Closed
Bug 308727
(kpkcs11)
Opened 19 years ago
Closed 19 years ago
NSS tries to call C_WaitForSlotEvent on PKCS#11 2.0 modules
Categories
(NSS :: Libraries, defect, P2)
Tracking
(Not tracked)
RESOLVED
FIXED
3.10.2
People
(Reporter: rlcarlson, Assigned: rrelyea)
References
()
Details
(Keywords: crash)
Attachments
(2 files, 1 obsolete file)
2.84 KB,
patch
|
wtc
:
review+
julien.pierre
:
superreview+
|
Details | Diff | Splinter Review |
2.18 KB,
patch
|
wtc
:
review+
julien.pierre
:
superreview+
|
Details | Diff | Splinter Review |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6
Going to any https:// website crashes FireFox. It does display the page while
submitting the bug report.
Reproducible: Always
Steps to Reproduce:
1.go to any https:// website
2.
3.
Actual Results:
Crash
Expected Results:
Shown the page
Comment 1•19 years ago
|
||
Please submit a talkback report for the crash. http://kb.mozillazine.org/Talkback
Comment 2•19 years ago
|
||
1.Close Firefox
2.Open Firefox via Windows Start menu-> Firefox-safemode
3.try any https://
(your report is odd though, bugzilla is https and yet you filed this bug with
that same browser)
Reporter | ||
Comment 3•19 years ago
|
||
Yes, Bugzilla is https. That is why I had to un-install Firefox Beta 1.5 and
re-install Firefox 1.0.6 before I could even file the Bug report. I will try
re-installing 1.5 beta tomorrow and try safe mode.
Reporter | ||
Comment 4•19 years ago
|
||
I've sent in various crash reports as requested.
I re-installed Firefox 1.5 Beta and started it in safe mode.
It still crashed when going to any https web site.
This is on a Dell Latitude D800 machine running XP Professional with all the
latest patches.
I then installed Firefox 1.5 Beta on a Compaq Presario R4000, running XP
Professional with all the latest patches. Firefox 1.5 Beta 1 seems to run fine
on that machine.
Should I re-build the D800 from scratch? That will take a few days.
Incident ID: 9385916
Incident ID: 9385776
Incident ID: 9385464
Incident ID: 9385407
Incident ID: 9385391
Incident ID: 9356329
URL: https://
ignore the first crasher, that's some other top crash which i will be forking
off.
Incident ID: 9385776
Stack Signature 0x000a0027 4cd951f6
Product ID Firefox15
Build ID 2005090806
Trigger Time 2005-09-15 12:21:22.0
Platform Win32
Operating System Windows NT 5.1 build 2600
Module
URL visited https://portal.anl.gov/portal/dt
User Comments
Since Last Crash 543 sec
Total Uptime 4225 sec
Trigger Reason Access violation
Source File, Line No. N/A
Stack Trace
0x000a0027
SECMOD_WaitForAnyTokenEvent [c:/builds/tinderbox/Fx-
Mozilla1.8/WINNT_5.2_Depend/mozilla/security/nss/lib/pk11wrap/pk11util.c, line
1071]
0x244c8b00
0x33333333
Assignee: nobody → wtchang
Status: UNCONFIRMED → NEW
Component: General → Libraries
Ever confirmed: true
Product: Firefox → NSS
QA Contact: general → jason.m.reid
Summary: FireFox 1.5 Beta crashes any time I try to go to a https:// website → FireFox 1.5 Beta crashes any time I try to go to a https:// website [@ 0x000a0027 - SECMOD_WaitForAnyTokenEvent]
Reporter | ||
Comment 7•19 years ago
|
||
I found this under Dr. Watson, if it helps any:
Application exception occurred:
App: C:\PROGRA~1\MOZILL~1\firefox.exe (pid=3748)
When: 9/15/2005 @ 14:08:07.291
Exception number: c0000005 (access violation)
*----> System Information <----*
Computer Name: RLCLAPTOP
User Name: b28384
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 6 Model 9 Stepping 5
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Uniprocessor Free
Registered Organization: Argonne National Laboratory
Registered Owner: Ray Carlson
*----> Task List <----*
0 System Process
4 System
864 smss.exe
968 csrss.exe
992 winlogon.exe
1036 services.exe
1048 lsass.exe
