Closed Bug 766148 Opened 12 years ago Closed 12 years ago

Intermittent crash during img-width-slice-2.html [@ PORT_ZFree_Util]

Categories

(NSS :: Libraries, defect)

3.13.5
ARM
Android
defect
Not set
critical

Tracking

(Not tracked)

RESOLVED WORKSFORME

People

(Reporter: emorley, Unassigned)

References

Details

(Keywords: crash, intermittent-failure)

Crash Data

Android XUL Tegra 250 mozilla-inbound opt test reftest-3 on 2012-06-19 02:08:40 PDT for push e2a44838954a

slave: tegra-070

https://tbpl.mozilla.org/php/getParsedLog.php?id=12784218&tree=Mozilla-Inbound

{
REFTEST TEST-START | http://10.250.48.210:30070/tests/layout/reftests/svg/as-image/img-width-slice-2.html | 541 / 2664 (20%)
INFO | automation.py | Application ran for: 0:04:41.860455
INFO | automation.py | Reading PID log: /tmp/tmpXCpSd4pidlog
getting files in '/mnt/sdcard/tests/reftest/profile/minidumps/'
Downloading symbols from: http://ftp.mozilla.org/pub/mozilla.org/mobile/tinderbox-builds/mozilla-inbound-android-xul/1340094315/fennec-16.0a1.en-US.android-arm.crashreporter-symbols.zip
PROCESS-CRASH | automation.py | application crashed (minidump found)
Crash dump filename: /tmp/tmpAqohMZ/37a30e0f-1891-2622-3a159d6a-3a375a48.dmp
Operating system: Linux
                  0.0.0 Linux 2.6.32.9 #1 SMP PREEMPT Fri Nov 5 19:33:10 UTC 2010 armv7l
CPU: arm
     0 CPUs

Crash reason:  SIGSEGV
Crash address: 0x0

Thread 14 (crashed)
 0  libmozglue.so!arena_dalloc [jemalloc.c:e2a44838954a : 4636 + 0x10]
     r4 = 0x4cabf000    r5 = 0x4a5621f0    r6 = 0x00000030    r7 = 0x4a562040
     r8 = 0x4ca00000    r9 = 0x00000488   r10 = 0x4a562044    fp = 0x00000000
     sp = 0x4c3ffcf8    lr = 0xafd10618    pc = 0x80c07b9c
    Found by: given as instruction pointer in context
 1  libmozglue.so!__wrap_free [jemalloc.c:e2a44838954a : 6567 + 0x4]
     r4 = 0x4cabf4c8    r5 = 0x00000000    r6 = 0x0000001c    r7 = 0x704159d4
     r8 = 0x00000000    r9 = 0x72f42843   r10 = 0x00000000    fp = 0x00000000
     sp = 0x4c3ffd20    pc = 0x80c08b41
    Found by: call frame info
 2  libnspr4.so!PR_Free [prmem.c:e2a44838954a : 459 + 0x0]
     r4 = 0x4cabf4c8    r5 = 0x00000000    r6 = 0x0000001c    r7 = 0x704159d4
     r8 = 0x00000000    r9 = 0x72f42843   r10 = 0x00000000    fp = 0x00000000
     sp = 0x4c3ffd28    pc = 0x7010caa7
    Found by: call frame info
 3  libnssutil3.so!PORT_ZFree_Util [secport.c : 162 + 0x0]
     r4 = 0x4cabf4c8    r5 = 0x00000000    r6 = 0x0000001c    r7 = 0x704159d4
     r8 = 0x00000000    r9 = 0x72f42843   r10 = 0x00000000    fp = 0x00000000
     sp = 0x4c3ffd30    pc = 0x7040a951
    Found by: call frame info
 4  libnssutil3.so!PORT_FreeArena_Util [secport.c : 355 + 0x0]
     r4 = 0x4cabf4c8    r5 = 0x00000000    r6 = 0x0000001c    r7 = 0x704159d4
     r8 = 0x00000000    r9 = 0x72f42843   r10 = 0x00000000    fp = 0x00000000
     sp = 0x4c3ffd38    pc = 0x7040a9c7
    Found by: call frame info
 5  libnss3.so!CERT_DestroyCertificate [stanpcertdb.c : 833 + 0x0]
     r4 = 0x4a825000    r5 = 0x510db810    r6 = 0x514754f0    r7 = 0x00000000
     r8 = 0x732ba964    r9 = 0x72f42843   r10 = 0x00000000    fp = 0x00000000
     sp = 0x4c3ffd50    pc = 0x705381f3
    Found by: call frame info
 6  libssl3.so!ssl3_CleanupPeerCerts [ssl3con.c : 7841 + 0x0]
     r4 = 0x4a825000    r5 = 0x510db810    r6 = 0x514754f0    r7 = 0x00000000
     r8 = 0x732ba964    r9 = 0x72f42843   r10 = 0x00000000    fp = 0x00000000
     sp = 0x4c3ffd58    pc = 0x70606981
    Found by: call frame info
 7  libssl3.so!ssl3_DestroySSL3Info [ssl3con.c : 9584 + 0x0]
     r4 = 0x4a825000    r5 = 0x4a825000    r6 = 0x4bc08000    r7 = 0x00000000
     r8 = 0x732ba964    r9 = 0x72f42843   r10 = 0x00000000    fp = 0x00000000
     sp = 0x4c3ffd68    pc = 0x70606a7d
}
Status: NEW → RESOLVED
Closed: 12 years ago
Resolution: --- → WORKSFORME
Whiteboard: [orange]
You need to log in before you can comment on or make changes to this bug.