Closed
Bug 1514024
Opened 5 years ago
Closed 5 years ago
Intermittent Last test finished | application crashed [@ static void js::InternalBarrierMethods<JSFunction *>::postBarrier(class JSFunction * *, class JSFunction *, class JSFunction *)] after application terminated with exit code 1
Categories
(Core :: JavaScript Engine, defect, P5)
Core
JavaScript Engine
Tracking
()
RESOLVED
DUPLICATE
of bug 1508102
People
(Reporter: intermittent-bug-filer, Unassigned)
Details
(Keywords: crash, intermittent-failure)
Crash Data
Filed by: rgurzau [at] mozilla.com https://treeherder.mozilla.org/logviewer.html#?job_id=216862616&repo=autoland https://queue.taskcluster.net/v1/task/WGb5Ag5zRlmEdXYnEoTVaw/runs/0/artifacts/public/logs/live_backing.log 19:48:17 INFO - TEST-START | dom/tests/browser/browser_xhr_sandbox.js 19:48:17 INFO - GECKO(8388) | MEMORY STAT | vsize 2025MB | vsizeMaxContiguous 131619296MB | residentFast 504MB | heapAllocated 180MB 19:48:17 INFO - TEST-OK | dom/tests/browser/browser_xhr_sandbox.js | took 69ms 19:48:17 INFO - checking window state 19:48:18 INFO - GECKO(8388) | ###!!! [Parent][MessageChannel] Error: (msgtype=0x33000B,name=PCompositorWidget::Msg_UnobserveVsync) Channel error: cannot send/recv 19:48:18 INFO - TEST-INFO | Main app process: exit 1 19:48:18 INFO - Buffered messages finished 19:48:18 ERROR - TEST-UNEXPECTED-FAIL | Last test finished | application terminated with exit code 1 19:48:18 INFO - runtests.py | Application ran for: 0:02:21.081000 19:48:18 INFO - zombiecheck | Reading PID log: c:\users\task_1544729502\appdata\local\temp\tmpwjbcbipidlog --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 19:48:18 INFO - zombiecheck | Checking for orphan process with PID: 5880 19:48:18 INFO - zombiecheck | Checking for orphan process with PID: 8828 19:48:18 INFO - mozcrash Downloading symbols from: https://queue.taskcluster.net/v1/task/CZtlIiVzSFm1KZdgvxiZvw/artifacts/public/build/target.crashreporter-symbols.zip 19:48:20 INFO - mozcrash Copy/paste: Z:\task_1544729502\build\win32-minidump_stackwalk.exe c:\users\task_1544729502\appdata\local\temp\tmpfugr1p.mozrunner\minidumps\97c1ba4c-ac37-4976-8230-9ae6998434cf.dmp c:\users\task_1544729502\appdata\local\temp\tmpoyz4vm 19:48:26 INFO - mozcrash Saved minidump as Z:\task_1544729502\build\blobber_upload_dir\97c1ba4c-ac37-4976-8230-9ae6998434cf.dmp 19:48:26 INFO - mozcrash Saved app info as Z:\task_1544729502\build\blobber_upload_dir\97c1ba4c-ac37-4976-8230-9ae6998434cf.extra 19:48:26 INFO - PROCESS-CRASH | Last test finished | application crashed [@ static void js::InternalBarrierMethods<JSFunction *>::postBarrier(class JSFunction * *, class JSFunction *, class JSFunction *)] 19:48:26 INFO - Crash dump filename: c:\users\task_1544729502\appdata\local\temp\tmpfugr1p.mozrunner\minidumps\97c1ba4c-ac37-4976-8230-9ae6998434cf.dmp 19:48:26 INFO - Operating system: Windows NT 19:48:26 INFO - 10.0.15063 19:48:26 INFO - CPU: amd64 19:48:26 INFO - family 6 model 85 stepping 3 19:48:26 INFO - 8 CPUs 19:48:26 INFO - 19:48:26 INFO - GPU: UNKNOWN 19:48:26 INFO - 19:48:26 INFO - Crash reason: EXCEPTION_ACCESS_VIOLATION_READ 19:48:26 INFO - Crash address: 0x22e0caffff0 19:48:26 INFO - Process uptime: 141 seconds 19:48:26 INFO - 19:48:26 INFO - Thread 0 (crashed) 19:48:26 INFO - 0 xul.dll!static void js::InternalBarrierMethods<JSFunction *>::postBarrier(class JSFunction * *, class JSFunction *, class JSFunction *) [Barrier.h:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 264 + 0x1d] 19:48:26 INFO - rax = 0x00002dce8c1071dc rdx = 0x0000022e0ca00000 19:48:26 INFO - rcx = 0x0000022e087dedd0 rbx = 0x0000022e087dedd0 19:48:26 INFO - rsi = 0x0000022e087ded80 rdi = 0x0000000000000001 19:48:26 INFO - rbp = 0x0000022e06cc44c0 rsp = 0x00000059b77fcd80 19:48:26 INFO - r8 = 0x0000000000000000 r9 = 0x0000000000000000 19:48:26 INFO - r10 = 0x0000022e12102000 r11 = 0x0000022e09024380 19:48:26 INFO - r12 = 0x00000059b77fcfc0 r13 = 0x0000022e06cc3000 19:48:26 INFO - r14 = 0x0000022e06cc44d0 r15 = 0x0000022e63d17240 19:48:26 INFO - rip = 0x00007ffda1108a40 19:48:26 INFO - Found by: given as instruction pointer in context 19:48:26 INFO - 1 