Closed Bug 1072559 Opened 11 years ago Closed 10 years ago

Intermittent test_keys.html | application crashed [@ js::jit::BaselineCompiler::compile()]

Categories

(Core :: JavaScript Engine: JIT, defect)

ARM
Android
defect
Not set
normal

Tracking

()

RESOLVED WORKSFORME

People

(Reporter: RyanVM, Unassigned)

Details

(Keywords: crash, intermittent-failure)

https://tbpl.mozilla.org/php/getParsedLog.php?id=48802010&tree=Mozilla-Inbound Android 4.0 Panda mozilla-inbound opt test mochitest-5 on 2014-09-24 12:49:09 PDT for push f8ad56c861c1 slave: panda-0273 13:02:12 INFO - 31 INFO TEST-START | /tests/dom/datastore/tests/test_keys.html 13:02:32 INFO - INFO | automation.py | Application ran for: 0:01:22.334929 13:02:32 INFO - INFO | zombiecheck | Reading PID log: /tmp/tmpotL07ypidlog 13:02:32 INFO - Contents of /data/anr/traces.txt: 13:02:35 INFO - mozcrash Downloading symbols from: https://ftp-ssl.mozilla.org/pub/mozilla.org/mobile/tinderbox-builds/mozilla-inbound-android/1411586216/fennec-35.0a1.en-US.android-arm.crashreporter-symbols.zip 13:02:39 INFO - mozcrash Saved minidump as /builds/panda-0273/test/build/blobber_upload_dir/53547be2-1963-89ea-3f285b10-4c0f301b.dmp 13:02:39 INFO - mozcrash Saved app info as /builds/panda-0273/test/build/blobber_upload_dir/53547be2-1963-89ea-3f285b10-4c0f301b.extra 13:02:39 WARNING - PROCESS-CRASH | /tests/dom/datastore/tests/test_keys.html | application crashed [@ js::jit::BaselineCompiler::compile()] 13:02:39 INFO - Crash dump filename: /tmp/tmpfw_osg/53547be2-1963-89ea-3f285b10-4c0f301b.dmp 13:02:39 INFO - Operating system: Android 13:02:39 INFO - 0.0.0 Linux 3.2.0+ #2 SMP PREEMPT Thu Nov 29 08:06:57 EST 2012 armv7l pandaboard/pandaboard/pandaboard:4.0.4/IMM76I/5:eng/test-keys 13:02:39 INFO - CPU: arm 13:02:39 INFO - 2 CPUs 13:02:39 INFO - Crash reason: SIGSEGV 13:02:39 INFO - Crash address: 0xe3e0c596 13:02:39 INFO - Thread 14 (crashed) 13:02:39 INFO - 0 libxul.so!js::jit::BaselineCompiler::compile() [BaselineCompiler.cpp:f8ad56c861c1 : 218 + 0x4] 13:02:39 INFO - r4 = 0x6e1e2e8c r5 = 0x00000003 r6 = 0x6b7bd000 r7 = 0x000000a3 13:02:39 INFO - r8 = 0x5da79600 r9 = 0x6b7bd924 r10 = 0x5da796a8 fp = 0x6d3e42d4 13:02:39 INFO - sp = 0x5da79550 lr = 0x64c6f025 pc = 0x64c94cca 13:02:39 INFO - Found by: given as instruction pointer in context 13:02:39 INFO - 1 libxul.so!js::jit::BaselineCompile(JSContext*, JSScript*) [BaselineJIT.cpp:f8ad56c861c1 : 229 + 0x5] 13:02:39 INFO - r4 = 0x00000001 r5 = 0x00000000 r6 = 0x67e320e0 r7 = 0x6b878670 13:02:39 INFO - r8 = 0x00000000 r9 = 0x0000000d r10 = 0x653486d4 fp = 0x5da7a9d8 13:02:39 INFO - sp = 0x5da79660 pc = 0x64c94fcf 13:02:39 INFO - Found by: call frame info 13:02:39 INFO - 2 libxul.so!CanEnterBaselineJIT [BaselineJIT.cpp:f8ad56c861c1 : 291 + 0x5] 13:02:39 INFO - r4 = 0x5da7a474 r5 = 0x00000928 r6 = 0x67e320e0 r7 = 0x5c34e000 13:02:39 INFO - r8 = 0x5c34e0d0 r9 = 0x0000000d r10 = 0x653486d4 fp = 0x5da7a9d8 13:02:39 INFO - sp = 0x5da7a440 pc = 0x64c95095 13:02:39 INFO - Found by: call frame info 13:02:39 INFO - 3 libxul.so!js::jit::CanEnterBaselineMethod(JSContext*, js::RunState&) [BaselineJIT.cpp:f8ad56c861c1 : 339 + 0x3] 13:02:39 INFO - r4 = 0x6b878670 r5 = 0x67e32108 r6 = 0x5c352024 r7 = 0x5c34e000 13:02:39 INFO - r8 = 0x5c34e0d0 r9 = 0x0000000d r10 = 0x653486d4 fp = 0x5da7a9d8 13:02:39 INFO - sp = 0x5da7a468 pc = 0x64c950e7 13:02:39 INFO - Found by: call frame info 13:02:39 INFO - 4 libxul.so!js::RunScript(JSContext*, js::RunState&) [Interpreter.cpp:f8ad56c861c1 : 423 + 0x7] 13:02:39 INFO - r4 = 0x67e320e0 r5 = 0x5da7a4e0 r6 = 0x5c352024 r7 = 0x5c34e000 13:02:39 INFO - r8 = 0x5c34e0d0 r9 = 0x0000000d r10 = 0x653486d4 fp = 0x5da7a9d8 13:02:39 INFO - sp = 0x5da7a488 pc = 0x64dd5dd9 13:02:39 INFO - Found by: call frame info 13:02:39 INFO - 5 libxul.so!js::Invoke(JSContext*, JS::CallArgs, js::MaybeConstruct) [Interpreter.cpp:f8ad56c861c1 : 507 + 0x7] 13:02:39 INFO - r4 = 0x5da7a4d0 r5 = 0x00000001 r6 = 0x67e320e0 r7 = 0x65567330 13:02:39 INFO - r8 = 0x5da7aa78 r9 = 0x67e320e0 r10 = 0x5da7a910 fp = 0x5da7a9d8 13:02:39 INFO - sp = 0x5da7a4b8 pc = 0x64dd6005 13:02:39 INFO - Found by: call frame info
Inactive; closing (see bug 1180138).
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → WORKSFORME
You need to log in before you can comment on or make changes to this bug.