Closed Bug 1134627 Opened 9 years ago Closed 9 years ago

Intermittent remoteautomation.py | application crashed [@ js::RegExpShared::trace(JSTracer*)]

Categories

(Core :: JavaScript Engine, defect)

x86
Android
defect
Not set
normal

Tracking

()

RESOLVED DUPLICATE of bug 1125125

People

(Reporter: cbook, Unassigned)

References

()

Details

Android 4.0 armv7 API 11+ mozilla-inbound opt test plain-reftest-2

https://treeherder.mozilla.org/logviewer.html#?job_id=6765210&repo=mozilla-inbound

00:49:24 WARNING - PROCESS-CRASH | remoteautomation.py | application crashed [@ js::RegExpShared::trace(JSTracer*)]
00:49:24 INFO - Crash dump filename: /tmp/tmpxZs3l7/742d138b-8258-583b-7e02f98d-7ac4f954.dmp
00:49:24 INFO - Operating system: Android
00:49:24 INFO - 0.0.0 Linux 3.2.0+ #2 SMP PREEMPT Thu Nov 29 08:06:57 EST 2012 armv7l pandaboard/pandaboard/pandaboard:4.0.4/IMM76I/5:eng/test-keys
00:49:24 INFO - CPU: arm
00:49:24 INFO - 2 CPUs
00:49:24 INFO - Crash reason: SIGSEGV
00:49:24 INFO - Crash address: 0xe4002065
00:49:24 INFO - Thread 12 (crashed)
00:49:24 INFO - 0 libxul.so!js::RegExpShared::trace(JSTracer*) [RegExpObject.cpp:8d38dc1dcdeb : 571 + 0x0]
00:49:24 INFO - r4 = 0x6e3fea60 r5 = 0xe4002065 r6 = 0x00000000 r7 = 0x00000000
00:49:24 INFO - r8 = 0x70a2e6c0 r9 = 0x6f273d40 r10 = 0xffffff85 fp = 0x5c3fcd4c
00:49:24 INFO - sp = 0x5c3fcb08 lr = 0x64432699 pc = 0x6442811c
00:49:24 INFO - Found by: given as instruction pointer in context
00:49:24 INFO - 1 libxul.so!js::RegExpObject::getShared(JSContext*, js::RegExpGuard*) [RegExpObject.cpp:8d38dc1dcdeb : 219 + 0x7]
00:49:24 INFO - r4 = 0x6e3fea60 r5 = 0x5c3fcb4c r6 = 0x00000000 r7 = 0x00000000
00:49:24 INFO - r8 = 0x70a2e6c0 r9 = 0x6f273d40 r10 = 0xffffff85 fp = 0x5c3fcd4c
00:49:24 INFO - sp = 0x5c3fcb18 pc = 0x64432699
00:49:24 INFO - Found by: call frame info
00:49:24 INFO - 2 libxul.so!js::RegExpObjectBuilder::clone(JS::Handle<js::RegExpObject*>) [RegExpObject.cpp:8d38dc1dcdeb : 129 + 0xb]
00:49:24 INFO - r4 = 0x5c3fcb88 r5 = 0x5c3fcb84 r6 = 0x00000000 r7 = 0x00000000
00:49:24 INFO - r8 = 0x70a2e6c0 r9 = 0x6f273d40 r10 = 0xffffff85 fp = 0x5c3fcd4c
00:49:24 INFO - sp = 0x5c3fcb28 pc = 0x64438ff1
00:49:24 INFO - Found by: call frame info
00:49:24 INFO - 3 libxul.so!js::CloneRegExpObject(JSContext*, JSObject*) [RegExpObject.cpp:8d38dc1dcdeb : 989 + 0x3]
00:49:24 INFO - r4 = 0x6e0d9b80 r5 = 0x5c3fcbb8 r6 = 0x6de74230 r7 = 0x00000000
00:49:24 INFO - r8 = 0x70a2e6c0 r9 = 0x6f273d40 r10 = 0xffffff85 fp = 0x5c3fcd4c
00:49:24 INFO - sp = 0x5c3fcb78 pc = 0x64439071
00:49:24 INFO - Found by: call frame info
00:49:24 INFO - 4 0x65e31066
00:49:24 INFO - r4 = 0x6e0d9b80 r5 = 0x5c3fcbb8 r6 = 0x6de74230 r7 = 0x00000000
00:49:24 INFO - r8 = 0x70a2e6c0 r9 = 0x6f273d40 r10 = 0xffffff85 fp = 0x5c3fcd4c
00:49:24 INFO - sp = 0x5c3fcba0 pc = 0x65e31068
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → DUPLICATE
You need to log in before you can comment on or make changes to this bug.