xul.dll!void nsXPCWrappedJS::~nsXPCWrappedJS() [XPCWrappedJS.cpp:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 447 + 0x6a] 19:48:26 INFO - rbx = 0x0000022e087dedd0 rbp = 0x0000022e06cc44c0 19:48:26 INFO - rsp = 0x00000059b77fcdd0 r12 = 0x00000059b77fcfc0 19:48:26 INFO - r13 = 0x0000022e06cc3000 r14 = 0x0000022e06cc44d0 19:48:26 INFO - r15 = 0x0000022e63d17240 rip = 0x00007ffda2719585 19:48:26 INFO - Found by: call frame info 19:48:26 INFO - 2 xul.dll!SnowWhiteKiller::~SnowWhiteKiller() [nsCycleCollector.cpp:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 2416 + 0x5f] 19:48:26 INFO - rbx = 0x0000022e087dedd0 rbp = 0x0000022e06cc44c0 19:48:26 INFO - rsp = 0x00000059b77fce10 r12 = 0x00000059b77fcfc0 19:48:26 INFO - r13 = 0x0000022e06cc3000 r14 = 0x0000022e06cc44d0 19:48:26 INFO - r15 = 0x0000022e63d17240 rip = 0x00007ffda1faa89f 19:48:26 INFO - Found by: call frame info 19:48:26 INFO - 3 xul.dll!nsCycleCollector::Collect(ccType,js::SliceBudget &,nsICycleCollectorListener *,bool) [nsCycleCollector.cpp:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 3407 + 0x247] 19:48:26 INFO - rbx = 0x0000022e087dedd0 rbp = 0x0000022e06cc44c0 19:48:26 INFO - rsp = 0x00000059b77fce90 r12 = 0x00000059b77fcfc0 19:48:26 INFO - r13 = 0x0000022e06cc3000 r14 = 0x0000022e06cc44d0 19:48:26 INFO - r15 = 0x0000022e63d17240 rip = 0x00007ffda1fabd83 19:48:26 INFO - Found by: call frame info 19:48:26 INFO - 4 xul.dll!nsCycleCollector_collect(nsICycleCollectorListener *) [nsCycleCollector.cpp:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 3942 + 0x15] 19:48:26 INFO - rbx = 0x0000022e087dedd0 rbp = 0x0000022e06cc44c0 19:48:26 INFO - rsp = 0x00000059b77fd070 r12 = 0x00000059b77fcfc0 19:48:26 INFO - r13 = 0x0000022e06cc3000 r14 = 0x0000022e06cc44d0 19:48:26 INFO - r15 = 0x0000022e63d17240 rip = 0x00007ffda1fae84b 19:48:26 INFO - Found by: call frame info 19:48:26 INFO - 5 xul.dll!nsJSContext::CycleCollectNow(nsICycleCollectorListener *) [nsJSEnvironment.cpp:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 1413 + 0x8] 19:48:26 INFO - rbx = 0x0000022e087dedd0 rbp = 0x0000022e06cc44c0 19:48:26 INFO - rsp = 0x00000059b77fd100 r12 = 0x00000059b77fcfc0 19:48:26 INFO - r13 = 0x0000022e06cc3000 r14 = 0x0000022e06cc44d0 19:48:26 INFO - r15 = 0x0000022e63d17240 rip = 0x00007ffda2cec49f 19:48:26 INFO - Found by: call frame info 19:48:26 INFO - 6 xul.dll!nsJSEnvironmentObserver::Observe(nsISupports *,char const *,char16_t const *) [nsJSEnvironment.cpp:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 329 + 0x7] 19:48:26 INFO - rbx = 0x0000022e087dedd0 rbp = 0x0000022e06cc44c0 19:48:26 INFO - rsp = 0x00000059b77fd170 r12 = 0x00000059b77fcfc0 19:48:26 INFO - r13 = 0x0000022e06cc3000 r14 = 0x0000022e06cc44d0 19:48:26 INFO - r15 = 0x0000022e63d17240 rip = 0x00007ffda0cce877 19:48:26 INFO - Found by: call frame info 19:48:26 INFO - 7 xul.dll!nsObserverService::NotifyObservers(nsISupports *,char const *,char16_t const *) [nsObserverService.cpp:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 286 + 0x45] 19:48:26 INFO - rbx = 0x0000022e087dedd0 rbp = 0x0000022e06cc44c0 19:48:26 INFO - rsp = 0x00000059b77fd220 r12 = 0x00000059b77fcfc0 19:48:26 INFO - r13 = 0x0000022e06cc3000 r14 = 0x0000022e06cc44d0 19:48:26 INFO - r15 = 0x0000022e63d17240 rip = 0x00007ffda07cd534 19:48:26 INFO - Found by: call frame info 19:48:26 INFO - 8 xul.dll!XPTC__InvokebyIndex [xptcinvoke_asm_x86_64.asm:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 97 + 0x4] 19:48:26 INFO - rbx = 0x0000022e087dedd0 rbp = 0x0000022e06cc44c0 19:48:26 INFO - rsp = 0x00000059b77fd2c0 r12 = 0x00000059b77fcfc0 19:48:26 INFO - r13 = 0x0000022e06cc3000 r14 = 0x0000022e06cc44d0 19:48:26 INFO - r15 = 0x0000022e63d17240 rip = 0x00007ffda4ff0a32 19:48:26 INFO - Found by: call frame info
Comment hidden (Intermittent Failures Robot) |
Updated•5 years ago
|
Status: NEW → RESOLVED
Closed: 5 years ago
Component: DOM → JavaScript Engine
Resolution: --- → DUPLICATE
Updated•5 years ago
|
Group: javascript-core-security
Updated•1 year ago
|
Group: javascript-core-security
You need to log in
before you can comment on or make changes to this bug.
Description
•