00000002 0522fdb0 00000000 kernel32!WaitForMultipleObjects+0x18
0522fef4 6552d65e 0251d950 02519ba0 00000000 CoreFoundation!CFRunLoopFinished+0x401
0522ff28 6552d702 65569924 00000000 20000000 CoreFoundation!CFRunLoopFinished+0x6bc
0522ff48 00414557 0012f6f4 00000000 00000000 CoreFoundation!CFRunLoopRun+0x26
0522ffac 78132a47 0012f6f0 7c80b683 023d4498 Safari+0x14557
0522ffec 00000000 781329e1 023d4498 00000000 MSVCR80!endthreadex+0xc7

*----> Raw Stack Dump <----*
000000000522fcd0  ab e9 90 7c e2 94 80 7c - 02 00 00 00 f8 fc 22 05  ...|...|......".
000000000522fce0  01 00 00 00 00 00 00 00 - 00 00 00 00 c5 8d 74 00  ..............t.
000000000522fcf0  9c 21 28 00 ed 10 90 7c - 48 04 00 00 54 04 00 00  .!(....|H...T...
000000000522fd00  48 04 00 00 31 00 00 00 - eb f0 52 65 17 a0 80 7c  H...1.....Re...|
000000000522fd10  10 08 53 65 9c ad 3a 02 - 14 00 00 00 01 00 00 00  ..Se..:.........
000000000522fd20  00 00 00 00 00 00 00 00 - 10 00 00 00 88 b5 64 02  ..............d.
000000000522fd30  05 00 00 00 f0 d5 ac 01 - 00 e0 fd 7f 00 d0 fa 7f  ................
000000000522fd40  1f ab 50 65 00 00 00 00 - f8 fc 22 05 00 00 00 00  ..Pe......".....
000000000522fd50  02 00 00 00 ec fc 22 05 - 9a cc 52 65 9c ff 22 05  ......"...Re..".
000000000522fd60  a8 9a 83 7c d8 95 80 7c - 00 00 00 00 88 fd 22 05  ...|...|......".
000000000522fd70  75 a0 80 7c 02 00 00 00 - b0 fd 22 05 00 00 00 00  u..|......".....
000000000522fd80  ff ff ff ff 00 00 00 00 - f4 fe 22 05 a3 d3 52 65  .........."...Re
000000000522fd90  02 00 00 00 b0 fd 22 05 - 00 00 00 00 ff ff ff ff  ......".........
000000000522fda0  50 d9 51 02 ed 10 90 7c - a0 9b 51 02 c0 21 21 85  P.Q....|..Q..!!.
000000000522fdb0  48 04 00 00 54 04 00 00 - 01 00 00 00 00 00 00 00  H...T...........
000000000522fdc0  00 00 00 00 68 b1 17 00 - 23 00 00 00 00 00 00 00  ....h...#.......
000000000522fdd0  05 00 00 00 03 00 00 00 - 00 00 15 00 05 00 00 00  ................
000000000522fde0  09 00 00 00 28 fe 22 05 - 18 ee 90 7c f0 06 91 7c  ....(."....|...|
000000000522fdf0  ff ff ff ff eb 06 91 7c - 05 00 00 00 24 1a 91 7c  .......|....$..|
000000000522fe00  00 00 00 00 f0 96 51 02 - d8 84 3a 02 00 00 00 00  ......Q...:.....

*----> State Dump for Thread Id 0x1160 <----*

eax=057fd000 ebx=023d4498 ecx=057fdec0 edx=7c90eb94 esi=00000000 edi=00000000
eip=7c90eb94 esp=057fff20 ebp=057fff58 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
057fff58 6a520532 000000fc 00000001 00000004 ntdll!KiFastSystemCallRet
057fff78 78132848 00000000 479c1f7e 7c913288 CFNetwork!CFHTTPGetConnectionInfoForProxy+0x916
057fffb0 781328c8 7c80b683 023d4498 7c913288 MSVCR80!endthread+0x4b
057fffec 00000000 7813286e 023d4498 00000000 MSVCR80!endthread+0xcb

*----> Raw Stack Dump <----*
00000000057fff20  a0 dc 90 7c cd d9 dd 77 - fc 00 00 00 00 00 00 00  ...|...w........
00000000057fff30  00 00 00 00 00 00 00 00 - d8 61 e4 77 04 00 00 00  .........a.w....
00000000057fff40  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000057fff50  74 2b 56 6a 00 00 00 00 - 78 ff 7f 05 32 05 52 6a  t+Vj....x...2.Rj
00000000057fff60  fc 00 00 00 01 00 00 00 - 04 00 00 00 00 00 00 00  ................
00000000057fff70  00 00 00 00 fc 00 00 00 - b0 ff 7f 05 48 28 13 78  ............H(.x
00000000057fff80  00 00 00 00 7e 1f 9c 47 - 88 32 91 7c 00 00 00 00  ....~..G.2.|....
00000000057fff90  98 44 3d 02 84 ff 7f 05 - 84 ff 7f 05 dc ff 7f 05  .D=.............
00000000057fffa0  dc ff 7f 05 ed 8c 13 78 - 56 ab f8 3a 00 00 00 00  .......xV..:....
00000000057fffb0  ec ff 7f 05 c8 28 13 78 - 83 b6 80 7c 98 44 3d 02  .....(.x...|.D=.
00000000057fffc0  88 32 91 7c 00 00 00 00 - 98 44 3d 02 00 80 fd 7f  .2.|.....D=.....
00000000057fffd0  00 b6 aa 8a c0 ff 7f 05 - 30 ce 17 87 ff ff ff ff  ........0.......
00000000057fffe0  a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
00000000057ffff0  00 00 00 00 6e 28 13 78 - 98 44 3d 02 00 00 00 00  ....n(.x.D=.....
0000000005800000  ef be ad de 60 00 00 00 - 60 00 00 00 00 00 00 00  ....`...`.......
0000000005800010  24 00 00 00 40 00 00 00 - 34 00 00 00 17 00 00 00  $...@...4.......
0000000005800020  03 00 00 00 39 00 00 00 - 31 00 00 00 3b 00 00 00  ....9...1...;...
0000000005800030  08 00 00 00 0e 00 00 00 - 2a 00 00 00 59 00 00 00  ........*...Y...
0000000005800040  49 00 00 00 04 00 00 00 - 5a 00 00 00 4a 00 00 00  I.......Z...J...
0000000005800050  2b 00 00 00 00 00 00 00 - 09 00 00 00 4c 00 00 00  +...........L...