1244 svchost.exe
1332 svchost.exe
1440 svchost.exe
1492 svchost.exe
1572 svchost.exe
1804 wltrysvc.exe
1816 bcmwltry.exe
1884 spoolsv.exe
1920 SCardSvr.exe
276 Explorer.EXE
376 Apoint.exe
440 DirectCD.exe
456 Apntex.exe
488 pccguide.exe
496 PCCClient.exe
508 Pop3trap.exe
600 DSentry.exe
608 WLTRAY.exe
628 Acrotray.exe
640 quickset.exe
668 jusched.exe
712 iTunesHelper.exe
744 qttask.exe
764 ctfmon.exe
844 BTTray.exe
908 BTSTAC~1.EXE
1296 btwdins.exe
1384 cvpnd.exe
1472 MDM.EXE
1588 NICCONFIGSVC.exe
1700 nvsvc32.exe
1792 svchost.exe
2088 Tmntsrv.exe
2176 wdfmgr.exe
2256 uphclean.exe
2304 tmproxy.exe
2340 mDNSResponder.exe
2608 PccPfw.exe
3056 wmiprvse.exe
3228 iPodService.exe
4092 alg.exe
3780 leash32.exe
3800 krbcc32s.exe
3748 firefox.exe
1520 PlugAPOP.exe
1084 putty.exe
3112 OUTLOOK.EXE
3328 WINWORD.EXE
3712 AgentSvr.exe
3676 mstsc.exe
3436 talkback.exe
1392 drwtsn32.exe
*----> Module List <----*
(0000000000400000 - 0000000000ad7000: C:\PROGRA~1\MOZILL~1\firefox.exe
(0000000001480000 - 000000000148f000: C:\Program Files\Dell\Bluetooth
Software\btkeyind.dll
(00000000015a0000 - 00000000015c5000:
C:\PROGRA~1\MOZILL~1\extensions\talkback@mozilla.org\components\fullsoft.dll
(0000000001700000 - 0000000001706000:
C:\PROGRA~1\MOZILL~1\extensions\talkback@mozilla.org\components\qfaservices.dll
(0000000001950000 - 0000000001962000: C:\Program Files\Dell\QuickSet\dadkeyb.dll
(0000000001ce0000 - 0000000001d36000: C:\Program Files\kx509\kpkcs11.dll
(0000000002420000 - 0000000002450000: C:\PROGRA~1\MOZILL~1\plugins\npbrowster.dll
(00000000027a0000 - 00000000027b9000: C:\Program Files\Bonjour\mdnsNSP.dll
(000000000ffd0000 - 000000000fff8000: C:\WINDOWS\system32\rsaenh.dll
(0000000010000000 - 0000000010017000:
C:\PROGRA~1\MOZILL~1\extensions\talkback@mozilla.org\components\BrandRes.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(000000004ec50000 - 000000004edf3000:
C:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_6595b64144ccf1df_1.0.2600.2180_x-ww_522f9f82\gdiplus.dll
(0000000059a60000 - 0000000059b01000: C:\WINDOWS\system32\DBGHELP.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\uxtheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(0000000060010000 - 0000000060022000: C:\PROGRA~1\MOZILL~1\components\jar50.dll
(0000000060030000 - 000000006003f000: C:\PROGRA~1\MOZILL~1\components\jsd3250.dll
(0000000060040000 - 000000006006c000: C:\PROGRA~1\MOZILL~1\components\xpinstal.dll
(0000000060080000 - 0000000060091000: C:\PROGRA~1\MOZILL~1\gksvggdiplus.dll
(00000000600a0000 - 0000000060108000: C:\PROGRA~1\MOZILL~1\js3250.dll
(0000000060160000 - 0000000060187000: C:\PROGRA~1\MOZILL~1\nspr4.dll
(0000000060190000 - 00000000601e8000: C:\PROGRA~1\MOZILL~1\nss3.dll
(00000000601f0000 - 000000006022a000: C:\Program Files\Mozilla Firefox\nssckbi.dll
(0000000060230000 - 0000000060237000: C:\PROGRA~1\MOZILL~1\plc4.dll
(0000000060240000 - 0000000060246000: C:\PROGRA~1\MOZILL~1\plds4.dll
(0000000060250000 - 0000000060258000: C:\PROGRA~1\MOZILL~1\plugins\npnul32.dll
(0000000060260000 - 000000006027a000: C:\PROGRA~1\MOZILL~1\smime3.dll
(0000000060280000 - 00000000602da000: C:\PROGRA~1\MOZILL~1\softokn3.dll
(00000000602e0000 - 00000000602fb000: C:\PROGRA~1\MOZILL~1\ssl3.dll
(0000000060310000 - 0000000060324000: C:\PROGRA~1\MOZILL~1\xpcom_compat.dll
(0000000060330000 - 0000000060396000: C:\PROGRA~1\MOZILL~1\xpcom_core.dll
(00000000605d0000 - 00000000605d9000: C:\WINDOWS\system32\mslbui.dll
(00000000662b0000 - 0000000066308000: C:\WINDOWS\system32\hnetcfg.dll
(0000000071a50000 - 0000000071a8f000: C:\WINDOWS\system32\mswsock.dll
(0000000071a90000 - 0000000071a98000: C:\WINDOWS\System32\wshtcpip.dll
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\WSOCK32.dll
