Closed
Bug 1235148
Opened 10 years ago
Closed 9 years ago
Intermittent browser_toolbox_sidebar_overflow_menu.js | FATAL ERROR: AsyncShutdown timeout in ShutdownLeaks: Wait for cleanup to be finished before checking for leaks Conditions: [{"name":"DevTools: Wait until toolbox is destroyed","state":"(none)"
Categories
(DevTools :: General, defect, P5)
DevTools
General
Tracking
(e10s+)
RESOLVED
WORKSFORME
| Tracking | Status | |
|---|---|---|
| e10s | + | --- |
People
(Reporter: aryx, Unassigned)
References
(Blocks 1 open bug)
Details
(Keywords: intermittent-failure)
https://treeherder.mozilla.org/logviewer.html#?job_id=19012702&repo=mozilla-inbound
20:03:44 INFO - WARNING: At least one completion condition is taking too long to complete. Conditions: [{"name":"DevTools: Wait until toolbox is destroyed","state":"(none)","filename":"resource://gre/modules/commonjs/toolkit/loader.js -> resource://devtools/client/framework/toolbox.js","lineNumber":2003,"stack":["resource://gre/modules/commonjs/toolkit/loader.js -> resource://devtools/client/framework/toolbox.js:Toolbox.prototype.destroy/leakCheckObserver:2003","chrome://mochikit/content/browser-test.js:Tester.prototype.nextTest</<:655","chrome://mochikit/content/tests/SimpleTest/SimpleTest.js:SimpleTest.waitForFocus/waitForFocusInner/focusedOrLoaded/<:735"]}] Barrier: ShutdownLeaks: Wait for cleanup to be finished before checking for leaks
20:03:44 INFO - --DOMWINDOW == 5 (0FE70000) [pid = 3796] [serial = 98] [outer = 00000000] [url = about:blank]
20:03:44 INFO - --DOMWINDOW == 4 (0FE6C000) [pid = 3796] [serial = 97] [outer = 00000000] [url = about:blank]
20:03:44 INFO - --DOMWINDOW == 3 (0FE71800) [pid = 3796] [serial = 99] [outer = 00000000] [url = about:blank]
20:03:47 INFO - --DOCSHELL 21DD5400 == 5 [pid = 3332] [id = 181]
20:03:47 INFO - --DOMWINDOW == 21 (16524000) [pid = 3332] [serial = 397] [outer = 00000000] [url = about:blank]
20:03:47 INFO - --DOMWINDOW == 20 (193E4000) [pid = 3332] [serial = 20] [outer = 00000000] [url = about:newtab]
20:03:47 INFO - --DOMWINDOW == 19 (116B1C00) [pid = 3332] [serial = 394] [outer = 00000000] [url = about:blank]
20:03:47 INFO - --DOMWINDOW == 18 (11BE2800) [pid = 3332] [serial = 387] [outer = 00000000] [url = chrome://devtools/content/framework/toolbox.xul]
20:03:47 INFO - --DOMWINDOW == 17 (1BD8E400) [pid = 3332] [serial = 28] [outer = 00000000] [url = data:application/vnd.mozilla.xul+xml;charset=utf-8,<window%20id='win'/>]
20:03:48 INFO - --DOMWINDOW == 2 (10A31800) [pid = 3796] [serial = 101] [outer = 00000000] [url = about:blank]
20:04:04 INFO - [Parent 3332] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80520012: file c:/builds/moz2_slave/m-in-w32-d-0000000000000000000/build/src/widget/windows/WinUtils.cpp, line 1364
20:04:35 INFO - FATAL ERROR: AsyncShutdown timeout in ShutdownLeaks: Wait for cleanup to be finished before checking for leaks Conditions: [{"name":"DevTools: Wait until toolbox is destroyed","state":"(none)","filename":"resource://gre/modules/commonjs/toolkit/loader.js -> resource://devtools/client/framework/toolbox.js","lineNumber":2003,"stack":["resource://gre/modules/commonjs/toolkit/loader.js -> resource://devtools/client/framework/toolbox.js:Toolbox.prototype.destroy/leakCheckObserver:2003","chrome://mochikit/content/browser-test.js:Tester.prototype.nextTest</<:655","chrome://mochikit/content/tests/SimpleTest/SimpleTest.js:SimpleTest.waitForFocus/waitForFocusInner/focusedOrLoaded/<:735"]}] At least one completion condition failed to complete within a reasonable amount of time. Causing a crash to ensure that we do not leave the user with an unresponsive process draining resources.
