Intermittent test_keys.html | application crashed [@ js::jit::BaselineCompiler::compile()]

RESOLVED WORKSFORME

Status

()

RESOLVED WORKSFORME
4 years ago
3 years ago

People

(Reporter: RyanVM, Unassigned)

Tracking

({crash, intermittent-failure})

Trunk
ARM
Android
crash, intermittent-failure
Points:
---

Firefox Tracking Flags

(Not tracked)

Details

(Reporter)

Description

4 years ago
https://tbpl.mozilla.org/php/getParsedLog.php?id=48802010&tree=Mozilla-Inbound

Android 4.0 Panda mozilla-inbound opt test mochitest-5 on 2014-09-24 12:49:09 PDT for push f8ad56c861c1
slave: panda-0273

13:02:12     INFO -  31 INFO TEST-START | /tests/dom/datastore/tests/test_keys.html
13:02:32     INFO -  INFO | automation.py | Application ran for: 0:01:22.334929
13:02:32     INFO -  INFO | zombiecheck | Reading PID log: /tmp/tmpotL07ypidlog
13:02:32     INFO -  Contents of /data/anr/traces.txt:
13:02:35     INFO -  mozcrash Downloading symbols from: https://ftp-ssl.mozilla.org/pub/mozilla.org/mobile/tinderbox-builds/mozilla-inbound-android/1411586216/fennec-35.0a1.en-US.android-arm.crashreporter-symbols.zip
13:02:39     INFO -  mozcrash Saved minidump as /builds/panda-0273/test/build/blobber_upload_dir/53547be2-1963-89ea-3f285b10-4c0f301b.dmp
13:02:39     INFO -  mozcrash Saved app info as /builds/panda-0273/test/build/blobber_upload_dir/53547be2-1963-89ea-3f285b10-4c0f301b.extra
13:02:39  WARNING -  PROCESS-CRASH | /tests/dom/datastore/tests/test_keys.html | application crashed [@ js::jit::BaselineCompiler::compile()]
13:02:39     INFO -  Crash dump filename: /tmp/tmpfw_osg/53547be2-1963-89ea-3f285b10-4c0f301b.dmp
13:02:39     INFO -  Operating system: Android
13:02:39     INFO -                    0.0.0 Linux 3.2.0+ #2 SMP PREEMPT Thu Nov 29 08:06:57 EST 2012 armv7l pandaboard/pandaboard/pandaboard:4.0.4/IMM76I/5:eng/test-keys
13:02:39     INFO -  CPU: arm
13:02:39     INFO -       2 CPUs
13:02:39     INFO -  Crash reason:  SIGSEGV
13:02:39     INFO -  Crash address: 0xe3e0c596
13:02:39     INFO -  Thread 14 (crashed)
13:02:39     INFO -   0  libxul.so!js::jit::BaselineCompiler::compile() [BaselineCompiler.cpp:f8ad56c861c1 : 218 + 0x4]
13:02:39     INFO -       r4 = 0x6e1e2e8c    r5 = 0x00000003    r6 = 0x6b7bd000    r7 = 0x000000a3
13:02:39     INFO -       r8 = 0x5da79600    r9 = 0x6b7bd924   r10 = 0x5da796a8    fp = 0x6d3e42d4
13:02:39     INFO -       sp = 0x5da79550    lr = 0x64c6f025    pc = 0x64c94cca
13:02:39     INFO -      Found by: given as instruction pointer in context
13:02:39     INFO -   1  libxul.so!js::jit::BaselineCompile(JSContext*, JSScript*) [BaselineJIT.cpp:f8ad56c861c1 : 229 + 0x5]
13:02:39     INFO -       r4 = 0x00000001    r5 = 0x00000000    r6 = 0x67e320e0    r7 = 0x6b878670
13:02:39     INFO -       r8 = 0x00000000    r9 = 0x0000000d   r10 = 0x653486d4    fp = 0x5da7a9d8
13:02:39     INFO -       sp = 0x5da79660    pc = 0x64c94fcf
13:02:39     INFO -      Found by: call frame info
13:02:39     INFO -   2  libxul.so!CanEnterBaselineJIT [BaselineJIT.cpp:f8ad56c861c1 : 291 + 0x5]
13:02:39     INFO -       r4 = 0x5da7a474    r5 = 0x00000928    r6 = 0x67e320e0    r7 = 0x5c34e000
13:02:39     INFO -       r8 = 0x5c34e0d0    r9 = 0x0000000d   r10 = 0x653486d4    fp = 0x5da7a9d8
13:02:39     INFO -       sp = 0x5da7a440    pc = 0x64c95095
13:02:39     INFO -      Found by: call frame info
13:02:39     INFO -   3  libxul.so!js::jit::CanEnterBaselineMethod(JSContext*, js::RunState&) [BaselineJIT.cpp:f8ad56c861c1 : 339 + 0x3]
13:02:39     INFO -       r4 = 0x6b878670    r5 = 0x67e32108    r6 = 0x5c352024    r7 = 0x5c34e000
13:02:39     INFO -       r8 = 0x5c34e0d0    r9 = 0x0000000d   r10 = 0x653486d4    fp = 0x5da7a9d8
13:02:39     INFO -       sp = 0x5da7a468    pc = 0x64c950e7
13:02:39     INFO -      Found by: call frame info
13:02:39     INFO -   4  libxul.so!js::RunScript(JSContext*, js::RunState&) [Interpreter.cpp:f8ad56c861c1 : 423 + 0x7]
13:02:39     INFO -       r4 = 0x67e320e0    r5 = 0x5da7a4e0    r6 = 0x5c352024    r7 = 0x5c34e000
13:02:39     INFO -       r8 = 0x5c34e0d0    r9 = 0x0000000d   r10 = 0x653486d4    fp = 0x5da7a9d8
13:02:39     INFO -       sp = 0x5da7a488    pc = 0x64dd5dd9
13:02:39     INFO -      Found by: call frame info
13:02:39     INFO -   5  libxul.so!js::Invoke(JSContext*, JS::CallArgs, js::MaybeConstruct) [Interpreter.cpp:f8ad56c861c1 : 507 + 0x7]
13:02:39     INFO -       r4 = 0x5da7a4d0    r5 = 0x00000001    r6 = 0x67e320e0    r7 = 0x65567330
13:02:39     INFO -       r8 = 0x5da7aa78    r9 = 0x67e320e0   r10 = 0x5da7a910    fp = 0x5da7a9d8
13:02:39     INFO -       sp = 0x5da7a4b8    pc = 0x64dd6005
13:02:39     INFO -      Found by: call frame info

Comment 1

3 years ago
Inactive; closing (see bug 1180138).
Status: NEW → RESOLVED
Last Resolved: 3 years ago
Resolution: --- → WORKSFORME
You need to log in before you can comment on or make changes to this bug.