Closed Bug 612881 Opened 14 years ago Closed 14 years ago

crash [@ ns_if_addref<nsIDOMHTMLCanvasElement*>(nsIDOMHTMLCanvasElement*) ] [@ ns_if_addref<nsIRequest*>(nsIRequest*) ] [@ ns_if_addref<nsPresContext*>(nsPresContext*) ] [@ ns_if_addref<nsICancelable*>(nsICancelable*) ]

Categories

(Core :: DOM: Navigation, defect)

x86
Windows 7
defect
Not set
critical

Tracking

()

RESOLVED FIXED
Tracking Status
blocking2.0 --- betaN+

People

(Reporter: scoobidiver, Unassigned)

References

Details

(Keywords: crash, regression, topcrash)

Crash Data

This is a new crash signature that was introduced by 4.0b8pre/20101116 build. It is #12 top crasher for this build. Signature ns_if_addref<nsIDOMHTMLCanvasElement*>(nsIDOMHTMLCanvasElement*) UUID facb7033-eb2a-4df1-9220-5ee8c2101117 Time 2010-11-17 07:15:48.759628 Uptime 58968 Last Crash 1515684 seconds (2.5 weeks) before submission Install Age 90610 seconds (1.0 days) since version was first installed. Product Firefox Version 4.0b8pre Build ID 20101116042306 Branch 2.0 OS Windows NT OS Version 6.1.7600 CPU x86 CPU Info GenuineIntel family 6 model 23 stepping 10 Crash Reason EXCEPTION_ACCESS_VIOLATION_READ Crash Address 0x6 App Notes AdapterVendorID: 8086, AdapterDeviceID: 2a42 Frame Module Signature [Expand] Source 0 xul.dll ns_if_addref<nsIDOMHTMLCanvasElement*> obj-firefox/dist/include/nsISupportsUtils.h:94 1 xul.dll nsSHTransaction::GetPrev docshell/shistory/src/nsSHTransaction.cpp:135 2 xul.dll nsSHistory::RemoveDuplicate docshell/shistory/src/nsSHistory.cpp:1193 3 xul.dll nsSHistory::RemoveEntries docshell/shistory/src/nsSHistory.cpp:1235 4 xul.dll nsDocShell::ClearFrameHistory docshell/base/nsDocShell.cpp:3529 5 xul.dll nsDocShell::OnNewURI 6 xul.dll nsDocShell::OnLoadingSite docshell/base/nsDocShell.cpp:9404 7 xul.dll nsDocShell::CreateContentViewer docshell/base/nsDocShell.cpp:7354 8 xul.dll nsDSURIContentListener::DoContent docshell/base/nsDSURIContentListener.cpp:148 9 xul.dll nsDocumentOpenInfo::TryContentListener uriloader/base/nsURILoader.cpp:757 10 xul.dll nsDocumentOpenInfo::DispatchContent uriloader/base/nsURILoader.cpp:455 11 xul.dll nsDocumentOpenInfo::OnStartRequest uriloader/base/nsURILoader.cpp:295 12 xul.dll nsHttpChannel::CallOnStartRequest netwerk/protocol/http/nsHttpChannel.cpp:770 13 xul.dll nsHttpChannel::ContinueProcessNormal netwerk/protocol/http/nsHttpChannel.cpp:1228 14 xul.dll nsHttpChannel::ProcessNormal netwerk/protocol/http/nsHttpChannel.cpp:1165 15 xul.dll nsHttpChannel::ProcessResponse netwerk/protocol/http/nsHttpChannel.cpp:1052 16 xul.dll nsHttpChannel::OnStartRequest netwerk/protocol/http/nsHttpChannel.cpp:3805 17 xul.dll nsInputStreamPump::OnStateStart netwerk/base/src/nsInputStreamPump.cpp:441 18 xul.dll nsInputStreamPump::OnInputStreamReady netwerk/base/src/nsInputStreamPump.cpp:397 19 xul.dll nsInputStreamReadyEvent::Run xpcom/io/nsStreamUtils.cpp:112 20 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:610 21 xul.dll mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:134 22 xul.dll xul.dll@0xaf3e63 23 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:202 24 mozcrt19.dll _VEC_memzero 25 xul.dll xul.dll@0x35114d 26 firefox.exe firefox.exe@0x1bb7 27 ntdll.dll WinSqmSetIfMaxDWORD 28 ntdll.dll _RtlUserThreadStart 29 firefox.exe firefox.exe@0x186f 30 firefox.exe firefox.exe@0x186f The regression range is: http://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=edf41ff32f08&tochange=a42e9b001bc8 More reports at: http://crash-stats.mozilla.com/report/list?product=Firefox&query_search=signature&query_type=exact&query=&range_value=4&range_unit=weeks&hang_type=any&process_type=any&plugin_field=&plugin_query_type=&plugin_query=&do_query=1&admin=&signature=ns_if_addref%3CnsIDOMHTMLCanvasElement*%3E%28nsIDOMHTMLCanvasElement*%29
blocking2.0: --- → ?
Smaug, any thoughts? This might be related to bug 612887, maybe. I looked through the regression range, but didn't see anything that stood out as an obvious cause for this, but another look would certainly not hurt!
blocking2.0: ? → beta9+
Summary: crash [@ ns_if_addref<nsIDOMHTMLCanvasElement*>(nsIDOMHTMLCanvasElement*) ] → crash [@ ns_if_addref<nsIDOMHTMLCanvasElement*>(nsIDOMHTMLCanvasElement*) ] [@ ns_if_addref<nsIRequest*>(nsIRequest*) ] [@ ns_if_addref<nsPresContext*>(nsPresContext*) ]
Summary: crash [@ ns_if_addref<nsIDOMHTMLCanvasElement*>(nsIDOMHTMLCanvasElement*) ] [@ ns_if_addref<nsIRequest*>(nsIRequest*) ] [@ ns_if_addref<nsPresContext*>(nsPresContext*) ] → crash [@ ns_if_addref<nsIDOMHTMLCanvasElement*>(nsIDOMHTMLCanvasElement*) ] [@ ns_if_addref<nsIRequest*>(nsIRequest*) ] [@ ns_if_addref<nsPresContext*>(nsPresContext*) ] [@ ns_if_addref<nsICancelable*>(nsICancelable*) ]
With the combined crash signatures, it is #11 top crasher in 4.0b8pre for the last week.
Keywords: topcrash
Depends on: 614499
Seems like the patch in bug 614499 took care of these. All of the top ns_if_addref crashes from the last 3 days are from users on builds from the 26th or earlier.
Status: NEW → RESOLVED
Closed: 14 years ago
Resolution: --- → FIXED
As per today's meeting, beta 9 will be a time-based release. Marking these all betaN+. Please move it back to beta9+ if you believe it MUST be in the next beta (ie: trunk is in an unshippable state without this)
blocking2.0: beta9+ → betaN+
No longer depends on: 614499
Depends on: 614499
Crash Signature: [@ ns_if_addref<nsIDOMHTMLCanvasElement*>(nsIDOMHTMLCanvasElement*) ] [@ ns_if_addref<nsIRequest*>(nsIRequest*) ] [@ ns_if_addref<nsPresContext*>(nsPresContext*) ] [@ ns_if_addref<nsICancelable*>(nsICancelable*) ]
You need to log in before you can comment on or make changes to this bug.