Closed Bug 1514024 Opened 5 years ago Closed 5 years ago

Intermittent Last test finished | application crashed [@ static void js::InternalBarrierMethods<JSFunction *>::postBarrier(class JSFunction * *, class JSFunction *, class JSFunction *)] after application terminated with exit code 1

Categories

(Core :: JavaScript Engine, defect, P5)

defect

Tracking

()

RESOLVED DUPLICATE of bug 1508102

People

(Reporter: intermittent-bug-filer, Unassigned)

Details

(Keywords: crash, intermittent-failure)

Crash Data

Filed by: rgurzau [at] mozilla.com

https://treeherder.mozilla.org/logviewer.html#?job_id=216862616&repo=autoland

https://queue.taskcluster.net/v1/task/WGb5Ag5zRlmEdXYnEoTVaw/runs/0/artifacts/public/logs/live_backing.log

19:48:17     INFO - TEST-START | dom/tests/browser/browser_xhr_sandbox.js
19:48:17     INFO - GECKO(8388) | MEMORY STAT | vsize 2025MB | vsizeMaxContiguous 131619296MB | residentFast 504MB | heapAllocated 180MB
19:48:17     INFO - TEST-OK | dom/tests/browser/browser_xhr_sandbox.js | took 69ms
19:48:17     INFO - checking window state
19:48:18     INFO - GECKO(8388) | ###!!! [Parent][MessageChannel] Error: (msgtype=0x33000B,name=PCompositorWidget::Msg_UnobserveVsync) Channel error: cannot send/recv
19:48:18     INFO - TEST-INFO | Main app process: exit 1
19:48:18     INFO - Buffered messages finished
19:48:18    ERROR - TEST-UNEXPECTED-FAIL | Last test finished | application terminated with exit code 1
19:48:18     INFO - runtests.py | Application ran for: 0:02:21.081000
19:48:18     INFO - zombiecheck | Reading PID log: c:\users\task_1544729502\appdata\local\temp\tmpwjbcbipidlog

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

19:48:18     INFO - zombiecheck | Checking for orphan process with PID: 5880
19:48:18     INFO - zombiecheck | Checking for orphan process with PID: 8828
19:48:18     INFO - mozcrash Downloading symbols from: https://queue.taskcluster.net/v1/task/CZtlIiVzSFm1KZdgvxiZvw/artifacts/public/build/target.crashreporter-symbols.zip
19:48:20     INFO - mozcrash Copy/paste: Z:\task_1544729502\build\win32-minidump_stackwalk.exe c:\users\task_1544729502\appdata\local\temp\tmpfugr1p.mozrunner\minidumps\97c1ba4c-ac37-4976-8230-9ae6998434cf.dmp c:\users\task_1544729502\appdata\local\temp\tmpoyz4vm
19:48:26     INFO - mozcrash Saved minidump as Z:\task_1544729502\build\blobber_upload_dir\97c1ba4c-ac37-4976-8230-9ae6998434cf.dmp
19:48:26     INFO - mozcrash Saved app info as Z:\task_1544729502\build\blobber_upload_dir\97c1ba4c-ac37-4976-8230-9ae6998434cf.extra
19:48:26     INFO - PROCESS-CRASH | Last test finished | application crashed [@ static void js::InternalBarrierMethods<JSFunction *>::postBarrier(class JSFunction * *, class JSFunction *, class JSFunction *)]
19:48:26     INFO - Crash dump filename: c:\users\task_1544729502\appdata\local\temp\tmpfugr1p.mozrunner\minidumps\97c1ba4c-ac37-4976-8230-9ae6998434cf.dmp
19:48:26     INFO - Operating system: Windows NT
19:48:26     INFO -                   10.0.15063 
19:48:26     INFO - CPU: amd64
19:48:26     INFO -      family 6 model 85 stepping 3
19:48:26     INFO -      8 CPUs
19:48:26     INFO - 
19:48:26     INFO - GPU: UNKNOWN
19:48:26     INFO - 
19:48:26     INFO - Crash reason:  EXCEPTION_ACCESS_VIOLATION_READ
19:48:26     INFO - Crash address: 0x22e0caffff0
19:48:26     INFO - Process uptime: 141 seconds
19:48:26     INFO - 
19:48:26     INFO - Thread 0 (crashed)
19:48:26     INFO -  0  xul.dll!static void js::InternalBarrierMethods<JSFunction *>::postBarrier(class JSFunction * *, class JSFunction *, class JSFunction *) [Barrier.h:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 264 + 0x1d]
19:48:26     INFO -     rax = 0x00002dce8c1071dc   rdx = 0x0000022e0ca00000
19:48:26     INFO -     rcx = 0x0000022e087dedd0   rbx = 0x0000022e087dedd0
19:48:26     INFO -     rsi = 0x0000022e087ded80   rdi = 0x0000000000000001
19:48:26     INFO -     rbp = 0x0000022e06cc44c0   rsp = 0x00000059b77fcd80
19:48:26     INFO -      r8 = 0x0000000000000000    r9 = 0x0000000000000000
19:48:26     INFO -     r10 = 0x0000022e12102000   r11 = 0x0000022e09024380
19:48:26     INFO -     r12 = 0x00000059b77fcfc0   r13 = 0x0000022e06cc3000
19:48:26     INFO -     r14 = 0x0000022e06cc44d0   r15 = 0x0000022e63d17240
19:48:26     INFO -     rip = 0x00007ffda1108a40
19:48:26     INFO -     Found by: given as instruction pointer in context
19:48:26     INFO -  1  xul.dll!void nsXPCWrappedJS::~nsXPCWrappedJS() [XPCWrappedJS.cpp:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 447 + 0x6a]
19:48:26     INFO -     rbx = 0x0000022e087dedd0   rbp = 0x0000022e06cc44c0
19:48:26     INFO -     rsp = 0x00000059b77fcdd0   r12 = 0x00000059b77fcfc0
19:48:26     INFO -     r13 = 0x0000022e06cc3000   r14 = 0x0000022e06cc44d0
19:48:26     INFO -     r15 = 0x0000022e63d17240   rip = 0x00007ffda2719585
19:48:26     INFO -     Found by: call frame info
19:48:26     INFO -  2  xul.dll!SnowWhiteKiller::~SnowWhiteKiller() [nsCycleCollector.cpp:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 2416 + 0x5f]
19:48:26     INFO -     rbx = 0x0000022e087dedd0   rbp = 0x0000022e06cc44c0
19:48:26     INFO -     rsp = 0x00000059b77fce10   r12 = 0x00000059b77fcfc0
19:48:26     INFO -     r13 = 0x0000022e06cc3000   r14 = 0x0000022e06cc44d0
19:48:26     INFO -     r15 = 0x0000022e63d17240   rip = 0x00007ffda1faa89f
19:48:26     INFO -     Found by: call frame info
19:48:26     INFO -  3  xul.dll!nsCycleCollector::Collect(ccType,js::SliceBudget &,nsICycleCollectorListener *,bool) [nsCycleCollector.cpp:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 3407 + 0x247]
19:48:26     INFO -     rbx = 0x0000022e087dedd0   rbp = 0x0000022e06cc44c0
19:48:26     INFO -     rsp = 0x00000059b77fce90   r12 = 0x00000059b77fcfc0
19:48:26     INFO -     r13 = 0x0000022e06cc3000   r14 = 0x0000022e06cc44d0
19:48:26     INFO -     r15 = 0x0000022e63d17240   rip = 0x00007ffda1fabd83
19:48:26     INFO -     Found by: call frame info
19:48:26     INFO -  4  xul.dll!nsCycleCollector_collect(nsICycleCollectorListener *) [nsCycleCollector.cpp:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 3942 + 0x15]
19:48:26     INFO -     rbx = 0x0000022e087dedd0   rbp = 0x0000022e06cc44c0
19:48:26     INFO -     rsp = 0x00000059b77fd070   r12 = 0x00000059b77fcfc0
19:48:26     INFO -     r13 = 0x0000022e06cc3000   r14 = 0x0000022e06cc44d0
19:48:26     INFO -     r15 = 0x0000022e63d17240   rip = 0x00007ffda1fae84b
19:48:26     INFO -     Found by: call frame info
19:48:26     INFO -  5  xul.dll!nsJSContext::CycleCollectNow(nsICycleCollectorListener *) [nsJSEnvironment.cpp:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 1413 + 0x8]
19:48:26     INFO -     rbx = 0x0000022e087dedd0   rbp = 0x0000022e06cc44c0
19:48:26     INFO -     rsp = 0x00000059b77fd100   r12 = 0x00000059b77fcfc0
19:48:26     INFO -     r13 = 0x0000022e06cc3000   r14 = 0x0000022e06cc44d0
19:48:26     INFO -     r15 = 0x0000022e63d17240   rip = 0x00007ffda2cec49f
19:48:26     INFO -     Found by: call frame info
19:48:26     INFO -  6  xul.dll!nsJSEnvironmentObserver::Observe(nsISupports *,char const *,char16_t const *) [nsJSEnvironment.cpp:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 329 + 0x7]
19:48:26     INFO -     rbx = 0x0000022e087dedd0   rbp = 0x0000022e06cc44c0
19:48:26     INFO -     rsp = 0x00000059b77fd170   r12 = 0x00000059b77fcfc0
19:48:26     INFO -     r13 = 0x0000022e06cc3000   r14 = 0x0000022e06cc44d0
19:48:26     INFO -     r15 = 0x0000022e63d17240   rip = 0x00007ffda0cce877
19:48:26     INFO -     Found by: call frame info
19:48:26     INFO -  7  xul.dll!nsObserverService::NotifyObservers(nsISupports *,char const *,char16_t const *) [nsObserverService.cpp:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 286 + 0x45]
19:48:26     INFO -     rbx = 0x0000022e087dedd0   rbp = 0x0000022e06cc44c0
19:48:26     INFO -     rsp = 0x00000059b77fd220   r12 = 0x00000059b77fcfc0
19:48:26     INFO -     r13 = 0x0000022e06cc3000   r14 = 0x0000022e06cc44d0
19:48:26     INFO -     r15 = 0x0000022e63d17240   rip = 0x00007ffda07cd534
19:48:26     INFO -     Found by: call frame info
19:48:26     INFO -  8  xul.dll!XPTC__InvokebyIndex [xptcinvoke_asm_x86_64.asm:7a5bfc35d78933c87fe71f4cba89ce641cff5b27 : 97 + 0x4]
19:48:26     INFO -     rbx = 0x0000022e087dedd0   rbp = 0x0000022e06cc44c0
19:48:26     INFO -     rsp = 0x00000059b77fd2c0   r12 = 0x00000059b77fcfc0
19:48:26     INFO -     r13 = 0x0000022e06cc3000   r14 = 0x0000022e06cc44d0
19:48:26     INFO -     r15 = 0x0000022e63d17240   rip = 0x00007ffda4ff0a32
19:48:26     INFO -     Found by: call frame info
Status: NEW → RESOLVED
Closed: 5 years ago
Component: DOM → JavaScript Engine
Resolution: --- → DUPLICATE
Group: javascript-core-security
Group: javascript-core-security
You need to log in before you can comment on or make changes to this bug.