Closed
Bug 543895
Opened 15 years ago
Closed 15 years ago
Crash [@ nsTArray_base::Length()] when completing mochitest-plain-3, with "missing output line for total leaks!"
Categories
(Core Graveyard :: Plug-ins, defect)
Tracking
(Not tracked)
RESOLVED
DUPLICATE
of bug 542700
People
(Reporter: dholbert, Unassigned)
Details
Just seen: http://tinderbox.mozilla.org/showlog.cgi?log=Firefox/1265161822.1265163535.4997.gz WINNT 5.2 mozilla-central debug test mochitests-3/5 on 2010/02/02 17:50:22 s: win32-slave31 Here's what looks like the relevant chunk of the full log: > 6697 INFO SimpleTest FINISHED [SNIP] > --DOMWINDOW == 0 (054E36A8) [serial = 11] [outer = 00000000] [url = http://localhost:8888/tests/?autorun=1&closeWhenDone=1&consoleLevel=INFO&totalChunks=5&thisChunk=3&chunkByDir=4] > nsStringStats > => mAllocCount: 1249110 > => mReallocCount: 330891 > => mFreeCount: 1249110 > => mShareCount: 1282710 > => mAdoptCount: 184457 > => mAdoptFreeCount: 184457 > INFO | automation.py | Application ran for: 0:16:12.375000 > INFO | automation.py | Reading PID log: c:\docume~1\cltbld\locals~1\temp\tmpoks7ikpidlog > ==> process 3412 launched child process 3880 > ==> process 3412 launched child process 3376 > INFO | automation.py | Checking for orphan process with PID: 3880 > INFO | automation.py | Checking for orphan process with PID: 3376 > NEXT ERROR PROCESS-CRASH | automation.py | application crashed (minidump found) > Operating system: Windows NT > 5.2.3790 Service Pack 2 > CPU: x86 > GenuineIntel family 6 model 23 stepping 8 > 1 CPU > > Crash reason: EXCEPTION_ACCESS_VIOLATION > Crash address: 0xffffffffdddddddd > > Thread 2 (crashed) > 0 xul.dll!nsTArray_base::Length() [nsTArray.h:2714d982f5b4 : 66 + 0x5] > eip = 0x60aa385c esp = 0x0121dcec ebp = 0x0121dcf0 ebx = 0x00000001 > esi = 0xdddddde5 edi = 0x00000000 eax = 0x03604864 ecx = 0xdddddddd > edx = 0xdddddde5 efl = 0x00010292 > Found by: given as instruction pointer in context > 1 xul.dll!nsTArray<mozilla::plugins::ChildAsyncCall *>::IndexOf<mozilla::plugins::ChildAsyncCall *,nsDefaultComparator<mozilla::plugins::ChildAsyncCall *,mozilla::plugins::ChildAsyncCall *> >(mozilla::plugins::ChildAsyncCall * const &,unsigned int,nsDefaultComparator<mozilla::plugins::ChildAsyncCall *,mozilla::plugins::ChildAsyncCall *> const &) [nsTArray.h:2714d982f5b4 : 391 + 0x22] > eip = 0x61a329bd esp = 0x0121dcf8 ebp = 0x0121dd08 > Found by: call frame info > 2 xul.dll!nsTArray<mozilla::plugins::ChildAsyncCall *>::RemoveElement<mozilla::plugins::ChildAsyncCall *,nsDefaultComparator<mozilla::plugins::ChildAsyncCall *,mozilla::plugins::ChildAsyncCall *> >(mozilla::plugins::ChildAsyncCall * const &,nsDefaultComparator<mozilla::plugins::ChildAsyncCall *,mozilla::plugins::ChildAsyncCall *> const &) [nsTArray.h:2714d982f5b4 : 700 + 0x11] > eip = 0x61a3294b esp = 0x0121dd10 ebp = 0x0121dd24 > Found by: call frame info > 3 xul.dll!nsTArray<mozilla::plugins::ChildAsyncCall *>::RemoveElement<mozilla::plugins::ChildAsyncCall *>(mozilla::plugins::ChildAsyncCall * const &) [nsTArray.h:2714d982f5b4 : 712 + 0x14] > eip = 0x61a3291e esp = 0x0121dd2c ebp = 0x0121dd3c > Found by: call frame info > 4 xul.dll!mozilla::plugins::ChildAsyncCall::Run() [ChildAsyncCall.cpp:2714d982f5b4 : 