Closed Bug 34834 Opened 24 years ago Closed 24 years ago

runaway psm

Categories

(Core :: Security: PSM, defect, P3)

1.0 Branch
x86
Linux
defect

Tracking

()

VERIFIED FIXED

People

(Reporter: ben, Assigned: leaf)

References

Details

(Whiteboard: DO NOT REOPEN)

Attachments

(3 files)

After browsing https documents for a while. PSM runs away and begins eating all
the CPU. The only way to fix it is to close the browser.
ben@valinux.com, when posting a bug please include build number and other 
details to help develpers.

I have seen a few checkin's to improve Mozilla with PSM.  Could be related.
Please follow up so we can direct approperly.  
reporter - are you stills seeing this?
yes
Here is something that I just discovered. This problem doesn't occur when I am

connected to a fast network. Normally, I am connected with a ricochet which is

26Kbs and it happens all the time. However, when I am in the office and

connected via ethernet it never occurs.

->Security
Assignee: asadotzler → norris
Component: Browser-General → Security: General
QA Contact: jelwell → junruh
psm
Assignee: norris → dougt
Component: Security: General → Security: Crypto
Change product to PSM

Component: Security: Crypto → Daemon
Product: Browser → PSM
Version: other → 1.01
ben@valinux.com - are you still seeing this problem with recent builds of 
Mozilla? If so, could you add a comment giving the Build ID of the version you 
tested with, and the version of the PSM, and we'll get this bug confirmed.

Gerv
tested on M16 2000-052408 Linux:
After having visited a site using SSL triggering the PSM module, and then having
left it, i realized things was going slower and slower and Moz barely reacting
anymore. Checked a ps -ef: There were 15 instances of ./psm running.
A quick "top" revealed this (excerpt):

1039 dark      17   0 34084  33M 12388 R       0 15.6 35.6   4:11 mozilla-bin
1064 dark      20   0  3204 3204  1540 R       0 14.3  3.3   1:00 psm
1115 dark      19   0  1044 1044   844 R       0 11.5  1.0   0:00 top
1061 dark      18   0  3204 3204  1540 R       0 10.9  3.3   1:17 psm
1062 dark      18   0  3204 3204  1540 R       0 10.9  3.3   1:00 psm
1063 dark      18   0  3204 3204  1540 R       0 10.9  3.3   1:00 psm
1066 dark      18   0  3204 3204  1540 R       0 10.9  3.3   1:00 psm
1069 dark      18   0  3204 3204  1540 R       0 10.2  3.3   1:00 psm
1067 dark      18   0  3204 3204  1540 R       0  8.8  3.3   1:00 psm
1068 dark      19   0  3204 3204  1540 R       0  5.4  3.3   0:45 psm
I am pretty sure that these are just threads in the PSM process.  
loaded the page again and left it - you're right.. it spawn 15 threads right
away. But it never terminates them. They keep hanging in using heaps of CPU.
The problem isn't with the fact that there are lots of threads. The problem is

that combined the 15 or so threads bring your machine to a crawl.

setting to New
Status: UNCONFIRMED → NEW
Ever confirmed: true
*** Bug 32605 has been marked as a duplicate of this bug. ***
Reassigning all https/cartman/security bugs to valeski.  He will be finding new 
owner(s).  This shift is so that I can focus on embedding issues.  If the new 
owner has questions that can not be resovled, I may be able to lend a (quick) 
hand.

over to valeski....
Assignee: dougt → valeski
Target Milestone: --- → M17
Version: 1.01 → 1.2
*** Bug 35699 has been marked as a duplicate of this bug. ***
*** Bug 41205 has been marked as a duplicate of this bug. ***
be sure that you have the correct version of PSM.  search your disk for any 
other version of psm and delete them.

reassign this one to lord
Assignee: valeski → lord
Status: NEW → RESOLVED
Closed: 24 years ago
Resolution: --- → WORKSFORME
Worksforme. I've never seen this happen, or had a problem with the machine 
slowing down when psm is a process.
The last time I saw this was last week.  I should point out that this does not
happen all the time (even on the same site), so perhaps it is still present. 
Comments from anyone?
I remember seeing this happen before and I believe it was caused by psm leaving 
phantom processing when psm disappeared unexpectedly.  (That's a nice way of 
saying "psm crashed")
I am still seeing this on 2000072905 on Linux.  Whenever I go to
https://webbanking.tdaccess.com/, login, and then logout, I get PSM
threads/processes that takes up all my CPU time.
Status: RESOLVED → REOPENED
Resolution: WORKSFORME → ---
This definitely occurs in M17.
debian woody
kernel 2.2.17p15
It's so bad that I'll end up with 70+ psm processes and I can't do much
debugging as I can fork any more processes.
Changing milestone to future.
Assignee: lord → ddrinan
Severity: normal → enhancement
Status: REOPENED → NEW
Target Milestone: M17 → M20
I can reproduce this quite well now, and I have some additional info that may be
of some use.  I am definitely changing the severity of this bug from "enhancement".

