Closed Bug 308727 (kpkcs11) Opened 19 years ago Closed 19 years ago

NSS tries to call C_WaitForSlotEvent on PKCS#11 2.0 modules

Categories

(NSS :: Libraries, defect, P2)

3.10
defect

Tracking

(Not tracked)

RESOLVED FIXED
3.10.2

People

(Reporter: rlcarlson, Assigned: rrelyea)

References

()

Details

(Keywords: crash)

Attachments

(2 files, 1 obsolete file)

User-Agent:       Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6

Going to any https:// website crashes FireFox.  It does display the page while
submitting the bug report.

Reproducible: Always

Steps to Reproduce:
1.go to any https:// website
2.
3.

Actual Results:  
Crash

Expected Results:  
Shown the page
Please submit a talkback report for the crash. http://kb.mozillazine.org/Talkback

1.Close Firefox
2.Open Firefox via Windows Start menu-> Firefox-safemode
3.try any https://

(your report is odd though, bugzilla is https and yet you filed this bug with
that same browser)
Keywords: crash
Yes, Bugzilla is https.  That is why I had to un-install Firefox Beta 1.5 and
re-install Firefox 1.0.6 before I could even file the Bug report.  I will try
re-installing 1.5 beta tomorrow and try safe mode.
I've sent in various crash reports as requested.
I re-installed Firefox 1.5 Beta and started it in safe mode.
It still crashed when going to any https web site.
This is on a Dell Latitude D800 machine running XP Professional with all the
latest patches.
I then installed Firefox 1.5 Beta on a Compaq Presario R4000, running XP
Professional with all the latest patches.  Firefox 1.5 Beta 1 seems to run fine
on that machine.
Should I re-build the D800 from scratch?  That will take a few days.
Incident ID: 9385916
Incident ID: 9385776
Incident ID: 9385464
Incident ID: 9385407
Incident ID: 9385391
Incident ID: 9356329
ignore the first crasher, that's some other top crash which i will be forking 
off.

Incident ID: 9385776 
Stack Signature 0x000a0027 4cd951f6 
Product ID Firefox15 
Build ID 2005090806 
Trigger Time 2005-09-15 12:21:22.0 
Platform Win32 
Operating System Windows NT 5.1 build 2600 
Module  
URL visited https://portal.anl.gov/portal/dt 
User Comments  
Since Last Crash 543 sec 
Total Uptime 4225 sec 
Trigger Reason Access violation 
Source File, Line No. N/A 
Stack Trace  

0x000a0027
SECMOD_WaitForAnyTokenEvent  [c:/builds/tinderbox/Fx-
Mozilla1.8/WINNT_5.2_Depend/mozilla/security/nss/lib/pk11wrap/pk11util.c, line 
1071]
0x244c8b00
0x33333333
Assignee: nobody → wtchang
Status: UNCONFIRMED → NEW
Component: General → Libraries
Ever confirmed: true
Product: Firefox → NSS
QA Contact: general → jason.m.reid
Summary: FireFox 1.5 Beta crashes any time I try to go to a https:// website → FireFox 1.5 Beta crashes any time I try to go to a https:// website [@ 0x000a0027 - SECMOD_WaitForAnyTokenEvent]
I found this under Dr. Watson, if it helps any:

Application exception occurred:
        App: C:\PROGRA~1\MOZILL~1\firefox.exe (pid=3748)
        When: 9/15/2005 @ 14:08:07.291
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: RLCLAPTOP
        User Name: b28384
        Terminal Session Id: 0
        Number of Processors: 1
        Processor Type: x86 Family 6 Model 9 Stepping 5
        Windows Version: 5.1
        Current Build: 2600
        Service Pack: 2
        Current Type: Uniprocessor Free
        Registered Organization: Argonne National Laboratory
        Registered Owner: Ray Carlson

*----> Task List <----*
   0 System Process
   4 System
 864 smss.exe
 968 csrss.exe
 992 winlogon.exe
1036 services.exe
1048 lsass.exe
1244 svchost.exe
1332 svchost.exe
1440 svchost.exe
1492 svchost.exe
1572 svchost.exe
1804 wltrysvc.exe
1816 bcmwltry.exe
1884 spoolsv.exe
1920 SCardSvr.exe
 276 Explorer.EXE
 376 Apoint.exe
 440 DirectCD.exe
 456 Apntex.exe
 488 pccguide.exe
 496 PCCClient.exe
 508 Pop3trap.exe
 600 DSentry.exe
 608 WLTRAY.exe
 628 Acrotray.exe
 640 quickset.exe
 668 jusched.exe
 712 iTunesHelper.exe
 744 qttask.exe
 764 ctfmon.exe
 844 BTTray.exe
 908 BTSTAC~1.EXE
1296 btwdins.exe
1384 cvpnd.exe
1472 MDM.EXE
1588 NICCONFIGSVC.exe
1700 nvsvc32.exe
1792 svchost.exe
2088 Tmntsrv.exe
2176 wdfmgr.exe
2256 uphclean.exe
2304 tmproxy.exe
2340 mDNSResponder.exe
2608 PccPfw.exe
3056 wmiprvse.exe
3228 iPodService.exe
4092 alg.exe
3780 leash32.exe
3800 krbcc32s.exe
3748 firefox.exe
1520 PlugAPOP.exe
1084 putty.exe
3112 OUTLOOK.EXE
3328 WINWORD.EXE
3712 AgentSvr.exe
3676 mstsc.exe
3436 talkback.exe
1392 drwtsn32.exe