67 + 0x17] > eip = 0x61a328e5 esp = 0x0121dd44 ebp = 0x0121dd4c > Found by: call frame info > 5 xul.dll!nsThread::ProcessNextEvent(int,int *) [nsThread.cpp:2714d982f5b4 : 527 + 0x18] > eip = 0x61b548ca esp = 0x0121dd54 ebp = 0x0121dd88 > Found by: call frame info > 6 xul.dll!NS_ProcessNextEvent_P(nsIThread *,int) [nsThreadUtils.cpp:2714d982f5b4 : 250 + 0x15] > eip = 0x61b061b3 esp = 0x0121dd90 ebp = 0x0121dda4 > Found by: call frame info > 7 xul.dll!mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate *) [MessagePump.cpp:2714d982f5b4 : 118 + 0xd] > eip = 0x61ccf5fd esp = 0x0121ddac ebp = 0x0121ddd8 > Found by: call frame info > 8 xul.dll!mozilla::ipc::MessagePumpForChildProcess::Run(base::MessagePump::Delegate *) [MessagePump.cpp:2714d982f5b4 : 232 + 0xb] > eip = 0x61ccfa1b esp = 0x0121dde0 ebp = 0x0121dde8 ebx = 0x01020c10 > Found by: call frame info > 9 xul.dll!MessageLoop::RunInternal() [message_loop.cc:2714d982f5b4 : 211 + 0x1e] > eip = 0x61a6f676 esp = 0x0121ddf0 ebp = 0x0121de0c > Found by: call frame info > 10 xul.dll!MessageLoop::RunHandler() [message_loop.cc:2714d982f5b4 : 187 + 0x7] > eip = 0x61a6f588 esp = 0x0121de14 ebp = 0x0121de44 > Found by: call frame info > 11 xul.dll!MessageLoop::Run() [message_loop.cc:2714d982f5b4 : 168 + 0x7] > eip = 0x61a6f493 esp = 0x0121de4c ebp = 0x0121de74 ebx = 0x0121d8f8 > Found by: call frame info > 12 xul.dll!nsBaseAppShell::Run() [nsBaseAppShell.cpp:2714d982f5b4 : 174 + 0xb] > eip = 0x618e6640 esp = 0x0121de7c ebp = 0x0121de80 > Found by: call frame info > 13 xul.dll!nsAppShell::Run() [nsAppShell.cpp:2714d982f5b4 : 239 + 0x8] > eip = 0x618e5cc2 esp = 0x0121de88 ebp = 0x0121fdd4 > Found by: call frame info > 14 xul.dll!XRE_RunAppShell [nsEmbedFunctions.cpp:2714d982f5b4 : 475 + 0x18] > eip = 0x60aacdda esp = 0x0121fddc ebp = 0x0121fdf4 > Found by: call frame info > 15 xul.dll!mozilla::ipc::MessagePumpForChildProcess::Run(base::MessagePump::Delegate *) [MessagePump.cpp:2714d982f5b4 : 218 + 0x4] > eip = 0x61ccf97b esp = 0x0121fdfc ebp = 0x0121fe00 > Found by: call frame info > 16 xul.dll!MessageLoop::RunInternal() [message_loop.cc:2714d982f5b4 : 211 + 0x1e] > eip = 0x61a6f676 esp = 0x0121fe08 ebp = 0x0121fe24 > Found by: call frame info > 17 xul.dll!MessageLoop::RunHandler() [message_loop.cc:2714d982f5b4 : 187 + 0x7] > eip = 0x61a6f588 esp = 0x0121fe2c ebp = 0x0121fe5c > Found by: call frame info > 18 xul.dll!MessageLoop::Run() [message_loop.cc:2714d982f5b4 : 168 + 0x7] > eip = 0x61a6f493 esp = 0x0121fe64 ebp = 0x0121fe8c ebx = 0x0121d8f8 > Found by: call frame info > 19 xul.dll!base::Thread::ThreadMain() [thread.cc:2714d982f5b4 : 165 + 0xa] > eip = 0x61a814a5 esp = 0x0121fe94 ebp = 0x0121ffac > Found by: call frame info > 20 xul.dll!`anonymous namespace'::ThreadFunc(void *) [platform_thread_win.cc:2714d982f5b4 : 26 + 0xc] > eip = 0x61ac44e7 esp = 0x0121ffb4 ebp = 0x0121ffb8 > Found by: call frame info > 21 kernel32.dll + 0x24828 > eip = 0x77e64829 esp = 0x0121ffc0 ebp = 0x0121ffec > Found by: call frame info
Updated•15 years ago
|
Status: NEW → RESOLVED
Closed: 15 years ago
Resolution: --- → DUPLICATE
Updated•2 years ago
|
Product: Core → Core Graveyard
You need to log in
before you can comment on or make changes to this bug.
Description
•