Closed
Bug 34834
Opened 24 years ago
Closed 24 years ago
runaway psm
Categories
(Core :: Security: PSM, defect, P3)
Tracking
()
VERIFIED
FIXED
M18
People
(Reporter: ben, Assigned: leaf)
References
Details
(Whiteboard: DO NOT REOPEN)
Attachments
(3 files)
17.03 KB,
patch
|
Details | Diff | Splinter Review | |
18.26 KB,
patch
|
Details | Diff | Splinter Review | |
76.80 KB,
text/plain
|
Details |
After browsing https documents for a while. PSM runs away and begins eating all the CPU. The only way to fix it is to close the browser.
Comment 1•24 years ago
|
||
ben@valinux.com, when posting a bug please include build number and other details to help develpers. I have seen a few checkin's to improve Mozilla with PSM. Could be related. Please follow up so we can direct approperly.
Comment 2•24 years ago
|
||
reporter - are you stills seeing this?
Reporter | ||
Comment 3•24 years ago
|
||
yes
Reporter | ||
Comment 4•24 years ago
|
||
Here is something that I just discovered. This problem doesn't occur when I am connected to a fast network. Normally, I am connected with a ricochet which is 26Kbs and it happens all the time. However, when I am in the office and connected via ethernet it never occurs.
Comment 5•24 years ago
|
||
->Security
Assignee: asadotzler → norris
Component: Browser-General → Security: General
QA Contact: jelwell → junruh
Comment 7•24 years ago
|
||
Change product to PSM
Component: Security: Crypto → Daemon
Product: Browser → PSM
Version: other → 1.01
Comment 8•24 years ago
|
||
ben@valinux.com - are you still seeing this problem with recent builds of Mozilla? If so, could you add a comment giving the Build ID of the version you tested with, and the version of the PSM, and we'll get this bug confirmed. Gerv
tested on M16 2000-052408 Linux: After having visited a site using SSL triggering the PSM module, and then having left it, i realized things was going slower and slower and Moz barely reacting anymore. Checked a ps -ef: There were 15 instances of ./psm running. A quick "top" revealed this (excerpt): 1039 dark 17 0 34084 33M 12388 R 0 15.6 35.6 4:11 mozilla-bin 1064 dark 20 0 3204 3204 1540 R 0 14.3 3.3 1:00 psm 1115 dark 19 0 1044 1044 844 R 0 11.5 1.0 0:00 top 1061 dark 18 0 3204 3204 1540 R 0 10.9 3.3 1:17 psm 1062 dark 18 0 3204 3204 1540 R 0 10.9 3.3 1:00 psm 1063 dark 18 0 3204 3204 1540 R 0 10.9 3.3 1:00 psm 1066 dark 18 0 3204 3204 1540 R 0 10.9 3.3 1:00 psm 1069 dark 18 0 3204 3204 1540 R 0 10.2 3.3 1:00 psm 1067 dark 18 0 3204 3204 1540 R 0 8.8 3.3 1:00 psm 1068 dark 19 0 3204 3204 1540 R 0 5.4 3.3 0:45 psm
Comment 10•24 years ago
|
||
I am pretty sure that these are just threads in the PSM process.
Comment 11•24 years ago
|
||
loaded the page again and left it - you're right.. it spawn 15 threads right away. But it never terminates them. They keep hanging in using heaps of CPU.
Reporter | ||
Comment 12•24 years ago
|
||
The problem isn't with the fact that there are lots of threads. The problem is that combined the 15 or so threads bring your machine to a crawl.
Comment 14•24 years ago
|
||
*** Bug 32605 has been marked as a duplicate of this bug. ***
Comment 15•24 years ago
|
||
Reassigning all https/cartman/security bugs to valeski. He will be finding new owner(s). This shift is so that I can focus on embedding issues. If the new owner has questions that can not be resovled, I may be able to lend a (quick) hand. over to valeski....
Assignee: dougt → valeski
Updated•24 years ago
|
Target Milestone: --- → M17
Version: 1.01 → 1.2
Comment 16•24 years ago
|
||
*** Bug 35699 has been marked as a duplicate of this bug. ***
Comment 17•24 years ago
|
||
*** Bug 41205 has been marked as a duplicate of this bug. ***
Comment 18•24 years ago
|
||
be sure that you have the correct version of PSM. search your disk for any other version of psm and delete them. reassign this one to lord
Assignee: valeski → lord
Updated•24 years ago
|
Status: NEW → RESOLVED
Closed: 24 years ago
Resolution: --- → WORKSFORME
Comment 19•24 years ago
|
||
Worksforme. I've never seen this happen, or had a problem with the machine slowing down when psm is a process.
Comment 20•24 years ago
|
||
The last time I saw this was last week. I should point out that this does not happen all the time (even on the same site), so perhaps it is still present. Comments from anyone?
Comment 21•24 years ago
|
||
I remember seeing this happen before and I believe it was caused by psm leaving phantom processing when psm disappeared unexpectedly. (That's a nice way of saying "psm crashed")
Comment 22•24 years ago
|
||
I am still seeing this on 2000072905 on Linux. Whenever I go to https://webbanking.tdaccess.com/, login, and then logout, I get PSM threads/processes that takes up all my CPU time.
Status: RESOLVED → REOPENED
Resolution: WORKSFORME → ---
Comment 23•24 years ago
|
||
This definitely occurs in M17. debian woody kernel 2.2.17p15 It's so bad that I'll end up with 70+ psm processes and I can't do much debugging as I can fork any more processes.
Comment 24•24 years ago
|
||
Changing milestone to future.
Assignee: lord → ddrinan
Severity: normal → enhancement
Status: REOPENED → NEW
Target Milestone: M17 → M20
Comment 25•24 years ago
|
||
I can reproduce this quite well now, and I have some additional info that may be of some use. I am definitely changing the severity of this bug from "enhancement". 1. Go to https://tdaccess.tdbank.ca/ Notice that there is a Javascript "bug" (see bug 45099). 2. Now browse other non-secure sites. Eventually, you will see a bunch of psm threads taking up all the CPUs. You may have to do quite a bit of surfing, but it has always shown up eventually. When I did "top", I see the following: PID USER PRI NI SIZE RSS SHARE STAT LIB %CPU %MEM TIME COMMAND 14963 howard 15 0 4508 4508 2252 R 0 15.1 3.5 0:06 psm 14959 howard 15 0 4508 4508 2252 R 0 14.9 3.5 0:01 psm 14965 howard 15 0 4508 4508 2252 R 0 14.9 3.5 0:06 psm 14960 howard 15 0 4508 4508 2252 R 0 14.5 3.5 0:06 psm 14962 howard 15 0 4508 4508 2252 R 0 14.5 3.5 0:06 psm 14961 howard 15 0 4508 4508 2252 R 0 14.3 3.5 0:06 psm I then attached gdb to some of these processes. They all look like the following: (gdb) where #0 0x401535bb in __pthread_mutex_trylock (mutex=0x82d348c) at spinlock.h:24 #1 0x40037567 in PR_EnterMonitor () from /home/howard/mozilla/nightly/package/psm/./libnspr4.so #2 0x8083149 in SSL_DataPending () #3 0x8084f43 in ssl_Poll () #4 0x4003a3f5 in PR_Poll () from /home/howard/mozilla/nightly/package/psm/./libnspr4.so #5 0x805b163 in SSM_SSLDataServiceThread () #6 0x4003b66e in _pt_root () from /home/howard/mozilla/nightly/package/psm/./libnspr4.so #7 0x40152b85 in pthread_start_thread (arg=0xbe1ffe40) at manager.c:241
Severity: enhancement → major
Comment 26•24 years ago
|
||
This still happens (PSM 1.2, Linux nightly 2000090621). To me it happens everytime when I go to a SSL site using proxy. When I go to SSL site on our Intranet, it doesn't happen.
Comment 27•24 years ago
|
||
still happens; linux, build 2000090821, psm 1.2. not using proxy, just internet dial-up. access my.sun.com and login to email. 18 psm threads running, the last one ran (highest pid) is sucking all the cpu.
