Closed Bug 942149 Opened 11 years ago Closed 10 years ago

Intermittent PROCESS-CRASH | C:\slave\test\build\tests\xpcshell\tests\services\sync\tests\unit\test_resource.js | application crashed [@ msvcr100.dll + 0x8af06]

Categories

(Core :: General, defect)

x86
Windows 7
defect
Not set
normal

Tracking

()

RESOLVED WORKSFORME

People

(Reporter: cbook, Unassigned)

References

()

Details

(Keywords: crash, intermittent-failure)

Crash Data

Windows 7 32-bit fx-team opt test xpcshell on 2013-11-21 20:35:07 PST for push dbf94e314cde

slave: t-w732-ix-027

https://tbpl.mozilla.org/php/getParsedLog.php?id=30935697&tree=Fx-Team



PROCESS-CRASH | C:\slave\test\build\tests\xpcshell\tests\services\sync\tests\unit\test_resource.js | application crashed [@ msvcr100.dll + 0x8af06]
WindowsError: [Error 32] The process cannot access the file because it is being used by another process: 'c:\\users\\cltbld\\appdata\\local\\temp\\tmpge7qb8\\xul.pdb\\7C5D309D9DDC486CB21A100FF8E461521\\xul.sym'
WindowsError: [Error 32] The process cannot access the file because it is being used by another process: 'c:\\users\\cltbld\\appdata\\local\\temp\\tmpge7qb8\\xul.pdb\\7C5D309D9DDC486CB21A100FF8E461521\\xul.sym'
Return code: 1

20:51:41  WARNING -  PROCESS-CRASH | C:\slave\test\build\tests\xpcshell\tests\services\sync\tests\unit\test_resource.js | application crashed [@ msvcr100.dll + 0x8af06]
20:51:41     INFO -  Crash dump filename: c:\users\cltbld\appdata\local\temp\tmpc54bpi\f6d92e51-1e1c-4a42-85ec-58f5b00c7a70.dmp
20:51:41     INFO -  Operating system: Windows NT
20:51:41     INFO -                    6.1.7601 Service Pack 1
20:51:41     INFO -  CPU: x86
20:51:41     INFO -       GenuineIntel family 6 model 30 stepping 5
20:51:41     INFO -       8 CPUs
20:51:41     INFO -  Crash reason:  EXCEPTION_NONCONTINUABLE_EXCEPTION
20:51:41     INFO -  Crash address: 0x0
20:51:41     INFO -  Assertion: Pure virtual function called
20:51:41     INFO -  Thread 0 (crashed)
20:51:41     INFO -   0  msvcr100.dll + 0x8af06
20:51:41     INFO -      eip = 0x68ddaf06   esp = 0x002ef9e0   ebp = 0x002ef9f4   ebx = 0x00000000
20:51:41     INFO -      esi = 0x009256a0   edi = 0x00974000   eax = 0x002ef3b0   ecx = 0x002ef67c
20:51:41     INFO -      edx = 0x00000000   efl = 0x00000206
20:51:41     INFO -      Found by: given as instruction pointer in context
20:51:41     INFO -   1  xul.dll!nsSecurityWarningDialogs::Release() [nsCertVerificationThread.cpp:dbf94e314cde : 13 + 0x26]
20:51:41     INFO -      eip = 0x681e8d8e   esp = 0x002ef9fc   ebp = 0x002efa00
20:51:41     INFO -      Found by: previous frame's frame pointer
20:51:41     INFO -   2  xul.dll!nsHttpHandler::~nsHttpHandler() [nsHttpHandler.cpp:dbf94e314cde : 230 + 0x8]
20:51:41     INFO -      eip = 0x6761da3b   esp = 0x002efa08   ebp = 0x002efa14
20:51:41     INFO -      Found by: call frame info
20:51:41     INFO -   3  xul.dll!nsHttpHandler::`vector deleting destructor'(unsigned int) + 0xa
20:51:41     INFO -      eip = 0x6761e067   esp = 0x002efa1c   ebp = 0x002efa20
20:51:41     INFO -      Found by: call frame info
20:51:41     INFO -   4  xul.dll!nsHttpHandler::Release() [nsHttpHandler.cpp:dbf94e314cde : 1546 + 0x26]
20:51:41     INFO -      eip = 0x6761d985   esp = 0x002efa28   ebp = 0x002efa2c
20:51:41     INFO -      Found by: call frame info
20:51:41     INFO -   5  xul.dll!nsCOMPtr_base::assign_with_AddRef(nsISupports *) [nsCOMPtr.cpp:dbf94e314cde : 49 + 0xf]
20:51:41     INFO -      eip = 0x67537c3f   esp = 0x002efa34   ebp = 0x002efa40
20:51:41     INFO -      Found by: call frame info
20:51:41     INFO -   6  xul.dll!FreeFactoryEntries [nsComponentManager.cpp:dbf94e314cde : 1125 + 0x9]
20:51:41     INFO -      eip = 0x6756d155   esp = 0x002efa3c   ebp = 0x002efa40
20:51:41     INFO -      Found by: call frame info
20:51:41     INFO -   7  xul.dll!nsBaseHashtable<nsIDHashKey,nsFactoryEntry *,nsFactoryEntry *>::s_EnumReadStub(PLDHashTable *,PLDHashEntryHdr *,unsigned int,void *) [nsBaseHashtable.h:dbf94e314cde : 379 + 0x11]
20:51:41     INFO -      eip = 0x6756cfe6   esp = 0x002efa48   ebp = 0x002efa54
20:51:41     INFO -      Found by: call frame info
20:51:41     INFO -   8  xul.dll!PL_DHashTableEnumerate [pldhash.cpp:dbf94e314cde : 632 + 0xa]
20:51:41     INFO -      eip = 0x6753f419   esp = 0x002efa5c   ebp = 0x002efa88
20:51:41     INFO -      Found by: call frame info
Closing bugs where TBPLbot has previously commented, but have now not been modified for >3 months & do not contain the whiteboard strings for disabled/annotated tests or use the keyword leave-open. Filter on: mass-intermittent-bug-closure-2014-07
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → WORKSFORME
You need to log in before you can comment on or make changes to this bug.