1. Go to https://tdaccess.tdbank.ca/  Notice that there is a Javascript "bug"
(see bug 45099).
2. Now browse other non-secure sites.  Eventually, you will see a bunch of psm
threads taking up all the CPUs.  You may have to do quite a bit of surfing, but
it has always shown up eventually.

When I did "top", I see the following:

  PID USER     PRI  NI  SIZE  RSS SHARE STAT  LIB %CPU %MEM   TIME COMMAND

14963 howard    15   0  4508 4508  2252 R       0 15.1  3.5   0:06 psm
14959 howard    15   0  4508 4508  2252 R       0 14.9  3.5   0:01 psm
14965 howard    15   0  4508 4508  2252 R       0 14.9  3.5   0:06 psm
14960 howard    15   0  4508 4508  2252 R       0 14.5  3.5   0:06 psm
14962 howard    15   0  4508 4508  2252 R       0 14.5  3.5   0:06 psm
14961 howard    15   0  4508 4508  2252 R       0 14.3  3.5   0:06 psm

I then attached gdb to some of these processes.  They all look like the following:

(gdb) where
#0  0x401535bb in __pthread_mutex_trylock (mutex=0x82d348c) at spinlock.h:24
#1  0x40037567 in PR_EnterMonitor ()
   from /home/howard/mozilla/nightly/package/psm/./libnspr4.so
#2  0x8083149 in SSL_DataPending ()
#3  0x8084f43 in ssl_Poll ()
#4  0x4003a3f5 in PR_Poll ()
   from /home/howard/mozilla/nightly/package/psm/./libnspr4.so
#5  0x805b163 in SSM_SSLDataServiceThread ()
#6  0x4003b66e in _pt_root ()
   from /home/howard/mozilla/nightly/package/psm/./libnspr4.so
#7  0x40152b85 in pthread_start_thread (arg=0xbe1ffe40) at manager.c:241
Severity: enhancement → major
This still happens (PSM 1.2, Linux nightly 2000090621). To me it happens
everytime when I go to a SSL site using proxy. When I go to SSL site on our
Intranet, it doesn't happen.
still happens; linux, build 2000090821, psm 1.2.  not using proxy, just internet
dial-up.  access my.sun.com and login to email.  18 psm threads running, the
last one ran (highest pid) is sucking all the cpu.
*** Bug 47130 has been marked as a duplicate of this bug. ***
*** Bug 55038 has been marked as a duplicate of this bug. ***
Changing QA contact to nitinp
QA Contact: junruh → nitinp
I think I'm seeing exactly this with BuildID 2000100621.

After getting cablemodem I've been able to get nightlies. Those of 30th Sept
2000 and 3rd October wouldn't install PSM at all. I was about to file this
when the 6th Oct nightly appeared to install it successfully. Except that as
soon as I tested it, I found www.fortify.net was adamant that I had no
encryption, and PSM started showing up in top just as it did in the top excerpt
from RK AA. Lots of psm processes (threads, whatever), each using about 10% of
CPU time. The only way to stop this is to kill off Mozilla. Waah.

What more information do you need? I wasn't sure. This is a K6 with 64Mb of RAM
running Linux.
Many people have mentioned this to me when using debian's M17 then installing
the official PSM. I still see this on recent builds on linux (both "official"
nightlyies and custom builds)
Well, here my tale of woe with PSM.  I have seen the problem with PSM taking up
100% of the CPU quite a few times now, but what I see even more is PSM creating
hundreds of threads none of which ever terminate.  On secure site I use is Green
Mountain Energy, http://www.greenmountain.com .  Their secure pages have
menu-like constructs which are image links with onMouseOver and onMouseOut
handlers to display a highlighted image and then replace with the standard image
again. Every time I move the mouse over one of these links and trigger the
handlers, PSM creates another one or two threads.  If I reload the page, PSM
creates another 52 (52!) threads.  I can get hundreds of PSM threads with only
loading a few of the secure pages and moving the mouse over links.  As I
continue causing PSM to create new threads, it will eventually start taking 100%
of the CPU though it seems that only 2 out of the hundreds of threads are
actually taking up the time.  Also, PSM seems to be spending most of its time in
system calls rather than in user code.  I get similar results viewing secure
pages on other sites.  It used to work ok but seems to have busted about the
time PSM 1.3 came out.