Comment 28•24 years ago
|
||
*** Bug 47130 has been marked as a duplicate of this bug. ***
Comment 29•24 years ago
|
||
*** Bug 55038 has been marked as a duplicate of this bug. ***
Comment 31•24 years ago
|
||
I think I'm seeing exactly this with BuildID 2000100621. After getting cablemodem I've been able to get nightlies. Those of 30th Sept 2000 and 3rd October wouldn't install PSM at all. I was about to file this when the 6th Oct nightly appeared to install it successfully. Except that as soon as I tested it, I found www.fortify.net was adamant that I had no encryption, and PSM started showing up in top just as it did in the top excerpt from RK AA. Lots of psm processes (threads, whatever), each using about 10% of CPU time. The only way to stop this is to kill off Mozilla. Waah. What more information do you need? I wasn't sure. This is a K6 with 64Mb of RAM running Linux.
Comment 32•24 years ago
|
||
Many people have mentioned this to me when using debian's M17 then installing the official PSM. I still see this on recent builds on linux (both "official" nightlyies and custom builds)
Comment 33•24 years ago
|
||
Well, here my tale of woe with PSM. I have seen the problem with PSM taking up 100% of the CPU quite a few times now, but what I see even more is PSM creating hundreds of threads none of which ever terminate. On secure site I use is Green Mountain Energy, http://www.greenmountain.com . Their secure pages have menu-like constructs which are image links with onMouseOver and onMouseOut handlers to display a highlighted image and then replace with the standard image again. Every time I move the mouse over one of these links and trigger the handlers, PSM creates another one or two threads. If I reload the page, PSM creates another 52 (52!) threads. I can get hundreds of PSM threads with only loading a few of the secure pages and moving the mouse over links. As I continue causing PSM to create new threads, it will eventually start taking 100% of the CPU though it seems that only 2 out of the hundreds of threads are actually taking up the time. Also, PSM seems to be spending most of its time in system calls rather than in user code. I get similar results viewing secure pages on other sites. It used to work ok but seems to have busted about the time PSM 1.3 came out. I hope this is fixed before rtm, otherwise it will not be possible to say that NS6 supports SSL on Linux. Tested with Mozilla 101008, trunk build, with PSM 1.3 on Linux.
Comment 34•24 years ago
|
||
I'm currently investigating this problem. Apart from the sites mentioned in the bug report already (https://webbanking.tdaccess.com/ and http://www.greenmountain.com) are there other SSL sites where this is a problem. I'm trying to see if there is some common link between these sites.
Comment 35•24 years ago
|
||
I have similar problems with http://www.netflix.com
Comment 36•24 years ago
|
||
I have psm 1.3 installed after compiling M18's source. If psm is launched from command line, without running Mozilla, it consumes >90% CPU immediately.
Comment 37•24 years ago
|
||
I've also seen this before. I don't log onto SSL sites often, however, so it's been a while since I've seen it. I think I've seen it mostly at http://www.amazon.com and at some internal company sites where I work (inaccessible from offsite). When it happens, switching virtual desktops under E will suddenly slow down noticeably and looking at top will show psm taking up a lot of cpu resources (usually between 60-90% on my PIII 500). Running `killall psm` usually fixes the problem.
Comment 38•24 years ago
|
||
It's really bad bug. I think its source of my problem, that PSM 1.3 doesn't work for me at all. When I open a site where the certificate is not signed by some stored root certificate (for example: https://ca.ica.cz/) The PSM's window with a message about it appears, but when I click to Next button, the buttons disappear and nothing else happens (Linux 2000101521). There are at least 7 psm threads/processes in background one of them consuming about 2% CPU. When I close the window using close from windowmanager there appears a new window about accepting the certificate, but again nothing happens when I click to Finish button. So the PSM seems to be completely unusable to me.
Comment 39•24 years ago
|
||
*** Bug 56904 has been marked as a duplicate of this bug. ***
Comment 40•24 years ago
|
||
rtm. This happened to me, and I had to reboot the Linux server to get rid of dozens of psm processes.