(00000000722b0000 - 00000000722b5000: C:\WINDOWS\system32\sensapi.dll
(0000000073000000 - 0000000073026000: C:\WINDOWS\system32\WINSPOOL.DRV
(00000000746f0000 - 000000007471a000: C:\WINDOWS\System32\msimtf.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\system32\msimg32.dll
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.DLL
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\imagehlp.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076e90000 - 0000000076ea2000: C:\WINDOWS\system32\rasman.dll
(0000000076eb0000 - 0000000076edf000: C:\WINDOWS\system32\TAPI32.dll
(0000000076ee0000 - 0000000076f1c000: C:\WINDOWS\system32\RASAPI32.DLL
(0000000076f20000 - 0000000076f47000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fb0000 - 0000000076fb8000: C:\WINDOWS\System32\winrnr.dll
(0000000076fc0000 - 0000000076fc6000: C:\WINDOWS\system32\rasadhlp.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININET.dll
(0000000077260000 - 00000000772fe000: C:\WINDOWS\system32\urlmon.dll
(00000000773d0000 - 00000000774d2000:
C:\WINDOWS\WinSxS\X86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\COMCTL32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\Apphelp.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077c70000 - 0000000077c93000: C:\WINDOWS\system32\msv1_0.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f56000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(000000007c340000 - 000000007c396000: C:\WINDOWS\system32\MSVCR71.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d4000: C:\WINDOWS\system32\SHELL32.dll
*----> State Dump for Thread Id 0xf4c <----*
eax=0caf1843 ebx=01233f48 ecx=00277ec0 edx=00000006 esi=00000000 edi=00000001
eip=7c90eb94 esp=0012fdc0 ebp=0012fe10 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00200202
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** WARNING: Unable to verify checksum for C:\PROGRA~1\MOZILL~1\firefox.exe
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\PROGRA~1\MOZILL~1\firefox.exe -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr Args to Child
0012fe10 007f42a7 0136aa38 603317bc 00401e57 ntdll!KiFastSystemCallRet
0012ff04 00401012 0123a528 0027d204 012cb1f8
firefox!DeviceContextImpl__GetDepth+0x2e688
0012ffc0 7c816d4f 007e0041 005c0031 7ffdc000 firefox+0x1012
0012fff0 00000000 008f0202 00000000 78746341 kernel32!RegisterWaitForInputIdle+0x49
*----> Raw Stack Dump <----*
000000000012fdc0 18 94 d4 77 e2 6c 51 00 - 00 00 00 80 f8 b1 2c 01
...w.lQ.......,.
000000000012fdd0 00 00 00 00 bc 02 02 00 - 13 01 00 00 01 00 00 00
................
000000000012fde0 00 00 00 00 29 2a 3a 00 - a6 02 00 00 6a 02 00 00
....)*:.....j...
000000000012fdf0 3c 45 a7 00 f8 fd 12 00 - 00 00 00 00 01 00 00 00
<E..............
000000000012fe00 00 00 00 00 b0 ff 12 00 - f9 32 8f 00 01 00 00 00
.........2......
000000000012fe10 04 ff 12 00 a7 42 7f 00 - 38 aa 36 01 bc 17 33 60
.....B..8.6...3`
000000000012fe20 57 1e 40 00 f8 b1 2c 01 - 41 00 7e 00 2c 1a c6 77
W.@...,.A.~.,..w
000000000012fe30 00 00 00 00 58 6a 37 60 - 4c fe 12 00 1f 00 00 00
....Xj7`L.......
000000000012fe40 11 00 01 00 3f 00 00 00 - 4c fe 12 00 31 2e 34 5f
....?...L...1.4_
000000000012fe50 32 30 30 35 30 39 30 38 - 30 36 2f 31 2e 38 62 34
2005090806/1.8b4
000000000012fe60 5f 32 30 30 35 30 39 30 - 38 30 36 00 00 00 27 00
_2005090806...'.
000000000012fe70 00 00 00 00 2d c0 c2 77 - e6 06 8f 00 84 23 a5 00
....-..w.....#..
000000000012fe80 00 00 00 00 ce c3 c2 77 - 64 00 00 00 68 67 8f 00
.......wd...hg..
000000000012fe90 54 67 8f 00 00 71 27 00 - 00 00 00 00 70 76 27 00
Tg...q'.....pv'.
000000000012fea0 80 78 27 00 01 00 00 00 - 00 00 00 00 01 00 00 00
.x'.............
000000000012feb0 01 00 00 00 00 00 00 00 - 45 09 91 7c b8 d1 23 01
........E..|..#.
