Closed Bug 1397199 Opened 7 years ago Closed 7 years ago

Intermittent sessionrestore_no_auto_restore | application crashed [@ VCRUNTIME140.dll + 0xd13f]

Categories

(Testing :: Talos, defect, P5)

Version 3
defect

Tracking

(Not tracked)

RESOLVED DUPLICATE of bug 1396366

People

(Reporter: intermittent-bug-filer, Unassigned)

References

Details

(Keywords: crash, intermittent-failure)

Crash Data

Filed by: archaeopteryx [at] coole-files.de https://treeherder.mozilla.org/logviewer.html#?job_id=128817785&repo=autoland https://mozilla-releng-blobs.s3.amazonaws.com/blobs/Autoland-Non-PGO/sha512/2d959f93f98421696f691b1d8344c541809003c71c4a00a325f3d72bd0eae1ae34cf97287c958ae7cea45ba94e2c5af7277dae4256bfa08f6d180cf5de2a469d 00:29:10 INFO - PROCESS-CRASH | sessionrestore_no_auto_restore | application crashed [@ VCRUNTIME140.dll + 0xd13f] 00:29:10 INFO - Crash dump filename: c:\users\cltbld~1.002\appdata\local\temp\tmptkddvf\profile\minidumps\70ef65e6-e779-435c-843e-6e7a398bb3ad.dmp 00:29:10 INFO - Operating system: Windows NT 00:29:10 INFO - 6.1.7601 Service Pack 1 00:29:10 INFO - CPU: x86 00:29:10 INFO - GenuineIntel family 6 model 30 stepping 5 00:29:10 INFO - 8 CPUs 00:29:10 INFO - GPU: UNKNOWN 00:29:10 INFO - Crash reason: EXCEPTION_ACCESS_VIOLATION_READ 00:29:10 INFO - Crash address: 0xffffffffe5e5e5e5 00:29:10 INFO - Process uptime: 3 seconds 00:29:10 INFO - Thread 46 (crashed) 00:29:10 INFO - 0 VCRUNTIME140.dll + 0xd13f 00:29:10 INFO - eip = 0x7126d13f esp = 0x2136f2a4 ebp = 0x2136f2c8 ebx = 0x2136f34c 00:29:10 INFO - esi = 0xe5e5e5e5 edi = 0x1f7503fb eax = 0xfa90e61e ecx = 0x0000e5e5 00:29:10 INFO - edx = 0x0000e5e5 efl = 0x00010206 00:29:10 INFO - Found by: given as instruction pointer in context 00:29:10 INFO - 1 xul.dll!mozilla::URLPreloader::CacheKey::Code<mozilla::loader::OutputBuffer>(mozilla::loader::OutputBuffer &) [URLPreloader.h:3740b33560ce : 167 + 0x9] 00:29:10 INFO - eip = 0x60737993 esp = 0x2136f2d0 ebp = 0x2136f2dc 00:29:10 INFO - Found by: previous frame's frame pointer 00:29:10 INFO - 2 xul.dll!mozilla::URLPreloader::WriteCache() [URLPreloader.cpp:3740b33560ce : 229 + 0xb] 00:29:10 INFO - eip = 0x6073f1f7 esp = 0x2136f2e4 ebp = 0x2136f358 00:29:10 INFO - Found by: call frame info 00:29:10 INFO - 3 xul.dll!mozilla::ScriptPreloader::WriteCache() [ScriptPreloader.cpp:3740b33560ce : 603 + 0x1a] 00:29:10 INFO - eip = 0x6073ebf9 esp = 0x2136f360 ebp = 0x2136f3e8 00:29:10 INFO - Found by: call frame info 00:29:10 INFO - 4 xul.dll!mozilla::ScriptPreloader::Run() [ScriptPreloader.cpp:3740b33560ce : 700 + 0xc] 00:29:10 INFO - eip = 0x6073e2c0 esp = 0x2136f3f0 ebp = 0x2136f3fc 00:29:10 INFO - Found by: call frame info 00:29:10 INFO - 5 xul.dll!nsThread::ProcessNextEvent(bool,bool *) [nsThread.cpp:3740b33560ce : 1039 + 0xc] 00:29:10 INFO - eip = 0x60306d06 esp = 0x2136f404 ebp = 0x2136f978 00:29:10 INFO - Found by: call frame info 00:29:10 INFO - 6 xul.dll!NS_ProcessNextEvent(nsIThread *,bool) [nsThreadUtils.cpp:3740b33560ce : 521 + 0xd] 00:29:10 INFO - eip = 0x603062b3 esp = 0x2136f980 ebp = 0x2136f994 00:29:10 INFO - Found by: previous frame's frame pointer 00:29:10 INFO - 7 xul.dll!mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate *) [MessagePump.cpp:3740b33560ce : 338 + 0x8] 00:29:10 INFO - eip = 0x6058a329 esp = 0x2136f99c ebp = 0x2136f9c0 00:29:10 INFO - Found by: call frame info 00:29:10 INFO - 8 xul.dll!MessageLoop::RunHandler() [message_loop.cc:3740b33560ce : 319 + 0x8] 00:29:10 INFO - eip = 0x60575227 esp = 0x2136f9c8 ebp = 0x2136f9f8 00:29:10 INFO - Found by: call frame info 00:29:10 INFO - 9 xul.dll!MessageLoop::Run() [message_loop.cc:3740b33560ce : 299 + 0x7] 00:29:10 INFO - eip = 0x60574fe1 esp = 0x2136fa00 ebp = 0x2136fa18 00:29:10 INFO - Found by: call frame info 00:29:10 INFO - 10 xul.dll!nsThread::ThreadFunc(void *) [nsThread.cpp:3740b33560ce : 427 + 0x7] 00:29:10 INFO - eip = 0x60309a22 esp = 0x2136fa20 ebp = 0x2136fa3c 00:29:10 INFO - Found by: call frame info 00:29:10 INFO - 11 nss3.dll!_PR_NativeRunThread [pruthr.c:3740b33560ce : 397 + 0x6] 00:29:10 INFO - eip = 0x6922a90f esp = 0x2136fa44 ebp = 0x2136fa58 00:29:10 INFO - Found by: call frame info 00:29:10 INFO - 12 nss3.dll!pr_root [w95thred.c:3740b33560ce : 95 + 0xa] 00:29:10 INFO - eip = 0x6921fe53 esp = 0x2136fa60 ebp = 0x2136fa64 00:29:10 INFO - Found by: call frame info 00:29:10 INFO - 13 ucrtbase.dll!_o__CIpow + 0x4f 00:29:10 INFO - eip = 0x6958d5ef esp = 0x2136fa6c ebp = 0x2136faa0 00:29:10 INFO - Found by: call frame info 00:29:10 INFO - 14 kernel32.dll!BaseThreadInitThunk + 0x12 00:29:10 INFO - eip = 0x776b3c45 esp = 0x2136faa8 ebp = 0x2136faac 00:29:10 INFO - Found by: call frame info 00:29:10 INFO - 15 mozglue.dll!patched_BaseThreadInitThunk [WindowsDllBlocklist.cpp:3740b33560ce : 815 + 0x15] 00:29:10 INFO - eip = 0x6a672680 esp = 0x2136fab4 ebp = 0x2136fae0 00:29:10 INFO - Found by: call frame info 00:29:10 INFO - 16 ntdll.dll!__RtlUserThreadStart + 0x27 00:29:10 INFO - eip = 0x778e37f5 esp = 0x2136fae8 ebp = 0x2136fb20 00:29:10 INFO - Found by: call frame info 00:29:10 INFO - 17 ntdll.dll!_RtlUserThreadStart + 0x1b 00:29:10 INFO - eip = 0x778e37c8 esp = 0x2136fb28 ebp = 0x2136fb38 00:29:10 INFO - Found by: call frame info
See Also: → 1396253
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → DUPLICATE
You need to log in before you can comment on or make changes to this bug.