Keywords: rtm
Comment 41•24 years ago
|
||
Re-assigning this bug to Javier. He is going to run psm in a debugger and see why these threads are not be cleaned up.
Assignee: ddrinan → javi
Comment 42•24 years ago
|
||
In order to make debugging this easier,I took a really long function and with the magic of cut and paste, made it into many smaller functions. Should make debugging this much easier.
Comment 43•24 years ago
|
||
The thread that polls socket for data had a block that checked the number of sockets waiting for data only exited the thread when number of sockets ready was less than zero. By modifying the following line: http://lxr.mozilla.org/mozilla/source/security/psm/server/sslconn.c#1107 to read if (nReady <= 0) { then the threads appear to properly clean up after themselves. This may be the fix, but it needs some more testing before I can officially declare it the fix.
Comment 44•24 years ago
|
||
Checked in a fix to the tip of the PSM tree that appears to fix the problem.
Comment 45•24 years ago
|
||
For an RTM eval for Netscape 6, we need to understand what tag we're pulling for PSM, and what set of tests have been run. Can you comment on the pros and cons of advancing a tag to get this checkin (or am I confused about how Netscape 6 is pulling PSM?). Thanks, Jim
Comment 46•24 years ago
|
||
Netscape6 bundles an xpi file that was generated off a tag. This check-in is to help with embedding projects that see their systems slow to a crawl after extended use of psm. For Netscape6 to pick this up, we'd have to re-spin the xpi and then have leaf incorporate that xpi into the daily builds.
Comment 48•24 years ago
|
||
We made some more changes for this, and we now appear to have fixed the problem. The code is checked into PSM's tree. If Netscape6 wants to pick this up, we'll need to do a new drop of PSM.
Comment 49•24 years ago
|
||
Comment 50•24 years ago
|
||
The following patch, when applied to the psm daemon, fixes this problem. We have tested this patch with a 3rd party vendor implementing a set top box and they confirmed PSM no longer eats up system resources. (The reason the diff is so big is because I took a very long function and create several smaller functions by cutting old sections and making them new functions. Makes the function much easier to read and debug in the future.) PSM team believes this is a re-spin bug.
Comment 51•24 years ago
|
||
Fix is good. r=ddrinan.
Comment 52•24 years ago
|
||
Adding more description about the diff for super reviewer's sake: There are 4 changes that went into the diff to fix this bug: 1) When polling the sockets from the client (mozilla) and the SSL server, we break out of the poll loop if the number of sockets waiting for data is equal to 0. That's the PR_Poll you see around the "@@ -1084,27 +1259,12 @@" block. 2)Break the function SSM_SSLDataServiceThread into smaller functions to improve readability and make debugging much easier. This created the functions SSM_SSLThreadMakeConnectionSSL, SSM_SSLThreadReadFromServer, and SSM_SSLThreadReadFromClient. These functions were created by cutting a piece of code out of SSM_SSLDataServiceThread and pasting it in. There were minor modifications for adding '->' notation instead of array notation. 3) Instead of NULL'ing out the file descriptor in the PRPollDesc and decrementing the counter, I zero out the in_flags so that PR_Poll will ignore that file descriptor when polling. (This was recommended by larryh of the NSPR team.) The old code would have something like this: Array of Poll Descriptors [Client socket,ie socket talking to Mozilla][Socket talking to SSL server] nSockets = 2 If the client socket was shutdown first, then the old code would NULL out the first index and decrement the counter. Leaving you with this scenario: Array of Poll Descriptors: [NULL socket][Socket talking to SSL server] nSockets = 1 In this case, when we went to Poll, PR_Poll would only look at the first index, see a NULL and exit right away. This would also cause the thread to loop one more time and get stuck at a PR_Poll above which was testing for some condition in regards to Keep Alive to properly close down the connection. Now the code keeps the File descriptors around and zero's out the in_flags when passing in the array to PR_Poll so that when PR_Poll returns, the socket we no longer care about won't get a bit set for reading or sending. 4)When we get an error from a socket, we close out the socket on the other end as well. If we get an EOF from the SSL server, we send all the data to the client and then shut the socket down as well. We do the same thing the other way around. Before, the code let the other socket stick around until Mozilla or the SSL server closed the socket. This also caused threads to stick around longer than needed. Hope this helps when reading the diff.
Comment 53•24 years ago
|
||
Oh yeah, the reason the diff is between -r 1.5 and -r 1.8, is because 1.5 is the version we've put up on the iPlanet web site and included with N6 PR3 and 1.8 is what's on the tip which we got to work like we wanted to.
Comment 54•24 years ago
|
||
I asked for a blow-by-blow more for the PDT's sake than for mine. If you guys had made a minimal change just for the Netscape 6 branch, we wouldn't be here typing into a tiny textarea. I'll review the patch, but if you could come up with a minimal-change patch to the Netscape 6 branch, you'd grease the skids for sure. /be
Comment 55•24 years ago
|
||
PR_SUCCESS should be SSM_SUCCESS (same value, but not same type): @@ -107,7 +107,7 @@ SSMResource** res) { SSMStatus rv = PR_SUCCESS; - SSMSSLDataConnection* conn; + SSMSSLDataConnection* conn=NULL; Uh oh, the rest of that function (SSMSSLDataConnection_Create) seems to use rv to hold a PRStatus. Consider changing the type of this variable, translating to SSMStatus only on return? Both read (hmm, famous Unix syscall name) and sent are uselessly initialized: +SSM_SSLThreadReadFromClient(SSMSSLDataConnection* conn, + PRIntn oBufSize, char *outbound, PRPollDesc *pds) +{ + PRIntn read = 0; + PRIntn sent = 0; Same goes for the same-named variables in SSM_SSLThreadReadFromServer. Also, this line from SSM_SSLThreadReadFromServer must be wrong: + /* remove the socket from the array */ + pds->in_flags = NULL; NULL should be 0. How about consistently indenting (by four-space increments) the code here: +SSM_WaitingOnData(PRPollDesc *pds, PRIntn numPDs) +{ + PRBool retVal = PR_FALSE; + int i; + + for (i=0; i<numPDs;i++) { + if (pds[i].in_flags & PR_POLL_READ) { + retVal = PR_TRUE; + break; + } + } + + return retVal; +} So long as in_flags can't be 0 until you're done with the polldesc (done including out_flags != 0 and there's something to do based on that condition), then I think the patch is good. Set my mind at ease here, ok? If you can fix the above nits, redo a diff, and also attach the entire new (patched) file, I'll give a quick sr=. /be
Comment 56•24 years ago
|
||
Comment 57•24 years ago
|
||
Comment 58•24 years ago
|
||
I've updated the patch with the additions Brendan asked for. I added one more bit of code to zero out the pds.out_flags parameter every time after processing the poll descriptors. PR_Poll doesn't modify the in_flags. In talking to Larry Hardiman of the NSPR team, he didn't think re-setting out_flag to zero was necessary but said it wouldn't hurt. (In testing, everything still works.)
Comment 59•24 years ago
|
||
Thansk, sr=brendan@mozilla.org. /be
Comment 62•24 years ago
|
||
This has a r=, and a sr=, and should go to rtm+.
Whiteboard: [rtm need info] → [rtm need info] sr=brendan, r=ddrinan
Comment 63•24 years ago
|
||
Nominating for approval. This only requires a new xpi drop to be sent to leaf. The fix has been tested by a third party on an embedded system and the bug has disappeared.
Whiteboard: [rtm need info] sr=brendan, r=ddrinan → [rtm+] sr=brendan, r=ddrinan
Comment 64•24 years ago
|
||
rtm++
Whiteboard: [rtm+] sr=brendan, r=ddrinan → [rtm++] sr=brendan, r=ddrinan
Comment 65•24 years ago
|
||
ok, I've received the drop for win32 and linux and am putting them in place.
Comment 66•24 years ago
|
||
The new linux PSM drop has been placed on lithium. The new win32 PSM drop has been checked into the shelf for both branch and trunk. These should show up in 10/26 morning builds.
Comment 67•24 years ago
|
||
PDT marking this bug resolved fixed since the 26th build has come and gone. QA, please verify.
Status: NEW → RESOLVED
Closed: 24 years ago → 24 years ago
Resolution: --- → FIXED
Comment 68•24 years ago
|
||
I sat down with QA and Netscape6 builds have not picked up the correct PSM. We're still seeing this problem with the daily buids. Did the xpi files get bundled with both branch and trunk builds?
Status: RESOLVED → REOPENED
Resolution: FIXED → ---
Comment 69•24 years ago
|
||
yes, the new files I was given were put in place for win32 and linux for both branch and trunk.
Comment 70•24 years ago
|
||
Then we need to sit down and figure out what happened. When I sit down and run N6 with my build, the threads go away. When I sat down and ran N6 that nitinp downloaded on Friday, the threads did not go away.
Comment 71•24 years ago
|
||
re-assigning to leaf since what's left to do is bundle the PSM xpi's. According to ddrinan, he's doing that today.
Comment 73•24 years ago
|
||
new drop is imported to shelf, will get into the branch presently.
Status: NEW → ASSIGNED
Updated•24 years ago
|
Status: ASSIGNED → RESOLVED
Closed: 24 years ago → 24 years ago
Resolution: --- → FIXED
Comment 74•24 years ago
|
||
ok, branch for shelf is updated, candidates away. Should be able to verify tomorrow.
Comment 75•24 years ago
|
||
*** Bug 57970 has been marked as a duplicate of this bug. ***
Comment 76•24 years ago
|
||
I just tried testing this with linux trunk build 2000110108 using the psm that came in the build. I still see psm creating more and more threads with every secure page I visit (81 threads at the moment after about ten minutes browsing). This fix should appear in the 11/01 daily build, right?
Comment 77•24 years ago
|
||
It seems that we passed the wrong bits over the wall. ddrinan has contacted leaf and asked him to bundle the correct bits. (Our QA guy tested the bits we've asked leaf to bundle to make sure this goes away for real.)
Comment 79•24 years ago
|
||
Where is the new psm.xpi for linux? Is it available to all mozilla users or it's only for Netscape's internal engineers?
Comment 80•24 years ago
|
||
debug>install psm
Comment 81•24 years ago
|
||
the new psm.xpi is not public yet , so I don't think mozilla people can get it. The new psm is in the daily builds of internal commercial netscape6 builds.
Comment 82•24 years ago
|
||
testing with todays linux build (installed) and psm 1.4, i have 39 psm threads hanging forever after one login in my bank. In addition, the lock-icon never triggered, and the processes did not go away after i had logged out and left the site. They don't suck CPU a lot, but are way too many. Still problems, in other words. (I was directed to PSM 1.4 by a developer, to test a PSM hang. Not sure whether that is the latest however.) Tested this first as an ordinary user. Then quit mozilla and tested it again as root. Same result.
Comment 83•24 years ago
|
||
RKA: please file a new bug on that, thanks.
Comment 84•24 years ago
|
||
*** Bug 59806 has been marked as a duplicate of this bug. ***
Comment 85•24 years ago
|
||
*** Bug 60617 has been marked as a duplicate of this bug. ***
Comment 86•24 years ago
|
||
I submitted the bug 60617, which was just marked as a duplicate of this one. Here's some more info that might help? I just went to a secure page (which unfortunately I can't give you the URL of; it's a billing statement...). As I started, I had this "ps" list: PID TTY STAT TIME COMMAND 3058 pts/2 S 0:00 sh /usr/local/src/mozilla/nightly-builds/001116/packa 3070 pts/2 S 14:55 /usr/local/src/mozilla/nightly-builds/001116/package/ 3072 pts/2 S 0:00 /usr/local/src/mozilla/nightly-builds/001116/package/ 3073 pts/2 S 0:01 /usr/local/src/mozilla/nightly-builds/001116/package/ ... 26828 pts/2 Z 0:00 [mozilla-bin <defunct>] 26996 pts/2 S 0:00 ./psm 26999 pts/2 S 0:00 ./psm 27000 pts/2 S 0:00 ./psm 27003 pts/2 S 0:00 ./psm A minute or so later, after opening a *single* secure web page, I had this list (different "ps" formatting option): USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND jpeek 3058 0.0 0.3 1696 832 pts/2 S Nov21 0:00 sh /usr/local/src jpeek 3070 0.9 20.3 59148 52524 pts/2 S Nov21 14:59 /usr/local/src/mo jpeek 3072 0.0 20.3 59148 52524 pts/2 S Nov21 0:00 /usr/local/src/mo jpeek 3073 0.0 20.3 59148 52524 pts/2 S Nov21 0:02 /usr/local/src/mo jpeek 26996 0.8 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 26999 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27000 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27003 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27004 0.0 20.3 59148 52524 pts/2 S 21:28 0:00 /usr/local/src/mo jpeek 27008 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27009 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27010 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27011 0.0 20.3 59148 52524 pts/2 S 21:28 0:00 /usr/local/src/mo jpeek 27012 0.1 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27013 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27014 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27015 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27016 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27017 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27018 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27019 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27020 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27021 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27022 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27023 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27024 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27025 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm jpeek 27026 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm That's not news, I bet. What might help is that this line appeared in /var/log/messages at about the same time: Nov 22 21:28:01 jpeek modprobe: modprobe: Can't locate module net-pf-10 I see that once in a while. I'm afraid I don't know much about how the Linux kernel usees modules, what net-pf-10 is, etc. But that message is familiar, and I think it might be related to the psm problem?? If I can do some testing or etc., let me know. I'm using build 2000111521 now, BTW.
Comment 87•24 years ago
|
||
When you open Tasks->Privacy And Security->Security Manager, click on About Security tab, which version of PSM does that say you're running?
Comment 88•24 years ago
|
||
I'm using PSM 1.3 and I see this behavior
Comment 89•24 years ago
|
||
net-pf-10 is irrelevant and was mentioned in another bug. Leaf, was this fixed for 1.2, 1.3 or 1.4?
Comment 90•24 years ago
|
||
This was fixed in PSM 1.4 We're working on integrating PSM into mozilla builds. That's why you haven't seen an XPI for PSM 1.4
Comment 91•24 years ago
|
||
*** Bug 62222 has been marked as a duplicate of this bug. ***
Comment 92•24 years ago
|
||
*** Bug 63450 has been marked as a duplicate of this bug. ***
Comment 93•24 years ago
|
||
I don't know about other people, but on the 2001010504 Windows build, the security info page reports PSM to be 1.4 already. However, I'm still seeing the problems with PSM hogging CPU time and using up to 300(!) threads at times. Does this mean the problem isn't fixed, or does it mean the wrong PSM is actually included with the daily builds?
Comment 94•24 years ago
|
||
I just saw this problem with 2001011208/Mtrunk/Linux. Logged into sourceforge (http://sourceforge.net), changed my email address in prefs and then, not seeing a "log out" link, I closed the browser window (I had two open). Within a minute or so, my cpu usage epplet shows almost all resources used and running top shows a psm thread using over 80% cpu. `killall psm` fixed the problem.
Comment 95•24 years ago
|
||
It seems to me like this bug should be reopened.
Comment 96•24 years ago
|
||
please file a new bug. I promise to shoot anyone who resolves your new bug as a dupe. Please comment here w/ the name and number of the new bug. Be sure to include build id, platform, steps to reproduce, and ideally a call stack or core or something interesting [ps -aux output or something similar might also be a good idea].
Keywords: rtm
Whiteboard: [rtm++] sr=brendan, r=ddrinan → DO NOT REOPEN
Comment 97•24 years ago
|
||
Timeless, I've entered this bug again as bug 65703.
Updated•23 years ago
|
Target Milestone: M20 → M18
You need to log in
before you can comment on or make changes to this bug.
Description
•