Closed Bug 1033840 Opened 10 years ago Closed 9 years ago

Intermittent test_can_play_type_webm.html | This test left crash dumps behind, but we weren't expecting it to!

Categories

(Core :: Audio/Video, defect)

ARM
Android
defect
Not set
normal

Tracking

()

RESOLVED WORKSFORME

People

(Reporter: KWierso, Unassigned)

Details

(Keywords: crash, intermittent-failure)

https://tbpl.mozilla.org/php/getParsedLog.php?id=42969093&tree=Mozilla-Inbound Android 4.0 Panda mozilla-inbound opt test mochitest-3 on 2014-07-02 13:34:34 PDT for push 4e35172b6476 slave: panda-0284 13:52:03 INFO - 880 INFO TEST-START | /tests/content/media/test/test_can_play_type_wave.html 13:52:03 INFO - 881 INFO TEST-INFO | MEMORY STAT vsize after test: 821411840 13:52:03 INFO - 882 INFO TEST-INFO | MEMORY STAT residentFast after test: 200019968 13:52:03 INFO - 883 INFO TEST-INFO | MEMORY STAT heapAllocated after test: 31900108 13:52:03 INFO - 884 INFO TEST-END | /tests/content/media/test/test_can_play_type_wave.html | finished in 309ms 13:52:03 INFO - 885 INFO TEST-START | /tests/content/media/test/test_can_play_type_webm.html 13:52:03 INFO - 886 INFO TEST-INFO | MEMORY STAT vsize after test: 821477376 13:52:03 INFO - 887 INFO TEST-INFO | MEMORY STAT residentFast after test: 200114176 13:52:03 INFO - 888 INFO TEST-INFO | MEMORY STAT heapAllocated after test: 31538332 13:52:03 INFO - 889 ERROR TEST-UNEXPECTED-FAIL | /tests/content/media/test/test_can_play_type_webm.html | This test left crash dumps behind, but we weren't expecting it to! 13:52:03 INFO - 890 INFO TEST-INFO | Found unexpected crash dump file /mnt/sdcard/tests/profile/minidumps/6d0579a1-30ec-1875-368d6175-50641a53.dmp. 13:52:03 INFO - 891 INFO TEST-INFO | Found unexpected crash dump file /mnt/sdcard/tests/profile/minidumps/6d0579a1-30ec-1875-368d6175-50641a53.extra. 13:52:03 INFO - 892 INFO TEST-END | /tests/content/media/test/test_can_play_type_webm.html | finished in 1046ms LATER 14:01:05 INFO - 1733 INFO TEST-START | Shutdown 14:01:05 INFO - 1734 INFO Passed: 16843 14:01:05 WARNING - 1735 INFO Failed: 1 14:01:05 WARNING - One or more unittests failed. 14:01:05 INFO - 1736 INFO Todo: 16 14:01:05 INFO - 1737 INFO Slowest: 42673ms - /tests/content/media/test/test_playback_rate.html 14:01:05 INFO - 1738 INFO SimpleTest FINISHED 14:01:05 INFO - INFO | automation.py | Application ran for: 0:12:04.572264 14:01:05 INFO - INFO | zombiecheck | Reading PID log: /tmp/tmpDqPhCtpidlog 14:01:05 INFO - Contents of /data/anr/traces.txt: 14:01:07 INFO - mozcrash INFO | Downloading symbols from: https://ftp-ssl.mozilla.org/pub/mozilla.org/mobile/tinderbox-builds/mozilla-inbound-android/1404330173/fennec-33.0a1.en-US.android-arm.crashreporter-symbols.zip 14:01:11 WARNING - PROCESS-CRASH | Shutdown | application crashed [@ libc.so + 0xc864] 14:01:11 INFO - Crash dump filename: /tmp/tmpgx_zc9/6d0579a1-30ec-1875-368d6175-50641a53.dmp 14:01:11 INFO - Operating system: Android 14:01:11 INFO - 0.0.0 Linux 3.2.0+ #2 SMP PREEMPT Thu Nov 29 08:06:57 EST 2012 armv7l pandaboard/pandaboard/pandaboard:4.0.4/IMM76I/5:eng/test-keys 14:01:11 INFO - CPU: arm 14:01:11 INFO - 2 CPUs 14:01:11 INFO - Crash reason: SIGILL 14:01:11 INFO - Crash address: 0x40010864 14:01:11 INFO - Thread 13 (crashed) 14:01:11 INFO - 0 libc.so + 0xc864 14:01:11 INFO - r4 = 0x696b7000 r5 = 0x5be50160 r6 = 0x66a081c0 r7 = 0x6443bc70 14:01:11 INFO - r8 = 0x00000016 r9 = 0x66a081c0 r10 = 0x696b7000 fp = 0x6dd1c438 14:01:11 