Closed
Bug 980620
Opened 11 years ago
Closed 11 years ago
Intermittent test_flexbox_order_table.html | application crashed [@ libc-2.15.so + 0xe8403], inside of cairo's _get_image_surface, which is inside of nsDOMWindowUtils::CompareCanvases()
Categories
(Core :: Graphics, defect)
Tracking
()
RESOLVED
WORKSFORME
People
(Reporter: KWierso, Unassigned)
Details
(Keywords: intermittent-failure)
Crash Data
Attachments
(1 file)
|
198.30 KB,
text/plain
|
Details |
https://tbpl.mozilla.org/php/getParsedLog.php?id=35747128&tree=Fx-Team
slave: tst-linux64-spot-403
13:49:02 INFO - 11104 INFO TEST-END | /tests/layout/style/test/test_flexbox_layout.html | finished in 340ms
13:49:02 INFO - 11105 INFO TEST-START | /tests/layout/style/test/test_flexbox_order.html
13:49:02 INFO - 11106 INFO TEST-INFO | MEMORY STAT vsize after test: 942587904
13:49:02 INFO - 11107 INFO TEST-INFO | MEMORY STAT residentFast after test: 193191936
13:49:02 INFO - 11108 INFO TEST-INFO | MEMORY STAT heapAllocated after test: 67179392
13:49:02 INFO - 11109 INFO TEST-END | /tests/layout/style/test/test_flexbox_order.html | finished in 397ms
13:49:02 INFO - 11110 INFO TEST-START | /tests/layout/style/test/test_flexbox_order_table.html
13:54:32 WARNING - TEST-UNEXPECTED-FAIL | /tests/layout/style/test/test_flexbox_order_table.html | application timed out after 330 seconds with no output
13:54:32 INFO - Xlib: extension "RANDR" missing on display ":0".
13:54:34 WARNING - TEST-UNEXPECTED-FAIL | /tests/layout/style/test/test_flexbox_order_table.html | application terminated with exit code 6
13:54:34 INFO - INFO | runtests.py | Application ran for: 0:20:47.901986
13:54:34 INFO - INFO | zombiecheck | Reading PID log: /tmp/tmpZnO0Cppidlog
13:54:34 INFO - ==> process 2375 launched child process 2414
13:54:34 INFO - ==> process 2375 launched child process 2440
13:54:34 INFO - ==> process 2375 launched child process 2875
13:54:34 INFO - ==> process 2375 launched child process 2877
13:54:34 INFO - ==> process 2375 launched child process 2907
13:54:34 INFO - INFO | zombiecheck | Checking for orphan process with PID: 2414
13:54:34 INFO - INFO | zombiecheck | Checking for orphan process with PID: 2440
13:54:34 INFO - INFO | zombiecheck | Checking for orphan process with PID: 2875
13:54:34 INFO - INFO | zombiecheck | Checking for orphan process with PID: 2877
13:54:34 INFO - INFO | zombiecheck | Checking for orphan process with PID: 2907
13:54:34 INFO - mozcrash INFO | Downloading symbols from: https://ftp-ssl.mozilla.org/pub/mozilla.org/b2g/tinderbox-builds/fx-team-linux64_gecko/1394132275/en-US/b2g-30.0a1.en-US.linux-x86_64.crashreporter-symbols.zip
13:54:43 WARNING - PROCESS-CRASH | /tests/layout/style/test/test_flexbox_order_table.html | application crashed [@ libc-2.15.so + 0xe8403]
13:54:43 INFO - Crash dump filename: /tmp/tmpWFt8VA/minidumps/5798a2dd-8290-3f64-001e5c2b-454bb211.dmp
13:54:43 INFO - Operating system: Linux
13:54:43 INFO - 0.0.0 Linux 3.2.0-23-generic #36-Ubuntu SMP Tue Apr 10 20:39:51 UTC 2012 x86_64
13:54:43 INFO - CPU: amd64
13:54:43 INFO - family 6 model 45 stepping 7
13:54:43 INFO - 1 CPU
13:54:43 INFO - Crash reason: SIGABRT
13:54:43 INFO - Crash address: 0x3e80000091d
13:54:43 INFO - Thread 0 (crashed)
13:54:43 INFO - 0 libc-2.15.so + 0xe8403
13:54:43 INFO - rbx = 0x00007f6d637e6000 r12 = 0x0000000000000000
13:54:43 INFO - r13 = 0x00007f6d637e6018 r14 = 0x00000000ffffffff
13:54:43 INFO - r15 = 0x0000000000000000 rip = 0x00007f6d63933403
13:54:43 INFO - rsp = 0x00007fff09037500 rbp = 0x0000000000000000
13:54:43 INFO - Found by: given as instruction pointer in context
Comment 1•11 years ago
|
||
Here's the relevant part of the log (from the test starting to the end of the log), for posterity's sake.
Comment 2•11 years ago
|
||
This looks like a cairo bug, or something lower-level than Gecko at least.
The testcase uses nsDOMWindowUtils::CompareCanvases() to compare a test rendering against a reference rendering, and we're crashing *inside* of that CompareCanvases call (in Cairo code, at _get_image_surface [cairo-xlib-surface.c:fb4b2b7e2a2d : 855 + 0x45])
Here's an even-more-pruned snippet of the log's backtrace:
{
13:54:43 INFO - 7 libxul.so!InstallSignalHandlers(char const*) [nsSigHandlers.cpp:fb4b2b7e2a2d : 307 + 0x8]
13:54:43 INFO - rip = 0x00007f6d613f60b1 rsp = 0x00007fff090376f0
13:54:43 INFO - Found by: stack scanning
13:54:43 INFO - 8 0x7fff0903794f
13:54:43 INFO - rbx = 0x00007f6d613f60b1 rip = 0x00007fff09037950
13:54:43 INFO - rsp = 0x00007fff090376f8
13:54:43 INFO - Found by: call frame info
13:54:43 INFO - 9 libxul.so!_get_image_surface [cairo-xlib-surface.c:fb4b2b7e2a2d : 855 + 0x45]
13:54:43 INFO - rip = 0x00007f6d6156d0ae rsp = 0x00007fff09037720
13:54:43 INFO - Found by: stack scanning
13:54:43 INFO - 10 libxul.so!_cairo_xlib_surface_acquire_source_image [cairo-xlib-surface.c:fb4b2b7e2a2d : 1390 + 0x9]
13:54:43 INFO - rbx = 0x00007fff09037958 r12 = 0x0000000000000000
13:54:43 INFO - r13 = 0x0000000000000000 r14 = 0x0000000000000000
13:54:43 INFO - r15 = 0x0000000000000000 rip = 0x00007f6d6156d921
13:54:43 INFO - rsp = 0x00007fff09037840 rbp = 0x00007fff09037950
13:54:43 INFO - Found by: call frame info
13:54:43 INFO - 11 libxul.so!_cairo_surface_acquire_source_image [cairo-surface.c:fb4b2b7e2a2d : 1452 + 0x1]
13:54:43 INFO - rbx = 0x00007f6d3a0c4000 r12 = 0x0000000000000000
13:54:43 INFO - r13 = 0x0000000000000000 r14 = 0x0000000000000000
13:54:43 INFO - r15 = 0x0000000000000000 rip = 0x00007f6d6159b1b8
13:54:43 INFO - rsp = 0x00007fff09037870 rbp = 0x00007fff09037950
13:54:43 INFO - Found by: call frame info
13:54:43 INFO - 12 libxul.so!_pixman_image_for_pattern [cairo-image-surface.c:fb4b2b7e2a2d : 1484 + 0x4]
13:54:43 INFO - rbx = 0x00007fff090380b8 r12 = 0x0000000000000000
13:54:43 INFO - r13 = 0x0000000000000000 r14 = 0x0000000000000000
13:54:43 INFO - r15 = 0x0000000000000000 rip = 0x00007f6d6158253b
13:54:43 INFO - rsp = 0x00007fff090378e0 rbp = 0x00007fff09037bbc
13:54:43 INFO - Found by: call frame info
13:54:43 INFO - 13 libxul.so!_clip_and_composite_boxes [cairo-image-surface.c:fb4b2b7e2a2d : 2998 + 0x1d]
13:54:43 INFO - rbx = 0x00007f6d30a6d540 r12 = 0x00007fff09037de0
13:54:43 INFO - r13 = 0x00007fff09037b9c r14 = 0x00007fff090380b8
13:54:43 INFO - r15 = 0x00007fff090380b8 rip = 0x00007f6d6158497a
13:54:43 INFO - rsp = 0x00007fff09037a70 rbp = 0x0000000000000002
13:54:43 INFO - Found by: call frame info
13:54:43 INFO - 14 libxul.so!_cairo_image_surface_paint [cairo-image-surface.c:fb4b2b7e2a2d : 3307 + 0x25]
13:54:43 INFO - rbx = 0x00007f6d30a6d540 r12 = 0x00007fff090380b8
13:54:43 INFO - r13 = 0x0000000000000000 r14 = 0x0000000000000000
13:54:43 INFO - r15 = 0x0000000000000003 rip = 0x00007f6d615853ac
13:54:43 INFO - rsp = 0x00007fff09037b40 rbp = 0x0000000000000002
13:54:43 INFO - Found by: call frame info
13:54:43 INFO - 15 libxul.so!_cairo_surface_paint [cairo-surface.c:fb4b2b7e2a2d : 2109 + 0xc]
13:54:43 INFO - rbx = 0x00007f6d30a6d540 r12 = 0x0000000000000000
