Closed
Bug 969200
Opened 10 years ago
Closed 9 years ago
Intermittent PROCESS-CRASH | string-literal-escape-sequences.js | application crashed [@ libxul.so + 0xeb9378]
Categories
(Core :: JavaScript Engine, defect)
Tracking
()
RESOLVED
WORKSFORME
People
(Reporter: KWierso, Unassigned)
Details
(Keywords: crash, intermittent-failure)
Crash Data
https://tbpl.mozilla.org/php/getParsedLog.php?id=34243806&tree=Mozilla-Inbound slave: panda-0844 15:29:49 INFO - REFTEST TEST-PASS | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/object-literal-accessor-property-name.js | item 1 15:29:49 INFO - REFTEST INFO | Loading a blank page 15:29:49 INFO - REFTEST TEST-END | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/object-literal-accessor-property-name.js 15:29:49 INFO - REFTEST TEST-START | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/primitive-this-boxing-behavior.js 15:29:49 INFO - REFTEST TEST-LOAD | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/primitive-this-boxing-behavior.js | 1073 / 2108 (50%) 15:29:49 INFO - REFTEST TEST-PASS | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/primitive-this-boxing-behavior.js | item 1 15:29:49 INFO - REFTEST INFO | Loading a blank page 15:29:49 INFO - REFTEST TEST-END | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/primitive-this-boxing-behavior.js 15:29:49 INFO - REFTEST TEST-START | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/string-literal-escape-sequences.js 15:29:49 INFO - REFTEST TEST-LOAD | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/string-literal-escape-sequences.js | 1074 / 2108 (50%) 15:29:49 INFO - INFO | automation.py | Application ran for: 0:10:16.069760 15:29:49 INFO - INFO | zombiecheck | Reading PID log: /tmp/tmp439hzkpidlog 15:29:49 INFO - /data/anr/traces.txt not found 15:29:50 INFO - mozcrash INFO | Downloading symbols from: https://ftp-ssl.mozilla.org/pub/mozilla.org/mobile/tinderbox-builds/mozilla-inbound-android/1391724545/fennec-30.0a1.en-US.android-arm.crashreporter-symbols.zip 15:29:55 WARNING - PROCESS-CRASH | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/string-literal-escape-sequences.js | application crashed [@ libxul.so + 0xeb9378] 15:29:55 INFO - Crash dump filename: /tmp/tmp7dlSgK/60ad1970-e1ef-a7be-5298d072-1342784c.dmp 15:29:55 INFO - Operating system: Android 15:29:55 INFO - 0.0.0 Linux 3.2.0+ #2 SMP PREEMPT Thu Nov 29 08:06:57 EST 2012 armv7l pandaboard/pandaboard/pandaboard:4.0.4/IMM76I/5:eng/test-keys 15:29:55 INFO - CPU: arm 15:29:55 INFO - 2 CPUs 15:29:55 INFO - Crash reason: SIGBUS 15:29:55 INFO - Crash address: 0x6e06c000 15:29:55 INFO - Thread 13 (crashed) 15:29:55 INFO - 0 libxul.so + 0xeb9378 15:29:55 INFO - r4 = 0x6fc51820 r5 = 0x00000320 r6 = 0x6e06c000 r7 = 0x00000100 15:29:55 INFO - r8 = 0x000000ff r9 = 0x000004f0 r10 = 0x00000058 fp = 0x6fc51800 15:29:55 INFO - sp = 0x5d41d580 lr = 0x6fbc8000 pc = 0x6380c378 15:29:55 INFO - Found by: given as instruction pointer in context 15:29:55 INFO - 1 libxul.so!neon_composite_src_8888_8888 [pixman-arm-neon.c:810ff6004dcf : 37 + 0x5] 15:29:55 INFO - sp = 0x5d41d5a8 pc = 0x637c672b 15:29:55 INFO - Found by: stack scanning
Comment 1•9 years ago
|
||
Inactive; closing (see bug 1180138).
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → WORKSFORME
You need to log in
before you can comment on or make changes to this bug.
Description
•