*----> Module List <----*
(0000000000400000 - 0000000000ad7000: C:\PROGRA~1\MOZILL~1\firefox.exe
(0000000001480000 - 000000000148f000: C:\Program Files\Dell\Bluetooth
Software\btkeyind.dll
(00000000015a0000 - 00000000015c5000:
C:\PROGRA~1\MOZILL~1\extensions\talkback@mozilla.org\components\fullsoft.dll
(0000000001700000 - 0000000001706000:
C:\PROGRA~1\MOZILL~1\extensions\talkback@mozilla.org\components\qfaservices.dll
(0000000001950000 - 0000000001962000: C:\Program Files\Dell\QuickSet\dadkeyb.dll
(0000000001ce0000 - 0000000001d36000: C:\Program Files\kx509\kpkcs11.dll
(0000000002420000 - 0000000002450000: C:\PROGRA~1\MOZILL~1\plugins\npbrowster.dll
(00000000027a0000 - 00000000027b9000: C:\Program Files\Bonjour\mdnsNSP.dll
(000000000ffd0000 - 000000000fff8000: C:\WINDOWS\system32\rsaenh.dll
(0000000010000000 - 0000000010017000:
C:\PROGRA~1\MOZILL~1\extensions\talkback@mozilla.org\components\BrandRes.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(000000004ec50000 - 000000004edf3000:
C:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_6595b64144ccf1df_1.0.2600.2180_x-ww_522f9f82\gdiplus.dll
(0000000059a60000 - 0000000059b01000: C:\WINDOWS\system32\DBGHELP.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\uxtheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(0000000060010000 - 0000000060022000: C:\PROGRA~1\MOZILL~1\components\jar50.dll
(0000000060030000 - 000000006003f000: C:\PROGRA~1\MOZILL~1\components\jsd3250.dll
(0000000060040000 - 000000006006c000: C:\PROGRA~1\MOZILL~1\components\xpinstal.dll
(0000000060080000 - 0000000060091000: C:\PROGRA~1\MOZILL~1\gksvggdiplus.dll
(00000000600a0000 - 0000000060108000: C:\PROGRA~1\MOZILL~1\js3250.dll
(0000000060160000 - 0000000060187000: C:\PROGRA~1\MOZILL~1\nspr4.dll
(0000000060190000 - 00000000601e8000: C:\PROGRA~1\MOZILL~1\nss3.dll
(00000000601f0000 - 000000006022a000: C:\Program Files\Mozilla Firefox\nssckbi.dll
(0000000060230000 - 0000000060237000: C:\PROGRA~1\MOZILL~1\plc4.dll
(0000000060240000 - 0000000060246000: C:\PROGRA~1\MOZILL~1\plds4.dll
(0000000060250000 - 0000000060258000: C:\PROGRA~1\MOZILL~1\plugins\npnul32.dll
(0000000060260000 - 000000006027a000: C:\PROGRA~1\MOZILL~1\smime3.dll
(0000000060280000 - 00000000602da000: C:\PROGRA~1\MOZILL~1\softokn3.dll
(00000000602e0000 - 00000000602fb000: C:\PROGRA~1\MOZILL~1\ssl3.dll
(0000000060310000 - 0000000060324000: C:\PROGRA~1\MOZILL~1\xpcom_compat.dll
(0000000060330000 - 0000000060396000: C:\PROGRA~1\MOZILL~1\xpcom_core.dll
(00000000605d0000 - 00000000605d9000: C:\WINDOWS\system32\mslbui.dll
(00000000662b0000 - 0000000066308000: C:\WINDOWS\system32\hnetcfg.dll
(0000000071a50000 - 0000000071a8f000: C:\WINDOWS\system32\mswsock.dll
(0000000071a90000 - 0000000071a98000: C:\WINDOWS\System32\wshtcpip.dll
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\WSOCK32.dll
(00000000722b0000 - 00000000722b5000: C:\WINDOWS\system32\sensapi.dll
(0000000073000000 - 0000000073026000: C:\WINDOWS\system32\WINSPOOL.DRV
(00000000746f0000 - 000000007471a000: C:\WINDOWS\System32\msimtf.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\system32\msimg32.dll
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.DLL
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\imagehlp.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076e90000 - 0000000076ea2000: C:\WINDOWS\system32\rasman.dll
(0000000076eb0000 - 0000000076edf000: C:\WINDOWS\system32\TAPI32.dll
(0000000076ee0000 - 0000000076f1c000: C:\WINDOWS\system32\RASAPI32.DLL
(0000000076f20000 - 0000000076f47000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fb0000 - 0000000076fb8000: C:\WINDOWS\System32\winrnr.dll
(0000000076fc0000 - 0000000076fc6000: C:\WINDOWS\system32\rasadhlp.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININET.dll
(0000000077260000 - 00000000772fe000: C:\WINDOWS\system32\urlmon.dll
(00000000773d0000 - 00000000774d2000:
C:\WINDOWS\WinSxS\X86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\COMCTL32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\Apphelp.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077c70000 - 0000000077c93000: C:\WINDOWS\system32\msv1_0.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f56000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(000000007c340000 - 000000007c396000: C:\WINDOWS\system32\MSVCR71.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d4000: C:\WINDOWS\system32\SHELL32.dll

*----> State Dump for Thread Id 0xf4c <----*

eax=0caf1843 ebx=01233f48 ecx=00277ec0 edx=00000006 esi=00000000 edi=00000001
eip=7c90eb94 esp=0012fdc0 ebp=0012fe10 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00200202

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\WINDOWS\system32\ntdll.dll - 
function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** WARNING: Unable to verify checksum for C:\PROGRA~1\MOZILL~1\firefox.exe
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\PROGRA~1\MOZILL~1\firefox.exe - 
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\WINDOWS\system32\kernel32.dll - 
ChildEBP RetAddr  Args to Child              
0012fe10 007f42a7 0136aa38 603317bc 00401e57 ntdll!KiFastSystemCallRet
0012ff04 00401012 0123a528 0027d204 012cb1f8
firefox!DeviceContextImpl__GetDepth+0x2e688
0012ffc0 7c816d4f 007e0041 005c0031 7ffdc000 firefox+0x1012
0012fff0 00000000 008f0202 00000000 78746341 kernel32!RegisterWaitForInputIdle+0x49

*----> Raw Stack Dump <----*
000000000012fdc0  18 94 d4 77 e2 6c 51 00 - 00 00 00 80 f8 b1 2c 01 
...w.lQ.......,.
000000000012fdd0  00 00 00 00 bc 02 02 00 - 13 01 00 00 01 00 00 00 
................
000000000012fde0  00 00 00 00 29 2a 3a 00 - a6 02 00 00 6a 02 00 00 
....)*:.....j...
000000000012fdf0  3c 45 a7 00 f8 fd 12 00 - 00 00 00 00 01 00 00 00 
<E..............
000000000012fe00  00 00 00 00 b0 ff 12 00 - f9 32 8f 00 01 00 00 00 
.........2......
000000000012fe10  04 ff 12 00 a7 42 7f 00 - 38 aa 36 01 bc 17 33 60 
.....B..8.6...3`
000000000012fe20  57 1e 40 00 f8 b1 2c 01 - 41 00 7e 00 2c 1a c6 77 
W.@...,.A.~.,..w
000000000012fe30  00 00 00 00 58 6a 37 60 - 4c fe 12 00 1f 00 00 00 
....Xj7`L.......
000000000012fe40  11 00 01 00 3f 00 00 00 - 4c fe 12 00 31 2e 34 5f 
....?...L...1.4_
000000000012fe50  32 30 30 35 30 39 30 38 - 30 36 2f 31 2e 38 62 34 
2005090806/1.8b4
000000000012fe60  5f 32 30 30 35 30 39 30 - 38 30 36 00 00 00 27 00 
_2005090806...'.
000000000012fe70  00 00 00 00 2d c0 c2 77 - e6 06 8f 00 84 23 a5 00 
....-..w.....#..
000000000012fe80  00 00 00 00 ce c3 c2 77 - 64 00 00 00 68 67 8f 00 
.......wd...hg..
000000000012fe90  54 67 8f 00 00 71 27 00 - 00 00 00 00 70 76 27 00 
Tg...q'.....pv'.
000000000012fea0  80 78 27 00 01 00 00 00 - 00 00 00 00 01 00 00 00 
.x'.............
000000000012feb0  01 00 00 00 00 00 00 00 - 45 09 91 7c b8 d1 23 01 
........E..|..#.
000000000012fec0  98 24 37 60 b4 2a a5 00 - 74 29 a5 00 00 ff 12 00 
.$7`.*..t)......
000000000012fed0  78 70 27 00 50 63 27 00 - 80 78 27 00 00 00 00 00 
xp'.Pc'..x'.....
000000000012fee0  78 71 27 00 c0 b2 2a 01 - 88 6d 13 01 00 00 00 00 
xq'...*..m......
000000000012fef0  e8 92 21 01 48 54 1e 01 - 78 f2 20 01 70 76 27 00  ..!.HT..x.
.pv'.