13:54:43 INFO - r13 = 0x00007fff090380b8 r14 = 0x00007fff09038510
13:54:43 INFO - r15 = 0x0000000000000003 rip = 0x00007f6d6159b69f
13:54:43 INFO - rsp = 0x00007fff09038060 rbp = 0x0000000000000002
13:54:43 INFO - Found by: call frame info
13:54:43 INFO - 16 libxul.so!_cairo_gstate_paint [cairo-gstate.c:fb4b2b7e2a2d : 1049 + 0x24]
13:54:43 INFO - rbx = 0x00007f6d2e325030 r12 = 0x00007fff090380b8
13:54:43 INFO - r13 = 0x00007f6d2e325000 r14 = 0x00007fff09038510
13:54:43 INFO - r15 = 0x0000000000000003 rip = 0x00007f6d6157f05d
13:54:43 INFO - rsp = 0x00007fff09038090 rbp = 0x0000000000000002
13:54:43 INFO - Found by: call frame info
13:54:43 INFO - 17 libxul.so!_moz_cairo_paint [cairo.c:fb4b2b7e2a2d : 2243 + 0x8]
13:54:43 INFO - rbx = 0x00007f6d2e325000 r12 = 0x00007fff090382d8
13:54:43 INFO - r13 = 0x00007f6d2e325000 r14 = 0x00007fff09038510
13:54:43 INFO - r15 = 0x0000000000000003 rip = 0x00007f6d615a27bd
13:54:43 INFO - rsp = 0x00007fff090381d0 rbp = 0x00007f6d30a6d540
13:54:43 INFO - Found by: call frame info
13:54:43 INFO - 18 libxul.so!mozilla::gfx::SourceSurfaceCairo::GetDataSurface() [SourceSurfaceCairo.cpp:fb4b2b7e2a2d : 75 + 0x7]
13:54:43 INFO - rbx = 0x00007f6d2df294f0 r12 = 0x00007fff090382d8
13:54:43 INFO - r13 = 0x00007f6d2e325000 r14 = 0x00007fff09038510
13:54:43 INFO - r15 = 0x0000000000000003 rip = 0x00007f6d607f0735
13:54:43 INFO - rsp = 0x00007fff090381e0 rbp = 0x00007f6d30a6d540
13:54:43 INFO - Found by: call frame info
13:54:43 INFO - 19 libxul.so!CanvasToDataSourceSurface [nsDOMWindowUtils.cpp:fb4b2b7e2a2d : 1551 + 0x8]
13:54:43 INFO - rbx = 0x00007fff090382d8 r12 = 0x0000000080004005
13:54:43 INFO - r13 = 0x00007f6d2e541eb8 r14 = 0x00007fff09038510
13:54:43 INFO - r15 = 0x0000000000000003 rip = 0x00007f6d60c59287
13:54:43 INFO - rsp = 0x00007fff09038220 rbp = 0x00007fff09038510
13:54:43 INFO - Found by: call frame info
13:54:43 INFO - 20 libxul.so!nsDOMWindowUtils::CompareCanvases(nsIDOMHTMLCanvasElement*, nsIDOMHTMLCanvasElement*, unsigned int*, unsigned int*) [nsDOMWindowUtils.cpp:fb4b2b7e2a2d : 1569 + 0x9]
}
(InstallSignalHandlers is the crash-handling code, presumably; I think we can ignore everything inside of that (stack-levels 1 through 6). This is why the snippet above only goes that deep.)
Summary: Intermittent test_flexbox_order_table.html | application crashed [@ libc-2.15.so + 0xe8403] → Intermittent test_flexbox_order_table.html | application crashed [@ libc-2.15.so + 0xe8403], inside of cairo's _get_image_surface, which is inside of nsDOMWindowUtils::CompareCanvases()
Comment 3•11 years ago
|
||
Moving to Graphics, since (per previous comment) this looks like a crash in cairo code, during a CompareCanvases() operation.
Component: Layout → Graphics
| Comment hidden (Legacy TBPL/Treeherder Robot) |
Comment 5•11 years ago
|
||
Comment 6•11 years ago
|
||
Yes, it was.
Comment 7•11 years ago
|
||
Closing bugs where TBPLbot has previously commented, but have now not been modified for >3 months & do not contain the whiteboard strings for disabled/annotated tests or use the keyword leave-open. Filter on: mass-intermittent-bug-closure-2014-07
Status: NEW → RESOLVED
Closed: 11 years ago
Resolution: --- → WORKSFORME
You need to log in
before you can comment on or make changes to this bug.
Description
•