000000000012fec0 98 24 37 60 b4 2a a5 00 - 74 29 a5 00 00 ff 12 00
.$7`.*..t)......
000000000012fed0 78 70 27 00 50 63 27 00 - 80 78 27 00 00 00 00 00
xp'.Pc'..x'.....
000000000012fee0 78 71 27 00 c0 b2 2a 01 - 88 6d 13 01 00 00 00 00
xq'...*..m......
000000000012fef0 e8 92 21 01 48 54 1e 01 - 78 f2 20 01 70 76 27 00 ..!.HT..x.
.pv'.
*----> State Dump for Thread Id 0xf50 <----*
eax=4dfc6000 ebx=00278604 ecx=7c910833 edx=00000110 esi=0000075c edi=00000000
eip=7c90eb94 esp=0105fe60 ebp=0105fec4 iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\PROGRA~1\MOZILL~1\nspr4.dll -
ChildEBP RetAddr Args to Child
0105fec4 7c802542 0000075c 0000ea60 00000000 ntdll!KiFastSystemCallRet
0105fed8 6017804c 0000075c 0000ea60 002785e8 kernel32!WaitForSingleObject+0x12
0000ea60 00000000 00000000 00000000 00000000 nspr4!PR_MD_WAIT_CV+0x5c
*----> Raw Stack Dump <----*
000000000105fe60 c0 e9 90 7c db 25 80 7c - 5c 07 00 00 00 00 00 00
...|.%.|\.......
000000000105fe70 94 fe 05 01 ec 86 27 00 - b8 87 27 00 04 86 27 00
......'...'...'.
000000000105fe80 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00
................
000000000105fe90 10 00 00 00 00 ba 3c dc - ff ff ff ff 00 c0 fd 7f
......<.........
000000000105fea0 00 e0 fd 7f 94 fe 05 01 - 00 30 36 02 74 fe 05 01
.........06.t...
000000000105feb0 28 29 01 00 a4 ff 05 01 - f3 99 83 7c 08 26 80 7c
().........|.&.|
000000000105fec0 00 00 00 00 d8 fe 05 01 - 42 25 80 7c 5c 07 00 00
........B%.|\...
000000000105fed0 60 ea 00 00 00 00 00 00 - 60 ea 00 00 4c 80 17 60
`.......`...L..`
000000000105fee0 5c 07 00 00 60 ea 00 00 - e8 85 27 00 b8 87 27 00
\...`.....'...'.
000000000105fef0 54 ff 05 01 00 00 00 00 - ac 44 17 60 ec 86 27 00
T........D.`..'.
000000000105ff00 04 86 27 00 98 34 33 00 - e8 85 27 00 98 34 33 00
..'..43...'..43.
000000000105ff10 f3 45 17 60 b8 87 27 00 - 78 86 27 00 e8 85 27 00
.E.`..'.x.'...'.
000000000105ff20 98 34 33 00 60 48 17 60 - 9a 0f 36 60 78 86 27 00
.43.`H.`..6`x.'.
000000000105ff30 98 34 33 00 64 88 27 00 - 14 87 27 00 c8 89 27 00
.43.d.'...'...'.
000000000105ff40 08 87 27 00 b4 ff 05 01 - c8 89 27 00 9d bc 35 60
..'.......'...5`
000000000105ff50 00 00 00 00 b4 ff 05 01 - 40 b8 35 60 00 05 39 60
........@.5`..9`
000000000105ff60 b8 87 27 00 c1 4e 17 60 - 08 87 27 00 48 46 27 00
..'..N.`..'.HF'.
000000000105ff70 48 46 27 00 78 01 15 00 - 98 97 27 00 2b 6f 17 60
HF'.x.....'.+o.`
000000000105ff80 b8 87 27 00 b0 a3 c3 77 - b8 87 27 00 78 01 15 00
..'....w..'.x...
000000000105ff90 80 25 16 00 c8 89 27 00 - 00 00 00 00 8c ff 05 01
.%....'.........
*----> State Dump for Thread Id 0xf58 <----*
eax=00000000 ebx=0016a5a0 ecx=00000602 edx=02edf008 esi=7fffffff edi=ffffffff
eip=7c90eb94 esp=0158cd24 ebp=0158cd60 iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000293
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\mswsock.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\WS2_32.dll -
ChildEBP RetAddr Args to Child
0158cd60 71a55fa7 00000688 000006b0 00000000 ntdll!KiFastSystemCallRet
0158ce54 71ab2e67 00000000 0158df00 00000000 mswsock+0x5fa7
0158cea4 60179b59 00000000 0158df00 00000000 WS2_32!select+0xa7
00000000 00000000 00000000 00000000 00000000 nspr4!PR_MD_UNLOCK+0x1789
*----> Raw Stack Dump <----*
000000000158cd24 c0 e9 90 7c 33 40 a5 71 - 88 06 00 00 01 00 00 00
...|3@.q........
