Closed Bug 631776 Opened 14 years ago Closed 14 years ago

"Assertion failure: script->main <= target && target < script->code + script->length," with xpcshell

Categories

(Core :: JavaScript Engine, defect)

x86_64
Linux
defect
Not set
critical

Tracking

()

RESOLVED DUPLICATE of bug 621432
Tracking Status
blocking2.0 --- final+

People

(Reporter: gkw, Assigned: Waldo)

References

Details

(Keywords: assertion, regression, testcase, Whiteboard: softblocker)

Attachments

(1 file)

Attached file stack (deleted) —
function a(code) { Components.utils.evalInSandbox(code, c) } function b() { return Components.utils.Sandbox("p:") } c = b() a("var c;this.watch(\"c\",Array.reduce)") a("function c(){}") asserts debug xpcshell on TM changeset 641a33d0932f without -m nor -j at Assertion failure: script->main <= target && target < script->code + script->length, tested on Ubuntu Linux 10.04 64-bit debug xpcshell.
blocking2.0: ? → final+
Whiteboard: softblocker
Does this reproduce with bug 621432's patch applied? Looks to me like it shouldn't, at a glance.
Assignee: general → jwalden+bmo
Doesn't reproduce with TM tip, strongly suspect it was bug 621432, optimistically marking as dup without precisely verifying.
Status: NEW → RESOLVED
Closed: 14 years ago
Resolution: --- → DUPLICATE
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: