This bug was filed from the Socorro interface and is
report bp-262b00d0-a2ba-411f-8c6f-2a1922110816 .
Seen while looking at crash stats. https://crash-stats.mozilla.com/report/list?signature=_SEH_epilog4 to the crashes which are all Windows and seen across all versions. No correlations are available and comments mention a bunch of different sites. Maybe some URLs would help here.
Frame Module Signature [Expand] Source
0 ntdll.dll ZwWaitForSingleObject
1 ntdll.dll ZwWaitForSingleObject
2 KERNELBASE.dll _SEH_epilog4
3 kernel32.dll WaitForSingleObjectExImplementation
4 kernel32.dll WaitForSingleObject
5 xul.dll google_breakpad::ExceptionHandler::WriteMinidumpOnHandlerThread toolkit/crashreporter/google-breakpad/src/client/windows/handler/exception_handler.cc:763
6 xul.dll google_breakpad::ExceptionHandler::HandleException toolkit/crashreporter/google-breakpad/src/client/windows/handler/exception_handler.cc:520
7 msvcr71.dll __CxxUnhandledExceptionFilter
8 kernel32.dll SbpMergeApphackContexts
9 ntdll.dll RtlKnownExceptionFilter
10 ntdll.dll ?? ::FNODOBFM::`string'
11 ntdll.dll _RtlUserThreadStart
Here are some URLs that are specific to 6.0, although nothing really stands out:
In crash automation a particular url http://www.emol.com/noticias/deportes/2011/08/11/497292/prensa-internacional-la-entrada-de-alexis-sanchez-relanzo-a-chile.html is associated with _SEH_epilog4 in Socorro but I get a different stack like
moz_free | operator delete(void*) nsHtml5UTF16Buffer::~nsHtml5UTF16Buffer() nsHtml5UTF16Buffer::`scalar deleting destructor'(unsigned int) + 0xe nsHtml5UTF16Buffer::Release() nsRefPtr<nsHtml5UTF16Buffer>::~nsRefPtr<nsHtml5UTF16Buffer>()
see bug 577952
I wonder if the SocorroStack above is more related to the breakpad processor falling over trying to process the stack overflow.
Marcia, my windows vms are tied up at the moment. Can you check if this sends a _SEH_epilog4 in a nightly build?
bc: I tried that site with Mozilla/5.0 (Windows NT 5.1; rv:9.0a1) Gecko/20110818 Firefox/9.0a1 in a Win XP VM and did not get a crash. After my mtg will head down to the lab and test on some real hardware down there.
bc: Using Mozilla/5.0 (Windows NT 6.1; WOW64; rv:9.0a1) Gecko/20110818 Firefox/9.0a1 in the lab, I cannot reproduce the crash either at that site.
Marcia: neither can I with nightly Nightly builds or debug Nightly just loading the site. I do crash when I load it in the Spider extension though. Not sure if that is a real bug or not.
Someone mentioned in bug 467169 that the testcase there was crashing with this stack.
But I see all kinds of breakpad stuff on this stack. Is that correct behavior?
It's sort of an unfortunate implementation detail of Breakpad. We're handling a C++ exception of some sort here, not an actual "crash" as far as the OS is concerned, so we can't present the stack starting at the point of the crash. In the stack in comment 0 here, for example, the actual crash is somewhere below this frame:
7 msvcr71.dll __CxxUnhandledExceptionFilter
A startup crash at http://crash-stats.mozilla.com/report/index/f910f8de-f977-43b2-8d31-d7df82110825 had a randomly named .dll file at the top of the module list, and in IRC the user mentioned a Malware Bytes full scan and a scan with another anti-virus failed to show any malware up.
I got him to scan with http://www.microsoft.com/security/scanner/en-us/default.aspx and Trojan Win32/Sefrit.O was detected and removed, and Firefox started working immediately
I've had a couple crashes on my home machine with _SEH_epilog4 in the signature. The last one was a few minutes ago, on the latest 7 beta channel release. I have Microsoft Security Essentials installed and running and am pretty sure I don't have any malware on my system.
The last 2 times I've seen this crash, a page had loaded and I did the normal scroll around for a few seconds and then all of a sudden, crash report window. This latest time, I was moving the cursor into a <code> block to perform a highlight and copy. Not sure if I got the mouse click in before it crashed.
My latest crash is https://crash-stats.mozilla.com/report/index/bp-805afd4f-cb3c-42b8-a976-0ac6b2110922. The URL that triggered was http://docs.disqus.com/developers/universal/. Unfortunately, it didn't reproduce.
Former crashes are:
Gregory: after poking at your minidumps, I've found that this signature is bogus. Your dumps are being misprocessed because of bug 683162, which hasn't been rolled out into production yet. When that gets landed we can reprocess your dumps, and they'll all have different, more useful signatures. (More concretely: the version of Breakpad in production can't read the exception context in your dumps, so it just starts walking from the very top of the thread stack, and never gets anywhere useful.)
*** Bug 689022 has been marked as a duplicate of this bug. ***
I've been seeing this since I updated to yesterday's nightly (afe75f8431ad -- 20110925). My previous nightly was perhaps two weeks ago. Example crash:
bugzilla URLs (on a different non-mozilla bugzilla) seem to trigger it, but that's all I tend to view in that profile. Oddly, I have yet to see it in my main profile where I do most of my browsing.
Ted, do all of our crashes suffer from the reporting problem, or just Gregory's? It looks to me like they do, but not sure why you singled out his dumps :)
Oh -- and I'm crashing on x86-32, not -64.
This is likely to affect all crashes on Windows 7 SP1 on recent Intel processors. Microsoft added a new flag bit to the CPU context structure on W7SP1 to indicate that Intel AVX CPU state is being stored, which broke a Breakpad assumption. The result is that Breakpad fails to walk the crashing thread properly. (It starts at the very top of the stack, inside the Breakpad handler code instead of at the point of the exception.)
I singled out his dumps because I actually downloaded them and checked for the presence of the new flag which was breaking us, FWIW. I am speculating about your dumps, but I'm fairly confident that's the issue.
Ted: I don't suppose you have the actual stack traces of my crashes? How difficult would it be to teach me to fish so I can compute them myself?
I filed bug 689579 to get crashes with this signature reprocessed, so when that's fixed you should be able to reload them and get the correct stack out.