Closed Bug 1002273 Opened 11 years ago Closed 10 years ago

Intermittent remoteautomation.py | application crashed [@ PL_DHashTableEnumerate(PLDHashTable*, PLDHashOperator (*)(PLDHashTable*, PLDHashEntryHdr*, unsigned int, void*), void*)] after "table->recursionLevel > 0, at xpcom/glue/pldhash.cpp:702" assertion

Categories

(Core :: Networking: JAR, defect)

ARM
Android
defect
Not set
normal

Tracking

()

RESOLVED WORKSFORME

People

(Reporter: RyanVM, Unassigned)

Details

(Keywords: assertion, crash, intermittent-failure)

https://tbpl.mozilla.org/php/getParsedLog.php?id=38592276&tree=Mozilla-Inbound Android 4.0 Panda mozilla-inbound debug test mochitest-1 on 2014-04-27 13:58:40 PDT for push eaa0d64e544e slave: panda-0175 14:09:25 INFO - runtests.py | Running tests: start. 14:09:27 INFO - INFO | automation.py | Application pid: 2240 14:09:47 INFO - INFO | automation.py | Application ran for: 0:00:22.098978 14:09:47 INFO - INFO | zombiecheck | Reading PID log: /tmp/tmpciyvjupidlog 14:09:48 INFO - /data/anr/traces.txt not found 14:09:49 INFO - mozcrash INFO | Downloading symbols from: https://ftp-ssl.mozilla.org/pub/mozilla.org/mobile/tinderbox-builds/mozilla-inbound-android-debug/1398629637/fennec-31.0a1.en-US.android-arm.crashreporter-symbols.zip 14:09:54 WARNING - PROCESS-CRASH | remoteautomation.py | application crashed [@ PL_DHashTableEnumerate(PLDHashTable*, PLDHashOperator (*)(PLDHashTable*, PLDHashEntryHdr*, unsigned int, void*), void*)] 14:09:54 INFO - Crash dump filename: /tmp/tmpxE0Wvj/5c0c5500-6f83-3d8e-3a4796c3-6685dd18.dmp 14:09:54 INFO - Operating system: Android 14:09:54 INFO - 0.0.0 Linux 3.2.0+ #2 SMP PREEMPT Thu Nov 29 08:06:57 EST 2012 armv7l pandaboard/pandaboard/pandaboard:4.0.4/IMM76I/5:eng/test-keys 14:09:54 INFO - CPU: arm 14:09:54 INFO - 2 CPUs 14:09:54 INFO - Crash reason: SIGSEGV 14:09:54 INFO - Crash address: 0x0 14:09:54 INFO - Thread 28 (crashed) 14:09:54 INFO - 0 libxul.so!PL_DHashTableEnumerate(PLDHashTable*, PLDHashOperator (*)(PLDHashTable*, PLDHashEntryHdr*, unsigned int, void*), void*) [pldhash.cpp:eaa0d64e544e : 702 + 0x14] 14:09:54 INFO - r4 = 0x5beab538 r5 = 0x00000000 r6 = 0x0000000c r7 = 0x61fd9e4d 14:09:54 INFO - r8 = 0x00000002 r9 = 0x00000014 r10 = 0x00000140 fp = 0x69bffbd0 14:09:54 INFO - sp = 0x69bffb90 lr = 0x61d0648f pc = 0x61d089ee 14:09:54 INFO - Found by: given as instruction pointer in context 14:09:54 INFO - 1 libxul.so!nsBaseHashtable<nsCStringHashKey, nsRefPtr<nsJAR>, nsJAR*>::EnumerateRead(PLDHashOperator (*)(nsACString_internal const&, nsJAR*, void*), void*) const [nsBaseHashtable.h:eaa0d64e544e : 175 + 0x3] 14:09:54 INFO - r4 = 0x5beab538 r5 = 0x69bffc00 r6 = 0x61fd9e2f r7 = 0x68eb9b00 14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3 14:09:54 INFO - sp = 0x69bffbc8 pc = 0x61fdaa5f 14:09:54 INFO - Found by: call frame info 14:09:54 INFO - 2 libxul.so!nsZipReaderCache::ReleaseZip(nsJAR*) [nsJAR.cpp:eaa0d64e544e : 1215 + 0x3] 14:09:54 INFO - r4 = 0x5beab510 r5 = 0x00000000 r6 = 0x5beab538 r7 = 0x68eb9b00 14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3 14:09:54 INFO - sp = 0x69bffbe8 pc = 0x61fdb371 14:09:54 INFO - Found by: call frame info 14:09:54 INFO - 3 libxul.so!nsJAR::Release() [nsJAR.cpp:eaa0d64e544e : 115 + 0x5] 14:09:54 INFO - r4 = 0x68eb9b00 r5 = 0x00000001 r6 = 0x00000000 r7 = 0x6affeb6c 14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3 14:09:54 INFO - sp = 0x69bffc80 pc = 0x61fdb52d 14:09:54 INFO - Found by: call frame info 14:09:54 INFO - 4 libxul.so!nsCOMPtr<XPCVariant>::assign_assuming_AddRef(XPCVariant*) [nsCOMPtr.h:eaa0d64e544e : 517 + 0x7] 14:09:54 INFO - r4 = 0x68eb9b00 r5 = 0x68878990 r6 = 0x00000000 r7 = 0x6affeb6c 14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3 14:09:54 INFO - sp = 0x69bffc98 pc = 0x61cff341 14:09:54 INFO - Found by: call frame info 14:09:54 INFO - 5 libxul.so!nsJARInputThunk::Close() [nsCOMPtr.h:eaa0d64e544e : 1257 + 0x7] 14:09:54 INFO - r4 = 0x68878990 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c 14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3 14:09:54 INFO - sp = 0x69bffca8 pc = 0x61fddbfb 14:09:54 INFO - Found by: call frame info 14:09:54 INFO - 6 libxul.so!nsJARInputThunk::~nsJARInputThunk() [nsJARChannel.cpp:eaa0d64e544e : 87 + 0x3] 14:09:54 INFO - r4 = 0x68878980 r5 = 0x688789a4 r6 = 0x00000000 r7 = 0x6affeb6c 14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3 14:09:54 INFO - sp = 0x69bffcb8 pc = 0x61fddc19 14:09:54 INFO - Found by: call frame info 14:09:54 INFO - 7 libxul.so!nsJARInputThunk::~nsJARInputThunk() [nsJARChannel.cpp:eaa0d64e544e : 88 + 0x3] 14:09:54 INFO - r4 = 0x68878980 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c 14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3 14:09:54 INFO - sp = 0x69bffcc8 pc = 0x61fddc49 14:09:54 INFO - Found by: call frame info 14:09:54 INFO - 8 libxul.so!nsJARInputThunk::Release() [nsJARChannel.cpp:eaa0d64e544e : 107 + 0x7] 14:09:54 INFO - r4 = 0x68878980 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c 14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3 14:09:54 INFO - sp = 0x69bffcd0 pc = 0x61fdc979 14:09:54 INFO - Found by: call frame info 14:09:54 INFO - 9 libxul.so!nsCOMPtr<AsyncApplyBufferingPolicyEvent>::~nsCOMPtr() + 0x15 14:09:54 INFO - r4 = 0x688789d8 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c 14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3 14:09:54 INFO - sp = 0x69bffce0 pc = 0x61cff279 14:09:54 INFO - Found by: call frame info 14:09:54 INFO - 10 libxul.so!nsInputStreamTransport::~nsInputStreamTransport() [nsStreamTransportService.cpp:eaa0d64e544e : 53 + 0x5] 14:09:54 INFO - r4 = 0x688789c0 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c 14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3 14:09:54 INFO - sp = 0x69bffce8 pc = 0x61da7fb5 14:09:54 INFO - Found by: call frame info 14:09:54 INFO - 11 libxul.so!nsInputStreamTransport::~nsInputStreamTransport() [nsStreamTransportService.cpp:eaa0d64e544e : 53 + 0x3] 14:09:54 INFO - r4 = 0x688789c0 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c 14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3 14:09:54 INFO - sp = 0x69bffcf0 pc = 0x61da7fd5 14:09:54 INFO - Found by: call frame info 14:09:54 INFO - 12 libxul.so!nsInputStreamTransport::Release() [nsStreamTransportService.cpp:eaa0d64e544e : 72 + 0x7] 14:09:54 INFO - r4 = 0x688789c0 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c 14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3 14:09:54 INFO - sp = 0x69bffcf8 pc = 0x61da4819 14:09:54 INFO - Found by: call frame info 14:09:54 INFO - 13 libxul.so!nsCOMPtr<XPCVariant>::assign_assuming_AddRef(XPCVariant*) [nsCOMPtr.h:eaa0d64e544e : 517 + 0x7] 14:09:54 INFO - r4 = 0x688789c4 r5 = 0x6affeb64 r6 = 0x00000000 r7 = 0x6affeb6c 14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3 14:09:54 INFO - sp = 0x69bffd08 pc = 0x61cff341 14:09:54 INFO - Found by: call frame info 14:09:54 INFO - 14 libxul.so!nsCOMPtr<nsIInputStream>::operator=(nsIInputStream*) [nsCOMPtr.h:eaa0d64e544e : 1257 + 0x7] 14:09:54 INFO - r4 = 0x00000000 r5 = 0x6affeb64 r6 = 0x00000000 r7 = 0x6affeb6c 14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3 14:09:54 INFO - sp = 0x69bffd18 pc = 0x61d3d9e5 14:09:54 INFO - Found by: call frame info 14:09:54 INFO - 15 libxul.so!nsAStreamCopier::Process() [nsStreamUtils.cpp:eaa0d64e544e : 332 + 0x9] 14:09:54 INFO - r4 = 0x6affeb50 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c 14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3 14:09:54 INFO - sp = 0x69bffd28 pc = 0x61d42a57 14:09:54 INFO - Found by: call frame info 14:09:56 INFO - 04-27 14:09:34.320 I/Gecko ( 2240): int mozilla::AndroidBridge::GetScreenDepth() 14:09:56 INFO - 04-27 14:09:34.320 I/Gecko ( 2240): int mozilla::AndroidBridge::GetScreenDepth() 14:09:56 INFO - 04-27 14:09:34.335 F/MOZ_Assert( 2240): Assertion failure: table->recursionLevel > 0, at /builds/slave/m-in-and-d-0000000000000000000/build/xpcom/glue/pldhash.cpp:702 14:09:56 INFO - 04-27 14:09:35.414 F/libc ( 2240): Fatal signal 11 (SIGSEGV) at 0x00000000 (code=1)
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → WORKSFORME
You need to log in before you can comment on or make changes to this bug.