Closed
Bug 1002273
Opened 11 years ago
Closed 10 years ago
Intermittent remoteautomation.py | application crashed [@ PL_DHashTableEnumerate(PLDHashTable*, PLDHashOperator (*)(PLDHashTable*, PLDHashEntryHdr*, unsigned int, void*), void*)] after "table->recursionLevel > 0, at xpcom/glue/pldhash.cpp:702" assertion
Categories
(Core :: Networking: JAR, defect)
Tracking
()
RESOLVED
WORKSFORME
People
(Reporter: RyanVM, Unassigned)
Details
(Keywords: assertion, crash, intermittent-failure)
https://tbpl.mozilla.org/php/getParsedLog.php?id=38592276&tree=Mozilla-Inbound
Android 4.0 Panda mozilla-inbound debug test mochitest-1 on 2014-04-27 13:58:40 PDT for push eaa0d64e544e
slave: panda-0175
14:09:25 INFO - runtests.py | Running tests: start.
14:09:27 INFO - INFO | automation.py | Application pid: 2240
14:09:47 INFO - INFO | automation.py | Application ran for: 0:00:22.098978
14:09:47 INFO - INFO | zombiecheck | Reading PID log: /tmp/tmpciyvjupidlog
14:09:48 INFO - /data/anr/traces.txt not found
14:09:49 INFO - mozcrash INFO | Downloading symbols from: https://ftp-ssl.mozilla.org/pub/mozilla.org/mobile/tinderbox-builds/mozilla-inbound-android-debug/1398629637/fennec-31.0a1.en-US.android-arm.crashreporter-symbols.zip
14:09:54 WARNING - PROCESS-CRASH | remoteautomation.py | application crashed [@ PL_DHashTableEnumerate(PLDHashTable*, PLDHashOperator (*)(PLDHashTable*, PLDHashEntryHdr*, unsigned int, void*), void*)]
14:09:54 INFO - Crash dump filename: /tmp/tmpxE0Wvj/5c0c5500-6f83-3d8e-3a4796c3-6685dd18.dmp
14:09:54 INFO - Operating system: Android
14:09:54 INFO - 0.0.0 Linux 3.2.0+ #2 SMP PREEMPT Thu Nov 29 08:06:57 EST 2012 armv7l pandaboard/pandaboard/pandaboard:4.0.4/IMM76I/5:eng/test-keys
14:09:54 INFO - CPU: arm
14:09:54 INFO - 2 CPUs
14:09:54 INFO - Crash reason: SIGSEGV
14:09:54 INFO - Crash address: 0x0
14:09:54 INFO - Thread 28 (crashed)
14:09:54 INFO - 0 libxul.so!PL_DHashTableEnumerate(PLDHashTable*, PLDHashOperator (*)(PLDHashTable*, PLDHashEntryHdr*, unsigned int, void*), void*) [pldhash.cpp:eaa0d64e544e : 702 + 0x14]
14:09:54 INFO - r4 = 0x5beab538 r5 = 0x00000000 r6 = 0x0000000c r7 = 0x61fd9e4d
14:09:54 INFO - r8 = 0x00000002 r9 = 0x00000014 r10 = 0x00000140 fp = 0x69bffbd0
14:09:54 INFO - sp = 0x69bffb90 lr = 0x61d0648f pc = 0x61d089ee
14:09:54 INFO - Found by: given as instruction pointer in context
14:09:54 INFO - 1 libxul.so!nsBaseHashtable<nsCStringHashKey, nsRefPtr<nsJAR>, nsJAR*>::EnumerateRead(PLDHashOperator (*)(nsACString_internal const&, nsJAR*, void*), void*) const [nsBaseHashtable.h:eaa0d64e544e : 175 + 0x3]
14:09:54 INFO - r4 = 0x5beab538 r5 = 0x69bffc00 r6 = 0x61fd9e2f r7 = 0x68eb9b00
14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3
14:09:54 INFO - sp = 0x69bffbc8 pc = 0x61fdaa5f
14:09:54 INFO - Found by: call frame info
14:09:54 INFO - 2 libxul.so!nsZipReaderCache::ReleaseZip(nsJAR*) [nsJAR.cpp:eaa0d64e544e : 1215 + 0x3]
14:09:54 INFO - r4 = 0x5beab510 r5 = 0x00000000 r6 = 0x5beab538 r7 = 0x68eb9b00
14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3
14:09:54 INFO - sp = 0x69bffbe8 pc = 0x61fdb371
14:09:54 INFO - Found by: call frame info
14:09:54 INFO - 3 libxul.so!nsJAR::Release() [nsJAR.cpp:eaa0d64e544e : 115 + 0x5]
14:09:54 INFO - r4 = 0x68eb9b00 r5 = 0x00000001 r6 = 0x00000000 r7 = 0x6affeb6c
14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3
14:09:54 INFO - sp = 0x69bffc80 pc = 0x61fdb52d
14:09:54 INFO - Found by: call frame info
14:09:54 INFO - 4 libxul.so!nsCOMPtr<XPCVariant>::assign_assuming_AddRef(XPCVariant*) [nsCOMPtr.h:eaa0d64e544e : 517 + 0x7]
14:09:54 INFO - r4 = 0x68eb9b00 r5 = 0x68878990 r6 = 0x00000000 r7 = 0x6affeb6c
14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3
14:09:54 INFO - sp = 0x69bffc98 pc = 0x61cff341
14:09:54 INFO - Found by: call frame info
14:09:54 INFO - 5 libxul.so!nsJARInputThunk::Close() [nsCOMPtr.h:eaa0d64e544e : 1257 + 0x7]
14:09:54 INFO - r4 = 0x68878990 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c
14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3
14:09:54 INFO - sp = 0x69bffca8 pc = 0x61fddbfb
14:09:54 INFO - Found by: call frame info
14:09:54 INFO - 6 libxul.so!nsJARInputThunk::~nsJARInputThunk() [nsJARChannel.cpp:eaa0d64e544e : 87 + 0x3]
14:09:54 INFO - r4 = 0x68878980 r5 = 0x688789a4 r6 = 0x00000000 r7 = 0x6affeb6c
