Closed Bug 612881 Opened 12 years ago Closed 12 years ago

crash [@ ns_if_addref<nsIDOMHTMLCanvasElement*>(nsIDOMHTMLCanvasElement*) ] [@ ns_if_addref<nsIRequest*>(nsIRequest*) ] [@ ns_if_addref<nsPresContext*>(nsPresContext*) ] [@ ns_if_addref<nsICancelable*>(nsICancelable*) ]

Categories

(Core :: DOM: Navigation, defect)

x86
Windows 7
defect
Not set
critical

Tracking

()

RESOLVED FIXED
Tracking Status
blocking2.0 --- betaN+

People

(Reporter: scoobidiver, Unassigned)

References

Details

(Keywords: crash, regression, topcrash)

Crash Data

This is a new crash signature that was introduced by 4.0b8pre/20101116 build.
It is #12 top crasher for this build.

Signature	ns_if_addref<nsIDOMHTMLCanvasElement*>(nsIDOMHTMLCanvasElement*)
UUID	facb7033-eb2a-4df1-9220-5ee8c2101117
Time 	2010-11-17 07:15:48.759628
Uptime	58968
Last Crash	1515684 seconds (2.5 weeks) before submission
Install Age	90610 seconds (1.0 days) since version was first installed.
Product	Firefox
Version	4.0b8pre
Build ID	20101116042306
Branch	2.0
OS	Windows NT
OS Version	6.1.7600
CPU	x86
CPU Info	GenuineIntel family 6 model 23 stepping 10
Crash Reason	EXCEPTION_ACCESS_VIOLATION_READ
Crash Address	0x6
App Notes 	AdapterVendorID: 8086, AdapterDeviceID: 2a42

Frame 	Module 	Signature [Expand] 	Source
0 	xul.dll 	ns_if_addref<nsIDOMHTMLCanvasElement*> 	obj-firefox/dist/include/nsISupportsUtils.h:94
1 	xul.dll 	nsSHTransaction::GetPrev 	docshell/shistory/src/nsSHTransaction.cpp:135
2 	xul.dll 	nsSHistory::RemoveDuplicate 	docshell/shistory/src/nsSHistory.cpp:1193
3 	xul.dll 	nsSHistory::RemoveEntries 	docshell/shistory/src/nsSHistory.cpp:1235
4 	xul.dll 	nsDocShell::ClearFrameHistory 	docshell/base/nsDocShell.cpp:3529
5 	xul.dll 	nsDocShell::OnNewURI 	
6 	xul.dll 	nsDocShell::OnLoadingSite 	docshell/base/nsDocShell.cpp:9404
7 	xul.dll 	nsDocShell::CreateContentViewer 	docshell/base/nsDocShell.cpp:7354
8 	xul.dll 	nsDSURIContentListener::DoContent 	docshell/base/nsDSURIContentListener.cpp:148
9 	xul.dll 	nsDocumentOpenInfo::TryContentListener 	uriloader/base/nsURILoader.cpp:757
10 	xul.dll 	nsDocumentOpenInfo::DispatchContent 	uriloader/base/nsURILoader.cpp:455
11 	xul.dll 	nsDocumentOpenInfo::OnStartRequest 	uriloader/base/nsURILoader.cpp:295
12 	xul.dll 	nsHttpChannel::CallOnStartRequest 	netwerk/protocol/http/nsHttpChannel.cpp:770
13 	xul.dll 	nsHttpChannel::ContinueProcessNormal 	netwerk/protocol/http/nsHttpChannel.cpp:1228
14 	xul.dll 	nsHttpChannel::ProcessNormal 	netwerk/protocol/http/nsHttpChannel.cpp:1165
15 	xul.dll 	nsHttpChannel::ProcessResponse 	netwerk/protocol/http/nsHttpChannel.cpp:1052
16 	xul.dll 	nsHttpChannel::OnStartRequest 	netwerk/protocol/http/nsHttpChannel.cpp:3805
17 	xul.dll 	nsInputStreamPump::OnStateStart 	netwerk/base/src/nsInputStreamPump.cpp:441
18 	xul.dll 	nsInputStreamPump::OnInputStreamReady 	netwerk/base/src/nsInputStreamPump.cpp:397
19 	xul.dll 	nsInputStreamReadyEvent::Run 	xpcom/io/nsStreamUtils.cpp:112
20 	xul.dll 	nsThread::ProcessNextEvent 	xpcom/threads/nsThread.cpp:610
21 	xul.dll 	mozilla::ipc::MessagePump::Run 	ipc/glue/MessagePump.cpp:134
22 	xul.dll 	xul.dll@0xaf3e63 	
23 	xul.dll 	MessageLoop::RunHandler 	ipc/chromium/src/base/message_loop.cc:202
24 	mozcrt19.dll 	_VEC_memzero 	
25 	xul.dll 	xul.dll@0x35114d 	
26 	firefox.exe 	firefox.exe@0x1bb7 	
27 	ntdll.dll 	WinSqmSetIfMaxDWORD 	
28 	ntdll.dll 	_RtlUserThreadStart 	
29 	firefox.exe 	firefox.exe@0x186f 	
30 	firefox.exe 	firefox.exe@0x186f 	