20:04:35 INFO - [Parent 3332] ###!!! ABORT: file resource://gre/modules/commonjs/toolkit/loader.js -> resource://devtools/client/framework/toolbox.js, line 2003
20:04:36 INFO - TEST-INFO | Main app process: exit 1
20:04:36 WARNING - TEST-UNEXPECTED-FAIL | ShutdownLeaks | process() called before end of test suite
20:04:36 INFO - 326 INFO checking window state
20:04:36 WARNING - TEST-UNEXPECTED-FAIL | devtools/client/framework/test/browser_toolbox_sidebar_overflow_menu.js | application terminated with exit code 1
20:04:36 INFO - runtests.py | Application ran for: 0:02:42.223000
20:04:36 INFO - zombiecheck | Reading PID log: c:\users\cltbld\appdata\local\temp\tmpv0faogpidlog
20:04:50 INFO - mozcrash Saved minidump as C:\slave\test\build\blobber_upload_dir\12e7f017-fdb6-4901-ad93-2f1dd084b144.dmp
20:04:50 INFO - mozcrash Saved app info as C:\slave\test\build\blobber_upload_dir\12e7f017-fdb6-4901-ad93-2f1dd084b144.extra
20:04:50 WARNING - PROCESS-CRASH | devtools/client/framework/test/browser_toolbox_sidebar_overflow_menu.js | application crashed [@ DebugBreak + 0x2]
20:04:50 INFO - Crash dump filename: c:\users\cltbld\appdata\local\temp\tmpkqm702.mozrunner\minidumps\12e7f017-fdb6-4901-ad93-2f1dd084b144.dmp
20:04:50 INFO - Operating system: Windows NT
20:04:50 INFO - 6.1.7601 Service Pack 1
20:04:50 INFO - CPU: x86
20:04:50 INFO - GenuineIntel family 6 model 30 stepping 5
20:04:50 INFO - 8 CPUs
20:04:50 INFO - Crash reason: EXCEPTION_BREAKPOINT
20:04:50 INFO - Crash address: 0x7569381b
20:04:50 INFO - Process uptime: 162 seconds
20:04:50 INFO - Thread 0 (crashed)
20:04:50 INFO - 0 KERNELBASE.dll!DebugBreak + 0x2
20:04:50 INFO - eip = 0x7569381b esp = 0x0028bac4 ebp = 0x0028bef4 ebx = 0x00000000
20:04:50 INFO - esi = 0x00000000 edi = 0x696d42b5 eax = 0x00000000 ecx = 0x00000005
20:04:50 INFO - edx = 0x0000001a efl = 0x00200246
20:04:50 INFO - Found by: given as instruction pointer in context
20:04:50 INFO - 1 xul.dll!NS_DebugBreak [nsDebugImpl.cpp:691f2e687e46 : 399 + 0x6]
20:04:50 INFO - eip = 0x62d9a27b esp = 0x0028bac8 ebp = 0x0028bef4
20:04:50 INFO - Found by: call frame info
20:04:50 INFO - 2 xul.dll!nsDebugImpl::Abort(char const *,int) [nsDebugImpl.cpp:691f2e687e46 : 146 + 0x11]
20:04:50 INFO - eip = 0x62d99973 esp = 0x0028befc ebp = 0x0028bf10
20:04:50 INFO - Found by: call frame info
20:04:50 INFO - 3 xul.dll!NS_InvokeByIndex [xptcinvoke.cpp:691f2e687e46 : 70 + 0x3]
20:04:50 INFO - eip = 0x62e1a8a8 esp = 0x0028bf18 ebp = 0x0028bf2c
20:04:50 INFO - Found by: call frame info
20:04:50 INFO - 4 xul.dll!CallMethodHelper::Invoke() [XPCWrappedNative.cpp:691f2e687e46 : 2097 + 0xf]
