Intermittent PROCESS-CRASH | string-literal-escape-sequences.js | application crashed [@ libxul.so + 0xeb9378]

RESOLVED WORKSFORME

Status

()

Core
JavaScript Engine
RESOLVED WORKSFORME
5 years ago
3 years ago

People

(Reporter: KWierso, Unassigned)

Tracking

({crash, intermittent-failure})

Trunk
x86_64
Windows 8.1
crash, intermittent-failure
Points:
---

Firefox Tracking Flags

(Not tracked)

Details

(crash signature)

(Reporter)

Description

5 years ago
https://tbpl.mozilla.org/php/getParsedLog.php?id=34243806&tree=Mozilla-Inbound
slave: panda-0844



15:29:49     INFO -  REFTEST TEST-PASS | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/object-literal-accessor-property-name.js |   item 1
15:29:49     INFO -  REFTEST INFO | Loading a blank page
15:29:49     INFO -  REFTEST TEST-END | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/object-literal-accessor-property-name.js
15:29:49     INFO -  REFTEST TEST-START | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/primitive-this-boxing-behavior.js
15:29:49     INFO -  REFTEST TEST-LOAD | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/primitive-this-boxing-behavior.js | 1073 / 2108 (50%)
15:29:49     INFO -  REFTEST TEST-PASS | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/primitive-this-boxing-behavior.js |   item 1
15:29:49     INFO -  REFTEST INFO | Loading a blank page
15:29:49     INFO -  REFTEST TEST-END | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/primitive-this-boxing-behavior.js
15:29:49     INFO -  REFTEST TEST-START | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/string-literal-escape-sequences.js
15:29:49     INFO -  REFTEST TEST-LOAD | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/string-literal-escape-sequences.js | 1074 / 2108 (50%)
15:29:49     INFO -  INFO | automation.py | Application ran for: 0:10:16.069760
15:29:49     INFO -  INFO | zombiecheck | Reading PID log: /tmp/tmp439hzkpidlog
15:29:49     INFO -  /data/anr/traces.txt not found
15:29:50     INFO -  mozcrash INFO | Downloading symbols from: https://ftp-ssl.mozilla.org/pub/mozilla.org/mobile/tinderbox-builds/mozilla-inbound-android/1391724545/fennec-30.0a1.en-US.android-arm.crashreporter-symbols.zip
15:29:55  WARNING -  PROCESS-CRASH | http://10.12.136.21:30844/jsreftest/tests/jsreftest.html?test=ecma_5/Expressions/string-literal-escape-sequences.js | application crashed [@ libxul.so + 0xeb9378]
15:29:55     INFO -  Crash dump filename: /tmp/tmp7dlSgK/60ad1970-e1ef-a7be-5298d072-1342784c.dmp
15:29:55     INFO -  Operating system: Android
15:29:55     INFO -                    0.0.0 Linux 3.2.0+ #2 SMP PREEMPT Thu Nov 29 08:06:57 EST 2012 armv7l pandaboard/pandaboard/pandaboard:4.0.4/IMM76I/5:eng/test-keys
15:29:55     INFO -  CPU: arm
15:29:55     INFO -       2 CPUs
15:29:55     INFO -  Crash reason:  SIGBUS
15:29:55     INFO -  Crash address: 0x6e06c000
15:29:55     INFO -  Thread 13 (crashed)
15:29:55     INFO -   0  libxul.so + 0xeb9378
15:29:55     INFO -       r4 = 0x6fc51820    r5 = 0x00000320    r6 = 0x6e06c000    r7 = 0x00000100
15:29:55     INFO -       r8 = 0x000000ff    r9 = 0x000004f0   r10 = 0x00000058    fp = 0x6fc51800
15:29:55     INFO -       sp = 0x5d41d580    lr = 0x6fbc8000    pc = 0x6380c378
15:29:55     INFO -      Found by: given as instruction pointer in context
15:29:55     INFO -   1  libxul.so!neon_composite_src_8888_8888 [pixman-arm-neon.c:810ff6004dcf : 37 + 0x5]
15:29:55     INFO -       sp = 0x5d41d5a8    pc = 0x637c672b
15:29:55     INFO -      Found by: stack scanning
Inactive; closing (see bug 1180138).
Status: NEW → RESOLVED
Last Resolved: 3 years ago
Resolution: --- → WORKSFORME
You need to log in before you can comment on or make changes to this bug.