The regression range is:
http://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=edf41ff32f08&tochange=a42e9b001bc8

More reports at:
http://crash-stats.mozilla.com/report/list?product=Firefox&query_search=signature&query_type=exact&query=&range_value=4&range_unit=weeks&hang_type=any&process_type=any&plugin_field=&plugin_query_type=&plugin_query=&do_query=1&admin=&signature=ns_if_addref%3CnsIDOMHTMLCanvasElement*%3E%28nsIDOMHTMLCanvasElement*%29
blocking2.0: --- → ?
Smaug, any thoughts? This might be related to bug 612887, maybe. I looked through the regression range, but didn't see anything that stood out as an obvious cause for this, but another look would certainly not hurt!
blocking2.0: ? → beta9+
Summary: crash [@ ns_if_addref<nsIDOMHTMLCanvasElement*>(nsIDOMHTMLCanvasElement*) ] → crash [@ ns_if_addref<nsIDOMHTMLCanvasElement*>(nsIDOMHTMLCanvasElement*) ] [@ ns_if_addref<nsIRequest*>(nsIRequest*) ] [@ ns_if_addref<nsPresContext*>(nsPresContext*) ]
Summary: crash [@ ns_if_addref<nsIDOMHTMLCanvasElement*>(nsIDOMHTMLCanvasElement*) ] [@ ns_if_addref<nsIRequest*>(nsIRequest*) ] [@ ns_if_addref<nsPresContext*>(nsPresContext*) ] → crash [@ ns_if_addref<nsIDOMHTMLCanvasElement*>(nsIDOMHTMLCanvasElement*) ] [@ ns_if_addref<nsIRequest*>(nsIRequest*) ] [@ ns_if_addref<nsPresContext*>(nsPresContext*) ] [@ ns_if_addref<nsICancelable*>(nsICancelable*) ]
With the combined crash signatures, it is #11 top crasher in 4.0b8pre for the last week.
Keywords: topcrash
Depends on: 614499
Seems like the patch in bug 614499 took care of these.  All of the top ns_if_addref crashes from the last 3 days are from users on builds from the 26th or earlier.
Status: NEW → RESOLVED
Closed: 12 years ago
Resolution: --- → FIXED
As per today's meeting, beta 9 will be a time-based release. Marking these all betaN+. Please move it back to beta9+ if  you believe it  MUST be in the next beta (ie: trunk is in an unshippable state without this)
blocking2.0: beta9+ → betaN+
No longer depends on: 614499
Depends on: 614499
Crash Signature: [@ ns_if_addref<nsIDOMHTMLCanvasElement*>(nsIDOMHTMLCanvasElement*) ] [@ ns_if_addref<nsIRequest*>(nsIRequest*) ] [@ ns_if_addref<nsPresContext*>(nsPresContext*) ] [@ ns_if_addref<nsICancelable*>(nsICancelable*) ]
You need to log in before you can comment on or make changes to this bug.