*----> State Dump for Thread Id 0xf50 <----*

eax=4dfc6000 ebx=00278604 ecx=7c910833 edx=00000110 esi=0000075c edi=00000000
eip=7c90eb94 esp=0105fe60 ebp=0105fec4 iopl=0         nv up ei ng nz ac po cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000297

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\PROGRA~1\MOZILL~1\nspr4.dll - 
ChildEBP RetAddr  Args to Child              
0105fec4 7c802542 0000075c 0000ea60 00000000 ntdll!KiFastSystemCallRet
0105fed8 6017804c 0000075c 0000ea60 002785e8 kernel32!WaitForSingleObject+0x12
0000ea60 00000000 00000000 00000000 00000000 nspr4!PR_MD_WAIT_CV+0x5c

*----> Raw Stack Dump <----*
000000000105fe60  c0 e9 90 7c db 25 80 7c - 5c 07 00 00 00 00 00 00 
...|.%.|\.......
000000000105fe70  94 fe 05 01 ec 86 27 00 - b8 87 27 00 04 86 27 00 
......'...'...'.
000000000105fe80  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000105fe90  10 00 00 00 00 ba 3c dc - ff ff ff ff 00 c0 fd 7f 
......<.........
000000000105fea0  00 e0 fd 7f 94 fe 05 01 - 00 30 36 02 74 fe 05 01 
.........06.t...
000000000105feb0  28 29 01 00 a4 ff 05 01 - f3 99 83 7c 08 26 80 7c 
().........|.&.|
000000000105fec0  00 00 00 00 d8 fe 05 01 - 42 25 80 7c 5c 07 00 00 
........B%.|\...
000000000105fed0  60 ea 00 00 00 00 00 00 - 60 ea 00 00 4c 80 17 60 
`.......`...L..`
000000000105fee0  5c 07 00 00 60 ea 00 00 - e8 85 27 00 b8 87 27 00 
\...`.....'...'.
000000000105fef0  54 ff 05 01 00 00 00 00 - ac 44 17 60 ec 86 27 00 
T........D.`..'.
000000000105ff00  04 86 27 00 98 34 33 00 - e8 85 27 00 98 34 33 00 
..'..43...'..43.
000000000105ff10  f3 45 17 60 b8 87 27 00 - 78 86 27 00 e8 85 27 00 
.E.`..'.x.'...'.
000000000105ff20  98 34 33 00 60 48 17 60 - 9a 0f 36 60 78 86 27 00 
.43.`H.`..6`x.'.
000000000105ff30  98 34 33 00 64 88 27 00 - 14 87 27 00 c8 89 27 00 
.43.d.'...'...'.
000000000105ff40  08 87 27 00 b4 ff 05 01 - c8 89 27 00 9d bc 35 60 
..'.......'...5`
000000000105ff50  00 00 00 00 b4 ff 05 01 - 40 b8 35 60 00 05 39 60 
........@.5`..9`
000000000105ff60  b8 87 27 00 c1 4e 17 60 - 08 87 27 00 48 46 27 00 
..'..N.`..'.HF'.
000000000105ff70  48 46 27 00 78 01 15 00 - 98 97 27 00 2b 6f 17 60 
HF'.x.....'.+o.`
000000000105ff80  b8 87 27 00 b0 a3 c3 77 - b8 87 27 00 78 01 15 00 
..'....w..'.x...
000000000105ff90  80 25 16 00 c8 89 27 00 - 00 00 00 00 8c ff 05 01 
.%....'.........

*----> State Dump for Thread Id 0xf58 <----*

eax=00000000 ebx=0016a5a0 ecx=00000602 edx=02edf008 esi=7fffffff edi=ffffffff
eip=7c90eb94 esp=0158cd24 ebp=0158cd60 iopl=0         nv up ei ng nz ac pe cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000293

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\WINDOWS\system32\mswsock.dll - 
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\WINDOWS\system32\WS2_32.dll - 
ChildEBP RetAddr  Args to Child              
0158cd60 71a55fa7 00000688 000006b0 00000000 ntdll!KiFastSystemCallRet
0158ce54 71ab2e67 00000000 0158df00 00000000 mswsock+0x5fa7
0158cea4 60179b59 00000000 0158df00 00000000 WS2_32!select+0xa7
00000000 00000000 00000000 00000000 00000000 nspr4!PR_MD_UNLOCK+0x1789

*----> Raw Stack Dump <----*
000000000158cd24  c0 e9 90 7c 33 40 a5 71 - 88 06 00 00 01 00 00 00 
...|3@.q........
000000000158cd34  4c cd 58 01 04 ce 58 01 - 00 df 58 01 f4 cd 58 01 
L.X...X...X...X.
000000000158cd44  e0 04 0f c7 28 ba c5 01 - ff ff ff ff ff ff ff 7f 
....(...........
000000000158cd54  a0 a5 16 00 00 00 00 00 - 00 00 00 00 54 ce 58 01 
............T.X.
000000000158cd64  a7 5f a5 71 88 06 00 00 - b0 06 00 00 00 00 00 00 
._.q............
000000000158cd74  04 00 00 00 00 00 00 00 - 30 a3 16 00 00 00 00 00 
........0.......
000000000158cd84  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000158cd94  01 00 00 00 80 96 18 6a - 67 ff ff ff ff ff ff ff 
.......jg.......
000000000158cda4  00 00 00 00 1c 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000158cdb4  00 00 00 00 8b e0 80 7c - 68 aa 16 00 00 00 00 00 
.......|h.......
000000000158cdc4  88 ce 58 01 d8 78 eb 02 - 00 24 6d 03 1c 00 00 00 
..X..x...$m.....
000000000158cdd4  a0 a5 16 00 10 ce 58 01 - 00 00 00 00 00 00 00 00 
......X.........
000000000158cde4  00 00 00 00 f4 cd 58 01 - 00 00 00 00 00 00 00 00 
......X.........
000000000158cdf4  ff ff ff ff ff ff ff 7f - 01 00 00 00 00 00 12 01 
................
000000000158ce04  b0 06 00 00 19 00 00 00 - 00 00 00 00 b0 03 00 00 
................
000000000158ce14  19 00 00 00 00 00 00 00 - b0 03 00 00 02 01 00 00 
................
000000000158ce24  ff ff ff ff 72 b2 a6 71 - a0 0b ac 71 32 2b ab 71 
....r..q...q2+.q
000000000158ce34  01 00 00 00 4a 56 00 00 - 78 cd 58 01 0c 15 aa 71 
....JV..x.X....q
000000000158ce44  94 ce 58 01 c8 71 a7 71 - 68 2e a5 71 ff ff ff ff 
..X..q.qh..q....
000000000158ce54  a4 ce 58 01 67 2e ab 71 - 00 00 00 00 00 df 58 01 
..X.g..q......X.

