Closed Bug 1235148 Opened 10 years ago Closed 9 years ago

Intermittent browser_toolbox_sidebar_overflow_menu.js | FATAL ERROR: AsyncShutdown timeout in ShutdownLeaks: Wait for cleanup to be finished before checking for leaks Conditions: [{"name":"DevTools: Wait until toolbox is destroyed","state":"(none)"

Categories

(DevTools :: General, defect, P5)

defect

Tracking

(e10s+)

RESOLVED WORKSFORME
Tracking Status
e10s + ---

People

(Reporter: aryx, Unassigned)

References

(Blocks 1 open bug)

Details

(Keywords: intermittent-failure)

https://treeherder.mozilla.org/logviewer.html#?job_id=19012702&repo=mozilla-inbound 20:03:44 INFO - WARNING: At least one completion condition is taking too long to complete. Conditions: [{"name":"DevTools: Wait until toolbox is destroyed","state":"(none)","filename":"resource://gre/modules/commonjs/toolkit/loader.js -> resource://devtools/client/framework/toolbox.js","lineNumber":2003,"stack":["resource://gre/modules/commonjs/toolkit/loader.js -> resource://devtools/client/framework/toolbox.js:Toolbox.prototype.destroy/leakCheckObserver:2003","chrome://mochikit/content/browser-test.js:Tester.prototype.nextTest</<:655","chrome://mochikit/content/tests/SimpleTest/SimpleTest.js:SimpleTest.waitForFocus/waitForFocusInner/focusedOrLoaded/<:735"]}] Barrier: ShutdownLeaks: Wait for cleanup to be finished before checking for leaks 20:03:44 INFO - --DOMWINDOW == 5 (0FE70000) [pid = 3796] [serial = 98] [outer = 00000000] [url = about:blank] 20:03:44 INFO - --DOMWINDOW == 4 (0FE6C000) [pid = 3796] [serial = 97] [outer = 00000000] [url = about:blank] 20:03:44 INFO - --DOMWINDOW == 3 (0FE71800) [pid = 3796] [serial = 99] [outer = 00000000] [url = about:blank] 20:03:47 INFO - --DOCSHELL 21DD5400 == 5 [pid = 3332] [id = 181] 20:03:47 INFO - --DOMWINDOW == 21 (16524000) [pid = 3332] [serial = 397] [outer = 00000000] [url = about:blank] 20:03:47 INFO - --DOMWINDOW == 20 (193E4000) [pid = 3332] [serial = 20] [outer = 00000000] [url = about:newtab] 20:03:47 INFO - --DOMWINDOW == 19 (116B1C00) [pid = 3332] [serial = 394] [outer = 00000000] [url = about:blank] 20:03:47 INFO - --DOMWINDOW == 18 (11BE2800) [pid = 3332] [serial = 387] [outer = 00000000] [url = chrome://devtools/content/framework/toolbox.xul] 20:03:47 INFO - --DOMWINDOW == 17 (1BD8E400) [pid = 3332] [serial = 28] [outer = 00000000] [url = data:application/vnd.mozilla.xul+xml;charset=utf-8,<window%20id='win'/>] 20:03:48 INFO - --DOMWINDOW == 2 (10A31800) [pid = 3796] [serial = 101] [outer = 00000000] [url = about:blank] 20:04:04 INFO - [Parent 3332] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80520012: file c:/builds/moz2_slave/m-in-w32-d-0000000000000000000/build/src/widget/windows/WinUtils.cpp, line 1364 20:04:35 INFO - FATAL ERROR: AsyncShutdown timeout in ShutdownLeaks: Wait for cleanup to be finished before checking for leaks Conditions: [{"name":"DevTools: Wait until toolbox is destroyed","state":"(none)","filename":"resource://gre/modules/commonjs/toolkit/loader.js -> resource://devtools/client/framework/toolbox.js","lineNumber":2003,"stack":["resource://gre/modules/commonjs/toolkit/loader.js -> resource://devtools/client/framework/toolbox.js:Toolbox.prototype.destroy/leakCheckObserver:2003","chrome://mochikit/content/browser-test.js:Tester.prototype.nextTest</<:655","chrome://mochikit/content/tests/SimpleTest/SimpleTest.js:SimpleTest.waitForFocus/waitForFocusInner/focusedOrLoaded/<:735"]}] At least one completion condition failed to complete within a reasonable amount of time. Causing a crash to ensure that we do not leave the user with an unresponsive process draining resources. 20:04:35 INFO - [Parent 3332] ###!!! ABORT: file resource://gre/modules/commonjs/toolkit/loader.js -> resource://devtools/client/framework/toolbox.js, line 2003 20:04:36 INFO - TEST-INFO | Main app process: exit 1 20:04:36 WARNING - TEST-UNEXPECTED-FAIL | ShutdownLeaks | process() called before end of test suite 20:04:36 INFO - 326 INFO checking window state 20:04:36 WARNING - TEST-UNEXPECTED-FAIL | devtools/client/framework/test/browser_toolbox_sidebar_overflow_menu.js | application terminated with exit code 1 20:04:36 INFO - runtests.py | Application ran for: 0:02:42.223000 20:04:36 INFO - zombiecheck | Reading PID log: c:\users\cltbld\appdata\local\temp\tmpv0faogpidlog 20:04:50 INFO - mozcrash Saved minidump as C:\slave\test\build\blobber_upload_dir\12e7f017-fdb6-4901-ad93-2f1dd084b144.dmp 20:04:50 INFO - mozcrash Saved app info as C:\slave\test\build\blobber_upload_dir\12e7f017-fdb6-4901-ad93-2f1dd084b144.extra 20:04:50 WARNING - PROCESS-CRASH | devtools/client/framework/test/browser_toolbox_sidebar_overflow_menu.js | application crashed [@ DebugBreak + 0x2] 20:04:50 INFO - Crash dump filename: c:\users\cltbld\appdata\local\temp\tmpkqm702.mozrunner\minidumps\12e7f017-fdb6-4901-ad93-2f1dd084b144.dmp 20:04:50 INFO - Operating system: Windows NT 20:04:50 INFO - 6.1.7601 Service Pack 1 20:04:50 INFO - CPU: x86 20:04:50 INFO - GenuineIntel family 6 model 30 stepping 5 20:04:50 INFO - 8 CPUs 20:04:50 INFO - Crash reason: EXCEPTION_BREAKPOINT 20:04:50 INFO - Crash address: 0x7569381b 20:04:50 INFO - Process uptime: 162 seconds 20:04:50 INFO - Thread 0 (crashed) 20:04:50 INFO - 0 KERNELBASE.dll!DebugBreak + 0x2 20:04:50 INFO - eip = 0x7569381b esp = 0x0028bac4 ebp = 0x0028bef4 ebx = 0x00000000 20:04:50 INFO - esi = 0x00000000 edi = 0x696d42b5 eax = 0x00000000 ecx = 0x00000005 20:04:50 INFO - edx = 0x0000001a efl = 0x00200246 20:04:50 INFO - Found by: given as instruction pointer in context 20:04:50 INFO - 1 xul.dll!NS_DebugBreak [nsDebugImpl.cpp:691f2e687e46 : 399 + 0x6] 20:04:50 INFO - eip = 0x62d9a27b esp = 0x0028bac8 ebp = 0x0028bef4 20:04:50 INFO - Found by: call frame info 20:04:50 INFO - 2 xul.dll!nsDebugImpl::Abort(char const *,int) [nsDebugImpl.cpp:691f2e687e46 : 146 + 0x11] 20:04:50 INFO - eip = 0x62d99973 esp = 0x0028befc ebp = 0x0028bf10 20:04:50 INFO - Found by: call frame info 20:04:50 INFO - 3 xul.dll!NS_InvokeByIndex [xptcinvoke.cpp:691f2e687e46 : 70 + 0x3] 20:04:50 INFO - eip = 0x62e1a8a8 esp = 0x0028bf18 ebp = 0x0028bf2c 20:04:50 INFO - Found by: call frame info 20:04:50 INFO - 4 xul.dll!CallMethodHelper::Invoke() [XPCWrappedNative.cpp:691f2e687e46 : 2097 + 0xf] 20:04:50 INFO - eip = 0x63503f6d esp = 0x0028bf34 ebp = 0x0028bf58 20:04:50 INFO - Found by: call frame info 20:04:50 INFO - 5 xul.dll!CallMethodHelper::Call() [XPCWrappedNative.cpp:691f2e687e46 : 1414 + 0x7] 20:04:50 INFO - eip = 0x634f6cd7 esp = 0x0028bf48 ebp = 0x0028bf58 20:04:50 INFO - Found by: call frame info 20:04:50 INFO - 6 xul.dll!XPCWrappedNative::CallMethod(XPCCallContext &,XPCWrappedNative::CallMode) [XPCWrappedNative.cpp:691f2e687e46 : 1381 + 0x12] 20:04:50 INFO - eip = 0x634f6db5 esp = 0x0028bf60 ebp = 0x0028c030 20:04:50 INFO - Found by: call frame info 20:04:50 INFO - 7 xul.dll!js::ObjectGroupHasProperty(JSContext *,js::ObjectGroup *,jsid,JS::Value const &) [TypeInference.cpp:691f2e687e46 : 242 + 0xe] 20:04:50 INFO - eip = 0x657a8bdf esp = 0x0028bf90 ebp = 0x0028bff4 20:04:50 INFO - Found by: stack scanning 20:04:50 INFO - 8 xul.dll!XPCNativeMember::GetCallInfo(JSObject *,XPCNativeInterface * *,XPCNativeMember * *) [XPCWrappedNativeInfo.cpp:691f2e687e46 : 32 + 0x8] 20:04:50 INFO - eip = 0x634fdc7e esp = 0x0028c018 ebp = 0x657553ad 20:04:50 INFO - Found by: call frame info with scanning 20:04:50 INFO - 9 xul.dll!XPCCallContext::SetCallInfo(XPCNativeInterface *,XPCNativeMember *,bool) [XPCCallContext.cpp:691f2e687e46 : 148 + 0x9] 20:04:50 INFO - eip = 0x634e8a14 esp = 0x0028c02c ebp = 0x657553ad 20:04:50 INFO - Found by: stack scanning 20:04:50 INFO - 10 xul.dll!XPC_WN_CallMethod(JSContext *,unsigned int,JS::Value *) [XPCWrappedNativeJSOps.cpp:691f2e687e46 : 1115 + 0xe] 20:04:50 INFO - eip = 0x6350c926 esp = 0x0028c038 ebp = 0x657553ad 20:04:50 INFO - Found by: stack scanning 20:04:50 INFO - 11 xul.dll!XPC_WN_CallMethod(JSContext *,unsigned int,JS::Value *) [XPCWrappedNativeJSOps.cpp:691f2e687e46 : 1115 + 0xe] 20:04:50 INFO - eip = 0x6350c926 esp = 0x0028c040 ebp = 0x0028c800 20:04:50 INFO - Found by: stack scanning 20:04:50 INFO - 12 xul.dll!js::Invoke(JSContext *,JS::CallArgs const &,js::MaybeConstruct) [Interpreter.cpp:691f2e687e46 : 460 + 0xf] 20:04:50 INFO - eip = 0x65b16f3a esp = 0x0028c120 ebp = 0x0028e340 20:04:50 INFO - Found by: call frame info with scanning 20:04:50 INFO - 13 xul.dll!XPCWrappedNative::CallMethod(XPCCallContext &,XPCWrappedNative::CallMode) [XPCWrappedNative.cpp:691f2e687e46 : 1381 + 0x20] 20:04:50 INFO - eip = 0x634f6dc3 esp = 0x0028c198 ebp = 0x0028c174 20:04:50 INFO - Found by: call frame info with scanning 20:04:50 INFO - 14 xul.dll!js::ObjectGroupHasProperty(JSContext *,js::ObjectGroup *,jsid,JS::Value const &) [TypeInference.cpp:691f2e687e46 : 242 + 0xe] 20:04:50 INFO - eip = 0x657a8bdf esp = 0x0028c1c8 ebp = 0x0028c174 20:04:50 INFO - Found by: stack scanning 20:04:50 INFO - 15 xul.dll!AssertActivityIsLegal [nsTraceRefcnt.cpp:691f2e687e46 : 163 + 0x11] 20:04:50 INFO - eip = 0x62db341b esp = 0x0028c240 ebp = 0x0028c1e4 20:04:50 INFO - Found by: call frame info with scanning 20:04:50 INFO - 16 nss3.dll!_MD_CURRENT_THREAD [w95thred.c:691f2e687e46 : 312 + 0xc] 20:04:50 INFO - eip = 0x69ba569c esp = 0x0028c254 ebp = 0x0028c1e4 20:04:50 INFO - Found by: call frame info 20:04:50 INFO - 17 xul.dll!js::CurrentThreadCanAccessRuntime(JSRuntime *) [Runtime.cpp:691f2e687e46 : 848 + 0x6] 20:04:50 INFO - eip = 0x6598c919 esp = 0x0028c25c ebp = 0x0028c1e4 20:04:50 INFO - Found by: call frame info 20:04:50 INFO - 18 xul.dll!XPCCallContext::~XPCCallContext() [XPCCallContext.cpp:691f2e687e46 : 234 + 0x1e] 20:04:50 INFO - eip = 0x634ce600 esp = 0x0028c274 ebp = 0x0028c28c 20:04:50 INFO - Found by: call frame info with scanning 20:04:50 INFO - 19 xul.dll!XPC_WN_CallMethod(JSContext *,unsigned int,JS::Value *) [XPCWrappedNativeJSOps.cpp:691f2e687e46 : 1115 + 0x2d] 20:04:50 INFO - eip = 0x6350c945 esp = 0x0028c280 ebp = 0x0028c28c 20:04:50 INFO - Found by: call frame info 20:04:50 INFO - 20 xul.dll!js::Debugger::FrameRange::FrameRange(js::AbstractFramePtr,js::GlobalObject *) [Debugger.cpp:691f2e687e46 : 197 + 0x7] 20:04:50 INFO - eip = 0x659112a7 esp = 0x0028c354 ebp = 0x0028e340 20:04:50 INFO - Found by: call frame info with scanning 20:04:50 INFO - 21 xul.dll!js::detail::BumpChunk::setBump(void *) [LifoAlloc.h:691f2e687e46 : 76 + 0xe] 20:04:50 INFO - eip = 0x6577095c esp = 0x0028c374 ebp = 0x0028ca34 20:04:50 INFO - Found by: call frame info with scanning 20:04:50 INFO - 22 xul.dll!JS::PersistentRooted<JSString *>::set(JSString *) [RootingAPI.h:691f2e687e46 : 1100 + 0x5] 20:04:50 INFO - eip = 0x62d76d65 esp = 0x0028c39c ebp = 0x0028c39c 20:04:50 INFO - Found by: call frame info with scanning 20:04:50 INFO - 23 xul.dll!Interpret [Interpreter.cpp:691f2e687e46 : 3988 + 0xf] 20:04:50 INFO - eip = 0x65b1648e esp = 0x0028c3c0 ebp = 0x0028cca0 20:04:50 INFO - Found by: call frame info with scanning 20:04:50 INFO - 24 xul.dll!xpc::WrapperFactory::PrepareForWrapping(JSContext *,JS::Handle<JSObject *>,JS::Handle<JSObject *>,JS::Handle<JSObject *>) [WrapperFactory.cpp:691f2e687e46 : 188 + 0x19] 20:04:50 INFO - eip = 0x634a6884 esp = 0x0028cd9c ebp = 0x0028c404 20:04:50 INFO - Found by: call frame info with scanning 20:04:50 INFO - 25 xul.dll!js::CallJSNative(JSContext *,bool (*)(JSContext *,unsigned int,JS::Value *),JS::CallArgs const &) [jscntxtinlines.h:691f2e687e46 : 235 + 0xe] 20:04:50 INFO - eip = 0x65b01e6a esp = 0x0028ce98 ebp = 0x0028cd00 20:04:50 INFO - Found by: call frame info with scanning 20:04:50 INFO - Thread 1 20:04:50 INFO - 0 ntdll.dll!KiFastSystemCallRet + 0x0 20:04:50 INFO - eip = 0x773b70b4 esp = 0x08bff02c ebp = 0x08bff03c ebx = 0x022813a0 20:04:50 INFO - esi = 0x02281360 edi = 0x08bff36c eax = 0x02281300 ecx = 0x00000006 20:04:50 INFO - edx = 0x0000006c efl = 0x00000246 20:04:50 INFO - Found by: given as instruction pointer in context 20:04:50 INFO - 1 ntdll.dll!NtClose + 0xc 20:04:50 INFO - eip = 0x773b54d4 esp = 0x08bff050 ebp = 0x08bff03c 20:04:50 INFO - Found by: call frame info with scanning 20:04:50 INFO - 2 KERNELBASE.dll!CloseHandle + 0x19 20:04:50 INFO - eip = 0x75666b32 esp = 0x08bff054 ebp = 0x08bff03c 20:04:50 INFO - Found by: call frame info 20:04:50 INFO - 3 dbghelp.dll!Win32LiveSystemProvider::OpenMapping(unsigned short const *,unsigned long *,unsigned short *,unsigned long,void * *) + 0x1fe 20:04:50 INFO - eip = 0x6776c127 esp = 0x08bff074 ebp = 0x08bff06c 20:04:50 INFO - Found by: call frame info with scanning 20:04:50 INFO - 4 dbghelp.dll!Win32LiveSystemProvider::OpenMapping(unsigned short const *,unsigned long *,unsigned short *,unsigned long,void * *) + 0x21c 20:04:50 INFO - eip = 0x6776c145 esp = 0x08bff084 ebp = 0x08bff34c 20:04:50 INFO - Found by: stack scanning 20:04:50 INFO - 5 dbghelp.dll!GenAllocateModuleObject(_MINIDUMP_STATE *,_INTERNAL_PROCESS *,unsigned short *,unsigned __int64,unsigned long,_INTERNAL_MODULE * *) + 0x3be 20:04:50 INFO - eip = 0x67767a9f esp = 0x08bff220 ebp = 0x00000000 20:04:50 INFO - Found by: call frame info with scanning 20:04:50 INFO - 6 ntdll.dll!RtlpFreeHeap + 0x418 20:04:50 INFO - eip = 0x773c6594 esp = 0x08bff25c ebp = 0x00000000 20:04:50 INFO - Found by: stack scanning 20:04:50 INFO - 7 ntdll.dll!RtlpFreeHeap + 0x3f4 20:04:50 INFO - eip = 0x773c6570 esp = 0x08bff264 ebp = 0x00000000 20:04:50 INFO - Found by: stack scanning
Summary: Intermittent browser_toolbox_sidebar_overflow_menu.js | → Intermittent browser_toolbox_sidebar_overflow_menu.js | FATAL ERROR: AsyncShutdown timeout in ShutdownLeaks: Wait for cleanup to be finished before checking for leaks Conditions: [{"name":"DevTools: Wait until toolbox is destroyed","state":"(none)"
See Also: → 1240580
See Also: → 1185045
Intermittent e10s test failure
Priority: -- → P5
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → WORKSFORME
Product: Firefox → DevTools
You need to log in before you can comment on or make changes to this bug.