14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3
14:09:54 INFO - sp = 0x69bffcb8 pc = 0x61fddc19
14:09:54 INFO - Found by: call frame info
14:09:54 INFO - 7 libxul.so!nsJARInputThunk::~nsJARInputThunk() [nsJARChannel.cpp:eaa0d64e544e : 88 + 0x3]
14:09:54 INFO - r4 = 0x68878980 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c
14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3
14:09:54 INFO - sp = 0x69bffcc8 pc = 0x61fddc49
14:09:54 INFO - Found by: call frame info
14:09:54 INFO - 8 libxul.so!nsJARInputThunk::Release() [nsJARChannel.cpp:eaa0d64e544e : 107 + 0x7]
14:09:54 INFO - r4 = 0x68878980 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c
14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3
14:09:54 INFO - sp = 0x69bffcd0 pc = 0x61fdc979
14:09:54 INFO - Found by: call frame info
14:09:54 INFO - 9 libxul.so!nsCOMPtr<AsyncApplyBufferingPolicyEvent>::~nsCOMPtr() + 0x15
14:09:54 INFO - r4 = 0x688789d8 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c
14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3
14:09:54 INFO - sp = 0x69bffce0 pc = 0x61cff279
14:09:54 INFO - Found by: call frame info
14:09:54 INFO - 10 libxul.so!nsInputStreamTransport::~nsInputStreamTransport() [nsStreamTransportService.cpp:eaa0d64e544e : 53 + 0x5]
14:09:54 INFO - r4 = 0x688789c0 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c
14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3
14:09:54 INFO - sp = 0x69bffce8 pc = 0x61da7fb5
14:09:54 INFO - Found by: call frame info
14:09:54 INFO - 11 libxul.so!nsInputStreamTransport::~nsInputStreamTransport() [nsStreamTransportService.cpp:eaa0d64e544e : 53 + 0x3]
14:09:54 INFO - r4 = 0x688789c0 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c
14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3
14:09:54 INFO - sp = 0x69bffcf0 pc = 0x61da7fd5
14:09:54 INFO - Found by: call frame info
14:09:54 INFO - 12 libxul.so!nsInputStreamTransport::Release() [nsStreamTransportService.cpp:eaa0d64e544e : 72 + 0x7]
14:09:54 INFO - r4 = 0x688789c0 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c
14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3
14:09:54 INFO - sp = 0x69bffcf8 pc = 0x61da4819
14:09:54 INFO - Found by: call frame info
14:09:54 INFO - 13 libxul.so!nsCOMPtr<XPCVariant>::assign_assuming_AddRef(XPCVariant*) [nsCOMPtr.h:eaa0d64e544e : 517 + 0x7]
14:09:54 INFO - r4 = 0x688789c4 r5 = 0x6affeb64 r6 = 0x00000000 r7 = 0x6affeb6c
14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3
14:09:54 INFO - sp = 0x69bffd08 pc = 0x61cff341
14:09:54 INFO - Found by: call frame info
14:09:54 INFO - 14 libxul.so!nsCOMPtr<nsIInputStream>::operator=(nsIInputStream*) [nsCOMPtr.h:eaa0d64e544e : 1257 + 0x7]
14:09:54 INFO - r4 = 0x00000000 r5 = 0x6affeb64 r6 = 0x00000000 r7 = 0x6affeb6c
14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3
14:09:54 INFO - sp = 0x69bffd18 pc = 0x61d3d9e5
14:09:54 INFO - Found by: call frame info
14:09:54 INFO - 15 libxul.so!nsAStreamCopier::Process() [nsStreamUtils.cpp:eaa0d64e544e : 332 + 0x9]
14:09:54 INFO - r4 = 0x6affeb50 r5 = 0x00000000 r6 = 0x00000000 r7 = 0x6affeb6c
14:09:54 INFO - r8 = 0x6affeb78 r9 = 0x00000001 r10 = 0x69a288f4 fp = 0x00054ae3
14:09:54 INFO - sp = 0x69bffd28 pc = 0x61d42a57
14:09:54 INFO - Found by: call frame info
14:09:56 INFO - 04-27 14:09:34.320 I/Gecko ( 2240): int mozilla::AndroidBridge::GetScreenDepth()
14:09:56 INFO - 04-27 14:09:34.320 I/Gecko ( 2240): int mozilla::AndroidBridge::GetScreenDepth()
14:09:56 INFO - 04-27 14:09:34.335 F/MOZ_Assert( 2240): Assertion failure: table->recursionLevel > 0, at /builds/slave/m-in-and-d-0000000000000000000/build/xpcom/glue/pldhash.cpp:702
14:09:56 INFO - 04-27 14:09:35.414 F/libc ( 2240): Fatal signal 11 (SIGSEGV) at 0x00000000 (code=1)
Comment hidden (Legacy TBPL/Treeherder Robot) |
Comment hidden (Legacy TBPL/Treeherder Robot) |
Comment hidden (Legacy TBPL/Treeherder Robot) |
Comment hidden (Legacy TBPL/Treeherder Robot) |
Comment hidden (Legacy TBPL/Treeherder Robot) |
Comment hidden (Legacy TBPL/Treeherder Robot) |
Comment hidden (Legacy TBPL/Treeherder Robot) |
Reporter | ||
Updated•10 years ago
|
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → WORKSFORME
You need to log in
before you can comment on or make changes to this bug.
Description
•