*----> State Dump for Thread Id 0xf60 <----*

eax=00000000 ebx=00278454 ecx=0000da7a edx=00000000 esi=00000644 edi=00000000
eip=7c90eb94 esp=0181fe70 ebp=0181fed4 iopl=0         nv up ei ng nz ac po cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000297

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0181fed4 7c802542 00000644 00003125 00000000 ntdll!KiFastSystemCallRet
0181fee8 6017804c 00000644 00003125 00278438 kernel32!WaitForSingleObject+0x12
00003125 00000000 00000000 00000000 00000000 nspr4!PR_MD_WAIT_CV+0x5c

*----> Raw Stack Dump <----*
000000000181fe70  c0 e9 90 7c db 25 80 7c - 44 06 00 00 00 00 00 00 
...|.%.|D.......
000000000181fe80  a4 fe 81 01 3c 85 27 00 - 58 2e 20 01 54 84 27 00  ....<.'.X.
.T.'.
000000000181fe90  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000181fea0  10 00 00 00 b0 4a 80 f8 - ff ff ff ff 00 c0 fd 7f 
.....J..........
000000000181feb0  00 a0 fd 7f a4 fe 81 01 - 00 00 00 00 84 fe 81 01 
................
000000000181fec0  00 00 00 00 a4 ff 81 01 - f3 99 83 7c 08 26 80 7c 
...........|.&.|
000000000181fed0  00 00 00 00 e8 fe 81 01 - 42 25 80 7c 44 06 00 00 
........B%.|D...
000000000181fee0  25 31 00 00 00 00 00 00 - 25 31 00 00 4c 80 17 60 
%1......%1..L..`
000000000181fef0  44 06 00 00 25 31 00 00 - 38 84 27 00 58 2e 20 01 
D...%1..8.'.X. .
000000000181ff00  e8 7e 27 00 38 84 27 00 - ac 44 17 60 3c 85 27 00 
.~'.8.'..D.`<.'.
000000000181ff10  54 84 27 00 b6 bc 0a 00 - 08 2d 21 01 b6 bc 0a 00 
T.'......-!.....
000000000181ff20  f3 45 17 60 58 2e 20 01 - c8 84 27 00 38 84 27 00  .E.`X.
...'.8.'.
000000000181ff30  b6 bc 0a 00 c0 7e 27 00 - 98 ed 35 60 c8 84 27 00 
.....~'...5`..'.
000000000181ff40  b6 bc 0a 00 04 2f 20 01 - b4 2d 20 01 b4 ff 81 01  ...../ ..-
.....
000000000181ff50  c0 27 20 01 b6 bc 0a 00 - 40 b8 35 60 0c 16 af 0c  .'
.....@.5`....
000000000181ff60  58 2e 20 01 c1 4e 17 60 - a8 2d 20 01 48 46 27 00  X. ..N.`.-
.HF'.
000000000181ff70  48 46 27 00 f0 d7 30 01 - 10 a8 23 01 2b 6f 17 60 
HF'...0...#.+o.`
000000000181ff80  58 2e 20 01 b0 a3 c3 77 - 58 2e 20 01 f0 d7 30 01  X. ....wX.
...0.
000000000181ff90  f0 d7 30 01 c0 27 20 01 - 00 00 00 00 8c ff 81 01  ..0..'
.........
000000000181ffa0  98 cc dc f3 dc ff 81 01 - 94 5c c3 77 d8 40 c1 77 
.........\.w.@.w

*----> State Dump for Thread Id 0xf64 <----*

eax=00ae58d0 ebx=0193fe7c ecx=00000008 edx=7c90eb94 esi=00000000 edi=7ffdc000
eip=7c90eb94 esp=0193fe54 ebp=0193fef0 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\WINDOWS\system32\USER32.dll - 
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_6595b64144ccf1df_1.0.2600.2180_x-ww_522f9f82\gdiplus.dll
- 
ChildEBP RetAddr  Args to Child              
0193fef0 77d495f9 00000002 0193ff18 00000000 ntdll!KiFastSystemCallRet
0193ff4c 77d496a8 00000001 0193ffac ffffffff USER32!GetLastInputInfo+0x105
0193ff68 4ec95846 00000001 0193ffac 00000000 USER32!MsgWaitForMultipleObjects+0x1f
0193ffb4 7c80b50b 00000000 00000000 0012eb64 gdiplus+0x45846
0193ffec 00000000 4ec957ed 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000193fe54  ab e9 90 7c f2 94 80 7c - 02 00 00 00 7c fe 93 01 
...|...|....|...
000000000193fe64  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000193fe74  02 00 00 00 00 00 00 00 - 54 06 00 00 3c 06 00 00 
........T...<...
000000000193fe84  01 00 00 00 00 0d 00 00 - 31 55 c9 4e cd ab ba dc 
........1U.N....
000000000193fe94  00 00 00 00 dc fe 93 01 - 14 00 00 00 01 00 00 00 
................
000000000193fea4  00 00 00 00 00 00 00 00 - 10 00 00 00 5a 88 d4 77 
............Z..w
000000000193feb4  e4 fe 93 01 2c 90 d8 77 - 00 c0 fd 7f 00 90 fd 7f 
....,..w........
000000000193fec4  06 04 01 00 00 00 00 00 - 7c fe 93 01 3c 90 d8 77 
........|...<..w
000000000193fed4  02 00 00 00 70 fe 93 01 - 00 00 00 00 dc ff 93 01 
....p...........
000000000193fee4  f3 99 83 7c 90 95 80 7c - 00 00 00 00 4c ff 93 01 
...|...|....L...
000000000193fef4  f9 95 d4 77 02 00 00 00 - 18 ff 93 01 00 00 00 00 
...w............
000000000193ff04  ff ff ff ff 00 00 00 00 - 6c c9 d4 77 64 62 dd 4e 
........l..wdb.N
000000000193ff14  00 00 00 00 54 06 00 00 - 3c 06 00 00 00 00 00 00 
....T...<.......
000000000193ff24  00 00 00 00 00 00 00 00 - 01 00 00 00 50 71 bf 00 
............Pq..
000000000193ff34  00 90 fd 7f 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000193ff44  00 90 fd 7f 3c 06 00 00 - 68 ff 93 01 a8 96 d4 77 
....<...h......w
000000000193ff54  01 00 00 00 ac ff 93 01 - ff ff ff ff ff 04 00 00 
................
000000000193ff64  18 ff 93 01 b4 ff 93 01 - 46 58 c9 4e 01 00 00 00 
........FX.N....
000000000193ff74  ac ff 93 01 00 00 00 00 - ff ff ff ff ff 04 00 00 
................
000000000193ff84  00 00 00 00 64 eb 12 00 - 00 00 00 00 92 02 03 00 
....d...........