*----> State Dump for Thread Id 0x9dc <----*

eax=71a5d5af ebx=c0000000 ecx=7c913288 edx=ffffffff esi=00000000 edi=71a87558
eip=7c90eb94 esp=059fff7c ebp=059fffb4 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000206

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
059fffb4 7c80b683 71a5d8ec 0490f858 7c90ee18 ntdll!KiFastSystemCallRet
059fffec 00000000 71a5d5af 001aef98 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000059fff7c  1b e3 90 7c 09 d6 a5 71 - bc 00 00 00 bc ff 9f 05  ...|...q........
00000000059fff8c  b0 ff 9f 05 a4 ff 9f 05 - 50 d6 a5 71 58 f8 90 04  ........P..qX...
00000000059fff9c  18 ee 90 7c 98 ef 1a 00 - 00 00 00 00 00 00 00 00  ...|............
00000000059fffac  00 00 a5 71 d8 2a ce 03 - ec ff 9f 05 83 b6 80 7c  ...q.*.........|
00000000059fffbc  ec d8 a5 71 58 f8 90 04 - 18 ee 90 7c 98 ef 1a 00  ...qX......|....
00000000059fffcc  00 b0 fa 7f 00 96 aa 8a - c0 ff 9f 05 e8 bb b8 84  ................
00000000059fffdc  ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00  .......|...|....
00000000059fffec  00 00 00 00 00 00 00 00 - af d5 a5 71 98 ef 1a 00  ...........q....
00000000059ffffc  00 00 00 00 50 00 51 01 - 50 00 51 01 00 00 00 00  ....P.Q.P.Q.....
0000000005a0000c  00 00 00 00 00 40 08 00 - 00 40 08 00 30 0c 00 00  .....@...@..0...
0000000005a0001c  00 0b 00 00 00 00 00 00 - 80 12 00 01 a0 33 08 00  .............3..
0000000005a0002c  a0 33 08 00 00 00 00 00 - 40 00 a0 05 00 00 00 00  .3......@.......
0000000005a0003c  00 00 00 00 00 00 a6 75 - 00 00 ef 2b 00 01 a5 28  .......u...+...(
0000000005a0004c  00 02 15 81 00 02 48 21 - 00 02 90 90 00 02 b3 31  ......H!.......1
0000000005a0005c  00 02 e5 d7 00 03 18 47 - 00 03 27 bd 00 03 59 0e  .......G..'...Y.
0000000005a0006c  00 03 74 6c 00 03 84 30 - 00 03 c0 d0 00 03 db 07  ..tl...0........
0000000005a0007c  00 03 f8 4b 00 04 29 7f - 00 04 8c 45 00 05 a7 5e  ...K..)....E...^
0000000005a0008c  00 06 39 9e 00 06 61 ae - 00 06 a9 11 00 06 cd c8  ..9...a.........
0000000005a0009c  00 07 d0 3e 00 08 d6 5d - 00 09 41 ba 00 0a 0c 0f  ...>...]..A.....
0000000005a000ac  00 0a 25 dd 00 0b 4d 57 - 00 0c 6e 4f 00 0d 1e 95  ..%...MW..nO....
Comment 1 Jyrki Wahlstedt 2008-09-15 23:16:24 PDT
Created attachment 23461 [details]
The crash dump file
Comment 2 Jyrki Wahlstedt 2008-09-16 02:19:27 PDT
This crash seems to be somehow related to cases, in which the form contains a text field. There doesn't have to be any user input in the field. Other forms not containing textfields (at least some of them) seem to work ok.
Comment 3 Jyrki Wahlstedt 2008-09-16 04:14:52 PDT
Increased severity a bit, because this causes an inevitable crash
Comment 4 Jyrki Wahlstedt 2008-09-17 23:57:38 PDT
As a testcase, trying to invite someone at http://www.linkedin.com conveniently produces the crash even not doing any modifications to any fields.
Comment 5 Jyrki Wahlstedt 2008-09-18 23:59:08 PDT
To refine the previous LinkedIn case, this follows from the steps:
1. search for a person with name
2. select the case, how one knows this person
3. (optional) add/modify a personal note
4. click the 'Send' button to send the invitation

crash follows

PS I also raised the priority and severity, as this bug prevents the use of several functions
Comment 6 Jyrki Wahlstedt 2008-09-19 00:00:28 PDT
still in r36620
Comment 7 Alexey Proskuryakov 2008-09-22 00:25:48 PDT
Might be fixed in <http://trac.webkit.org/projects/webkit/changeset/36692>.
Comment 8 Jyrki Wahlstedt 2008-09-23 22:42:42 PDT
Seems to be ok.
Comment 9 Alexey Proskuryakov 2008-09-24 08:16:52 PDT
*** Bug 20962 has been marked as a duplicate of this bug. ***