20:04:50 INFO - eip = 0x63503f6d esp = 0x0028bf34 ebp = 0x0028bf58
20:04:50 INFO - Found by: call frame info
20:04:50 INFO - 5 xul.dll!CallMethodHelper::Call() [XPCWrappedNative.cpp:691f2e687e46 : 1414 + 0x7]
20:04:50 INFO - eip = 0x634f6cd7 esp = 0x0028bf48 ebp = 0x0028bf58
20:04:50 INFO - Found by: call frame info
20:04:50 INFO - 6 xul.dll!XPCWrappedNative::CallMethod(XPCCallContext &,XPCWrappedNative::CallMode) [XPCWrappedNative.cpp:691f2e687e46 : 1381 + 0x12]
20:04:50 INFO - eip = 0x634f6db5 esp = 0x0028bf60 ebp = 0x0028c030
20:04:50 INFO - Found by: call frame info
20:04:50 INFO - 7 xul.dll!js::ObjectGroupHasProperty(JSContext *,js::ObjectGroup *,jsid,JS::Value const &) [TypeInference.cpp:691f2e687e46 : 242 + 0xe]
20:04:50 INFO - eip = 0x657a8bdf esp = 0x0028bf90 ebp = 0x0028bff4
20:04:50 INFO - Found by: stack scanning
20:04:50 INFO - 8 xul.dll!XPCNativeMember::GetCallInfo(JSObject *,XPCNativeInterface * *,XPCNativeMember * *) [XPCWrappedNativeInfo.cpp:691f2e687e46 : 32 + 0x8]
20:04:50 INFO - eip = 0x634fdc7e esp = 0x0028c018 ebp = 0x657553ad
20:04:50 INFO - Found by: call frame info with scanning
20:04:50 INFO - 9 xul.dll!XPCCallContext::SetCallInfo(XPCNativeInterface *,XPCNativeMember *,bool) [XPCCallContext.cpp:691f2e687e46 : 148 + 0x9]
20:04:50 INFO - eip = 0x634e8a14 esp = 0x0028c02c ebp = 0x657553ad
20:04:50 INFO - Found by: stack scanning
20:04:50 INFO - 10 xul.dll!XPC_WN_CallMethod(JSContext *,unsigned int,JS::Value *) [XPCWrappedNativeJSOps.cpp:691f2e687e46 : 1115 + 0xe]
20:04:50 INFO - eip = 0x6350c926 esp = 0x0028c038 ebp = 0x657553ad
20:04:50 INFO - Found by: stack scanning
20:04:50 INFO - 11 xul.dll!XPC_WN_CallMethod(JSContext *,unsigned int,JS::Value *) [XPCWrappedNativeJSOps.cpp:691f2e687e46 : 1115 + 0xe]
20:04:50 INFO - eip = 0x6350c926 esp = 0x0028c040 ebp = 0x0028c800
20:04:50 INFO - Found by: stack scanning
20:04:50 INFO - 12 xul.dll!js::Invoke(JSContext *,JS::CallArgs const &,js::MaybeConstruct) [Interpreter.cpp:691f2e687e46 : 460 + 0xf]
20:04:50 INFO - eip = 0x65b16f3a esp = 0x0028c120 ebp = 0x0028e340
20:04:50 INFO - Found by: call frame info with scanning
20:04:50 INFO - 13 xul.dll!XPCWrappedNative::CallMethod(XPCCallContext &,XPCWrappedNative::CallMode) [XPCWrappedNative.cpp:691f2e687e46 : 1381 + 0x20]
20:04:50 INFO - eip = 0x634f6dc3 esp = 0x0028c198 ebp = 0x0028c174
20:04:50 INFO - Found by: call frame info with scanning
20:04:50 INFO - 14 xul.dll!js::ObjectGroupHasProperty(JSContext *,js::ObjectGroup *,jsid,JS::Value const &) [TypeInference.cpp:691f2e687e46 : 242 + 0xe]
20:04:50 INFO - eip = 0x657a8bdf esp = 0x0028c1c8 ebp = 0x0028c174
20:04:50 INFO - Found by: stack scanning
20:04:50 INFO - 15 xul.dll!AssertActivityIsLegal [nsTraceRefcnt.cpp:691f2e687e46 : 163 + 0x11]
20:04:50 INFO - eip = 0x62db341b esp = 0x0028c240 ebp = 0x0028c1e4
20:04:50 INFO - Found by: call frame info with scanning
20:04:50 INFO - 16 nss3.dll!_MD_CURRENT_THREAD [w95thred.c:691f2e687e46 : 312 + 0xc]
20:04:50 INFO - eip = 0x69ba569c esp = 0x0028c254 ebp = 0x0028c1e4
20:04:50 INFO - Found by: call frame info
20:04:50 INFO - 17 xul.dll!js::CurrentThreadCanAccessRuntime(JSRuntime *) [Runtime.cpp:691f2e687e46 : 848 + 0x6]
20:04:50 INFO - eip = 0x6598c919 esp = 0x0028c25c ebp = 0x0028c1e4
20:04:50 INFO - Found by: call frame info
20:04:50 INFO - 18 xul.dll!XPCCallContext::~XPCCallContext() [XPCCallContext.cpp:691f2e687e46 : 234 + 0x1e]
20:04:50 INFO - eip = 0x634ce600 esp = 0x0028c274 ebp = 0x0028c28c
20:04:50 INFO - Found by: call frame info with scanning
20:04:50 INFO - 19 xul.dll!XPC_WN_CallMethod(JSContext *,unsigned int,JS::Value *) [XPCWrappedNativeJSOps.cpp:691f2e687e46 : 1115 + 0x2d]
20:04:50 INFO - eip = 0x6350c945 esp = 0x0028c280 ebp = 0x0028c28c
20:04:50 INFO - Found by: call frame info
20:04:50 INFO - 20 xul.dll!js::Debugger::FrameRange::FrameRange(js::AbstractFramePtr,js::GlobalObject *) [Debugger.cpp:691f2e687e46 : 197 + 0x7]
20:04:50 INFO - eip = 0x659112a7 esp = 0x0028c354 ebp = 0x0028e340
20:04:50 INFO - Found by: call frame info with scanning
20:04:50 INFO - 21 xul.dll!js::detail::BumpChunk::setBump(void *) [LifoAlloc.h:691f2e687e46 : 76 + 0xe]
20:04:50 INFO - eip = 0x6577095c esp = 0x0028c374 ebp = 0x0028ca34
20:04:50 INFO - Found by: call frame info with scanning
20:04:50 INFO - 22 xul.dll!JS::PersistentRooted<JSString *>::set(JSString *) [RootingAPI.h:691f2e687e46 : 1100 + 0x5]
20:04:50 INFO - eip = 0x62d76d65 esp = 0x0028c39c ebp = 0x0028c39c
20:04:50 INFO - Found by: call frame info with scanning
20:04:50 INFO - 23 xul.dll!Interpret [Interpreter.cpp:691f2e687e46 : 3988 + 0xf]
20:04:50 INFO - eip = 0x65b1648e esp = 0x0028c3c0 ebp = 0x0028cca0
20:04:50 INFO - Found by: call frame info with scanning
20:04:50 INFO - 24 xul.dll!xpc::WrapperFactory::PrepareForWrapping(JSContext *,JS::Handle<JSObject *>,JS::Handle<JSObject *>,JS::Handle<JSObject *>) [WrapperFactory.cpp:691f2e687e46 : 188 + 0x19]
20:04:50 INFO - eip = 0x634a6884 esp = 0x0028cd9c ebp = 0x0028c404
20:04:50 INFO - Found by: call frame info with scanning
20:04:50 INFO - 25 xul.dll!js::CallJSNative(JSContext *,bool (*)(JSContext *,unsigned int,JS::Value *),JS::CallArgs const &) [jscntxtinlines.h:691f2e687e46 : 235 + 0xe]
20:04:50 INFO - eip = 0x65b01e6a esp = 0x0028ce98 ebp = 0x0028cd00
20:04:50 INFO - Found by: call frame info with scanning
20:04:50 INFO - Thread 1
20:04:50 INFO - 0 ntdll.dll!KiFastSystemCallRet + 0x0
20:04:50 INFO - eip = 0x773b70b4 esp = 0x08bff02c ebp = 0x08bff03c ebx = 0x022813a0
20:04:50 INFO - esi = 0x02281360 edi = 0x08bff36c eax = 0x02281300 ecx = 0x00000006
20:04:50 INFO - edx = 0x0000006c efl = 0x00000246
20:04:50 INFO - Found by: given as instruction pointer in context
20:04:50 INFO - 1 ntdll.dll!NtClose + 0xc
20:04:50 INFO - eip = 0x773b54d4 esp = 0x08bff050 ebp = 0x08bff03c
20:04:50 INFO - Found by: call frame info with scanning
20:04:50 INFO - 2 KERNELBASE.dll!CloseHandle + 0x19
20:04:50 INFO - eip = 0x75666b32 esp = 0x08bff054 ebp = 0x08bff03c
20:04:50 INFO - Found by: call frame info
20:04:50 INFO - 3 dbghelp.dll!Win32LiveSystemProvider::OpenMapping(unsigned short const *,unsigned long *,unsigned short *,unsigned long,void * *) + 0x1fe
20:04:50 INFO - eip = 0x6776c127 esp = 0x08bff074 ebp = 0x08bff06c
20:04:50 INFO - Found by: call frame info with scanning
20:04:50 INFO - 4 dbghelp.dll!Win32LiveSystemProvider::OpenMapping(unsigned short const *,unsigned long *,unsigned short *,unsigned long,void * *) + 0x21c
20:04:50 INFO - eip = 0x6776c145 esp = 0x08bff084 ebp = 0x08bff34c
20:04:50 INFO - Found by: stack scanning
20:04:50 INFO - 5 dbghelp.dll!GenAllocateModuleObject(_MINIDUMP_STATE *,_INTERNAL_PROCESS *,unsigned short *,unsigned __int64,unsigned long,_INTERNAL_MODULE * *) + 0x3be
20:04:50 INFO - eip = 0x67767a9f esp = 0x08bff220 ebp = 0x00000000
20:04:50 INFO - Found by: call frame info with scanning
20:04:50 INFO - 6 ntdll.dll!RtlpFreeHeap + 0x418
20:04:50 INFO - eip = 0x773c6594 esp = 0x08bff25c ebp = 0x00000000
20:04:50 INFO - Found by: stack scanning
20:04:50 INFO - 7 ntdll.dll!RtlpFreeHeap + 0x3f4
20:04:50 INFO - eip = 0x773c6570 esp = 0x08bff264 ebp = 0x00000000
20:04:50 INFO - Found by: stack scanning
| Reporter | ||
Updated•10 years ago
|
Summary: Intermittent browser_toolbox_sidebar_overflow_menu.js | → Intermittent browser_toolbox_sidebar_overflow_menu.js | FATAL ERROR: AsyncShutdown timeout in ShutdownLeaks: Wait for cleanup to be finished before checking for leaks Conditions: [{"name":"DevTools: Wait until toolbox is destroyed","state":"(none)"
Updated•10 years ago
|
Blocks: e10s-tests
tracking-e10s:
--- → ?
Updated•10 years ago
|
| Comment hidden (Intermittent Failures Robot) |
| Comment hidden (Intermittent Failures Robot) |
Updated•9 years ago
|
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → WORKSFORME
Updated•7 years ago
|
Product: Firefox → DevTools
You need to log in
before you can comment on or make changes to this bug.
Description
•