000000000158cd34 4c cd 58 01 04 ce 58 01 - 00 df 58 01 f4 cd 58 01
L.X...X...X...X.
000000000158cd44 e0 04 0f c7 28 ba c5 01 - ff ff ff ff ff ff ff 7f
....(...........
000000000158cd54 a0 a5 16 00 00 00 00 00 - 00 00 00 00 54 ce 58 01
............T.X.
000000000158cd64 a7 5f a5 71 88 06 00 00 - b0 06 00 00 00 00 00 00
._.q............
000000000158cd74 04 00 00 00 00 00 00 00 - 30 a3 16 00 00 00 00 00
........0.......
000000000158cd84 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
000000000158cd94 01 00 00 00 80 96 18 6a - 67 ff ff ff ff ff ff ff
.......jg.......
000000000158cda4 00 00 00 00 1c 00 00 00 - 00 00 00 00 00 00 00 00
................
000000000158cdb4 00 00 00 00 8b e0 80 7c - 68 aa 16 00 00 00 00 00
.......|h.......
000000000158cdc4 88 ce 58 01 d8 78 eb 02 - 00 24 6d 03 1c 00 00 00
..X..x...$m.....
000000000158cdd4 a0 a5 16 00 10 ce 58 01 - 00 00 00 00 00 00 00 00
......X.........
000000000158cde4 00 00 00 00 f4 cd 58 01 - 00 00 00 00 00 00 00 00
......X.........
000000000158cdf4 ff ff ff ff ff ff ff 7f - 01 00 00 00 00 00 12 01
................
000000000158ce04 b0 06 00 00 19 00 00 00 - 00 00 00 00 b0 03 00 00
................
000000000158ce14 19 00 00 00 00 00 00 00 - b0 03 00 00 02 01 00 00
................
000000000158ce24 ff ff ff ff 72 b2 a6 71 - a0 0b ac 71 32 2b ab 71
....r..q...q2+.q
000000000158ce34 01 00 00 00 4a 56 00 00 - 78 cd 58 01 0c 15 aa 71
....JV..x.X....q
000000000158ce44 94 ce 58 01 c8 71 a7 71 - 68 2e a5 71 ff ff ff ff
..X..q.qh..q....
000000000158ce54 a4 ce 58 01 67 2e ab 71 - 00 00 00 00 00 df 58 01
..X.g..q......X.
*----> State Dump for Thread Id 0xf60 <----*
eax=00000000 ebx=00278454 ecx=0000da7a edx=00000000 esi=00000644 edi=00000000
eip=7c90eb94 esp=0181fe70 ebp=0181fed4 iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0181fed4 7c802542 00000644 00003125 00000000 ntdll!KiFastSystemCallRet
0181fee8 6017804c 00000644 00003125 00278438 kernel32!WaitForSingleObject+0x12
00003125 00000000 00000000 00000000 00000000 nspr4!PR_MD_WAIT_CV+0x5c
*----> Raw Stack Dump <----*
000000000181fe70 c0 e9 90 7c db 25 80 7c - 44 06 00 00 00 00 00 00
...|.%.|D.......
000000000181fe80 a4 fe 81 01 3c 85 27 00 - 58 2e 20 01 54 84 27 00 ....<.'.X.
.T.'.
000000000181fe90 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00
................
000000000181fea0 10 00 00 00 b0 4a 80 f8 - ff ff ff ff 00 c0 fd 7f
.....J..........
000000000181feb0 00 a0 fd 7f a4 fe 81 01 - 00 00 00 00 84 fe 81 01
................
000000000181fec0 00 00 00 00 a4 ff 81 01 - f3 99 83 7c 08 26 80 7c
...........|.&.|
000000000181fed0 00 00 00 00 e8 fe 81 01 - 42 25 80 7c 44 06 00 00
........B%.|D...
000000000181fee0 25 31 00 00 00 00 00 00 - 25 31 00 00 4c 80 17 60
%1......%1..L..`
000000000181fef0 44 06 00 00 25 31 00 00 - 38 84 27 00 58 2e 20 01
D...%1..8.'.X. .
000000000181ff00 e8 7e 27 00 38 84 27 00 - ac 44 17 60 3c 85 27 00
.~'.8.'..D.`<.'.
000000000181ff10 54 84 27 00 b6 bc 0a 00 - 08 2d 21 01 b6 bc 0a 00
T.'......-!.....
000000000181ff20 f3 45 17 60 58 2e 20 01 - c8 84 27 00 38 84 27 00 .E.`X.
...'.8.'.