*----> State Dump for Thread Id 0xf80 <----*

eax=7c372522 ebx=0265fec8 ecx=02552858 edx=00000000 esi=00000000 edi=7ffdc000
eip=7c90eb94 esp=0265fea0 ebp=0265ff3c iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** WARNING: Unable to verify checksum for
C:\PROGRA~1\MOZILL~1\plugins\npbrowster.dll
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\PROGRA~1\MOZILL~1\plugins\npbrowster.dll - 
ChildEBP RetAddr  Args to Child              
0265ff3c 7c809c86 00000002 0265ff7c 00000000 ntdll!KiFastSystemCallRet
0265ff58 0242bd91 00000002 0265ff7c 00000000 kernel32!WaitForMultipleObjects+0x18
0265ffb4 7c80b50b 02552858 00000000 00000000 npbrowster+0xbd91
0265ffec 00000000 7c3494f6 02552858 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000265fea0  ab e9 90 7c f2 94 80 7c - 02 00 00 00 c8 fe 65 02 
...|...|......e.
000000000265feb0  01 00 00 00 00 00 00 00 - 00 00 00 00 c0 24 55 02 
.............$U.
000000000265fec0  6e 9c 80 7c 4c 9c 80 7c - 20 05 00 00 04 05 00 00  n..|L..|
.......
000000000265fed0  44 06 00 00 fc cb dc f3 - a0 00 00 00 40 df 68 e4 
D...........@.h.
000000000265fee0  00 00 00 00 08 10 e3 82 - 14 00 00 00 01 00 00 00 
................
000000000265fef0  00 00 00 00 00 00 00 00 - 10 00 00 00 ff ff ff ff 
................
000000000265ff00  00 00 55 02 00 a0 fd 7f - 00 c0 fd 7f 00 e0 fa 7f 
..U.............
000000000265ff10  e4 e6 e6 82 00 00 00 00 - c8 fe 65 02 14 00 00 00 
..........e.....
000000000265ff20  02 00 00 00 bc fe 65 02 - 70 ff 65 02 a4 ff 65 02 
......e.p.e...e.
000000000265ff30  f3 99 83 7c 90 95 80 7c - 00 00 00 00 58 ff 65 02 
...|...|....X.e.
000000000265ff40  86 9c 80 7c 02 00 00 00 - 7c ff 65 02 00 00 00 00 
...|....|.e.....
000000000265ff50  ff ff ff ff 00 00 00 00 - b4 ff 65 02 91 bd 42 02 
..........e...B.
000000000265ff60  02 00 00 00 7c ff 65 02 - 00 00 00 00 ff ff ff ff 
....|.e.........
000000000265ff70  00 00 00 00 c0 3b 55 02 - 58 28 55 02 20 05 00 00 
.....;U.X(U. ...
000000000265ff80  04 05 00 00 65 95 34 7c - c0 24 55 02 00 00 00 00 
....e.4|.$U.....
000000000265ff90  00 00 00 00 58 28 55 02 - 00 00 00 00 8c ff 65 02 
....X(U.......e.
000000000265ffa0  98 cc dc f3 dc ff 65 02 - 0d 24 34 7c 08 f5 37 7c 
......e..$4|..7|
000000000265ffb0  00 00 00 00 ec ff 65 02 - 0b b5 80 7c 58 28 55 02 
......e....|X(U.
000000000265ffc0  00 00 00 00 00 00 00 00 - 58 28 55 02 00 e0 fa 7f 
........X(U.....
000000000265ffd0  00 26 fc 82 c0 ff 65 02 - f8 94 f6 82 ff ff ff ff 
.&....e.........

*----> State Dump for Thread Id 0xb4 <----*

eax=00000000 ebx=00000000 ecx=00000000 edx=0381fdc8 esi=001532f0 edi=00153394
eip=7c90eb94 esp=0381fe1c ebp=0381ff80 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for
C:\WINDOWS\system32\RPCRT4.dll - 
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0381ff80 77e76c22 0381ffa8 77e76a3b 001532f0 ntdll!KiFastSystemCallRet
0381ff88 77e76a3b 001532f0 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5ea
0381ffa8 77e76c0a 00163c18 0381ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
0381ffb4 7c80b50b 0018df88 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5d2
0381ffec 00000000 77e76bf0 0018df88 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000381fe1c  99 e3 90 7c 03 67 e7 77 - 14 06 00 00 70 ff 81 03 
...|.g.w....p...
000000000381fe2c  00 00 00 00 28 6d 17 00 - 4c ff 81 03 f6 e4 01 00 
....(m..L.......
000000000381fe3c  10 87 e2 81 00 00 00 00 - 9c 36 50 c0 c0 2b 9a 82 
.........6P..+..
000000000381fe4c  38 0c 00 00 02 0b f3 f3 - 00 00 4e 80 38 0c 00 00 
8.........N.8...
000000000381fe5c  c0 2b 9a 82 00 00 f8 7f - fc 07 30 c0 00 fe 1f c0 
.+........0.....
000000000381fe6c  04 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000381fe7c  00 00 00 00 ff ff ff ff - 28 0c f3 f3 8e b5 4e 80 
........(.....N.
000000000381fe8c  fc 07 30 c0 28 0c f3 f3 - 06 b4 4e 80 00 00 f8 7f 
..0.(.....N.....
000000000381fe9c  00 00 00 00 00 00 00 00 - e8 18 8d 82 c8 29 9a 82 
.............)..
000000000381feac  01 2a 9a 82 00 00 00 00 - 00 fe 1f c0 00 00 00 00 
.*..............
000000000381febc  48 57 dd 82 ff ff 2d 02 - 00 00 04 00 df 22 00 00 
HW....-......"..
000000000381fecc  94 2a 9a 82 c8 29 9a 82 - d0 0b f3 f3 00 00 00 00 
.*...)..........
000000000381fedc  00 00 2e 02 3c 0b f3 f3 - 00 00 00 00 ff ff ff ff 
....<...........
000000000381feec  90 24 4e 80 00 00 f8 7f - ff ff ff ff 22 89 56 80 
.$N.........".V.
000000000381fefc  ec e7 4d 80 ff ff ff ff - b8 0c f3 f3 bc 0c f3 f3 
..M.............
000000000381ff0c  00 80 00 00 44 ef 82 82 - 20 0c f3 f3 46 02 00 00  ....D...
...F...
000000000381ff1c  ba c2 4d 80 14 ef 82 82 - a8 ed 82 82 dc ed 82 82 
..M.............
000000000381ff2c  38 a9 54 80 80 ff 81 03 - 99 66 e7 77 4c ff 81 03 
8.T......f.wL...
000000000381ff3c  a9 66 e7 77 ed 10 90 7c - e8 61 62 03 88 df 18 00 
.f.w...|.ab.....
000000000381ff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff 
../M.....]......

*----> State Dump for Thread Id 0x334 <----*

eax=036aa4a0 ebx=010edd64 ecx=06d10004 edx=06d00003 esi=00000560 edi=00000000
eip=7c90eb94 esp=01bdfe58 ebp=01bdfebc iopl=0         nv up ei ng nz ac po cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000297

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
01bdfebc 7c802542 00000560 0000ea60 00000000 ntdll!KiFastSystemCallRet
01bdfed0 6017804c 00000560 0000ea60 010edd48 kernel32!WaitForSingleObject+0x12
0000ea60 00000000 00000000 00000000 00000000 nspr4!PR_MD_WAIT_CV+0x5c

