Closed Bug 1120575 Opened 9 years ago Closed 9 years ago

Intermittent browser_urlbar_search_healthreport.js | application crashed [@ JS::Heap<JSObject *>::~Heap<JSObject *>()]

Categories

(Core :: JavaScript: GC, defect)

x86
Windows 7
defect
Not set
normal

Tracking

()

RESOLVED WORKSFORME

People

(Reporter: RyanVM, Unassigned)

Details

(Keywords: crash, intermittent-failure)

Related to bug 1119751 and bug 1119753 by chance?

07:49:03 INFO - 701 INFO TEST-START | browser/base/content/test/general/browser_urlbar_search_healthreport.js
07:49:03 INFO - ###!!! [Child][MessageChannel::SendAndWait] Error: Channel error: cannot send/recv
07:49:03 INFO - TEST-INFO | Main app process: exit status 1
07:49:03 INFO - 702 INFO checking window state
07:49:03 INFO - 703 INFO Console message: [JavaScript Warning: "unsafe CPOW usage" {file: "resource://app/modules/sessionstore/TabState.jsm" line: 96}]
07:49:03 INFO - 704 INFO Console message: [JavaScript Warning: "unsafe CPOW usage" {file: "resource://app/modules/sessionstore/TabState.jsm" line: 96}]
07:49:03 INFO - 705 INFO Console message: [JavaScript Warning: "unsafe CPOW usage" {file: "resource://app/modules/sessionstore/TabState.jsm" line: 96}]
07:49:03 INFO - 706 INFO Console message: [JavaScript Warning: "unsafe CPOW usage" {file: "resource://app/modules/sessionstore/TabState.jsm" line: 96}]
07:49:03 INFO - 707 INFO Entering test test_healthreport_search_recording
07:49:03 INFO - 708 INFO TEST-PASS | browser/base/content/test/general/browser_urlbar_search_healthreport.js | Health Reporter available.
07:49:03 INFO - 709 INFO TEST-PASS | browser/base/content/test/general/browser_urlbar_search_healthreport.js | Searches provider is available.
07:49:03 INFO - 710 INFO waitForDocLoadAndStopIt: Waiting for URL: https://search.yahoo.com/yhs/search?p=firefox+health+report&ei=UTF-8&hspart=mozilla&hsimp=yhs-001
07:49:03 INFO - 711 ERROR TEST-UNEXPECTED-FAIL | browser/base/content/test/general/browser_urlbar_search_healthreport.js | application terminated with exit code 1
07:49:03 INFO - runtests.py | Application ran for: 0:01:51.023000
07:49:03 INFO - zombiecheck | Reading PID log: c:\users\cltbld\appdata\local\temp\tmpch5umhpidlog
07:49:03 INFO - mozcrash Downloading symbols from: https://ftp-ssl.mozilla.org/pub/mozilla.org/firefox/tinderbox-builds/mozilla-central-win32-pgo/1421065818/firefox-37.0a1.en-US.win32.crashreporter-symbols.zip
07:49:12 INFO - mozcrash Saved minidump as C:\slave\test\build\blobber_upload_dir\f57da310-9f19-42ab-aeb6-599b912873a0.dmp
07:49:12 INFO - mozcrash Saved app info as C:\slave\test\build\blobber_upload_dir\f57da310-9f19-42ab-aeb6-599b912873a0.extra
07:49:12 WARNING - PROCESS-CRASH | browser/base/content/test/general/browser_urlbar_search_healthreport.js | application crashed [@ JS::Heap<JSObject *>::~Heap<JSObject *>()]
07:49:12 INFO - Crash dump filename: c:\users\cltbld\appdata\local\temp\tmpbjzhik.mozrunner\minidumps\f57da310-9f19-42ab-aeb6-599b912873a0.dmp
07:49:12 INFO - Operating system: Windows NT
07:49:12 INFO - 6.1.7601 Service Pack 1
07:49:12 INFO - CPU: x86
07:49:12 INFO - GenuineIntel family 6 model 30 stepping 5
07:49:12 INFO - 8 CPUs
07:49:12 INFO - Crash reason: EXCEPTION_ACCESS_VIOLATION_READ
07:49:12 INFO - Crash address: 0x426ffff0
07:49:12 INFO - Thread 0 (crashed)
07:49:12 INFO - 0 xul.dll!JS::Heap<JSObject *>::~Heap<JSObject *>() [RootingAPI.h:a41cce2dd408 : 224 + 0xa]
