Closed Bug 807442 Opened 12 years ago Closed 12 years ago

browser_bug386835.js | Assertion failure: mDocument->IsXUL() || mDocument->GetReadyStateEnum() == nsIDocument::READYSTATE_INTERACTIVE || (mDocument->GetReadyStateEnum() == nsIDocument::READYSTATE_UNINITIALIZED...

Categories

(Core :: Layout, defect)

17 Branch
defect
Not set
normal

Tracking

()

RESOLVED FIXED
mozilla22
Tracking Status
firefox17 --- affected
firefox18 --- affected
firefox19 --- affected
firefox20 --- affected

People

(Reporter: kats, Assigned: RyanVM)

References

()

Details

(4 keywords)

Crash Data

Attachments

(2 files)

Attached file GDB backtrace —
Got this assertion failure while I was clicking on the links at https://bugzilla.mozilla.org/show_bug.cgi?id=750198#c11 trying to reproduce that bug. The build is a local android build from a recent (today) m-c changeset, running on an HTC Desire HD. Backtrace attached.
Rev3 WINNT 5.1 mozilla-aurora debug test mochitest-browser-chrome on 2012-11-30 16:41:49 PST for push 19c3aa22d0ea slave: talos-r3-xp-065 Assertion failure: mDocument->IsXUL() || mDocument->GetReadyStateEnum() == nsIDocument::READYSTATE_INTERACTIVE || (mDocument->GetReadyStateEnum() == nsIDocument::READYSTATE_UNINITIALIZED && NS_IsAboutBlank(mDocument->GetDocumentURI())) (Bad readystate), at e:/builds/moz2_slave/m-aurora-w32-dbg/build/layout/base/nsDocumentViewer.cpp:1032 nsStringStats => mAllocCount: 81315 => mReallocCount: 6525 => mFreeCount: 67549 -- LEAKED 13766 !!! => mShareCount: 124861 => mAdoptCount: 5939 => mAdoptFreeCount: 5934 -- LEAKED 5 !!! TEST-UNEXPECTED-FAIL | chrome://mochitests/content/browser/browser/base/content/test/browser_bug386835.js | Exited with code -2147483645 during test run INFO | automation.py | Application ran for: 0:00:31.359000 INFO | automation.py | Reading PID log: c:\docume~1\cltbld\locals~1\temp\tmpzmxjrspidlog Downloading symbols from: http://ftp-scl3.mozilla.com/pub/mozilla.org/firefox/tinderbox-builds/mozilla-aurora-win32-debug/1354318545/firefox-19.0a2.en-US.win32.crashreporter-symbols.zip PROCESS-CRASH | chrome://mochitests/content/browser/browser/base/content/test/browser_bug386835.js | application crashed (minidump found) Crash dump filename: c:\docume~1\cltbld\locals~1\temp\tmpdz62gg\minidumps\6b732f50-4d7b-4046-ad76-6665acf80702.dmp Operating system: Windows NT 5.1.2600 Service Pack 2 CPU: x86 GenuineIntel family 6 model 23 stepping 10 2 CPUs Crash reason: EXCEPTION_BREAKPOINT Crash address: 0x1e4db70 Thread 0 (crashed) 0 xul.dll!DocumentViewerImpl::LoadComplete(tag_nsresult) [nsDocumentViewer.cpp:19c3aa22d0ea : 1032 + 0x69] eip = 0x01e4db70 esp = 0x0012d2e0 ebp = 0x0012d338 ebx = 0x00000000 esi = 0x068f2cd8 edi = 0x070dd28c eax = 0x00000000 ecx = 0x0876b116 edx = 0x10361f48 efl = 0x00000212 Found by: given as instruction pointer in context 1 xul.dll!nsDocShell::EndPageLoad(nsIWebProgress *,nsIChannel *,tag_nsresult) [nsDocShell.cpp:19c3aa22d0ea : 6510 + 0xd] eip = 0x02887552 esp = 0x0012d340 ebp = 0x0012d520 Found by: call frame info 2 xul.dll!nsDocShell::OnStateChange(nsIWebProgress *,nsIRequest *,unsigned int,tag_nsresult) [nsDocShell.cpp:19c3aa22d0ea : 6338 + 0x10] eip = 0x02890dcc esp = 0x0012d528 ebp = 0x0012d5d8 Found by: call frame info 3 xul.dll!nsDocLoader::DoFireOnStateChange(nsIWebProgress * const,nsIRequest * const,int &,tag_nsresult) [nsDocLoader.cpp:19c3aa22d0ea : 1305 + 0x18] eip = 0x028a1cbf esp = 0x0012d5e0 ebp = 0x0012d678 Found by: call frame info 4 xul.dll!nsDocLoader::doStopDocumentLoad(nsIRequest *,tag_nsresult) [nsDocLoader.cpp:19c3aa22d0ea : 885 + 0x2f] eip = 0x028a2abe esp = 0x0012d680 ebp = 0x0012d728 Found by: call frame info 5 xul.dll!nsDocLoader::DocLoaderIsEmpty(bool) [nsDocLoader.cpp:19c3aa22d0ea : 775 + 0xc] eip = 0x028a3172 esp = 0x0012d730 ebp = 0x0012d75c Found by: call frame info 6 xul.dll!nsDocLoader::OnStopRequest(nsIRequest *,nsISupports *,tag_nsresult) [nsDocLoader.cpp:19c3aa22d0ea : 659 + 0x9] eip = 0x028a3575 esp = 0x0012d764 ebp = 0x0012d7e8 Found by: call frame info 7 xul.dll!nsLoadGroup::RemoveRequest(nsIRequest *,nsISupports *,tag_nsresult) [nsLoadGroup.cpp:19c3aa22d0ea : 697 + 0x14] eip = 0x01bc9cc5 esp = 0x0012d7f0 ebp = 0x0012d880 Found by: call frame info 8 xul.dll!imgRequestProxy::RemoveFromLoadGroup(bool) [imgRequestProxy.cpp:19c3aa22d0ea : 253 + 0x10] eip = 0x01dcb6f8 esp = 0x0012d888 ebp = 0x0012d8a8 Found by: call frame info 9 xul.dll!imgRequestProxy::OnStopRequest(bool) [imgRequestProxy.cpp:19c3aa22d0ea : 774 + 0x9] eip = 0x01dcbdca esp = 0x0012d8b0 ebp = 0x0012d93c Found by: call frame info 10 xul.dll!imgStatusTracker::OnStopRequest(bool,tag_nsresult) [imgStatusTracker.cpp:19c3aa22d0ea : 705 + 0x17] eip = 0x01dcf5d3 esp = 0x0012d944 ebp = 0x0012d95c Found by: call frame info 11 xul.dll!imgRequest::OnStopRequest(nsIRequest *,nsISupports *,tag_nsresult) [imgRequest.cpp:19c3aa22d0ea : 688 + 0x11] eip = 0x01dc7985 esp = 0x0012d964 ebp = 0x0012d98c Found by: call frame info 12 xul.dll!ProxyListener::OnStopRequest(nsIRequest *,nsISupports *,tag_nsresult) [imgLoader.cpp:19c3aa22d0ea : 2052 + 0x13] eip = 0x01dbcef9 esp = 0x0012d994 ebp = 0x0012d9a4 Found by: call frame info 13 xul.dll!nsJARChannel::OnStopRequest(nsIRequest *,nsISupports *,tag_nsresult) [nsJARChannel.cpp:19c3aa22d0ea : 887 + 0x14] eip = 0x01d703ce esp = 0x0012d9ac ebp = 0x0012d9c8 Found by: call frame info 14 xul.dll!nsInputStreamPump::OnStateStop() [nsInputStreamPump.cpp:19c3aa22d0ea : 552 + 0x17] eip = 0x01bc11e7 esp = 0x0012d9d0 ebp = 0x0012d9f0 Found by: call frame info 15 xul.dll!nsInputStreamPump::OnInputStreamReady(nsIAsyncInputStream *) [nsInputStreamPump.cpp:19c3aa22d0ea : 374 + 0x9] eip = 0x01bc12dd esp = 0x0012d9f8 ebp = 0x0012da04 Found by: call frame info 16 xul.dll!nsInputStreamReadyEvent::Run() [nsStreamUtils.cpp:19c3aa22d0ea : 82 + 0x10] eip = 0x02eb1588 esp = 0x0012da0c ebp = 0x0012da1c Found by: call frame info 17 xul.dll!nsThread::ProcessNextEvent(bool,bool *) [nsThread.cpp:19c3aa22d0ea : 627 + 0xd]
OS: Android → All
