Closed Bug 1069326 Opened 10 years ago Closed 10 years ago

Intermittent test_SplitAppend.html | application crashed [@ NS_ABORT_OOM(unsigned int)]

Categories

(Core :: Audio/Video, defect)

x86
Windows XP
defect
Not set
normal

Tracking

()

RESOLVED FIXED
mozilla35
Tracking Status
firefox33 --- unaffected
firefox34 --- unaffected
firefox35 --- fixed
firefox-esr31 --- unaffected

People

(Reporter: cbook, Assigned: kinetik)

References

()

Details

(Keywords: crash, intermittent-failure)

Windows XP 32-bit mozilla-inbound opt test mochitest-1 on 2014-09-18 05:38:19 PDT for push 04458f023e47

slave: t-xp32-ix-092

https://tbpl.mozilla.org/php/getParsedLog.php?id=48376128&tree=Mozilla-Inbound#error1

04:47:52  WARNING -  PROCESS-CRASH | /tests/content/media/mediasource/test/test_SplitAppend.html | application crashed [@ NS_ABORT_OOM(unsigned int)]
04:47:52     INFO -  Crash dump filename: c:\docume~1\cltbld~1.t-x\locals~1\temp\tmp_igqzf.mozrunner\minidumps\0b56e947-3fa6-4b17-b10f-32f050776d67.dmp
04:47:52     INFO -  Operating system: Windows NT
04:47:52     INFO -                    5.1.2600 Service Pack 3
04:47:52     INFO -  CPU: x86
04:47:52     INFO -       GenuineIntel family 6 model 30 stepping 5
04:47:52     INFO -       8 CPUs
04:47:52     INFO -  Crash reason:  EXCEPTION_BREAKPOINT
04:47:52     INFO -  Crash address: 0x166dff4
04:47:52     INFO -  Thread 0 (crashed)
04:47:52     INFO -   0  xul.dll!NS_ABORT_OOM(unsigned int) [nsDebugImpl.cpp:04458f023e47 : 632 + 0x0]
04:47:52     INFO -      eip = 0x0166dff4   esp = 0x0012f908   ebp = 0x0012f908   ebx = 0x07ce7b10
04:47:52     INFO -      esi = 0x6969696c   edi = 0x7fffffff   eax = 0x6969696c   ecx = 0x6969696c
04:47:52     INFO -      edx = 0x00000000   efl = 0x00200a47
04:47:52     INFO -      Found by: given as instruction pointer in context
04:47:52     INFO -   1  xul.dll!nsTArray_base<nsTArrayInfallibleAllocator,nsTArray_CopyWithMemutils>::EnsureCapacity(unsigned int,unsigned int) [nsTArray-inl.h:04458f023e47 : 127 + 0x9]
04:47:52     INFO -      eip = 0x01659ada   esp = 0x0012f910   ebp = 0x0012f920
04:47:52     INFO -      Found by: call frame info
04:47:52     INFO -   2  xul.dll!nsTArray_Impl<nsRefPtr<mozilla::TrackBuffer>,nsTArrayInfallibleAllocator>::AppendElements<nsRefPtr<mozilla::TrackBuffer> >(nsRefPtr<mozilla::TrackBuffer> const *,unsigned int) [nsTArray.h:04458f023e47 : 1282 + 0x13]
04:47:52     INFO -      eip = 0x0177cd14   esp = 0x0012f928   ebp = 0x0012f940
04:47:52     INFO -      Found by: call frame info
04:47:52     INFO -   3  xul.dll!mozilla::MediaSourceReader::PrepareInitialization() [MediaSourceReader.cpp:04458f023e47 : 58 + 0x17]
04:47:52     INFO -      eip = 0x021dc182   esp = 0x0012f948   ebp = 0x0012f95c
04:47:52     INFO -      Found by: call frame info
04:47:52     INFO -   4  xul.dll!nsRunnableMethodImpl<void ( imgRequestProxy::*)(void),void,1>::Run() [nsThreadUtils.h:04458f023e47 : 388 + 0x7]
04:47:52     INFO -      eip = 0x01784c3f   esp = 0x0012f95c   ebp = 0x0012f95c
04:47:52     INFO -      Found by: call frame info
04:47:52     INFO -   5  xul.dll!nsThread::ProcessNextEvent(bool,bool *) [nsThread.cpp:04458f023e47 : 823 + 0x5]
04:47:52     INFO -      eip = 0x016a388b   esp = 0x0012f964   ebp = 0x0012fa44
04:47:52     INFO -      Found by: call frame info
04:47:52     INFO -   6  xul.dll!NS_ProcessNextEvent(nsIThread *,bool) [nsThreadUtils.cpp:04458f023e47 : 265 + 0xc]
04:47:52     INFO -      eip = 0x016b3c37   esp = 0x0012fa4c   ebp = 0x0012fa58
04:47:52     INFO -      Found by: call frame info
04:47:52     INFO -   7  xul.dll!mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate *) [MessagePump.cpp:04458f023e47 : 99 + 0x9]
04:47:52     INFO -      eip = 0x0182102e   esp = 0x0012fa60   ebp = 0x0012fa84
04:47:52     INFO -      Found by: call frame info
04:47:52     INFO -   8  xul.dll!MessageLoop::RunHandler() [message_loop.cc:04458f023e47 : 227 + 0x8]
04:47:52     INFO -      eip = 0x018153c5   esp = 0x0012fa8c   ebp = 0x0012fabc
04:47:52     INFO -      Found by: call frame info
04:47:52     INFO -   9  xul.dll!MessageLoop::Run() [message_loop.cc:04458f023e47 : 201 + 0x6]
Component: General → Video/Audio
https://tbpl.mozilla.org/php/getParsedLog.php?id=48399144&tree=Mozilla-Inbound

This is spiking pretty hard. Kinetik's recent push is standing out to me as a possible culprit:
https://tbpl.mozilla.org/?tree=Mozilla-Inbound&jobname=Win.*mochitest-1&rev=0a508290d5f8
Flags: needinfo?(kinetik)
No longer blocks: 1065250
Sorry, not sure how I removed the blocking bug there.
Flags: needinfo?(kinetik)
Assignee: nobody → kinetik
Status: NEW → ASSIGNED
Depends on: 1069730
Fixed by bug 1069730.
Status: ASSIGNED → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla35
You need to log in before you can comment on or make changes to this bug.