Closed Bug 1166032 Opened 9 years ago Closed 8 years ago

Intermittent test_oob_cert_auth.js | application crashed [@ DispatchCertVerificationResult::Run]

Categories

(Core :: Security: PSM, defect, P3)

ARM
Gonk (Firefox OS)
defect

Tracking

()

RESOLVED INCOMPLETE
Tracking Status
firefox41 --- affected

People

(Reporter: RyanVM, Unassigned)

References

Details

(Keywords: crash, intermittent-failure, Whiteboard: [psm-intermittent])

01:44:40 INFO - TEST-START | toolkit/devtools/security/tests/unit/test_oob_cert_auth.js
01:45:00 INFO - TEST-PASS | toolkit/devtools/security/tests/unit/test_oob_cert_auth.js | took 19698ms
01:45:02 INFO - mozcrash Downloading symbols from: http://pvtbuilds.pvt.build.mozilla.org/pub/mozilla.org/b2g/tinderbox-builds/mozilla-inbound-emulator/20150518000144/b2g-41.0a1.en-US.android-arm.crashreporter-symbols.zip
01:45:26 WARNING - PROCESS-CRASH | toolkit/devtools/security/tests/unit/test_oob_cert_auth.js | application crashed [@ DispatchCertVerificationResult::Run]
01:45:26 INFO - Crash dump filename: /tmp/tmpCcNHod/4a6ae8fd-eba3-47b1-74632bac-3477d64f.dmp
01:45:26 INFO - Operating system: Android
01:45:26 INFO - 0.0.0 Linux 2.6.29-g41a03df #22 Thu Jun 26 10:59:09 CST 2014 armv7l Android/full/generic:4.0.4.0.4.0.4/OPENMASTER/eng.cltbld.20150518.001455:eng/test-keys
01:45:26 INFO - CPU: arm
01:45:26 INFO - 0 CPUs
01:45:26 INFO - Crash reason: SIGSEGV
01:45:26 INFO - Crash address: 0x0
01:45:26 INFO - Thread 0 (crashed)
01:45:26 INFO - 0 libxul.so!DispatchCertVerificationResult::Run [nsCertVerificationThread.cpp:dc240e7fedee : 28 + 0x0]
01:45:26 INFO - r4 = 0x458eadb0 r5 = 0x458919a0 r6 = 0x40402320 r7 = 0xbea2aeb4
01:45:26 INFO - r8 = 0x00000001 r9 = 0xbea2b038 r10 = 0x00000000 fp = 0xbea2ae98
01:45:26 INFO - sp = 0xbea2ae70 lr = 0x408ad3ad pc = 0x408d6fee
01:45:26 INFO - Found by: given as instruction pointer in context
01:45:26 INFO - 1 libxul.so!nsThread::ProcessNextEvent [nsThread.cpp:dc240e7fedee : 866 + 0x5]
01:45:26 INFO - r4 = 0x40402350 r5 = 0x00000001 r6 = 0x40402320 r7 = 0xbea2aeb4
01:45:26 INFO - r8 = 0x00000001 r9 = 0xbea2b038 r10 = 0x00000000 fp = 0xbea2ae98
01:45:26 INFO - sp = 0xbea2ae80 pc = 0x408afd97
01:45:26 INFO - Found by: call frame info
01:45:26 INFO - 2 libxul.so!NS_InvokeByIndex [xptcinvoke_arm.cpp:dc240e7fedee : 163 + 0x9]
01:45:26 INFO - r4 = 0x408afb39 r5 = 0xbea2b058 r6 = 0x00000002 r7 = 0xbea2af00
01:45:26 INFO - r8 = 0x00000008 r9 = 0x00000001 r10 = 0x00000002 fp = 0xbea2afc4
01:45:26 INFO - sp = 0xbea2aee8 pc = 0x408b4a1d
01:45:26 INFO - Found by: call frame info
01:45:26 INFO - 3 libxul.so!XPCWrappedNative::CallMethod [XPCWrappedNative.cpp:dc240e7fedee : 2080 + 0xf]
01:45:26 INFO - r4 = 0x00000000 r5 = 0x00000002 r6 = 0xbea2afe8 r7 = 0x00000010
01:45:26 INFO - r8 = 0x00000001 r9 = 0xbea2afd8 r10 = 0x00000002 fp = 0xbea2afc4
01:45:26 INFO - sp = 0xbea2af30 pc = 0x40b468ff
01:45:26 INFO - Found by: call frame info
01:45:26 INFO - 4 libxul.so!XPC_WN_CallMethod [XPCWrappedNativeJSOps.cpp:dc240e7fedee : 1141 + 0x7]
01:45:26 INFO - r4 = 0x43e390e0 r5 = 0x00000001 r6 = 0xbea2b12c r7 = 0xbea2b1d0
01:45:26 INFO - r8 = 0x42f097ac r9 = 0xbea2b114 r10 = 0xbea2b1e0 fp = 0x00000001
01:45:26 INFO - sp = 0xbea2b0e0 pc = 0x40b49419
01:45:26 INFO - Found by: call frame info
01:45:26 INFO - 5 0x448dfb0a
01:45:26 INFO - r4 = 0x44fb21f0 r5 = 0xffffff88 r6 = 0x448ea240 r7 = 0xffffff82
01:45:26 INFO - r8 = 0x00000183 r9 = 0x45387e88 r10 = 0x00000000 fp = 0xbea2b1e8
01:45:26 INFO - sp = 0xbea2b1b0 pc = 0x448dfb0c
01:45:26 INFO - Found by: call frame info
In bug 1141544, I've disabled this test on B2G emulator debug and Android opt, which is where it appears to fail according to Orange Factor.
This also happens on emulator-x86-kk opt, https://treeherder.allizom.org/logviewer.html#?job_id=3637951&repo=b2g-inbound

15:50:10     INFO -  mozcrash Downloading symbols from: https://queue.taskcluster.net/v1/task/UUTZdnk-RCujQ3WpvLC33g/artifacts/public/build/b2g-crashreporter-symbols.zip
15:50:18     INFO -  mozcrash Copy/paste: /usr/local/bin/linux64-minidump_stackwalk /tmp/tmpcv9ajc/0e7a8499-c846-37e2-252d0352-02a63f34.dmp /tmp/tmpFACKWn
15:50:27  WARNING -  PROCESS-CRASH | devtools/shared/security/tests/unit/test_oob_cert_auth.js | application crashed [@ DispatchCertVerificationResult::Run]
15:50:27     INFO -  Crash dump filename: /tmp/tmpcv9ajc/0e7a8499-c846-37e2-252d0352-02a63f34.dmp
15:50:27     INFO -  Operating system: Android
15:50:27     INFO -                    0.0.0 Linux 3.4.0+ #1 PREEMPT Fri Dec 5 17:28:48 PST 2014 i686 Android/full_x86/generic_x86:4.4.2/KOT49H/eng.worker.20160115.144835:eng/test-keys
15:50:27     INFO -  CPU: x86
15:50:27     INFO -       GenuineIntel family 6 model 3 stepping 3
15:50:27     INFO -       1 CPU
15:50:27     INFO -  Crash reason:  SIGSEGV
15:50:27     INFO -  Crash address: 0x0
15:50:27     INFO -  Thread 0 (crashed)
15:50:27     INFO -   0  libxul.so!DispatchCertVerificationResult::Run [nsCertVerificationThread.cpp:a8b2d9f36497 : 28 + 0x1]
15:50:27     INFO -      eip = 0xb33f70d9   esp = 0xbfb5f45c   ebp = 0xbfb5f478   ebx = 0xb730f6a8
15:50:27     INFO -      esi = 0xaee58a40   edi = 0xaeefb980   eax = 0x00000000   ecx = 0x000b5e28
15:50:27     INFO -      edx = 0xb77b52a0   efl = 0x00000202
15:50:27     INFO -      Found by: given as instruction pointer in context
15:50:27     INFO -   1  libxul.so!nsThread::ProcessNextEvent(bool, bool*) [nsThread.cpp:a8b2d9f36497 : 989 + 0x5]
15:50:27     INFO -      eip = 0xb33a9321   esp = 0xbfb5f480   ebp = 0xbfb5f4f8   ebx = 0xb730f6a8
15:50:27     INFO -      esi = 0xbfb5f640   edi = 0x00000000
15:50:27     INFO -      Found by: call frame info
15:50:27     INFO -   2  libxul.so!NS_InvokeByIndex + 0x2f
15:50:27     INFO -      eip = 0xb33b104c   esp = 0xbfb5f500   ebp = 0xbfb5f528   ebx = 0xb730f6a8
15:50:27     INFO -      esi = 0x00000002   edi = 0xbfb5f640
15:50:27     INFO -      Found by: call frame info
15:50:27     INFO -   3  libxul.so!XPCWrappedNative::CallMethod(XPCCallContext&, XPCWrappedNative::CallMode) [XPCWrappedNative.cpp:a8b2d9f36497 : 2097 + 0x15]
15:50:27     INFO -      eip = 0xb380a78b   esp = 0xbfb5f530   ebp = 0xbfb5f6d8
15:50:27     INFO -      Found by: previous frame's frame pointer
15:50:27     INFO -   4  libxul.so!XPC_WN_CallMethod(JSContext*, unsigned int, JS::Value*) [XPCWrappedNativeJSOps.cpp:a8b2d9f36497 : 1115 + 0x9]
15:50:27     INFO -      eip = 0xb380aec5   esp = 0xbfb5f6e0   ebp = 0xbfb5f7a8   ebx = 0xb730f6a8
15:50:27     INFO -      esi = 0xbfb5f734   edi = 0xafff7a20
15:50:27     INFO -      Found by: call frame info
15:50:27     INFO -   5  0xafd38378
15:50:27     INFO -      eip = 0xafd38379   esp = 0xbfb5f7b0   ebp = 0xbfb5f7f0   ebx = 0xafe5e700
15:50:27     INFO -      esi = 0xafd3abd4   edi = 0xafa9fc88
15:50:27     INFO -      Found by: call frame info
15:50:27     INFO -   6  0xafa9fc87
15:50:27     INFO -      eip = 0xafa9fc88   esp = 0xbfb5f7f8   ebp = 0xbfb5f84c
15:50:27     INFO -      Found by: previous frame's frame pointer
15:50:27     INFO -   7  0xaffb0940
15:50:27     INFO -      eip = 0xaffb0941   esp = 0xbfb5f854   ebp = 0xbfb5f878
15:50:27     INFO -      Found by: previous frame's frame pointer
15:50:27     INFO -   8  libxul.so!EnterBaseline [BaselineJIT.cpp:a8b2d9f36497 : 135 + 0x2d]
15:50:27     INFO -      eip = 0xb5242538   esp = 0xbfb5f880   ebp = 0xbfb5f968
15:50:27     INFO -      Found by: previous frame's frame pointer
15:50:27     INFO -   9  libxul.so!js::jit::EnterBaselineAtBranch(JSContext*, js::InterpreterFrame*, unsigned char*) [BaselineJIT.cpp:a8b2d9f36497 : 241 + 0xc]
15:50:27     INFO -      eip = 0xb5265e0b   esp = 0xbfb5f970   ebp = 0xbfb5fa88   ebx = 0xb730f6a8
15:50:27     INFO -      esi = 0xb1ec2300   edi = 0xb001e128
15:50:27     INFO -      Found by: call frame info
15:50:27     INFO -  10  libxul.so!Interpret [Interpreter.cpp:a8b2d9f36497 : 1819 + 0x15]
15:50:27     INFO -      eip = 0xb55557c1   esp = 0xbfb5fa90   ebp = 0xbfb5ff58
15:50:27     INFO -      Found by: previous frame's frame pointer
15:50:27     INFO -  11  libxul.so!js::RunScript(JSContext*, js::RunState&) [Interpreter.cpp:a8b2d9f36497 : 428 + 0x8]
15:50:27     INFO -      eip = 0xb5557e23   esp = 0xbfb5ff60   ebp = 0xbfb5fff8
15:50:27     INFO -      Found by: previous frame's frame pointer
15:50:27     INFO -  12  libxul.so!js::Invoke(JSContext*, JS::CallArgs const&, js::MaybeConstruct) [Interpreter.cpp:a8b2d9f36497 : 499 + 0x12]
15:50:27     INFO -      eip = 0xb55582d1   esp = 0xbfb60000   ebp = 0xbfb60068   ebx = 0xb730f6a8
15:50:27     INFO -      esi = 0xbfb600c0   edi = 0x00000001
15:50:27     INFO -      Found by: call frame info
15:50:27     INFO -  13  libxul.so!js::Invoke(JSContext*, JS::Value const&, JS::Value const&, unsigned int, JS::Value const*, JS::MutableHandle<JS::Value>) [Interpreter.cpp:a8b2d9f36497 : 533 + 0x4]
15:50:27     INFO -      eip = 0xb5558cae   esp = 0xbfb60070   ebp = 0xbfb60148   ebx = 0xb730f6a8
15:50:27     INFO -      esi = 0x00000000   edi = 0x00000000
15:50:27     INFO -      Found by: call frame info
15:50:27     INFO -  14  libxul.so!js::jit::DoCallFallback [BaselineIC.cpp:a8b2d9f36497 : 6186 + 0x7]
15:50:27     INFO -      eip = 0xb5279af6   esp = 0xbfb60150   ebp = 0xbfb603b8
15:50:27     INFO -      Found by: previous frame's frame pointer
15:50:27     INFO -  15  0xaffb6040
15:50:27     INFO -      eip = 0xaffb6041   esp = 0xbfb603c0   ebp = 0xbfb60428
15:50:27     INFO -      Found by: previous frame's frame pointer
15:50:27     INFO -  16  0xafa02bcf
15:50:27     INFO -      eip = 0xafa02bd0   esp = 0xbfb60430   ebp = 0xbfb604ac
15:50:27     INFO -      Found by: previous frame's frame pointer
15:50:27     INFO -  17  0xaffb0940
15:50:27     INFO -      eip = 0xaffb0941   esp = 0xbfb604b4   ebp = 0xbfb604d8
15:50:27     INFO -      Found by: previous frame's frame pointer
15:50:27     INFO -  18  libxul.so!EnterBaseline [BaselineJIT.cpp:a8b2d9f36497 : 135 + 0x2d]
15:50:27     INFO -      eip = 0xb5242538   esp = 0xbfb604e0   ebp = 0xbfb605c8
15:50:27     INFO -      Found by: previous frame's frame pointer
15:50:27     INFO -  19  libxul.so!js::jit::EnterBaselineAtBranch(JSContext*, js::InterpreterFrame*, unsigned char*) [BaselineJIT.cpp:a8b2d9f36497 : 241 + 0xc]
15:50:27     INFO -      eip = 0xb5265e0b   esp = 0xbfb605d0   ebp = 0xbfb606e8   ebx = 0xb730f6a8
15:50:27     INFO -      esi = 0xb1ec2300   edi = 0xb001e078
15:50:27     INFO -      Found by: call frame info
15:50:27     INFO -  20  libxul.so!Interpret [Interpreter.cpp:a8b2d9f36497 : 1819 + 0x15]
15:50:27     INFO -      eip = 0xb55557c1   esp = 0xbfb606f0   ebp = 0xbfb60bb8
15:50:27     INFO -      Found by: previous frame's frame pointer
15:50:27     INFO -  21  libxul.so!js::RunScript(JSContext*, js::RunState&) [Interpreter.cpp:a8b2d9f36497 : 428 + 0x8]
15:50:27     INFO -      eip = 0xb5557e23   esp = 0xbfb60bc0   ebp = 0xbfb60c58
15:50:27     INFO -      Found by: previous frame's frame pointer
15:50:27     INFO -  22  libxul.so!js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value const&, js::ExecuteType, js::AbstractFramePtr, JS::Value*) [Interpreter.cpp:a8b2d9f36497 : 687 + 0x4]
15:50:27     INFO -      eip = 0xb5557fca   esp = 0xbfb60c60   ebp = 0xbfb60cc8   ebx = 0xb730f6a8
15:50:27     INFO -      esi = 0x00000000   edi = 0xafff0040
15:50:27     INFO -      Found by: call frame info
15:50:27     INFO -  23  libxul.so!js::Execute(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value*) [Interpreter.cpp:a8b2d9f36497 : 720 + 0x8]
15:50:27     INFO -      eip = 0xb5558111   esp = 0xbfb60cd0   ebp = 0xbfb60d38   ebx = 0xb730f6a8
15:50:27     INFO -      esi = 0xb1ec2300   edi = 0xbfb60d88
15:50:27     INFO -      Found by: call frame info
15:50:27     INFO -  24  libxul.so!Evaluate [jsapi.cpp:a8b2d9f36497 : 4465 + 0x13]
15:50:27     INFO -      eip = 0xb546e620   esp = 0xbfb60d40   ebp = 0xbfb60e38   ebx = 0xb730f6a8
15:50:27     INFO -      esi = 0xb1ec2300   edi = 0xbfb60d80
15:50:27     INFO -      Found by: call frame info
15:50:27     INFO -  25  libxul.so!JS::Evaluate(JSContext*, JS::ReadOnlyCompileOptions const&, char const*, unsigned int, JS::MutableHandle<JS::Value>) [jsapi.cpp:a8b2d9f36497 : 4519 + 0x1b]
15:50:27     INFO -      eip = 0xb546ea2f   esp = 0xbfb60e40   ebp = 0xbfb60eb8   ebx = 0xb730f6a8
15:50:27     INFO -      esi = 0xb1ec2300   edi = 0xbfb61068
15:50:27     INFO -      Found by: call frame info
15:50:27     INFO -  26  libxul.so!XRE_XPCShellMain [XPCShellImpl.cpp:a8b2d9f36497 : 1098 + 0x2f]
15:50:27     INFO -      eip = 0xb38057c1   esp = 0xbfb60ec0   ebp = 0xbfb61178   ebx = 0xb730f6a8
15:50:27     INFO -      esi = 0x00000017   edi = 0xbfb62aff
15:50:27     INFO -      Found by: call frame info
15:50:27     INFO -  27  xpcshell!main [xpcshell.cpp:a8b2d9f36497 : 54 + 0xd]
15:50:27     INFO -      eip = 0xb77b6541   esp = 0xbfb61180   ebp = 0xbfb611b8   ebx = 0xb77b7fe0
15:50:27     INFO -      esi = 0x0000001b   edi = 0xbfb61234
15:50:27     INFO -      Found by: call frame info
15:50:27     INFO -  28  libc.so!__libc_init [libc_init_dynamic.cpp : 112 + 0xe]
15:50:27     INFO -      eip = 0xb743c52d   esp = 0xbfb611c0   ebp = 0xbfb61234
15:50:27     INFO -      Found by: previous frame's frame pointer
15:50:27     INFO -  29  xpcshell + 0xfdf
15:50:27     INFO -      eip = 0xb77b7fe0   esp = 0xbfb611f0   ebp = 0xb743c4c9   ebx = 0xb77b3f04
15:50:27     INFO -      esi = 0x00000000   edi = 0x00000000
15:50:27     INFO -      Found by: call frame info
15:50:27     INFO -  30  xpcshell + 0x4f7
15:50:27     INFO -      eip = 0xb77b64f8   esp = 0xbfb6120c   ebp = 0xb743c4c9
15:50:27     INFO -      Found by: stack scanning
15:50:27     INFO -  31  0xbfb6120f
15:50:27     INFO -      eip = 0xbfb61210   esp = 0xbfb61210   ebp = 0xb743c4c9
15:50:27     INFO -      Found by: call frame info
Blocks: 1192135
Priority: -- → P1
test_oob_cert_auth.js is disabled on emulator-x86-kk in bug 1242820.
Mass whiteboard change to annotate PSM intermittent test failures as [psm-intermittent]. Filter on 31b932bd-1aad-4e29-9f4b-4cd864a3ffdc if that's important to you.
Whiteboard: [psm-intermittent]
Status: NEW → RESOLVED
Closed: 8 years ago
Resolution: --- → INCOMPLETE
You need to log in before you can comment on or make changes to this bug.