[unagi weekly build 13.06.06]monkey test crash in android::TouchInputMapper::sync

RESOLVED DUPLICATE of bug 882539

Status

Firefox OS
General
--
critical
RESOLVED DUPLICATE of bug 882539
4 years ago
4 years ago

People

(Reporter: James Zhang (Spreadtrum), Unassigned)

Tracking

Firefox Tracking Flags

(Not tracked)

Details

Attachments

(1 attachment)

(Reporter)

Description

4 years ago
Operating system: Android
                  0.0.0 Linux 3.0.8-perf-svn26240 #1 PREEMPT Mon Oct 8 01:19:17 HKT 2012 armv7l toro/full_unagi/unagi:4.0.4.0.4.0.4/OPENMASTER/eng.apusr.20130604.213457:eng/test-keys
CPU: arm
     0 CPUs

Crash reason:  SIGSEGV
Crash address: 0x4197de96

Thread 28 (crashed)
 0  libxul.so!android::TouchInputMapper::sync [InputReader.cpp : 3307 + 0x2]
     r4 = 0x45ad4000    r5 = 0x00000000    r6 = 0x4197de7e    r7 = 0x00000014
     r8 = 0x4197fce9    r9 = 0x00000002   r10 = 0x00000002    fp = 0x00000001
     sp = 0x470ffdb0    lr = 0x4125f78b    pc = 0x4125f790
    Found by: given as instruction pointer in context
 1  libxul.so!android::TouchInputMapper::process [InputReader.cpp : 3300 + 0x9]
     r4 = 0x45ac2e40    r5 = 0x45ad4000    r6 = 0x4197c9fe    r7 = 0x00000014
     r8 = 0x4197fce9    r9 = 0x00000002   r10 = 0x00000002    fp = 0x00000001
     sp = 0x470ffe00    pc = 0x4125faa1
    Found by: call frame info
 2  libxul.so!android::MultiTouchInputMapper::process [InputReader.cpp : 5572 + 0x3]
     r4 = 0x45ac2e40    r5 = 0x45ad9000    r6 = 0x4197c9fe    r7 = 0x00000014
     r8 = 0x4197fce9    r9 = 0x00000002   r10 = 0x00000002    fp = 0x00000001
     sp = 0x470ffe10    pc = 0x4125fab3
    Found by: call frame info
 3  libxul.so!android::InputDevice::process [InputReader.cpp : 961 + 0x5]
     r4 = 0x45ac2e40    r5 = 0x45ac0480    r6 = 0x4197c9fe    r7 = 0x00000014
     r8 = 0x4197fce9    r9 = 0x00000002   r10 = 0x00000002    fp = 0x00000001
     sp = 0x470ffe20    pc = 0x41261ea9
    Found by: call frame info
 4  libxul.so!android::InputReader::processEventsForDeviceLocked [InputReader.cpp : 459 + 0x7]
     r4 = 0x45ac3080    r5 = 0x00000007    r6 = 0x45ac10c0    r7 = 0x00000100
     r8 = 0x0fffffff    r9 = 0x44b95de0   r10 = 0x00100000    fp = 0x00000001
     sp = 0x470ffe48    pc = 0x41261f11
    Found by: call frame info
 5  libxul.so!android::InputReader::processEventsLocked [InputReader.cpp : 321 + 0x9]
     r4 = 0x45ac10c0    r5 = 0x00000100    r6 = 0x00000100    r7 = 0x45ac1000
     r8 = 0x0fffffff    r9 = 0x44b95de0   r10 = 0x00100000    fp = 0x00000001
     sp = 0x470ffe68    pc = 0x41262ae9
    Found by: call frame info
 6  libxul.so!android::InputReader::loopOnce [InputReader.cpp : 283 + 0x9]
     r4 = 0x45ac1000    r5 = 0x45ac100c    r6 = 0xffffffff    r7 = 0x00000100
     r8 = 0x45ac10c0    r9 = 0x44b95de0   r10 = 0x00100000    fp = 0x00000001
     sp = 0x470ffe88    pc = 0x41262cfd
    Found by: call frame info
 7  libxul.so!android::InputReaderThread::threadLoop [InputReader.cpp : 838 + 0x5]
     r4 = 0x43c76f70    r5 = 0x43c76f70    r6 = 0x43c76f7c    r7 = 0x470ffeb4
     r8 = 0x470ffeb0    r9 = 0x44b95de0   r10 = 0x00100000    fp = 0x00000001
     sp = 0x470ffea0    pc = 0x412599d7
    Found by: call frame info
 8  libutils.so!android::Thread::_threadLoop [Threads.cpp : 834 + 0x5]
     r4 = 0x43c76f70    r5 = 0x43c76f70    r6 = 0x43c76f7c    r7 = 0x470ffeb4
     r8 = 0x470ffeb0    r9 = 0x44b95de0   r10 = 0x00100000    fp = 0x00000001
     sp = 0x470ffea8    pc = 0x4017ae59
    Found by: call frame info
 9  libutils.so!thread_data_t::trampoline [Threads.cpp : 127 + 0x3]
     r4 = 0x44b95df0    r5 = 0x4017ade5    r6 = 0x43c76f70    r7 = 0xfffffff8
     r8 = 0x4017b409    r9 = 0x44b95de0   r10 = 0x00100000    fp = 0x00000001
     sp = 0x470ffed0    pc = 0x4017b49f
    Found by: call frame info
10  libc.so!__thread_entry [pthread.c : 217 + 0x6]
     r4 = 0x470fff00    r5 = 0x4017b409    r6 = 0x44b95de0    r7 = 0x00000078
     r8 = 0x4017b409    r9 = 0x44b95de0   r10 = 0x00100000    fp = 0x00000001
     sp = 0x470ffef0    pc = 0x400cee18
    Found by: call frame info
11  libc.so!pthread_create [pthread.c : 357 + 0xe]
     r4 = 0x470fff00    r5 = 0x00fb26f8    r6 = 0xbedc63ec    r7 = 0x00000078
     r8 = 0x4017b409    r9 = 0x44b95de0   r10 = 0x00100000    fp = 0x00000001
     sp = 0x470fff00    pc = 0x400ce96c
    Found by: call frame info
(Reporter)

Comment 1

4 years ago
Created attachment 761852 [details]
unagi crash report

Updated

4 years ago
Status: UNCONFIRMED → RESOLVED
Last Resolved: 4 years ago
Resolution: --- → DUPLICATE
Duplicate of bug: 882539
You need to log in before you can comment on or make changes to this bug.