INFO - sp = 0x5d492d80 lr = 0x63e979ed pc = 0x40010864 14:01:11 INFO - Found by: given as instruction pointer in context 14:01:11 INFO - 1 libxul.so!js::gcstats::Statistics::endPhase(js::gcstats::Phase) [Statistics.cpp:4e35172b6476 : 650 + 0x3] 14:01:11 INFO - sp = 0x5d492d90 pc = 0x63d2b521 14:01:11 INFO - Found by: stack scanning 14:01:11 INFO - 2 libxul.so!JSCompartment::sweepBaseShapeTable() [Statistics.h:4e35172b6476 : 205 + 0x7] 14:01:11 INFO - r4 = 0x696b7000 r5 = 0x5be50160 r6 = 0x00000000 r7 = 0x6443bc70 14:01:11 INFO - r8 = 0x00000001 r9 = 0x66a081c0 sp = 0x5d492db0 pc = 0x63ef0055 14:01:11 INFO - Found by: call frame info 14:01:11 INFO - 3 libxul.so!JSCompartment::sweep(js::FreeOp*, bool) [jscompartment.cpp:4e35172b6476 : 596 + 0x5] 14:01:11 INFO - r4 = 0x66a08000 r5 = 0x5be50090 r6 = 0x66a081c0 r7 = 0x66a08160 14:01:11 INFO - r8 = 0x5d492e10 r9 = 0x66a20800 r10 = 0x00000000 sp = 0x5d492dd8 14:01:11 INFO - pc = 0x63e71463 14:01:11 INFO - Found by: call frame info 14:01:11 INFO - 4 libxul.so!js::gc::GCRuntime::beginSweepingZoneGroup() [jsgc.cpp:4e35172b6476 : 4164 + 0x9] 14:01:11 INFO - r4 = 0x31f7c2d8 r5 = 0x0004fd36 r6 = 0x66a081c0 r7 = 0x66a08160 14:01:11 INFO - r8 = 0x6dd1c5dc r9 = 0x66a20800 r10 = 0x00000000 sp = 0x5d492df8 14:01:11 INFO - pc = 0x63e763a5 14:01:11 INFO - Found by: call frame info 14:01:11 INFO - 5 libxul.so!js::gc::GCRuntime::beginSweepPhase(bool) [jsgc.cpp:4e35172b6476 : 4285 + 0x5] 14:01:11 INFO - r4 = 0x66a08160 r5 = 0x00000001 r6 = 0x66a081c0 r7 = 0x00000000 14:01:11 INFO - r8 = 0x66a081c0 r9 = 0x00000000 r10 = 0x00000000 fp = 0x66a08000 14:01:11 INFO - sp = 0x5d492e40 pc = 0x63e76beb 14:01:11 INFO - Found by: call frame info 14:01:11 INFO - 6 libxul.so!js::gc::GCRuntime::incrementalCollectSlice(long long, JS::gcreason::Reason, js::JSGCInvocationKind) [jsgc.cpp:4e35172b6476 : 4832 + 0x5] 14:01:11 INFO - r4 = 0x00000001 r5 = 0x5d492e70 r6 = 0x66a08160 r7 = 0x00000000 14:01:11 INFO - r8 = 0x66a081c0 r9 = 0x00000000 r10 = 0x00000000 fp = 0x66a08000 14:01:11 INFO - sp = 0x5d492e50 pc = 0x63e76e05 14:01:11 INFO - Found by: call frame info 14:01:11 INFO - 7 libxul.so!js::gc::GCRuntime::gcCycle(bool, long long, js::JSGCInvocationKind, JS::gcreason::Reason) [jsgc.cpp:4e35172b6476 : 4980 + 0x9] 14:01:11 INFO - r4 = 0x66a08160 r5 = 0x66a08000 r6 = 0x00000000 r7 = 0x644305f8 14:01:11 INFO - r8 = 0x00000000 r9 = 0x00000000 r10 = 0x66a08160 fp = 0x00000000 14:01:11 INFO - sp = 0x5d492ea8 pc = 0x63e77467 14:01:11 INFO - Found by: call frame info 14:01:11 INFO - 8 libxul.so!js::gc::GCRuntime::collect(bool, long long, js::JSGCInvocationKind, JS::gcreason::Reason) [jsgc.cpp:4e35172b6476 : 5140 + 0xd] 14:01:11 INFO - r4 = 0x00000022 r5 = 0x00000000 r6 = 0x66a081c0 r7 = 0x00000006 14:01:11 INFO - r8 = 0x00000082 r9 = 0x00000006 r10 = 0x66a08160 fp = 0x00000000 14:01:11 INFO - sp = 0x5d492ed8 pc = 0x63e7769d 14:01:11 INFO - Found by: call frame info 14:01:11 INFO - 9 libxul.so!JS::GCForReason(JSRuntime*, JS::gcreason::Reason) [jsgc.cpp:4e35172b6476 : 5078 + 0x19] 14:01:11 INFO - r4 = 0x66a08000 r5 = 0x00000022 r6 = 0x5d492f48 r7 = 0x5d492f50 14:01:11 INFO - r8 = 0x00000001 r9 = 0x00000000 r10 = 0x5d493048 fp = 0x64198fdc 14:01:11 INFO - sp = 0x5d492f18 pc = 0x63e77bdb 14:01:11 INFO - Found by: call frame info
Inactive; closing (see bug 1180138).
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → WORKSFORME
You need to log in before you can comment on or make changes to this bug.