Summary: Assertion failure: mDocument->IsXUL() || mDocument->GetReadyStateEnum() == nsIDocument::READYSTATE_INTERACTIVE || (mDocument->GetReadyStateEnum() == nsIDocument::READYSTATE_UNINITIALIZED && NS_IsAboutBlank(mDocument->GetDocumentURI())) (Bad readystate) → browser_bug386835.js | Assertion failure: mDocument->IsXUL() || mDocument->GetReadyStateEnum() == nsIDocument::READYSTATE_INTERACTIVE || (mDocument->GetReadyStateEnum() == nsIDocument::READYSTATE_UNINITIALIZED...
Crash Signature: [@ DocumentViewerImpl::LoadComplete(tag_nsresult)]
1. http://www.dtnprogressivefarmer.com/dtnag/weather + 238 other urls 2. Assertion failure: mDocument->IsXUL() || mDocument->GetReadyStateEnum() == nsIDocument::READYSTATE_INTERACTIVE || (mDocument->GetReadyStateEnum() == nsIDocument::READYSTATE_UNINITIALIZED && NS_IsAboutBlank(mDocument->GetDocumentURI())) (Bad readystate) Reproduced on Beta/18, Aurora/19, Nightly/20. Marked the status for the major branches. This probably affects esr17 as well, but I haven't tested that. This url is reproducible on Windows 7 32bit at least. Found regression between 20120815004159-20120816020800 Pushlog: http://hg.mozilla.org/integration/mozilla-inbound/pushloghtml?fromchange=104388bbcab2&tochange=2759cfa65dc5 http://ftp.mozilla.org/pub/mozilla.org/firefox/nightly/2012/08/2012-08-15-mozilla-inbound-debug/firefox-17.0a1.en-US.debug-win32.installer.exe http://ftp.mozilla.org/pub/mozilla.org/firefox/nightly/2012/08/2012-08-16-mozilla-inbound-debug/firefox-17.0a1.en-US.debug-win32.installer.exe This has been a pita for a while now in crash automation. Can we get some traction on this now that we can reproduce reliably?
Somebody seems to have broken it harder, maybe that'll give it more traction.
Henri, I see that you added this assertion back in bug 775467. Can you help find an owner for this bug? It has spiked significantly in the last two days.
Flags: needinfo?(hsivonen)
(In reply to Ryan VanderMeulen [:RyanVM] from comment #15) > Henri, I see that you added this assertion back in bug 775467. Can you help > find an owner for this bug? It has spiked significantly in the last two days. Somehow, bug 829456 made this go through the roof (though there have still been a few other intermittent failures prior to that landing over the last couple days).
Looks like timing changes arising from multithreaded image decoding exposed a duplicate of 779959. Fixing is a big deal. Let's just make the assertion non-fatal for now. The bogosity exposed by the assertion is real, though.
Flags: needinfo?(hsivonen)
Thanks, Henri!
Depends on: 779959
Attached patch make the assert non-fatal — — Splinter Review
Assignee: nobody → ryanvm
Status: NEW → ASSIGNED
Attachment #730702 - Flags: review?(hsivonen)
Comment on attachment 730702 [details] [diff] [review] make the assert non-fatal Thanks!
Attachment #730702 - Flags: review?(hsivonen) → review+
Status: ASSIGNED → RESOLVED
Closed: 12 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla22
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: