Closed Bug 987749 Opened 11 years ago Closed 10 years ago

Intermittent Android remoteautomation.py | application crashed [@ libmozglue.so + 0x104d0] on startup

Categories

(Core :: JavaScript Engine, defect)

ARM
Android
defect
Not set
critical

Tracking

()

RESOLVED DUPLICATE of bug 1125941

People

(Reporter: RyanVM, Unassigned)

Details

https://tbpl.mozilla.org/php/getParsedLog.php?id=36645881&tree=Mozilla-Inbound Android 4.0 Panda mozilla-inbound opt test mochitest-1 on 2014-03-24 23:23:42 PDT for push daada068c02f slave: panda-0147 23:34:33 INFO - runtests.py | Running tests: start. 23:34:35 INFO - INFO | automation.py | Application pid: 2228 23:34:55 INFO - INFO | automation.py | Application ran for: 0:00:22.088227 23:34:55 INFO - INFO | zombiecheck | Reading PID log: /tmp/tmpP1MPKEpidlog 23:34:55 INFO - /data/anr/traces.txt not found 23:34:55 INFO - mozcrash INFO | Downloading symbols from: https://ftp-ssl.mozilla.org/pub/mozilla.org/mobile/tinderbox-builds/mozilla-inbound-android/1395726101/fennec-31.0a1.en-US.android-arm.crashreporter-symbols.zip 23:35:00 WARNING - PROCESS-CRASH | remoteautomation.py | application crashed [@ libmozglue.so + 0x104d0] 23:35:00 INFO - Crash dump filename: /tmp/tmpex4xzy/3e03c7d3-807b-b3e1-45eef271-26f580b0.dmp 23:35:00 INFO - Operating system: Android 23:35:00 INFO - 0.0.0 Linux 3.2.0+ #2 SMP PREEMPT Thu Nov 29 08:06:57 EST 2012 armv7l pandaboard/pandaboard/pandaboard:4.0.4/IMM76I/5:eng/test-keys 23:35:00 INFO - CPU: arm 23:35:00 INFO - 2 CPUs 23:35:00 INFO - Crash reason: SIGILL 23:35:00 INFO - Crash address: 0x5bc374cc 23:35:00 INFO - Thread 13 (crashed) 23:35:00 INFO - 0 libmozglue.so + 0x104d0 23:35:00 INFO - r4 = 0x000000a0 r5 = 0xc8156926 r6 = 0x000003eb r7 = 0x6b8a3809 23:35:00 INFO - r8 = 0x9e3779b9 r9 = 0x000003e8 r10 = 0x6b8a3809 fp = 0x66707190 23:35:00 INFO - sp = 0x5d447780 lr = 0x5bc4f323 pc = 0x5bc374d0 23:35:00 INFO - Found by: given as instruction pointer in context 23:35:00 INFO - 1 libxul.so!SaveSharedScriptData [jsscript.h:daada068c02f : 1896 + 0x3] 23:35:00 INFO - sp = 0x5d4477a8 pc = 0x63c8facd 23:35:00 INFO - Found by: stack scanning 23:35:00 INFO - 2 libxul.so!JSScript::fullyInitFromEmitter(js::ExclusiveContext*, JS::Handle<JSScript*>, js::frontend::BytecodeEmitter*) [jsscript.cpp:daada068c02f : 2400 + 0x9] 23:35:00 INFO - r4 = 0x5d4478f8 r5 = 0x5d447900 r6 = 0x66707190 r7 = 0x6b8a3800 23:35:00 INFO - r8 = 0x000000da r9 = 0x6b8a3800 r10 = 0x000002ae fp = 0x0000003a 23:35:00 INFO - sp = 0x5d4477f8 pc = 0x63c8fde9 23:35:00 INFO - Found by: call frame info 23:35:00 INFO - 3 libxul.so!js::frontend::EmitFunctionScript(js::ExclusiveContext*, js::frontend::BytecodeEmitter*, js::frontend::ParseNode*) [BytecodeEmitter.cpp:daada068c02f : 2944 + 0xb] 23:35:00 INFO - r4 = 0x5d4478f8 r5 = 0x66707190 r6 = 0x5d447844 r7 = 0x668a77d0 23:35:00 INFO - r8 = 0x00000000 r9 = 0x66707190 r10 = 0x0000001b fp = 0x5d447b7c 23:35:00 INFO - sp = 0x5d447838 pc = 0x63b38365 23:35:00 INFO - Found by: call frame info 23:35:00 INFO - 4 libxul.so!EmitFunc [BytecodeEmitter.cpp:daada068c02f : 4926 + 0x9] 23:35:00 INFO - r4 = 0x5d448058 r5 = 0x00000001 r6 = 0x668a7768 r7 = 0x5d4478a4 23:35:00 INFO - r8 = 0x668a7790 r9 = 0x66707190 r10 = 0x0000001b fp = 0x5d447b7c 23:35:00 INFO - sp = 0x5d447878 pc = 0x63b38743 23:35:00 INFO - Found by: call frame info 23:35:00 INFO - 5 libxul.so!js::frontend::EmitTree [BytecodeEmitter.cpp:daada068c02f : 6195 + 0x9] 23:35:00 INFO - r4 = 0x5d448058 r5 = 0x668a7768 r6 = 0x66707190 r7 = 0x64438ee4 23:35:00 INFO - r8 = 0x0000027f r9 = 0x00000000 r10 = 0x0000001b fp = 0x5d447b7c 23:35:00 INFO - sp = 0x5d447a40 pc = 0x63b33d05 23:35:00 INFO - Found by: call frame info
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → DUPLICATE
You need to log in before you can comment on or make changes to this bug.