07:49:12 INFO - eip = 0x6210daf5 esp = 0x0028e12c ebp = 0x0028e13c ebx = 0x1c199000
07:49:12 INFO - esi = 0x1c199348 edi = 0x1c199400 eax = 0x426ffff0 ecx = 0x1c199358
07:49:12 INFO - edx = 0x42606b00 efl = 0x00010206
07:49:12 INFO - Found by: given as instruction pointer in context
07:49:12 INFO - 1 xul.dll!js::HashMapEntry<mozilla::jsipc::ObjectId,JS::Heap<JSObject *> >::`scalar deleting destructor'(unsigned int) + 0xb
07:49:12 INFO - eip = 0x6294fafa esp = 0x0028e144 ebp = 0x0028e160
07:49:12 INFO - Found by: call frame info
07:49:12 INFO - 2 xul.dll!js::detail::HashTable<js::HashMapEntry<mozilla::jsipc::ObjectId,JS::Heap<JSObject *> >,js::HashMap<mozilla::jsipc::ObjectId,JS::Heap<JSObject *>,mozilla::jsipc::ObjectIdHasher,js::SystemAllocPolicy>::MapHashPolicy,js::SystemAllocPolicy>::destroyTable(js::SystemAllocPolicy &,js::detail::HashTableEntry<js::HashMapEntry<mozilla::jsipc::ObjectId,JS::Heap<JSObject *> > > *,unsigned int) [HashTable.h:a41cce2dd408 : 1094 + 0xd]
07:49:12 INFO - eip = 0x62953cb1 esp = 0x0028e150 ebp = 0x0028e160
07:49:12 INFO - Found by: call frame info
07:49:12 INFO - 3 xul.dll!mozilla::jsipc::JavaScriptShared::~JavaScriptShared() [JavaScriptShared.h:a41cce2dd408 : 147 + 0x46]
07:49:12 INFO - eip = 0x6294faac esp = 0x0028e168 ebp = 0x0028e17c
07:49:12 INFO - Found by: call frame info
07:49:12 INFO - 4 xul.dll!mozilla::jsipc::JavaScriptParent::`scalar deleting destructor'(unsigned int) + 0x12
07:49:12 INFO - eip = 0x6294fbaf esp = 0x0028e178 ebp = 0x0028e17c
07:49:12 INFO - Found by: call frame info
07:49:12 INFO - 5 xul.dll!mozilla::jsipc::WrapperOwner::drop(JSObject *) [WrapperOwner.cpp:a41cce2dd408 : 751 + 0x15]
07:49:12 INFO - eip = 0x62953dca esp = 0x0028e184 ebp = 0x0028e1b8
07:49:12 INFO - Found by: call frame info
07:49:12 INFO - 6 xul.dll!CPOWProxyHandler::finalize(JSFreeOp *,JSObject *) [WrapperOwner.cpp:a41cce2dd408 : 717 + 0x7]
07:49:12 INFO - eip = 0x62953eed esp = 0x0028e1c0 ebp = 0x0028e1c8
07:49:12 INFO - Found by: call frame info
07:49:12 INFO - 7 xul.dll!FinalizeArenas [jsgc.cpp:a41cce2dd408 : 606 + 0x8]
07:49:12 INFO - eip = 0x6217b1f6 esp = 0x0028e1d0 ebp = 0x0028e390
07:49:12 INFO - Found by: call frame info
07:49:12 INFO - 8 xul.dll!js::gc::ArenaLists::forceFinalizeNow(js::FreeOp *,js::gc::AllocKind,js::gc::ArenaLists::KeepArenasEnum,js::gc::ArenaHeader * *) [jsgc.cpp:a41cce2dd408 : 2802 + 0x1a]
07:49:12 INFO - eip = 0x620a2162 esp = 0x0028e398 ebp = 0x0028ebe8
07:49:12 INFO - Found by: call frame info
07:49:12 INFO - 9 xul.dll!js::gc::ArenaLists::queueForegroundObjectsForSweep(js::FreeOp *) [jsgc.cpp:a41cce2dd408 : 2920 + 0x11]
07:49:12 INFO - eip = 0x620a1c17 esp = 0x0028ebf0 ebp = 0x0028ec2c
07:49:12 INFO - Found by: call frame info
07:49:12 INFO - 10 xul.dll!js::gc::GCRuntime::beginSweepingZoneGroup() [jsgc.cpp:a41cce2dd408 : 5138 + 0x5]
07:49:12 INFO - eip = 0x622b4d59 esp = 0x0028ec34 ebp = 0x0028ef00
07:49:12 INFO - Found by: call frame info
Flags: needinfo?(wmccloskey)
Yes, this is surely the same bug. Do we typically dupe in this situation? I don't want to break auto-starring.
Flags: needinfo?(wmccloskey)
Yeah, given the different top frame, we're better off leaving it open for now. We can dupe them all to one bug once fixed.
Inactive; closing (see bug 1180138).
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → WORKSFORME
You need to log in before you can comment on or make changes to this bug.