I hope this is fixed before rtm, otherwise it will not be possible to say that
NS6 supports SSL on Linux.

Tested with Mozilla 101008, trunk build, with PSM 1.3 on Linux.
I'm currently investigating this problem. Apart from the sites mentioned in the 
bug report already (https://webbanking.tdaccess.com/ and 
http://www.greenmountain.com) are there other SSL sites where this is a problem. 
I'm trying to see if there is some common link between these sites.
I have similar problems with http://www.netflix.com
I have psm 1.3 installed after compiling M18's source. 
If psm is launched from command line, without running Mozilla, it consumes >90% 
CPU immediately.
I've also seen this before. I don't log onto SSL sites often, however, so it's
been a while since I've seen it.
I think I've seen it mostly at http://www.amazon.com and at some internal
company sites where I work (inaccessible from offsite).
When it happens, switching virtual desktops under E will suddenly slow down
noticeably and looking at top will show psm taking up a lot of cpu resources
(usually between 60-90% on my PIII 500). Running `killall psm` usually fixes the
problem.
It's really bad bug. I think its source of my problem, that PSM 1.3 doesn't work
for me at all. When I open a site where the certificate is not signed by some
stored root certificate (for example: https://ca.ica.cz/) The PSM's window with
a message about it appears, but when I click to Next button, the buttons
disappear and nothing else happens (Linux 2000101521). There are at least 7 psm
threads/processes in background one of them consuming about 2% CPU. When I close
the window using close from windowmanager there appears a new window about
accepting the certificate, but again nothing happens when I click to Finish button.

So the PSM seems to be completely unusable to me.
*** Bug 56904 has been marked as a duplicate of this bug. ***
rtm. This happened to me, and I had to reboot the Linux server to get rid of 
dozens of psm processes.
Keywords: rtm
Re-assigning this bug to Javier. He is going to run psm in a debugger and see 
why these threads are not be cleaned up.
Assignee: ddrinan → javi
In order to make debugging this easier,I took a really long function and with 
the magic of cut and paste, made it into many smaller functions.  Should make 
debugging this much easier.
The thread that polls socket for data had a block that checked the number of 
sockets waiting for data only exited the thread when number of sockets ready was 
less than zero.

By modifying the following line:
http://lxr.mozilla.org/mozilla/source/security/psm/server/sslconn.c#1107

to read 

if (nReady <= 0) {

then the threads appear to properly clean up after themselves.  This may be the 
fix, but it needs some more testing before I can officially declare it the fix.
Checked in a fix to the tip of the PSM tree that appears to fix the problem.
For an RTM eval for Netscape 6, we need to understand what tag we're pulling for
PSM, and what set of tests have been run.

Can you comment on the pros and cons of advancing a tag to get this checkin (or
am I confused about how Netscape 6 is pulling PSM?).

Thanks,
Jim
Netscape6 bundles an xpi file that was generated off a tag.

This check-in is to help with embedding projects that see their systems slow to 
a crawl after extended use of psm.

For Netscape6 to pick this up, we'd have to re-spin the xpi and then have leaf 
incorporate that xpi into the daily builds.
status: [rtm need info]
Whiteboard: [rtm need info]
We made some more changes for this, and we now appear to have fixed the problem.  
The code is checked into PSM's tree.  If Netscape6 wants to pick this up, we'll 
need to do a new drop of PSM.
The following patch, when applied to the psm daemon, fixes this problem.  We 
have tested this patch with a 3rd party vendor implementing a set top box and 
they confirmed PSM no longer eats up system resources.

(The reason the diff is so big is because I took a very long function and create 
several smaller functions by cutting old sections and making them new functions.  
Makes the function much easier to read and debug in the future.)