*----> Raw Stack Dump <----*
0000000001bdfe58  c0 e9 90 7c db 25 80 7c - 60 05 00 00 00 00 00 00 
...|.%.|`.......
0000000001bdfe68  8c fe bd 01 4c de 0e 01 - 80 32 e3 02 64 dd 0e 01 
....L....2..d...
0000000001bdfe78  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 
................
0000000001bdfe88  10 00 00 00 00 ba 3c dc - ff ff ff ff 00 c0 fd 7f 
......<.........
0000000001bdfe98  00 d0 fd 7f 8c fe bd 01 - f0 83 17 60 6c fe bd 01 
...........`l...
0000000001bdfea8  82 48 17 60 a4 ff bd 01 - f3 99 83 7c 08 26 80 7c 
.H.`.......|.&.|
0000000001bdfeb8  00 00 00 00 d0 fe bd 01 - 42 25 80 7c 60 05 00 00 
........B%.|`...
0000000001bdfec8  60 ea 00 00 00 00 00 00 - 60 ea 00 00 4c 80 17 60 
`.......`...L..`
0000000001bdfed8  60 05 00 00 60 ea 00 00 - 48 dd 0e 01 80 32 e3 02 
`...`...H....2..
0000000001bdfee8  48 ff bd 01 00 c0 16 60 - ac 44 17 60 4c de 0e 01 
H......`.D.`L...
0000000001bdfef8  64 dd 0e 01 98 34 33 00 - 8c eb 0e 01 98 34 33 00 
d....43......43.
0000000001bdff08  f3 45 17 60 80 32 e3 02 - d8 dd 0e 01 48 dd 0e 01 
.E.`.2......H...
0000000001bdff18  98 34 33 00 50 eb 0e 01 - 3d 30 47 00 d8 dd 0e 01 
.43.P...=0G.....
0000000001bdff28  98 34 33 00 50 eb 0e 01 - d0 56 f3 02 10 40 16 60 
.43.P....V...@.`
0000000001bdff38  48 dd 0e 01 34 44 ea 02 - 55 b6 91 0c 98 34 33 00 
H...4D..U....43.
0000000001bdff48  60 ff bd 01 0f 32 47 00 - 68 ff bd 01 80 32 e3 02 
`....2G.h....2..
0000000001bdff58  2c 33 e3 02 08 4c ea 02 - b4 ff bd 01 c1 4e 17 60 
,3...L.......N.`
0000000001bdff68  d0 56 f3 02 48 46 27 00 - 48 46 27 00 ff ff ff ff 
.V..HF'.HF'.....
0000000001bdff78  c8 87 f1 02 2b 6f 17 60 - 80 32 e3 02 b0 a3 c3 77 
....+o.`.2.....w
0000000001bdff88  80 32 e3 02 ff ff ff ff - 32 07 91 7c 08 4c ea 02 
.2......2..|.L..

*----> State Dump for Thread Id 0x248 <----*

eax=71a5d5af ebx=c0000000 ecx=7c916315 edx=0f5827d9 esi=00000000 edi=71a87558
eip=7c90eb94 esp=01cdff7c ebp=01cdffb4 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
01cdffb4 7c80b50b 71a5d8ec 7c913288 7c916433 ntdll!KiFastSystemCallRet
01cdffec 00000000 71a5d5af 03628ab0 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001cdff7c  1b e3 90 7c 09 d6 a5 71 - a8 06 00 00 bc ff cd 01 
...|...q........
0000000001cdff8c  b0 ff cd 01 a4 ff cd 01 - 50 d6 a5 71 88 32 91 7c 
........P..q.2.|
0000000001cdff9c  33 64 91 7c b0 8a 62 03 - 00 00 00 00 00 00 00 00 
3d.|..b.........
0000000001cdffac  00 00 a5 71 e0 24 6d 03 - ec ff cd 01 0b b5 80 7c 
...q.$m........|
0000000001cdffbc  ec d8 a5 71 88 32 91 7c - 33 64 91 7c b0 8a 62 03 
...q.2.|3d.|..b.
0000000001cdffcc  00 80 fd 7f 00 26 fc 82 - c0 ff cd 01 78 be e1 82 
.....&......x...
0000000001cdffdc  ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 
.......|...|....
0000000001cdffec  00 00 00 00 00 00 00 00 - af d5 a5 71 b0 8a 62 03 
...........q..b.
0000000001cdfffc  00 00 00 00 4d 5a 90 00 - 03 00 00 00 04 00 00 00 
....MZ..........
0000000001ce000c  ff ff 00 00 b8 00 00 00 - 00 00 00 00 40 00 00 00 
............@...
0000000001ce001c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
0000000001ce002c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
0000000001ce003c  e0 00 00 00 0e 1f ba 0e - 00 b4 09 cd 21 b8 01 4c 
............!..L
0000000001ce004c  cd 21 54 68 69 73 20 70 - 72 6f 67 72 61 6d 20 63  .!This
program c
0000000001ce005c  61 6e 6e 6f 74 20 62 65 - 20 72 75 6e 20 69 6e 20  annot be
run in 
0000000001ce006c  44 4f 53 20 6d 6f 64 65 - 2e 0d 0d 0a 24 00 00 00  DOS
mode....$...
0000000001ce007c  00 00 00 00 8f 0a f5 a0 - cb 6b 9b f3 cb 6b 9b f3 
.........k...k..
0000000001ce008c  cb 6b 9b f3 b0 77 97 f3 - ce 6b 9b f3 48 77 95 f3 
.k...w...k..Hw..
0000000001ce009c  ce 6b 9b f3 48 63 c6 f3 - c0 6b 9b f3 cb 6b 9a f3 
.k..Hc...k...k..
0000000001ce00ac  9c 6b 9b f3 23 74 91 f3 - 19 6b 9b f3 23 74 9f f3 
.k..#t...k..#t..

*----> State Dump for Thread Id 0x24c <----*

eax=01e3ff04 ebx=60174840 ecx=00000000 edx=02cec6b8 esi=02f9b1c8 edi=6036e27e
eip=00000000 esp=4747474f ebp=47474747 iopl=0         nv up ei ng nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000286

function: <nosymbols>
No prior disassembly possible
        :
        00000000 ??               ???
        00000002 ??               ???
        00000004 ??               ???
        00000006 ??               ???
        00000008 ??               ???
        0000000a ??               ???
        0000000c ??               ???
        0000000e ??               ???
FAULT ->:
00000000 ??               ???
Error 0x00000001
        00000002 ??               ???
        00000004 ??               ???
        00000006 ??               ???
        00000008 ??               ???
        0000000a ??               ???
        0000000c ??               ???
        0000000e ??               ???
        00000010 ??               ???
        00000012 ??               ???
        00000014 ??               ???

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
4747474b 00000000 00000000 00000000 00000000 0x0

Error 0x8007012B
*----> State Dump for Thread Id 0xd58 <----*

eax=77c3a341 ebx=0125150c ecx=6001a918 edx=00000000 esi=000001e4 edi=00000000
eip=7c90eb94 esp=0491fe78 ebp=0491fedc iopl=0         nv up ei ng nz ac po cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000297

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0491fedc 7c802542 000001e4 0000ea60 00000000 ntdll!KiFastSystemCallRet
0491fef0 6017804c 000001e4 0000ea60 012514f0 kernel32!WaitForSingleObject+0x12
0000ea60 00000000 00000000 00000000 00000000 nspr4!PR_MD_WAIT_CV+0x5c

