Closed Bug 1007828 Opened 11 years ago Closed 10 years ago

Intermittent test_bug879319.html | application crashed [@ xpc_IsGrayGCThing(void*)]

Categories

(Core :: XPCOM, defect)

ARM
Android
defect
Not set
normal

Tracking

()

RESOLVED DUPLICATE of bug 1064276

People

(Reporter: RyanVM, Unassigned)

References

Details

https://tbpl.mozilla.org/php/getParsedLog.php?id=39277166&tree=Mozilla-Central Android 4.0 Panda mozilla-central opt test mochitest-3 on 2014-05-08 06:21:28 PDT for push a8602e656d86 slave: panda-0405 06:34:53 INFO - 281 INFO TEST-START | /tests/content/html/content/test/test_bug879319.html 06:34:53 INFO - 282 INFO TEST-INFO | MEMORY STAT vsize after test: 816955392 06:34:53 INFO - 283 INFO TEST-INFO | MEMORY STAT residentFast after test: 195248128 06:34:53 INFO - 284 INFO TEST-INFO | MEMORY STAT heapAllocated after test: 30459860 06:34:53 INFO - 285 INFO TEST-END | /tests/content/html/content/test/test_bug879319.html | finished in 318ms 06:34:53 INFO - INFO | automation.py | Application ran for: 0:00:42.169235 06:34:53 INFO - INFO | zombiecheck | Reading PID log: /tmp/tmp6BYzTupidlog 06:34:53 INFO - Contents of /data/anr/traces.txt: 06:34:54 INFO - mozcrash INFO | Downloading symbols from: https://ftp-ssl.mozilla.org/pub/mozilla.org/mobile/tinderbox-builds/mozilla-central-android/1399550678/fennec-32.0a1.en-US.android-arm.crashreporter-symbols.zip 06:34:58 WARNING - PROCESS-CRASH | /tests/content/html/content/test/test_bug879319.html | application crashed [@ xpc_IsGrayGCThing(void*)] 06:34:58 INFO - Crash dump filename: /tmp/tmp_L1SgU/33707c8f-dcfa-b94c-46bf7931-2b2c2222.dmp 06:34:58 INFO - Operating system: Android 06:34:58 INFO - 0.0.0 Linux 3.2.0+ #2 SMP PREEMPT Thu Nov 29 08:06:57 EST 2012 armv7l pandaboard/pandaboard/pandaboard:4.0.4/IMM76I/5:eng/test-keys 06:34:58 INFO - CPU: arm 06:34:58 INFO - 2 CPUs 06:34:58 INFO - Crash reason: SIGSEGV 06:34:58 INFO - Crash address: 0xfc0a0 06:34:58 INFO - Thread 13 (crashed) 06:34:58 INFO - 0 libxul.so!xpc_IsGrayGCThing(void*) [HeapAPI.h:a8602e656d86 : 229 + 0x0] 06:34:58 INFO - r4 = 0x00000000 r5 = 0x5d47778c r6 = 0x00000001 r7 = 0x6ef79240 06:34:58 INFO - r8 = 0x00000000 r9 = 0x00000001 r10 = 0x00000000 fp = 0x0000000f 06:34:58 INFO - sp = 0x5d477710 lr = 0x62dbd81d pc = 0x62dbd60e 06:34:58 INFO - Found by: given as instruction pointer in context 06:34:58 INFO - 1 libxul.so!NoteJSChild [CycleCollectedJSRuntime.cpp:a8602e656d86 : 382 + 0x3] 06:34:58 INFO - r4 = 0x00000000 r5 = 0x5d47778c r6 = 0x00000001 r7 = 0x6ef79240 06:34:58 INFO - r8 = 0x00000000 r9 = 0x00000001 r10 = 0x00000000 fp = 0x0000000f 06:34:58 INFO - sp = 0x5d477710 pc = 0x62dbd81d 06:34:58 INFO - Found by: call frame info 06:34:58 INFO - 2 libxul.so!MarkInternal<JSObject> [Marking.cpp:a8602e656d86 : 241 + 0x3] 06:34:58 INFO - r4 = 0x5d47778c r5 = 0x00000001 r6 = 0x00000000 r7 = 0x6ef79240 06:34:58 INFO - r8 = 0x00000000 r9 = 0x00000001 r10 = 0x00000000 fp = 0x0000000f 06:34:58 INFO - sp = 0x5d477720 pc = 0x63b6a1d7 06:34:58 INFO - Found by: call frame info 06:34:58 INFO - 3 libxul.so!js::gc::MarkChildren [Marking.cpp:a8602e656d86 : 269 + 0x7] 06:34:58 INFO - r4 = 0x5d47778c r5 = 0xffffffff r6 = 0x00000000 r7 = 0x6ef79240 06:34:58 INFO - r8 = 0x00000000 r9 = 0x00000001 r10 = 0x00000000 fp = 0x0000000f 06:34:58 INFO - sp = 0x5d477730 pc = 0x63b6a3df 06:34:58 INFO - Found by: call frame info 06:34:58 INFO - 4 libxul.so!js::gc::MarkTypeObject(JSTracer*, js::BarrieredBase<js::types::TypeObject*>*, char const*) + 0x19 06:34:58 INFO - r4 = 0x5d47778c r5 = 0xffffffff r6 = 0x00000000 r7 = 0x5be74400 06:34:58 INFO - r8 = 0x00000001 r9 = 0x00000001 r10 = 0x00000000 fp = 0x0000000f 06:34:58 INFO - sp = 0x5d477768 pc = 0x63b69f1b 06:34:58 INFO - Found by: call frame info 06:34:58 INFO - 5 libxul.so!js::ObjectImpl::markChildren(JSTracer*) [ObjectImpl.cpp:a8602e656d86 : 367 + 0x7] 06:34:58 INFO - r4 = 0x6f09a7e0 r5 = 0x5d47778c r6 = 0x6f09a7e0 r7 = 0x5be74400 06:34:58 INFO - r8 = 0x00000001 r9 = 0x00000001 r10 = 0x00000000 fp = 0x0000000f 06:34:58 INFO - sp = 0x5d477778 pc = 0x63cf658b 06:34:58 INFO - Found by: call frame info
Blocks: 911246
Component: JavaScript: GC → XPCOM
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → DUPLICATE
You need to log in before you can comment on or make changes to this bug.