PSM team believes this is a re-spin bug.
Fix is good. r=ddrinan.
Adding more description about the diff for super reviewer's sake:

There are 4 changes that went into the diff to fix this bug:

1) When polling the sockets from the client (mozilla) and the SSL server, we 
break out of the poll loop if the number of sockets waiting for data is equal to 
0.  That's the PR_Poll you see around the "@@ -1084,27 +1259,12 @@" block.

2)Break the function SSM_SSLDataServiceThread into smaller functions to improve 
readability and make debugging much easier.  This created the functions 
SSM_SSLThreadMakeConnectionSSL, SSM_SSLThreadReadFromServer, and 
SSM_SSLThreadReadFromClient.  These functions were created by cutting a piece of 
code out of SSM_SSLDataServiceThread and pasting it in.  There were minor 
modifications for adding '->' notation instead of array notation.

3) Instead of NULL'ing out the file descriptor in the PRPollDesc and 
decrementing the counter, I zero out the in_flags so that PR_Poll will ignore 
that file descriptor when polling. (This was recommended by larryh of the NSPR 
team.)  The old code would have something like this:

Array of Poll Descriptors
 [Client socket,ie socket talking to Mozilla][Socket talking to SSL server]
nSockets = 2

If the client socket was shutdown first, then the old code would NULL out the 
first index and decrement the counter.  Leaving you with this scenario:

Array of Poll Descriptors:
[NULL socket][Socket talking to SSL server]
nSockets = 1

In this case, when we went to Poll, PR_Poll would only look at the first index, 
see a NULL and exit right away.  This would also cause the thread to loop one 
more time and get stuck at a PR_Poll above which was testing for some condition 
in regards to Keep Alive to properly close down the connection.

Now the code keeps the File descriptors around and zero's out the in_flags when 
passing in the array to PR_Poll so that when PR_Poll returns, the socket we no 
longer care about won't get a bit set for reading or sending.

4)When we get an error from a socket, we close out the socket on the other end 
as well.  If we get an EOF from the SSL server, we send all the data to the 
client and then shut the socket down as well.  We do the same thing the other 
way around.  Before, the code let the other socket stick around until Mozilla or 
the SSL server closed the socket.  This also caused threads to stick around 
longer than needed.

Hope this helps when reading the diff.
Oh yeah, the reason the diff is between -r 1.5 and -r 1.8, is because 1.5 is the 
version we've put up on the iPlanet web site and included with N6 PR3 and 1.8 is 
what's on the tip which we got to work like we wanted to.
I asked for a blow-by-blow more for the PDT's sake than for mine.  If you guys 
had made a minimal change just for the Netscape 6 branch, we wouldn't be here 
typing into a tiny textarea.  I'll review the patch, but if you could come up 
with a minimal-change patch to the Netscape 6 branch, you'd grease the skids for 
sure.

/be
PR_SUCCESS should be SSM_SUCCESS (same value, but not same type):

@@ -107,7 +107,7 @@
                                      SSMResource** res)
 {
     SSMStatus rv = PR_SUCCESS;
-    SSMSSLDataConnection* conn;
+    SSMSSLDataConnection* conn=NULL;

Uh oh, the rest of that function (SSMSSLDataConnection_Create) seems to use rv 
to hold a PRStatus.  Consider changing the type of this variable, translating to 
SSMStatus only on return?

Both read (hmm, famous Unix syscall name) and sent are uselessly initialized:

+SSM_SSLThreadReadFromClient(SSMSSLDataConnection* conn, 
+                           PRIntn oBufSize, char *outbound, PRPollDesc *pds)
+{
+  PRIntn read = 0;
+  PRIntn sent = 0;

Same goes for the same-named variables in SSM_SSLThreadReadFromServer.  Also, 
this line from SSM_SSLThreadReadFromServer must be wrong:

+      /* remove the socket from the array */
+      pds->in_flags = NULL;

NULL should be 0.

How about consistently indenting (by four-space increments) the code here:

+SSM_WaitingOnData(PRPollDesc *pds, PRIntn numPDs)
+{
+    PRBool retVal = PR_FALSE;
+    int i;
+
+    for (i=0; i<numPDs;i++) {
+      if (pds[i].in_flags & PR_POLL_READ) {
+       retVal = PR_TRUE;
+       break;
+      }
+    }
+
+    return retVal;
+}

So long as in_flags can't be 0 until you're done with the polldesc (done 
including out_flags != 0 and there's something to do based on that condition), 
then I think the patch is good.  Set my mind at ease here, ok?

If you can fix the above nits, redo a diff, and also attach the entire new 
(patched) file, I'll give a quick sr=.

/be
Attached patch Updated patchSplinter Review
I've updated the patch with the additions Brendan asked for.

I added one more bit of code to zero out the pds.out_flags parameter every time
after processing the poll descriptors.  PR_Poll doesn't modify the in_flags.  In
talking to Larry Hardiman of the NSPR team, he didn't think re-setting out_flag
to zero was necessary but said it wouldn't hurt.  (In testing, everything still
works.)
-> [rtm-]
Whiteboard: [rtm need info] → [rtm-]
doh!  This one is [rtm need info]
Whiteboard: [rtm-] → [rtm need info]
This has a r=, and a sr=, and should go to rtm+.
Whiteboard: [rtm need info] → [rtm need info] sr=brendan, r=ddrinan
Nominating for approval.  This only requires a new xpi drop to be sent to leaf.

The fix has been tested by a third party on an embedded system and the bug has
disappeared.
Whiteboard: [rtm need info] sr=brendan, r=ddrinan → [rtm+] sr=brendan, r=ddrinan
rtm++
Whiteboard: [rtm+] sr=brendan, r=ddrinan → [rtm++] sr=brendan, r=ddrinan
ok, I've received the drop for win32 and linux and am putting them in place.
The new linux PSM drop has been placed on lithium.  The new win32 PSM drop has
been checked into the shelf for both branch and trunk.  These should show up in
10/26 morning builds.
PDT marking this bug resolved fixed since the 26th build has come and gone. QA,
please verify.
Status: NEW → RESOLVED
Closed: 24 years ago24 years ago
Resolution: --- → FIXED
I sat down with QA and Netscape6 builds have not picked up the correct PSM.

We're still seeing this problem with the daily buids.  Did the xpi files get
bundled with both branch and trunk builds?
Status: RESOLVED → REOPENED
Resolution: FIXED → ---
yes, the new files I was given were put in place for win32 and linux for both
branch and trunk.
Then we need to sit down and figure out what happened.  When I sit down and run
N6 with my build, the threads go away.  When I sat down and ran N6 that nitinp
downloaded on Friday, the threads did not go away.
re-assigning to leaf since what's left to do is bundle the PSM xpi's.

According to ddrinan, he's doing that today.
re-assigning for real....
Assignee: javi → leaf
Status: REOPENED → NEW
new drop is imported to shelf, will get into the branch presently.
Status: NEW → ASSIGNED
Status: ASSIGNED → RESOLVED
Closed: 24 years ago24 years ago
Resolution: --- → FIXED
ok, branch for shelf is updated, candidates away. Should be able to verify tomorrow.
*** Bug 57970 has been marked as a duplicate of this bug. ***
I just tried testing this with linux trunk build 2000110108 using the psm that
came in the build.  I still see psm creating more and more threads with every
secure page I visit (81 threads at the moment after about ten minutes browsing).

This fix should appear in the 11/01 daily build, right?
It seems that we passed the wrong bits over the wall.  ddrinan has contacted
leaf and asked him to bundle the correct bits.  (Our QA guy tested the bits
we've asked leaf to bundle to make sure this goes away for real.)
verified fixed in the 2000-11-02-09-MN6 build.
Status: RESOLVED → VERIFIED
Where is the new psm.xpi for linux? Is it available to all mozilla users or it's
only for Netscape's internal engineers?
debug>install psm
the new psm.xpi is not public yet , so I don't think mozilla people can get it.
The new psm is in the daily builds of internal commercial netscape6 builds.
testing with todays linux build (installed) and psm 1.4, i have 39 psm threads
hanging forever after one login in my bank.
In addition, the lock-icon never triggered, and the processes did not go away
after i had logged out and left the site.
They don't suck CPU a lot, but are way too many.
Still problems, in other words. (I was directed to PSM 1.4 by a developer, to
test a PSM hang. Not sure whether that is the latest however.)

Tested this first as an ordinary user. Then quit mozilla and tested it again as
root. Same result.
RKA: please file a new bug on that, thanks.
*** Bug 59806 has been marked as a duplicate of this bug. ***
*** Bug 60617 has been marked as a duplicate of this bug. ***
I submitted the bug 60617, which was just marked as a duplicate of this one.
Here's some more info that might help?

