Closed Bug 1657863 Opened 4 months ago Closed 4 months ago

Perma Windows 10 x64 MinGW cppunit WindowsDllInterceptor | Fail to enable ProcessDynamicCodePolicy. TestDllInterceptor.exe | test failed with return code 1

Categories

(Firefox Build System :: General, defect, P5)

defect

Tracking

(firefox-esr68 unaffected, firefox-esr78 unaffected, firefox79 unaffected, firefox80 unaffected, firefox81 fixed)

RESOLVED FIXED
81 Branch
Tracking Status
firefox-esr68 --- unaffected
firefox-esr78 --- unaffected
firefox79 --- unaffected
firefox80 --- unaffected
firefox81 --- fixed

People

(Reporter: intermittent-bug-filer, Assigned: glandium)

References

(Regression)

Details

(Keywords: intermittent-failure, regression)

Attachments

(1 file)

Filed by: btara [at] mozilla.com
Parsed log: https://treeherder.mozilla.org/logviewer.html#?job_id=312367892&repo=mozilla-central
Full log: https://firefox-ci-tc.services.mozilla.com/api/queue/v1/task/VptzgDGnTbK5L1xIHgAc_Q/runs/0/artifacts/public/logs/live_backing.log


[task 2020-08-07T10:26:11.661Z] 10:26:11     INFO -  TEST-START | TestDllInterceptor.exe
[task 2020-08-07T10:26:11.701Z] 10:26:11     INFO -  PID 10768 |
[task 2020-08-07T10:26:11.702Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Hook added
[task 2020-08-07T10:26:11.702Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Hook called
[task 2020-08-07T10:26:11.703Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Hook works properly
[task 2020-08-07T10:26:11.704Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Hook was called after unregistration
[task 2020-08-07T10:26:11.704Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Original function worked properly
[task 2020-08-07T10:26:11.704Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function NtMapViewOfSection from ntdll.dll
[task 2020-08-07T10:26:11.705Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | MovPushRet
[task 2020-08-07T10:26:11.705Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | MovRaxJump
[task 2020-08-07T10:26:11.706Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | DoubleJump
[task 2020-08-07T10:26:11.707Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | NearJump
[task 2020-08-07T10:26:11.707Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | MovPushRet
[task 2020-08-07T10:26:11.708Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | MovRaxJump
[task 2020-08-07T10:26:11.708Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | DoubleJump
[task 2020-08-07T10:26:11.709Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook NtCreateFile from ntdll.dll
[task 2020-08-07T10:26:11.709Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function NtCreateFile from ntdll.dll
[task 2020-08-07T10:26:11.710Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook NtReadFile from ntdll.dll
[task 2020-08-07T10:26:11.710Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function NtReadFile from ntdll.dll
[task 2020-08-07T10:26:11.711Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook NtReadFileScatter from ntdll.dll
[task 2020-08-07T10:26:11.712Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function NtReadFileScatter from ntdll.dll
[task 2020-08-07T10:26:11.712Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook NtWriteFile from ntdll.dll
[task 2020-08-07T10:26:11.713Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function NtWriteFile from ntdll.dll
[task 2020-08-07T10:26:11.713Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook NtWriteFileGather from ntdll.dll
[task 2020-08-07T10:26:11.713Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function NtWriteFileGather from ntdll.dll
[task 2020-08-07T10:26:11.713Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook NtQueryFullAttributesFile from ntdll.dll
[task 2020-08-07T10:26:11.714Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function NtQueryFullAttributesFile from ntdll.dll
[task 2020-08-07T10:26:11.714Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could detour LdrLoadDll from ntdll.dll
[task 2020-08-07T10:26:11.715Z] 10:26:11     INFO -  TEST-SKIPPED | WindowsDllInterceptor | Will not attempt to execute patched LdrLoadDll.
[task 2020-08-07T10:26:11.715Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook LdrUnloadDll from ntdll.dll
[task 2020-08-07T10:26:11.715Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function LdrUnloadDll from ntdll.dll
[task 2020-08-07T10:26:11.715Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook LdrResolveDelayLoadedAPI from ntdll.dll
[task 2020-08-07T10:26:11.715Z] 10:26:11     INFO -  TEST-SKIPPED | WindowsDllInterceptor | Will not attempt to execute patched LdrResolveDelayLoadedAPI.
[task 2020-08-07T10:26:11.716Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook ApiSetQueryApiSetPresence from Api-ms-win-core-apiquery-l1-1-0.dll
[task 2020-08-07T10:26:11.716Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function ApiSetQueryApiSetPresence from Api-ms-win-core-apiquery-l1-1-0.dll
[task 2020-08-07T10:26:11.716Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook QueryDosDeviceW from kernelbase.dll
[task 2020-08-07T10:26:11.716Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function QueryDosDeviceW from kernelbase.dll
[task 2020-08-07T10:26:11.716Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook GetFileAttributesW from kernel32.dll
[task 2020-08-07T10:26:11.716Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function GetFileAttributesW from kernel32.dll
[task 2020-08-07T10:26:11.716Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook SetUnhandledExceptionFilter from kernel32.dll
[task 2020-08-07T10:26:11.716Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function SetUnhandledExceptionFilter from kernel32.dll
[task 2020-08-07T10:26:11.716Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook CreateFileA from kernel32.dll
[task 2020-08-07T10:26:11.716Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function CreateFileA from kernel32.dll
[task 2020-08-07T10:26:11.716Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook TlsAlloc from kernel32.dll
[task 2020-08-07T10:26:11.716Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function TlsAlloc from kernel32.dll
[task 2020-08-07T10:26:11.716Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook TlsFree from kernel32.dll
[task 2020-08-07T10:26:11.717Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function TlsFree from kernel32.dll
[task 2020-08-07T10:26:11.717Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook CloseHandle from kernel32.dll
[task 2020-08-07T10:26:11.717Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function CloseHandle from kernel32.dll
[task 2020-08-07T10:26:11.717Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook DuplicateHandle from kernel32.dll
[task 2020-08-07T10:26:11.717Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function DuplicateHandle from kernel32.dll
[task 2020-08-07T10:26:11.717Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could detour BaseThreadInitThunk from kernel32.dll
[task 2020-08-07T10:26:11.717Z] 10:26:11     INFO -  TEST-SKIPPED | WindowsDllInterceptor | Will not attempt to execute patched BaseThreadInitThunk.
[task 2020-08-07T10:26:11.717Z] 10:26:11     INFO -  TEST-SKIPPED | WindowsDllInterceptor | Skipped hook test for RtlInstallFunctionTableCallback from kernel32.dll
[task 2020-08-07T10:26:11.717Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook GetKeyState from user32.dll
[task 2020-08-07T10:26:11.717Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function GetKeyState from user32.dll
[task 2020-08-07T10:26:11.717Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook GetWindowInfo from user32.dll
[task 2020-08-07T10:26:11.718Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function GetWindowInfo from user32.dll
[task 2020-08-07T10:26:11.718Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook TrackPopupMenu from user32.dll
[task 2020-08-07T10:26:11.718Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function TrackPopupMenu from user32.dll
[task 2020-08-07T10:26:11.718Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could detour CreateWindowExW from user32.dll
[task 2020-08-07T10:26:11.718Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function CreateWindowExW from user32.dll
[task 2020-08-07T10:26:11.718Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook InSendMessageEx from user32.dll
[task 2020-08-07T10:26:11.718Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function InSendMessageEx from user32.dll
[task 2020-08-07T10:26:11.718Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook SendMessageTimeoutW from user32.dll
[task 2020-08-07T10:26:11.718Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function SendMessageTimeoutW from user32.dll
[task 2020-08-07T10:26:11.718Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook SetCursorPos from user32.dll
[task 2020-08-07T10:26:11.719Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function SetCursorPos from user32.dll
[task 2020-08-07T10:26:11.719Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook ImmGetContext from imm32.dll
[task 2020-08-07T10:26:11.719Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function ImmGetContext from imm32.dll
[task 2020-08-07T10:26:11.719Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook ImmGetCompositionStringW from imm32.dll
[task 2020-08-07T10:26:11.719Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function ImmGetCompositionStringW from imm32.dll
[task 2020-08-07T10:26:11.719Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook ImmSetCandidateWindow from imm32.dll
[task 2020-08-07T10:26:11.719Z] 10:26:11     INFO -  TEST-SKIPPED | WindowsDllInterceptor | Will not attempt to execute patched ImmSetCandidateWindow.
[task 2020-08-07T10:26:11.719Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook ImmNotifyIME from imm32.dll
[task 2020-08-07T10:26:11.719Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function ImmNotifyIME from imm32.dll
[task 2020-08-07T10:26:11.719Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook GetSaveFileNameW from comdlg32.dll
[task 2020-08-07T10:26:11.720Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function GetSaveFileNameW from comdlg32.dll
[task 2020-08-07T10:26:11.720Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook GetOpenFileNameW from comdlg32.dll
[task 2020-08-07T10:26:11.720Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function GetOpenFileNameW from comdlg32.dll
