Closed
Bug 883495
Opened 10 years ago
Closed 10 years ago
crash in nsDNSAsyncRequest::OnLookupComplete @ nsXPCWrappedJS::CallMethod
Categories
(Core :: Networking: DNS, defect)
Tracking
()
RESOLVED
FIXED
mozilla24
Tracking | Status | |
---|---|---|
firefox23 | --- | unaffected |
firefox24 | --- | verified |
People
(Reporter: scoobidiver, Assigned: jdm)
References
Details
(Keywords: crash, regression)
Crash Data
Attachments
(1 file)
2.21 KB,
patch
|
mcmanus
:
review+
|
Details | Diff | Splinter Review |
With the stack trace below, it first showed up in 24.0a1/20130612. The regression range is: http://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=86413e921d5d&tochange=0414d6d0f60d It's likely a regression from bug 770840. Signature nsXPCWrappedJS::CallMethod(unsigned short, XPTMethodDescriptor const*, nsXPTCMiniVariant*) More Reports Search UUID d18042d9-37ed-40e8-94bc-090482130614 Date Processed 2013-06-14 14:10:48 Uptime 24 Last Crash 1.1 hours before submission Install Age 24 seconds since version was first installed. Install Time 2013-06-14 14:10:27 Product Firefox Version 24.0a1 Build ID 20130614031100 Release Channel nightly OS Windows NT OS Version 6.1.7601 Service Pack 1 Build Architecture x86 Build Architecture Info AuthenticAMD family 15 model 107 stepping 2 Crash Reason EXCEPTION_BREAKPOINT Crash Address 0x611205cf App Notes AdapterVendorID: 0x1002, AdapterDeviceID: 0x689e, AdapterSubsysID: 00000000, AdapterDriverVersion: 9.2.0.0 D2D? D2D+ DWrite? DWrite+ D3D10 Layers? D3D10 Layers+ Processor Notes sp-processor01_phx1_mozilla_com_25518:2012 EMCheckCompatibility True Adapter Vendor ID 0x1002 Adapter Device ID 0x689e Total Virtual Memory 2147352576 Available Virtual Memory 1656975360 System Memory Use Percentage 61 Available Page File 2796986368 Available Physical Memory 836923392 Frame Module Signature Source 0 xul.dll nsXPCWrappedJS::CallMethod js/xpconnect/src/XPCWrappedJS.cpp:571 1 xul.dll PrepareAndDispatch xpcom/reflect/xptcall/src/md/win32/xptcstubs.cpp:85 2 xul.dll SharedStub xpcom/reflect/xptcall/src/md/win32/xptcstubs.cpp:112 3 xul.dll nsDNSAsyncRequest::OnLookupComplete netwerk/dns/nsDNSService2.cpp:294 More reports at: https://crash-stats.mozilla.com/report/list?signature=nsXPCWrappedJS%3A%3ACallMethod%28unsigned+short%2C+XPTMethodDescriptor+const*%2C+nsXPTCMiniVariant*%29
Reporter | ||
Updated•10 years ago
|
Crash Signature: [@ nsXPCWrappedJS::CallMethod(unsigned short, XPTMethodDescriptor const*, nsXPTCMiniVariant*)] → [@ nsXPCWrappedJS::CallMethod(unsigned short, XPTMethodDescriptor const*, nsXPTCMiniVariant*) ]
Assignee | ||
Comment 1•10 years ago
|
||
nsDNSAsyncRequest::mListener can be scripted and nsDNSAsyncRequest::OnLookupComplete can be called on a background thread.
Assignee | ||
Comment 2•10 years ago
|
||
Attachment #763221 -
Flags: review?(mcmanus)
Assignee | ||
Updated•10 years ago
|
Assignee: nobody → josh
Updated•10 years ago
|
Attachment #763221 -
Flags: review?(mcmanus) → review+
Assignee | ||
Updated•10 years ago
|
Keywords: checkin-needed
Comment 3•10 years ago
|
||
https://hg.mozilla.org/integration/mozilla-inbound/rev/fb43bd87db39
Keywords: checkin-needed
Comment 4•10 years ago
|
||
http://mozillamemes.tumblr.com/post/21637966463/yes-i-have-a-condition-that-forces-me-to-insert Backed out for mass bustage. https://hg.mozilla.org/integration/mozilla-inbound/rev/cc1118580105 https://tbpl.mozilla.org/php/getParsedLog.php?id=24292731&tree=Mozilla-Inbound et al
Assignee | ||
Comment 5•10 years ago
|
||
https://hg.mozilla.org/integration/mozilla-inbound/rev/5a3dc3d31890
Reporter | ||
Updated•10 years ago
|
Target Milestone: --- → mozilla24
Assignee | ||
Comment 6•10 years ago
|
||
Aaaaaaaaaaaaand leak: https://hg.mozilla.org/integration/mozilla-inbound/rev/2def848b4ed3 https://tbpl.mozilla.org/php/getParsedLog.php?id=24336757&tree=Mozilla-Inbound
Assignee | ||
Comment 7•10 years ago
|
||
https://tbpl.mozilla.org/?tree=Try&rev=d3fe9fabb1f1
Assignee | ||
Comment 8•10 years ago
|
||
https://hg.mozilla.org/integration/mozilla-inbound/rev/c50503ce8669
Comment 9•10 years ago
|
||
Interesting that it didn't leak on Try - did you push the wrong version of it to inbound? Backed out in https://hg.mozilla.org/integration/mozilla-inbound/rev/3a85eb8af304 for the same leak as before.
Assignee | ||
Comment 10•10 years ago
|
||
Third time's the charm (I did, in fact, push the wrong version last time): https://hg.mozilla.org/integration/mozilla-inbound/rev/1c1ae670a995
Comment 11•10 years ago
|
||
https://hg.mozilla.org/mozilla-central/rev/1c1ae670a995
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Reporter | ||
Comment 12•10 years ago
|
||
There are still crashes after the fix.
Assignee | ||
Comment 13•10 years ago
|
||
I'm going to clone this and track the failure there.
Status: REOPENED → RESOLVED
Closed: 10 years ago → 10 years ago
Resolution: --- → FIXED
Reporter | ||
Updated•10 years ago
|
status-firefox25:
affected → ---
Comment 14•10 years ago
|
||
Verified as fixed, since there are very few (5-6) crashes in this last month regarding 24.0b5, 25.0a2, 26.0a1. Details here: https://crash-stats.mozilla.com/report/list?signature=nsXPCWrappedJS%3A%3ACallMethod%28unsigned+short%2C+XPTMethodDescriptor+const*%2C+nsXPTCMiniVariant*%29
QA Contact: manuela.muntean
You need to log in
before you can comment on or make changes to this bug.
Description
•