I just went to a secure page (which unfortunately I can't give you the URL of;
it's a billing statement...).  As I started, I had this "ps" list:


  PID TTY      STAT   TIME COMMAND
 3058 pts/2    S      0:00 sh /usr/local/src/mozilla/nightly-builds/001116/packa
 3070 pts/2    S     14:55 /usr/local/src/mozilla/nightly-builds/001116/package/
 3072 pts/2    S      0:00 /usr/local/src/mozilla/nightly-builds/001116/package/
 3073 pts/2    S      0:01 /usr/local/src/mozilla/nightly-builds/001116/package/
    ...
26828 pts/2    Z      0:00 [mozilla-bin <defunct>]
26996 pts/2    S      0:00 ./psm
26999 pts/2    S      0:00 ./psm
27000 pts/2    S      0:00 ./psm
27003 pts/2    S      0:00 ./psm

A minute or so later, after opening a *single* secure web page, I had this list
(different "ps" formatting option):

USER       PID %CPU %MEM   VSZ  RSS TTY      STAT START   TIME COMMAND
jpeek     3058  0.0  0.3  1696  832 pts/2    S    Nov21   0:00 sh /usr/local/src
jpeek     3070  0.9 20.3 59148 52524 pts/2   S    Nov21  14:59 /usr/local/src/mo
jpeek     3072  0.0 20.3 59148 52524 pts/2   S    Nov21   0:00 /usr/local/src/mo
jpeek     3073  0.0 20.3 59148 52524 pts/2   S    Nov21   0:02 /usr/local/src/mo
jpeek    26996  0.8  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    26999  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27000  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27003  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27004  0.0 20.3 59148 52524 pts/2   S    21:28   0:00 /usr/local/src/mo
jpeek    27008  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27009  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27010  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27011  0.0 20.3 59148 52524 pts/2   S    21:28   0:00 /usr/local/src/mo
jpeek    27012  0.1  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27013  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27014  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27015  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27016  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27017  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27018  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27019  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27020  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27021  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27022  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27023  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27024  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27025  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm
jpeek    27026  0.0  1.8  7268 4896 pts/2    S    21:28   0:00 ./psm

That's not news, I bet.  What might help is that this line appeared in
/var/log/messages at about the same time:

Nov 22 21:28:01 jpeek modprobe: modprobe: Can't locate module net-pf-10

I see that once in a while.  I'm afraid I don't know much about how the Linux
kernel usees modules, what net-pf-10 is, etc.  But that message is familiar, and
I think it might be related to the psm problem??

If I can do some testing or etc., let me know.  I'm using build 2000111521 now, BTW.
When you open Tasks->Privacy And Security->Security Manager, click on About 

Security tab, which version of PSM does that say you're running?

I'm using PSM 1.3 and I see this behavior
net-pf-10 is irrelevant and was mentioned in another bug.

Leaf, was this fixed for 1.2, 1.3 or 1.4?
This was fixed in PSM 1.4

We're working on integrating PSM into mozilla builds.  That's why you haven't
seen an XPI for PSM 1.4
*** Bug 62222 has been marked as a duplicate of this bug. ***
*** Bug 63450 has been marked as a duplicate of this bug. ***
I don't know about other people, but on the 2001010504 Windows build, the
security info page reports PSM to be 1.4 already.  However, I'm still seeing the
problems with PSM hogging CPU time and using up to 300(!) threads at times.
Does this mean the problem isn't fixed, or does it mean the wrong PSM is
actually included with the daily builds?
I just saw this problem with 2001011208/Mtrunk/Linux.

Logged into sourceforge (http://sourceforge.net), changed my email address in
prefs and then, not seeing a "log out" link, I closed the browser window (I had
two open). Within a minute or so, my cpu usage epplet shows almost all resources
used and running top shows a psm thread using over 80% cpu.

`killall psm` fixed the problem.
It seems to me like this bug should be reopened.
please file a new bug. I promise to shoot anyone who resolves your new bug as a 
dupe.  Please comment here w/ the name and number of the new bug.  Be sure to 
include build id, platform, steps to reproduce, and ideally a call stack or 
core or something interesting [ps -aux output or something similar might also 
be a good idea].
Keywords: rtm
Whiteboard: [rtm++] sr=brendan, r=ddrinan → DO NOT REOPEN
Timeless, I've entered this bug again as bug 65703.
Target Milestone: M20 → M18
Product: PSM → Core
Version: psm1.2 → 1.0 Branch
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: