Intermittent jsreftest.html?test=ecma_6/TypedArray/element-setting-converts-using-ToNumber.js | application crashed [@ js::jit::GetCalleeTokenTag] ("Assertion failure: tag <= CalleeToken_Script, at js/src/jit/IonFrames.h:32")

RESOLVED WORKSFORME

Status

()

Core
JavaScript Engine: JIT
--
critical
RESOLVED WORKSFORME
4 years ago
3 years ago

People

(Reporter: emorley, Unassigned)

Tracking

({assertion, intermittent-failure})

Trunk
ARM
Android
assertion, intermittent-failure
Points:
---

Firefox Tracking Flags

(Not tracked)

Details

(crash signature)

(Reporter)

Description

4 years ago
Android 4.0 Panda mozilla-inbound debug test jsreftest-1 on 2014-08-05 17:31:38 PDT for push fdf012084abd

slave: panda-0455

https://tbpl.mozilla.org/php/getParsedLog.php?id=45290657&tree=Mozilla-Inbound

{
18:02:35     INFO -  REFTEST TEST-START | http://10.26.132.18:30455/jsreftest/tests/jsreftest.html?test=ecma_6/TypedArray/element-setting-converts-using-ToNumber.js
18:02:35     INFO -  REFTEST TEST-LOAD | http://10.26.132.18:30455/jsreftest/tests/jsreftest.html?test=ecma_6/TypedArray/element-setting-converts-using-ToNumber.js | 1487 / 2114 (70%)
18:02:35     INFO -  INFO | automation.py | Application ran for: 0:20:15.813785
18:02:35     INFO -  INFO | zombiecheck | Reading PID log: /tmp/tmpf23TJPpidlog
18:02:35     INFO -  Contents of /data/anr/traces.txt:
18:02:37     INFO -  mozcrash INFO | Downloading symbols from: https://ftp-ssl.mozilla.org/pub/mozilla.org/mobile/tinderbox-builds/mozilla-inbound-android-debug/1407283339/fennec-34.0a1.en-US.android-arm.crashreporter-symbols.zip
18:02:42  WARNING -  PROCESS-CRASH | http://10.26.132.18:30455/jsreftest/tests/jsreftest.html?test=ecma_6/TypedArray/element-setting-converts-using-ToNumber.js | application crashed [@ js::jit::GetCalleeTokenTag]
18:02:42     INFO -  Crash dump filename: /tmp/tmp7fCf1a/207aaab7-c8b6-15d4-3323df52-09b13c27.dmp
18:02:42     INFO -  Operating system: Android
18:02:42     INFO -                    0.0.0 Linux 3.2.0+ #2 SMP PREEMPT Thu Nov 29 08:06:57 EST 2012 armv7l pandaboard/pandaboard/pandaboard:4.0.4/IMM76I/5:eng/test-keys
18:02:42     INFO -  CPU: arm
18:02:42     INFO -       2 CPUs
18:02:42     INFO -  Crash reason:  SIGSEGV
18:02:42     INFO -  Crash address: 0x0
18:02:42     INFO -  Thread 13 (crashed)
18:02:42     INFO -   0  libxul.so!js::jit::GetCalleeTokenTag [IonFrames.h:fdf012084abd : 32 + 0xc]
18:02:42     INFO -       r4 = 0x5d4dce04    r5 = 0x5d4dd0c0    r6 = 0x00000000    r7 = 0x5d4dcdfc
18:02:42     INFO -       r8 = 0x00002710    r9 = 0x6ce2bf40   r10 = 0x00000003    fp = 0x5d4dd2c4
18:02:42     INFO -       sp = 0x5d4dcdb0    lr = 0x634a92c1    pc = 0x634aa81c
18:02:42     INFO -      Found by: given as instruction pointer in context
18:02:42     INFO -   1  libxul.so!js::jit::ScriptFromCalleeToken [IonFrames.h:fdf012084abd : 68 + 0x7]
18:02:42     INFO -       r4 = 0x5d4dce04    r5 = 0x5d4dd0c0    r6 = 0x00000000    r7 = 0x5d4dcdfc
18:02:42     INFO -       r8 = 0x00002710    r9 = 0x6ce2bf40   r10 = 0x00000003    fp = 0x5d4dd2c4
18:02:42     INFO -       sp = 0x5d4dcdb8    pc = 0x634b2841
18:02:42     INFO -      Found by: call frame info
18:02:42     INFO -   2  libxul.so!js::jit::JitFrameIterator::script() const [IonFrames.cpp:fdf012084abd : 206 + 0x5]
18:02:42     INFO -       r4 = 0x5d4dce04    r5 = 0x5d4dd0c0    r6 = 0x00000000    r7 = 0x5d4dcdfc
18:02:42     INFO -       r8 = 0x00002710    r9 = 0x6ce2bf40   r10 = 0x00000003    fp = 0x5d4dd2c4
18:02:42     INFO -       sp = 0x5d4dcdc0    pc = 0x634be27f
18:02:42     INFO -      Found by: call frame info
18:02:42     INFO -   3  libxul.so!js::jit::IonBailoutIterator::IonBailoutIterator(js::jit::JitActivationIterator const&, js::jit::BailoutStack*) [Bailouts-arm.cpp:fdf012084abd : 85 + 0x5]
18:02:42     INFO -       r4 = 0x5d4dce04    r5 = 0x5d4dd0c0    r6 = 0x00000000    r7 = 0x5d4dcdfc
18:02:42     INFO -       r8 = 0x00002710    r9 = 0x6ce2bf40   r10 = 0x00000003    fp = 0x5d4dd2c4
18:02:42     INFO -       sp = 0x5d4dcdc8    pc = 0x63542407
18:02:42     INFO -      Found by: call frame info
18:02:42     INFO -   4  libxul.so!js::jit::Bailout(js::jit::BailoutStack*, js::jit::BaselineBailoutInfo**) [Bailouts.cpp:fdf012084abd : 88 + 0x9]
18:02:42     INFO -       r4 = 0x6b018bc0    r5 = 0x5d4dd0c0    r6 = 0x5d4dd0b8    r7 = 0xffffff81
18:02:42     INFO -       r8 = 0x00002710    r9 = 0x6ce2bf40   r10 = 0x00000003    fp = 0x5d4dd2c4
18:02:42     INFO -       sp = 0x5d4dcdf0    pc = 0x6342c3d7
18:02:42     INFO -      Found by: call frame info
18:02:42     INFO -   5  0x644fb35a
18:02:42     INFO -       r4 = 0x00000000    r5 = 0x6cdbb570    r6 = 0xffffff88    r7 = 0xffffff81
18:02:42     INFO -       r8 = 0x00002710    r9 = 0x6ce2bf40   r10 = 0x00000003    fp = 0x5d4dd2c4
18:02:42     INFO -       sp = 0x5d4dd0b8    pc = 0x644fb35c
18:02:42     INFO -      Found by: call frame info
}
Comment hidden (Treeherder Robot)
(Reporter)

Updated

3 years ago
Status: NEW → RESOLVED
Last Resolved: 3 years ago
Resolution: --- → WORKSFORME
You need to log in before you can comment on or make changes to this bug.