[task 2020-08-07T10:26:11.720Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook PrintDlgW from comdlg32.dll
[task 2020-08-07T10:26:11.720Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function PrintDlgW from comdlg32.dll
[task 2020-08-07T10:26:11.720Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook ProcessCaretEvents from tiptsf.dll
[task 2020-08-07T10:26:11.720Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function ProcessCaretEvents from tiptsf.dll
[task 2020-08-07T10:26:11.720Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook InternetOpenA from wininet.dll
[task 2020-08-07T10:26:11.720Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function InternetOpenA from wininet.dll
[task 2020-08-07T10:26:11.720Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook InternetCloseHandle from wininet.dll
[task 2020-08-07T10:26:11.720Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function InternetCloseHandle from wininet.dll
[task 2020-08-07T10:26:11.720Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook InternetConnectA from wininet.dll
[task 2020-08-07T10:26:11.720Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function InternetConnectA from wininet.dll
[task 2020-08-07T10:26:11.721Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook InternetQueryDataAvailable from wininet.dll
[task 2020-08-07T10:26:11.721Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function InternetQueryDataAvailable from wininet.dll
[task 2020-08-07T10:26:11.721Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook InternetReadFile from wininet.dll
[task 2020-08-07T10:26:11.721Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function InternetReadFile from wininet.dll
[task 2020-08-07T10:26:11.721Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook InternetWriteFile from wininet.dll
[task 2020-08-07T10:26:11.721Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function InternetWriteFile from wininet.dll
[task 2020-08-07T10:26:11.721Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook InternetSetOptionA from wininet.dll
[task 2020-08-07T10:26:11.721Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function InternetSetOptionA from wininet.dll
[task 2020-08-07T10:26:11.721Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook HttpAddRequestHeadersA from wininet.dll
[task 2020-08-07T10:26:11.721Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function HttpAddRequestHeadersA from wininet.dll
[task 2020-08-07T10:26:11.721Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook HttpOpenRequestA from wininet.dll
[task 2020-08-07T10:26:11.722Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function HttpOpenRequestA from wininet.dll
[task 2020-08-07T10:26:11.722Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook HttpQueryInfoA from wininet.dll
[task 2020-08-07T10:26:11.722Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function HttpQueryInfoA from wininet.dll
[task 2020-08-07T10:26:11.722Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook HttpSendRequestA from wininet.dll
[task 2020-08-07T10:26:11.722Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function HttpSendRequestA from wininet.dll
[task 2020-08-07T10:26:11.722Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook HttpSendRequestExA from wininet.dll
[task 2020-08-07T10:26:11.722Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function HttpSendRequestExA from wininet.dll
[task 2020-08-07T10:26:11.722Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook HttpEndRequestA from wininet.dll
[task 2020-08-07T10:26:11.722Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function HttpEndRequestA from wininet.dll
[task 2020-08-07T10:26:11.722Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook InternetQueryOptionA from wininet.dll
[task 2020-08-07T10:26:11.722Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function InternetQueryOptionA from wininet.dll
[task 2020-08-07T10:26:11.722Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook AcquireCredentialsHandleA from sspicli.dll
[task 2020-08-07T10:26:11.723Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function AcquireCredentialsHandleA from sspicli.dll
[task 2020-08-07T10:26:11.723Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook QueryCredentialsAttributesA from sspicli.dll
[task 2020-08-07T10:26:11.723Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function QueryCredentialsAttributesA from sspicli.dll
[task 2020-08-07T10:26:11.723Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Could hook FreeCredentialsHandle from sspicli.dll
[task 2020-08-07T10:26:11.723Z] 10:26:11     INFO -  TEST-PASS | WindowsDllInterceptor | Executed hooked function FreeCredentialsHandle from sspicli.dll
[task 2020-08-07T10:26:11.723Z] 10:26:11  WARNING -  TEST-UNEXPECTED-FAIL | WindowsDllInterceptor | Fail to enable ProcessDynamicCodePolicy.
[task 2020-08-07T10:26:11.723Z] 10:26:11     INFO -  mozcrash checking c:\users\task_1596794687\appdata\local\temp\tmpci2abl for minidumps...
[task 2020-08-07T10:26:11.723Z] 10:26:11  WARNING -  TEST-UNEXPECTED-FAIL | TestDllInterceptor.exe | test failed with return code 1
[task 2020-08-07T10:26:11.723Z] 10:26:11     INFO -  TEST-INFO took 48ms
Flags: needinfo?(mh+mozilla)

Bug 1656141 effectively added manifests that mingw builds didn't have before. I did this on purpose. For some reason, though, it broke this test (while the same test with the same manifest doesn't fail on clang-cl windows builds). Tom, any idea why this would fail? The manifest is the one here: https://searchfox.org/mozilla-central/source/mozglue/tests/interceptor/TestDllInterceptor.exe.manifest

Flags: needinfo?(mh+mozilla) → needinfo?(tom)

Fail to enable ProcessDynamicCodePolicy.

And only happens on x64, not x86. I don't have the slightest idea. Adding Jacek and MArtin in case they have an idea.

You can disable it with something like (cc_type == "clang" && os == 'win' and bits == 64); and if you could file a followup bug to investigate, linked to this and 1656141, blocking mingw-clang, that would be great.

Flags: needinfo?(tom)
Flags: needinfo?(mh+mozilla)
Summary: Perma Tier 2 WindowsDllInterceptor | Fail to enable ProcessDynamicCodePolicy. TestDllInterceptor.exe | test failed with return code 1 → Perma Windows 10 x64 MinGW cppunit WindowsDllInterceptor | Fail to enable ProcessDynamicCodePolicy. TestDllInterceptor.exe | test failed with return code 1

This wasn't happening before bug 1656141 and apparently causes problems.
So until we can sort them out...

Assignee: nobody → mh+mozilla
Status: NEW → ASSIGNED
Flags: needinfo?(mh+mozilla)
Pushed by mh@glandium.org:
https://hg.mozilla.org/integration/autoland/rev/a47d1c31b581
Skip adding manifests automatically on mingw builds. r=froydnj
Status: ASSIGNED → RESOLVED
Closed: 4 months ago
Resolution: --- → FIXED
Target Milestone: --- → 81 Branch
You need to log in before you can comment on or make changes to this bug.