*----> Raw Stack Dump <----*
000000000491fe78  c0 e9 90 7c db 25 80 7c - e4 01 00 00 00 00 00 00 
...|.%.|........
000000000491fe88  ac fe 91 04 f4 15 25 01 - b0 2e be 02 0c 15 25 01 
......%.......%.
000000000491fe98  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 
................
000000000491fea8  10 00 00 00 00 ba 3c dc - ff ff ff ff 00 c0 fd 7f 
......<.........
000000000491feb8  00 60 fd 7f ac fe 91 04 - 18 ee 90 7c 8c fe 91 04 
.`.........|....
000000000491fec8  ff ff ff ff a4 ff 91 04 - f3 99 83 7c 08 26 80 7c 
...........|.&.|
000000000491fed8  00 00 00 00 f0 fe 91 04 - 42 25 80 7c e4 01 00 00 
........B%.|....
000000000491fee8  60 ea 00 00 00 00 00 00 - 60 ea 00 00 4c 80 17 60 
`.......`...L..`
000000000491fef8  e4 01 00 00 60 ea 00 00 - f0 14 25 01 b0 2e be 02 
....`.....%.....
000000000491ff08  98 34 33 00 40 89 24 01 - ac 44 17 60 f4 15 25 01 
.43.@.$..D.`..%.
000000000491ff18  0c 15 25 01 98 34 33 00 - 20 89 24 01 98 34 33 00  ..%..43.
.$..43.
000000000491ff28  f3 45 17 60 b0 2e be 02 - 80 15 25 01 f0 14 25 01 
.E.`......%...%.
000000000491ff38  98 34 33 00 40 89 24 01 - 47 c1 44 00 80 15 25 01 
.43.@.$.G.D...%.
000000000491ff48  98 34 33 00 5c 2f be 02 - b0 2e be 02 b4 ff 91 04 
.43.\/..........
000000000491ff58  88 d0 e5 02 f0 14 25 01 - 20 89 24 01 c1 4e 17 60  ......%.
.$..N.`
000000000491ff68  b5 58 92 0c 48 46 27 00 - 48 46 27 00 72 2f 53 65 
.X..HF'.HF'.r/Se
000000000491ff78  60 49 e1 02 2b 6f 17 60 - b0 2e be 02 b0 a3 c3 77 
`I..+o.`.......w
000000000491ff88  b0 2e be 02 72 2f 53 65 - 63 75 72 65 88 d0 e5 02 
....r/Secure....
000000000491ff98  00 00 00 00 8c ff 91 04 - 98 cc 7f f6 dc ff 91 04 
................
000000000491ffa8  94 5c c3 77 d8 40 c1 77 - 00 00 00 00 ec ff 91 04 
.\.w.@.w........

*----> State Dump for Thread Id 0x250 <----*

eax=77e76bf0 ebx=00000000 ecx=7c910732 edx=ffffffff esi=001532f0 edi=00153394
eip=7c90eb94 esp=04a1fe1c ebp=04a1ff80 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
04a1ff80 77e76c22 04a1ffa8 77e76a3b 001532f0 ntdll!KiFastSystemCallRet
04a1ff88 77e76a3b 001532f0 0381fc98 7c90ee18 RPCRT4!I_RpcBCacheFree+0x5ea
04a1ffa8 77e76c0a 00163c18 04a1ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
04a1ffb4 7c80b50b 03675e78 0381fc98 7c90ee18 RPCRT4!I_RpcBCacheFree+0x5d2
04a1ffec 00000000 77e76bf0 03675e78 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000004a1fe1c  99 e3 90 7c 03 67 e7 77 - 14 06 00 00 70 ff a1 04 
...|.g.w....p...
0000000004a1fe2c  00 00 00 00 e0 f3 62 03 - 4c ff a1 04 90 6d 7f e4 
......b.L....m..
0000000004a1fe3c  b8 00 e2 82 00 00 00 00 - 00 6f 7f e4 70 6f 7f e4 
.........o..po..
0000000004a1fe4c  c8 6c 34 e1 00 00 00 00 - 00 00 00 00 00 00 00 00 
.l4.............
0000000004a1fe5c  46 02 00 00 ce 39 4e 80 - 00 00 00 00 80 a8 e1 82 
F....9N.........
0000000004a1fe6c  00 00 00 00 80 cb 7f f6 - 27 87 4e 80 80 cc 7f f6 
........'.N.....
0000000004a1fe7c  01 00 00 00 00 00 00 00 - 00 00 00 00 80 a8 e1 82 
................
0000000004a1fe8c  00 00 00 00 f0 be a0 82 - 00 00 00 00 01 6d 7f e4 
.............m..
0000000004a1fe9c  e6 a6 4a 00 90 cb 7f f6 - 3b a7 4a f8 90 6d 7f e4 
..J.....;.J..m..
0000000004a1feac  b8 00 e2 82 1c cc 7f f6 - ba f4 4c f8 f0 be a0 82 
..........L.....
0000000004a1febc  80 a8 e1 82 c8 f4 4c f8 - 90 a8 e1 82 d0 43 f6 82 
......L......C..
0000000004a1fecc  b8 00 e2 82 01 00 00 00 - 00 00 00 00 00 00 00 00 
................
0000000004a1fedc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
................
0000000004a1feec  00 00 00 00 00 00 00 00 - ac cb 7f f6 00 00 00 00 
................
0000000004a1fefc  01 ca 7f f6 b0 cb 7f f6 - 02 00 00 00 b8 00 e2 82 
................
0000000004a1ff0c  00 11 f5 82 44 5f 4f 82 - 20 cc 7f f6 46 02 00 00  ....D_O.
...F...
0000000004a1ff1c  ba c2 4d 80 14 5f 4f 82 - a8 5d 4f 82 dc 5d 4f 82 
..M.._O..]O..]O.
0000000004a1ff2c  ff ff ff ff 80 ff a1 04 - 99 66 e7 77 4c ff a1 04 
.........f.wL...
0000000004a1ff3c  a9 66 e7 77 ed 10 90 7c - d8 91 63 03 78 5e 67 03 
.f.w...|..c.x^g.
0000000004a1ff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff 
../M.....]......

i think that's a different crash. fwiw, that's a null pointer (probably 
function pointer) dereference, see: *----> State Dump for Thread Id 0x24c <----*

if you're willing to run a debug build, i could probably find one for you (in 
which case we'd setup your system to generate .dmp files which are more helpful 
than the drwatson report).
I did various things before finally getting FireFox 1.5 Beta 1 to stop crashing
when going to a https website.  I uninstalled browster from PC and extension
from FireFox, didn't work. Re-booted machine, still didn't work.  I uninstalled
Firefox and re-installed, didn't work. I uninstalled Firefox and all of the
firefox data for the user, rebooted machine, installed Firefox 1.5 Beta 1,
importing new prefences, etc., from IE and Mozilla,  that finally worked.  I'll
now set Firefox 1.5 Beta 1 to my default browser and keep testing.  Thanks for
the help.
Assignee: wtchang → rrelyea
After removing everything an re-installing FireFox 1.5 Beta 1, it is working.
However, it looks like Browster may not have been the only problem.
I tried to add the kx509 back inot FireFox 1.5 and that now causes FireFox to
crash.  I added it back in by going to Tools/Options/Advanced/Security Devices
and  Load a module called kx509 module, which I pointed to kpkcs11.dll.  After
that, FireFox would start crashing.  I had to removed the module to keep FireFox
from crashing.  Any ideas
Summary: FireFox 1.5 Beta crashes any time I try to go to a https:// website [@ 0x000a0027 - SECMOD_WaitForAnyTokenEvent] → FireFox 1.5 with kpkcs11 (kerberos pki) crashes loading https:// [@ 0x000a0027 - SECMOD_WaitForAnyTokenEvent]
The most likely problem is kx509 isn't providing a stub for
C_WaitForSlotEvent(). PKCS #11 modules are supposed to provide entry points for
all PKCS #11 functions, and return CKR_NOT_IMPLEMENTED for those it doesn't
implement.

I'm presuming k509 has set the CKF_REMOVABLE_DEVICE in one of it's slots. Is
kx509 a PKCS #11 2.00 module (as opposed to 2.01 or later)?

bob
Alias: kpkcs11
OK, I've found the source kpkcs11 and determined that it is indeed a PKCS #11
2.0 module. C_WaitForSlotEvent is a 2.01 function, and therefore can only be
called if the module is version 2.01. The bug is in NSS, I'll attach a patch
here shortly.

You can work around this issue if you add a C_WaitForSlotEvent to the end of
your  PKCS #11 functions List (pkcs11_funcs.c in PKCS11_Init_FunctionList add a
line pFunctionList->C_WaitForSlotEvent = C_WaitForSlotEvent; in cki_funcs.c add
a a function CK_RV C_WaitForSlotEvent(CK_FLAGS flags, CK_SLOT_ID_PTR pSlot,
CK_VOID_PTR pReserved) which returns CKR_FUNCTION_NOT_SUPPORTED; in cki_funcs.h
add a definition for the previous function; in cki_types.h add CK_RV
(*C_WaitForSlotEvents)(); to the end of CK_FUNCTION_LIST).

I'll supply an NSS patch shortly
Status: NEW → ASSIGNED
Target Milestone: --- → 3.11
This patch is against NSS 3.11

The code only checks the minor version, since NSS already rejects all non-2.X
versions of PKCS #11.
Attachment #196807 - Flags: review?(wtchang)
Comment on attachment 196807 [details] [diff] [review]
Don't call C_WaitForSlotEvent if the module is 2.0.

Julien, This is a fairly simple patch, so you could pass this off to Saul for
Neil for review if you want.
Attachment #196807 - Flags: superreview?(julien.pierre.bugs)
Comment on attachment 196807 [details] [diff] [review]
Don't call C_WaitForSlotEvent if the module is 2.0.

I have some comments below that I want Bob to review.

1. In secmodt.h, you added a new field
"CK_VERSION  cryptokiVersion" at the end of the SECMODModuleStr
structure, which is public.  I wanted to make sure you considered
this issue and concluded that it's okay.

2. In pk11util.c, you have:

> #include "pki3hack.h"
> #include "secerr.h"
> #include "dev.h"
>+#include "pkcs11ni.h"

I can't find this header file.	With this error this patch gets
a review-.

>-    if (!pk11_getFinalizeModulesOption()) {
>+    if ((mod->cryptokiVersion.minor < 1) || 
>+        !pk11_getFinalizeModulesOption()) {
>         /* if we are sharing the module with other software in our
>-         * address space, we can't reliably use C_WaitForSlotEvent() */
>+         * address space, we can't reliably use C_WaitForSlotEvent(),
>+         * and if the module is version 2.0, C_WaitForSlotEvent() doesn't
>+         * exist */
> 	return secmod_HandleWaitForSlotEvent(mod, flags, latency);
>     }

I suggest you reorder either the tests or the two if's in the comment
so that the orderings match.  Right now your comment describe the second
test before the first test.

As defensive programming, it is better to test
mod->cryptokiVersion.major, too:
    (mod->cryptokiVersion.major == 2 &&
     mod->cryptokiVersion.minor < 1)

This eliminates one place you'll need to update when PKCS #11 v3 is
released.
Attachment #196807 - Flags: superreview?(julien.pierre.bugs)
Attachment #196807 - Flags: review?(wtchang)
Attachment #196807 - Flags: review-
The extra include was part of another patch (I have 2 in this directory I need
to sort out). It doesn't belong in this fix.

The use of minor or only was purposeful. The change to allow version 3 PKCS #11
modules is expected to be extensive (version 3 implies it will not be binary
compatible with version 2, so things like this function would likely be
rewritten). On the other hand, the only reason for not doing a full compare is
'performance'. Since this call is on order of multiple of seconds to
minutes/hours, the cost of an extra compare is not work the confusion leaving
it out causes. So this patch restores the full compare
Attachment #196807 - Attachment is obsolete: true
Attachment #196811 - Flags: superreview?(julien.pierre.bugs)
Attachment #196811 - Flags: review?(wtchang)
this patch would need 2 reviews if we want it for 3.10.2
Attachment #196812 - Flags: superreview?(julien.pierre.bugs)
Attachment #196812 - Flags: review?(wtchang)
Comment on attachment 196812 [details] [diff] [review]
Same patch for the 3.10 branch

This patch is fine. The test for cryptokiVersion.major is not necessary, since
we only support version 2, and the module will fail to load earlier if it's
anything else.
Attachment #196812 - Flags: superreview?(julien.pierre.bugs) → superreview+
Comment on attachment 196811 [details] [diff] [review]
Updated patch with review comments.

This patch is fine. The test for cryptokiVersion.major isn't necessary.  Also,
it would be better to cast mod->slotCount to CK_ULONG rather than to unsigned
long.
Attachment #196811 - Flags: superreview?(julien.pierre.bugs) → superreview+
OS: Windows XP → All
Priority: -- → P2
Hardware: PC → All
Summary: FireFox 1.5 with kpkcs11 (kerberos pki) crashes loading https:// [@ 0x000a0027 - SECMOD_WaitForAnyTokenEvent] → NSS tries to call C_WaitForSlotEvent on PKCS#11 2.0 modules
Version: unspecified → 3.10
Comment on attachment 196811 [details] [diff] [review]
Updated patch with review comments.

r=wtc.
Attachment #196811 - Flags: review?(wtchang) → review+
Comment on attachment 196812 [details] [diff] [review]
Same patch for the 3.10 branch

Not sure if this bug is critical enough for NSS 3.10.x, but
the risk of this patch is low.	Its risk is that if a module
has the C_WaitForSlotEvent method but has a Cryptoki version
of 2.0, we won't be using the module optimally.  Since NSS
uses 2.0 modules in single-threaded mode, I think modules
that support 2.1 or higher interfaces are motivated to set
their Cryptoki version correctly.
Attachment #196812 - Flags: review?(wtchang) → review+
Actually the risk is the application will generate token insertion and removal
events (for this token) slowly versus the application crashing.

Not all 2.01 will take the C_WaitForSlotEvent() path, many tokens will return
CKR_FUNCTION_NOT_SUPPORTED (especially since NSS didn't use it pre 3.10), and
will also generate events slowly. This is an existing 3.10 semantic.

so the only risk is a currently crashing token may generate events slowly
instead of crash;).
NSS 3.11:

File: pk11load.c   Working revision:    1.17
File: pk11util.c    Working revision:    1.52
File: secmodt.h   Working revision:    1.28

NSS 3.10
Checking in pk11load.c;
/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11load.c,v  <--  pk11load.c
new revision: 1.15.8.1; previous revision: 1.15
done
The bug is now fixed in NSS. It won't show up in a mozilla build until 3.10.2 or
3.11 is picked up.

bob
Status: ASSIGNED → RESOLVED
Closed: 19 years ago
Resolution: --- → FIXED
Comment on attachment 196812 [details] [diff] [review]
Same patch for the 3.10 branch

Julien, please confirm that your review+ of this patch
indicated Sun's approval of the inclusion of this patch
in NSS 3.10.2.
Yes, it did.
Having just installed Beta 2, and still having the same problem, I take it that
the fix has not been incorporated into Beta 2.  Is that correct?
Ray: that's correct.  We missed the Firefox 1.5 Beta 2
deadline.  We are now trying to get this into Firefox 1.5
RC1 or final.  See bug 311402.
Target Milestone: 3.11 → 3.10.2
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: