Closed Bug 1234972 Opened 9 years ago Closed 9 years ago

[emulator-x86-kk][xpcshell] unhide devtools/shared/security/tests/unit/test_encryption.js

Categories

(Core :: Security: PSM, defect, P3)

ARM
Gonk (Firefox OS)
defect

Tracking

()

RESOLVED WONTFIX

People

(Reporter: edgar, Unassigned)

References

Details

https://treeherder.mozilla.org/logviewer.html#?job_id=14847496&repo=try [...] 13:31:49 WARNING - PROCESS-CRASH | devtools/shared/security/tests/unit/test_encryption.js | application crashed [@ DispatchCertVerificationResult::Run] 13:31:49 INFO - Crash dump filename: /tmp/tmphtdS3S/08402cd2-2b54-6c0e-5b6d3545-1f696274.dmp 13:31:49 INFO - Operating system: Android 13:31:49 INFO - 0.0.0 Linux 3.4.0+ #1 PREEMPT Fri Dec 5 17:28:48 PST 2014 i686 Android/full_x86/generic_x86:4.4.2/KOT49H/eng.worker.20151223.122803:eng/test-keys 13:31:49 INFO - CPU: x86 13:31:49 INFO - GenuineIntel family 6 model 3 stepping 3 13:31:49 INFO - 1 CPU 13:31:49 INFO - Crash reason: SIGSEGV 13:31:49 INFO - Crash address: 0x0 13:31:49 INFO - Thread 0 (crashed) 13:31:49 INFO - 0 libxul.so!DispatchCertVerificationResult::Run [nsCertVerificationThread.cpp:3779955620ed : 28 + 0x1] 13:31:49 INFO - eip = 0xb34611c9 esp = 0xbfb6520c ebp = 0xbfb65228 ebx = 0xb72796a8 13:31:49 INFO - esi = 0xafa8fe80 edi = 0xaedcc680 eax = 0x00000000 ecx = 0x00091ff0 13:31:49 INFO - edx = 0xb771f2a0 efl = 0x00000202 13:31:49 INFO - Found by: given as instruction pointer in context 13:31:49 INFO - 1 libxul.so!nsThread::ProcessNextEvent(bool, bool*) [nsThread.cpp:3779955620ed : 964 + 0x5] 13:31:49 INFO - eip = 0xb341397c esp = 0xbfb65230 ebp = 0xbfb652a8 ebx = 0xb72796a8 13:31:49 INFO - esi = 0xbfb653f0 edi = 0x00000000 13:31:49 INFO - Found by: call frame info 13:31:49 INFO - 2 libxul.so!NS_InvokeByIndex + 0x2f 13:31:49 INFO - eip = 0xb341b400 esp = 0xbfb652b0 ebp = 0xbfb652d8 ebx = 0xb72796a8 13:31:49 INFO - esi = 0x00000002 edi = 0xbfb653f0 13:31:49 INFO - Found by: call frame info 13:31:49 INFO - 3 libxul.so!XPCWrappedNative::CallMethod(XPCCallContext&, XPCWrappedNative::CallMode) [XPCWrappedNative.cpp:3779955620ed : 2097 + 0x15] 13:31:49 INFO - eip = 0xb385c1b7 esp = 0xbfb652e0 ebp = 0xbfb65488 13:31:49 INFO - Found by: previous frame's frame pointer 13:31:49 INFO - 4 libxul.so!XPC_WN_CallMethod(JSContext*, unsigned int, JS::Value*) [XPCWrappedNativeJSOps.cpp:3779955620ed : 1115 + 0x9] 13:31:49 INFO - eip = 0xb385c8f1 esp = 0xbfb65490 ebp = 0xbfb65558 ebx = 0xb72796a8 13:31:49 INFO - esi = 0xbfb654e4 edi = 0xb00f2a20 13:31:49 INFO - Found by: call frame info 13:31:49 INFO - 5 0xb20b0de8 13:31:49 INFO - eip = 0xb20b0de9 esp = 0xbfb65560 ebp = 0xbfb655a0 ebx = 0xb202a190 13:31:49 INFO - esi = 0xb20b2d94 edi = 0xaf4f6a88 13:31:49 INFO - Found by: call frame info 13:31:49 INFO - 6 0xaf4f6a87 13:31:49 INFO - eip = 0xaf4f6a88 esp = 0xbfb655a8 ebp = 0xbfb655fc 13:31:49 INFO - Found by: previous frame's frame pointer 13:31:49 INFO - 7 0xb00b0940 13:31:49 INFO - eip = 0xb00b0941 esp = 0xbfb65604 ebp = 0xbfb65628 13:31:49 INFO - Found by: previous frame's frame pointer 13:31:49 INFO - 8 libxul.so!EnterBaseline [BaselineJIT.cpp:3779955620ed : 135 + 0x2d] 13:31:49 INFO - eip = 0xb520ac08 esp = 0xbfb65630 ebp = 0xbfb65718 13:31:49 INFO - Found by: previous frame's frame pointer 13:31:49 INFO - 9 libxul.so!js::jit::EnterBaselineAtBranch(JSContext*, js::InterpreterFrame*, unsigned char*) [BaselineJIT.cpp:3779955620ed : 245 + 0xc] 13:31:49 INFO - eip = 0xb522eaeb esp = 0xbfb65720 ebp = 0xbfb65838 ebx = 0xb72796a8 13:31:49 INFO - esi = 0xb1ec3300 edi = 0xb0151128 13:31:49 INFO - Found by: call frame info 13:31:49 INFO - 10 libxul.so!Interpret [Interpreter.cpp:3779955620ed : 1802 + 0x15] 13:31:49 INFO - eip = 0xb553526c esp = 0xbfb65840 ebp = 0xbfb65d28 13:31:49 INFO - Found by: previous frame's frame pointer 13:31:49 INFO - 11 libxul.so!js::RunScript(JSContext*, js::RunState&) [Interpreter.cpp:3779955620ed : 407 + 0x8] 13:31:49 INFO - eip = 0xb5537673 esp = 0xbfb65d30 ebp = 0xbfb65dc8 13:31:49 INFO - Found by: previous frame's frame pointer 13:31:49 INFO - 12 libxul.so!js::Invoke(JSContext*, JS::CallArgs const&, js::MaybeConstruct) [Interpreter.cpp:3779955620ed : 478 + 0x12] 13:31:49 INFO - eip = 0xb5537b31 esp = 0xbfb65dd0 ebp = 0xbfb65e38 ebx = 0xb72796a8 13:31:49 INFO - esi = 0xbfb65e90 edi = 0x00000001 13:31:49 INFO - Found by: call frame info 13:31:49 INFO - 13 libxul.so!js::Invoke(JSContext*, JS::Value const&, JS::Value const&, unsigned int, JS::Value const*, JS::MutableHandle<JS::Value>) [Interpreter.cpp:3779955620ed : 512 + 0x4] 13:31:49 INFO - eip = 0xb55387de esp = 0xbfb65e40 ebp = 0xbfb65f18 ebx = 0xb72796a8 13:31:49 INFO - esi = 0x00000000 edi = 0x00000000 13:31:49 INFO - Found by: call frame info 13:31:49 INFO - 14 libxul.so!js::jit::DoCallFallback [BaselineIC.cpp:3779955620ed : 6164 + 0x7] 13:31:49 INFO - eip = 0xb5242436 esp = 0xbfb65f20 ebp = 0xbfb66188 13:31:49 INFO - Found by: previous frame's frame pointer 13:31:49 INFO - 15 0xb00b5e90 13:31:49 INFO - eip = 0xb00b5e91 esp = 0xbfb66190 ebp = 0xbfb661f8 13:31:49 INFO - Found by: previous frame's frame pointer 13:31:49 INFO - 16 0xafa54b6f 13:31:49 INFO - eip = 0xafa54b70 esp = 0xbfb66200 ebp = 0xbfb6627c 13:31:49 INFO - Found by: previous frame's frame pointer 13:31:49 INFO - 17 0xb00b0940 13:31:49 INFO - eip = 0xb00b0941 esp = 0xbfb66284 ebp = 0xbfb662a8 13:31:49 INFO - Found by: previous frame's frame pointer 13:31:49 INFO - 18 libxul.so!EnterBaseline [BaselineJIT.cpp:3779955620ed : 135 + 0x2d] 13:31:49 INFO - eip = 0xb520ac08 esp = 0xbfb662b0 ebp = 0xbfb66398 13:31:49 INFO - Found by: previous frame's frame pointer 13:31:49 INFO - 19 libxul.so!js::jit::EnterBaselineAtBranch(JSContext*, js::InterpreterFrame*, unsigned char*) [BaselineJIT.cpp:3779955620ed : 245 + 0xc] 13:31:49 INFO - eip = 0xb522eaeb esp = 0xbfb663a0 ebp = 0xbfb664b8 ebx = 0xb72796a8 13:31:49 INFO - esi = 0xb1ec3300 edi = 0xb0151078 13:31:49 INFO - Found by: call frame info 13:31:49 INFO - 20 libxul.so!Interpret [Interpreter.cpp:3779955620ed : 1802 + 0x15] 13:31:49 INFO - eip = 0xb553526c esp = 0xbfb664c0 ebp = 0xbfb669a8 13:31:49 INFO - Found by: previous frame's frame pointer 13:31:49 INFO - 21 libxul.so!js::RunScript(JSContext*, js::RunState&) [Interpreter.cpp:3779955620ed : 407 + 0x8] 13:31:49 INFO - eip = 0xb5537673 esp = 0xbfb669b0 ebp = 0xbfb66a48 13:31:49 INFO - Found by: previous frame's frame pointer 13:31:49 INFO - 22 libxul.so!js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value const&, js::ExecuteType, js::AbstractFramePtr, JS::Value*) [Interpreter.cpp:3779955620ed : 666 + 0x4] 13:31:49 INFO - eip = 0xb553781a esp = 0xbfb66a50 ebp = 0xbfb66ab8 ebx = 0xb72796a8 13:31:49 INFO - esi = 0x00000000 edi = 0xb00eb040 13:31:49 INFO - Found by: call frame info 13:31:49 INFO - 23 libxul.so!js::Execute(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value*) [Interpreter.cpp:3779955620ed : 701 + 0x4] 13:31:49 INFO - eip = 0xb5537969 esp = 0xbfb66ac0 ebp = 0xbfb66b28 ebx = 0xb72796a8 13:31:49 INFO - esi = 0xb1ec3300 edi = 0xbfb66b78 13:31:49 INFO - Found by: call frame info 13:31:49 INFO - 24 libxul.so!Evaluate [jsapi.cpp:3779955620ed : 4406 + 0x13] 13:31:49 INFO - eip = 0xb5410570 esp = 0xbfb66b30 ebp = 0xbfb66c28 ebx = 0xb72796a8 13:31:49 INFO - esi = 0xb1ec3300 edi = 0xbfb66b70 13:31:49 INFO - Found by: call frame info 13:31:49 INFO - 25 libxul.so!JS::Evaluate(JSContext*, JS::ReadOnlyCompileOptions const&, char const*, unsigned int, JS::MutableHandle<JS::Value>) [jsapi.cpp:3779955620ed : 4460 + 0x1b] 13:31:49 INFO - eip = 0xb54108af esp = 0xbfb66c30 ebp = 0xbfb66ca8 ebx = 0xb72796a8 13:31:49 INFO - esi = 0xb1ec3300 edi = 0xbfb66e58 13:31:49 INFO - Found by: call frame info 13:31:49 INFO - 26 libxul.so!XRE_XPCShellMain [XPCShellImpl.cpp:3779955620ed : 1096 + 0x2f] 13:31:49 INFO - eip = 0xb3857166 esp = 0xbfb66cb0 ebp = 0xbfb66f68 ebx = 0xb72796a8 13:31:49 INFO - esi = 0x00000017 edi = 0xbfb67ae5 13:31:49 INFO - Found by: call frame info 13:31:49 INFO - 27 xpcshell!main [xpcshell.cpp:3779955620ed : 54 + 0xd] 13:31:49 INFO - eip = 0xb7720541 esp = 0xbfb66f70 ebp = 0xbfb66fa8 ebx = 0xb7721fe0 13:31:49 INFO - esi = 0x0000001b edi = 0xbfb67024 13:31:49 INFO - Found by: call frame info 13:31:49 INFO - 28 libc.so!__libc_init [libc_init_dynamic.cpp : 112 + 0xe] 13:31:49 INFO - eip = 0xb73a652d esp = 0xbfb66fb0 ebp = 0xbfb67024 13:31:49 INFO - Found by: previous frame's frame pointer 13:31:49 INFO - 29 xpcshell + 0xfdf 13:31:49 INFO - eip = 0xb7721fe0 esp = 0xbfb66fe0 ebp = 0xb73a64c9 ebx = 0xb771df04 13:31:49 INFO - esi = 0x00000000 edi = 0x00000000 13:31:49 INFO - Found by: call frame info 13:31:49 INFO - 30 xpcshell + 0x4f7 13:31:49 INFO - eip = 0xb77204f8 esp = 0xbfb66ffc ebp = 0xb73a64c9 13:31:49 INFO - Found by: stack scanning 13:31:49 INFO - 31 0xbfb66fff 13:31:49 INFO - eip = 0xbfb67000 esp = 0xbfb67000 ebp = 0xb73a64c9 13:31:49 INFO - Found by: call frame info [...]
See Also: → 1206586
Component: General → Security: PSM
Product: Firefox OS → Core
Hi J Ryan, we are tracking this bug. I see your name is associated with the file test_encryption.js. Do you know who is the best person to contact for fixing this issue?
Flags: needinfo?(jryans)
I did write the test and module being tested. How often does the crash occur?
Flags: needinfo?(jryans) → needinfo?(ettseng)
(In reply to J. Ryan Stinnett [:jryans] (use ni?) from comment #2) > I did write the test and module being tested. How often does the crash > occur? Edgar, do you have answer for this question?
Flags: needinfo?(ettseng) → needinfo?(echen)
Priority: -- → P1
Flags: needinfo?(echen)
test_encryption.js is disabled on emulator-x86-kk in bug 1242820.
I cannot reproduce this bug after a few tries on my local emulator-x86-kk build.
Per comment 7, modify the bug description a bit, and re-set priority as it doesn't block emu-x86-kk stabilization at the moment.
Priority: P1 → P3
Summary: [emulator-x86-kk][xpcshell] PROCESS-CRASH | devtools/shared/security/tests/unit/test_encryption.js | application crashed [@ DispatchCertVerificationResult::Run] → [emulator-x86-kk][xpcshell] unhide devtools/shared/security/tests/unit/test_encryption.js
Is this still an important item to address?
Flags: needinfo?(echen)
No, this is not an important item to address given that B2G is moved to tier-3 now. Thank you.
Flags: needinfo?(echen)
Ok - thanks. I'll close this as wontfix for now, unless/until someone decides to pick it up.
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → WONTFIX
You need to log in before you can comment on or make changes to this bug.