000000000181ff30 b6 bc 0a 00 c0 7e 27 00 - 98 ed 35 60 c8 84 27 00
.....~'...5`..'.
000000000181ff40 b6 bc 0a 00 04 2f 20 01 - b4 2d 20 01 b4 ff 81 01 ...../ ..-
.....
000000000181ff50 c0 27 20 01 b6 bc 0a 00 - 40 b8 35 60 0c 16 af 0c .'
.....@.5`....
000000000181ff60 58 2e 20 01 c1 4e 17 60 - a8 2d 20 01 48 46 27 00 X. ..N.`.-
.HF'.
000000000181ff70 48 46 27 00 f0 d7 30 01 - 10 a8 23 01 2b 6f 17 60
HF'...0...#.+o.`
000000000181ff80 58 2e 20 01 b0 a3 c3 77 - 58 2e 20 01 f0 d7 30 01 X. ....wX.
...0.
000000000181ff90 f0 d7 30 01 c0 27 20 01 - 00 00 00 00 8c ff 81 01 ..0..'
.........
000000000181ffa0 98 cc dc f3 dc ff 81 01 - 94 5c c3 77 d8 40 c1 77
.........\.w.@.w
*----> State Dump for Thread Id 0xf64 <----*
eax=00ae58d0 ebx=0193fe7c ecx=00000008 edx=7c90eb94 esi=00000000 edi=7ffdc000
eip=7c90eb94 esp=0193fe54 ebp=0193fef0 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\USER32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_6595b64144ccf1df_1.0.2600.2180_x-ww_522f9f82\gdiplus.dll
-
ChildEBP RetAddr Args to Child
0193fef0 77d495f9 00000002 0193ff18 00000000 ntdll!KiFastSystemCallRet
0193ff4c 77d496a8 00000001 0193ffac ffffffff USER32!GetLastInputInfo+0x105
0193ff68 4ec95846 00000001 0193ffac 00000000 USER32!MsgWaitForMultipleObjects+0x1f
0193ffb4 7c80b50b 00000000 00000000 0012eb64 gdiplus+0x45846
0193ffec 00000000 4ec957ed 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000193fe54 ab e9 90 7c f2 94 80 7c - 02 00 00 00 7c fe 93 01
...|...|....|...
000000000193fe64 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
000000000193fe74 02 00 00 00 00 00 00 00 - 54 06 00 00 3c 06 00 00
........T...<...
000000000193fe84 01 00 00 00 00 0d 00 00 - 31 55 c9 4e cd ab ba dc
........1U.N....
000000000193fe94 00 00 00 00 dc fe 93 01 - 14 00 00 00 01 00 00 00
................
000000000193fea4 00 00 00 00 00 00 00 00 - 10 00 00 00 5a 88 d4 77
............Z..w
000000000193feb4 e4 fe 93 01 2c 90 d8 77 - 00 c0 fd 7f 00 90 fd 7f
....,..w........
000000000193fec4 06 04 01 00 00 00 00 00 - 7c fe 93 01 3c 90 d8 77
........|...<..w
000000000193fed4 02 00 00 00 70 fe 93 01 - 00 00 00 00 dc ff 93 01
....p...........
000000000193fee4 f3 99 83 7c 90 95 80 7c - 00 00 00 00 4c ff 93 01
...|...|....L...
000000000193fef4 f9 95 d4 77 02 00 00 00 - 18 ff 93 01 00 00 00 00
...w............
000000000193ff04 ff ff ff ff 00 00 00 00 - 6c c9 d4 77 64 62 dd 4e
........l..wdb.N
000000000193ff14 00 00 00 00 54 06 00 00 - 3c 06 00 00 00 00 00 00
....T...<.......
000000000193ff24 00 00 00 00 00 00 00 00 - 01 00 00 00 50 71 bf 00
............Pq..
000000000193ff34 00 90 fd 7f 00 00 00 00 - 00 00 00 00 00 00 00 00
................
000000000193ff44 00 90 fd 7f 3c 06 00 00 - 68 ff 93 01 a8 96 d4 77
....<...h......w
000000000193ff54 01 00 00 00 ac ff 93 01 - ff ff ff ff ff 04 00 00
................
000000000193ff64 18 ff 93 01 b4 ff 93 01 - 46 58 c9 4e 01 00 00 00
........FX.N....
000000000193ff74 ac ff 93 01 00 00 00 00 - ff ff ff ff ff 04 00 00
................
000000000193ff84 00 00 00 00 64 eb 12 00 - 00 00 00 00 92 02 03 00
....d...........
*----> State Dump for Thread Id 0xf80 <----*
eax=7c372522 ebx=0265fec8 ecx=02552858 edx=00000000 esi=00000000 edi=7ffdc000
eip=7c90eb94 esp=0265fea0 ebp=0265ff3c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** WARNING: Unable to verify checksum for
C:\PROGRA~1\MOZILL~1\plugins\npbrowster.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\PROGRA~1\MOZILL~1\plugins\npbrowster.dll -
ChildEBP RetAddr Args to Child
0265ff3c 7c809c86 00000002 0265ff7c 00000000 ntdll!KiFastSystemCallRet
0265ff58 0242bd91 00000002 0265ff7c 00000000 kernel32!WaitForMultipleObjects+0x18
0265ffb4 7c80b50b 02552858 00000000 00000000 npbrowster+0xbd91
0265ffec 00000000 7c3494f6 02552858 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000265fea0 ab e9 90 7c f2 94 80 7c - 02 00 00 00 c8 fe 65 02
...|...|......e.
000000000265feb0 01 00 00 00 00 00 00 00 - 00 00 00 00 c0 24 55 02
.............$U.
000000000265fec0 6e 9c 80 7c 4c 9c 80 7c - 20 05 00 00 04 05 00 00 n..|L..|
.......
000000000265fed0 44 06 00 00 fc cb dc f3 - a0 00 00 00 40 df 68 e4
D...........@.h.
000000000265fee0 00 00 00 00 08 10 e3 82 - 14 00 00 00 01 00 00 00
................
000000000265fef0 00 00 00 00 00 00 00 00 - 10 00 00 00 ff ff ff ff
................
000000000265ff00 00 00 55 02 00 a0 fd 7f - 00 c0 fd 7f 00 e0 fa 7f
..U.............
000000000265ff10 e4 e6 e6 82 00 00 00 00 - c8 fe 65 02 14 00 00 00
..........e.....
000000000265ff20 02 00 00 00 bc fe 65 02 - 70 ff 65 02 a4 ff 65 02
......e.p.e...e.
000000000265ff30 f3 99 83 7c 90 95 80 7c - 00 00 00 00 58 ff 65 02
...|...|....X.e.
000000000265ff40 86 9c 80 7c 02 00 00 00 - 7c ff 65 02 00 00 00 00
...|....|.e.....
000000000265ff50 ff ff ff ff 00 00 00 00 - b4 ff 65 02 91 bd 42 02
..........e...B.
000000000265ff60 02 00 00 00 7c ff 65 02 - 00 00 00 00 ff ff ff ff
....|.e.........
000000000265ff70 00 00 00 00 c0 3b 55 02 - 58 28 55 02 20 05 00 00
.....;U.X(U. ...
000000000265ff80 04 05 00 00 65 95 34 7c - c0 24 55 02 00 00 00 00
....e.4|.$U.....
000000000265ff90 00 00 00 00 58 28 55 02 - 00 00 00 00 8c ff 65 02
....X(U.......e.
000000000265ffa0 98 cc dc f3 dc ff 65 02 - 0d 24 34 7c 08 f5 37 7c
......e..$4|..7|
000000000265ffb0 00 00 00 00 ec ff 65 02 - 0b b5 80 7c 58 28 55 02
......e....|X(U.
000000000265ffc0 00 00 00 00 00 00 00 00 - 58 28 55 02 00 e0 fa 7f
........X(U.....
000000000265ffd0 00 26 fc 82 c0 ff 65 02 - f8 94 f6 82 ff ff ff ff
.&....e.........
*----> State Dump for Thread Id 0xb4 <----*
eax=00000000 ebx=00000000 ecx=00000000 edx=0381fdc8 esi=001532f0 edi=00153394
eip=7c90eb94 esp=0381fe1c ebp=0381ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for
C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0381ff80 77e76c22 0381ffa8 77e76a3b 001532f0 ntdll!KiFastSystemCallRet
0381ff88 77e76a3b 001532f0 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5ea
0381ffa8 77e76c0a 00163c18 0381ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
0381ffb4 7c80b50b 0018df88 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5d2
0381ffec 00000000 77e76bf0 0018df88 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000381fe1c 99 e3 90 7c 03 67 e7 77 - 14 06 00 00 70 ff 81 03
...|.g.w....p...
000000000381fe2c 00 00 00 00 28 6d 17 00 - 4c ff 81 03 f6 e4 01 00
....(m..L.......
000000000381fe3c 10 87 e2 81 00 00 00 00 - 9c 36 50 c0 c0 2b 9a 82
.........6P..+..
000000000381fe4c 38 0c 00 00 02 0b f3 f3 - 00 00 4e 80 38 0c 00 00
8.........N.8...
000000000381fe5c c0 2b 9a 82 00 00 f8 7f - fc 07 30 c0 00 fe 1f c0
.+........0.....
000000000381fe6c 04 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
000000000381fe7c 00 00 00 00 ff ff ff ff - 28 0c f3 f3 8e b5 4e 80
........(.....N.
000000000381fe8c fc 07 30 c0 28 0c f3 f3 - 06 b4 4e 80 00 00 f8 7f
..0.(.....N.....
000000000381fe9c 00 00 00 00 00 00 00 00 - e8 18 8d 82 c8 29 9a 82
.............)..
000000000381feac 01 2a 9a 82 00 00 00 00 - 00 fe 1f c0 00 00 00 00
.*..............
000000000381febc 48 57 dd 82 ff ff 2d 02 - 00 00 04 00 df 22 00 00
HW....-......"..
000000000381fecc 94 2a 9a 82 c8 29 9a 82 - d0 0b f3 f3 00 00 00 00
.*...)..........
000000000381fedc 00 00 2e 02 3c 0b f3 f3 - 00 00 00 00 ff ff ff ff
....<...........
000000000381feec 90 24 4e 80 00 00 f8 7f - ff ff ff ff 22 89 56 80
.$N.........".V.
000000000381fefc ec e7 4d 80 ff ff ff ff - b8 0c f3 f3 bc 0c f3 f3
..M.............
000000000381ff0c 00 80 00 00 44 ef 82 82 - 20 0c f3 f3 46 02 00 00 ....D...
...F...
000000000381ff1c ba c2 4d 80 14 ef 82 82 - a8 ed 82 82 dc ed 82 82
..M.............
000000000381ff2c 38 a9 54 80 80 ff 81 03 - 99 66 e7 77 4c ff 81 03
8.T......f.wL...
000000000381ff3c a9 66 e7 77 ed 10 90 7c - e8 61 62 03 88 df 18 00
.f.w...|.ab.....
000000000381ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff
../M.....]......
*----> State Dump for Thread Id 0x334 <----*
eax=036aa4a0 ebx=010edd64 ecx=06d10004 edx=06d00003 esi=00000560 edi=00000000
eip=7c90eb94 esp=01bdfe58 ebp=01bdfebc iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01bdfebc 7c802542 00000560 0000ea60 00000000 ntdll!KiFastSystemCallRet
01bdfed0 6017804c 00000560 0000ea60 010edd48 kernel32!WaitForSingleObject+0x12
0000ea60 00000000 00000000 00000000 00000000 nspr4!PR_MD_WAIT_CV+0x5c
*----> Raw Stack Dump <----*
0000000001bdfe58 c0 e9 90 7c db 25 80 7c - 60 05 00 00 00 00 00 00
...|.%.|`.......
0000000001bdfe68 8c fe bd 01 4c de 0e 01 - 80 32 e3 02 64 dd 0e 01
....L....2..d...
0000000001bdfe78 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00
................
0000000001bdfe88 10 00 00 00 00 ba 3c dc - ff ff ff ff 00 c0 fd 7f
......<.........
0000000001bdfe98 00 d0 fd 7f 8c fe bd 01 - f0 83 17 60 6c fe bd 01
...........`l...
0000000001bdfea8 82 48 17 60 a4 ff bd 01 - f3 99 83 7c 08 26 80 7c
.H.`.......|.&.|
0000000001bdfeb8 00 00 00 00 d0 fe bd 01 - 42 25 80 7c 60 05 00 00
........B%.|`...
0000000001bdfec8 60 ea 00 00 00 00 00 00 - 60 ea 00 00 4c 80 17 60
`.......`...L..`
0000000001bdfed8 60 05 00 00 60 ea 00 00 - 48 dd 0e 01 80 32 e3 02
`...`...H....2..
0000000001bdfee8 48 ff bd 01 00 c0 16 60 - ac 44 17 60 4c de 0e 01
H......`.D.`L...
0000000001bdfef8 64 dd 0e 01 98 34 33 00 - 8c eb 0e 01 98 34 33 00
d....43......43.
0000000001bdff08 f3 45 17 60 80 32 e3 02 - d8 dd 0e 01 48 dd 0e 01
.E.`.2......H...
0000000001bdff18 98 34 33 00 50 eb 0e 01 - 3d 30 47 00 d8 dd 0e 01
.43.P...=0G.....
0000000001bdff28 98 34 33 00 50 eb 0e 01 - d0 56 f3 02 10 40 16 60
.43.P....V...@.`
0000000001bdff38 48 dd 0e 01 34 44 ea 02 - 55 b6 91 0c 98 34 33 00
H...4D..U....43.
0000000001bdff48 60 ff bd 01 0f 32 47 00 - 68 ff bd 01 80 32 e3 02
`....2G.h....2..
0000000001bdff58 2c 33 e3 02 08 4c ea 02 - b4 ff bd 01 c1 4e 17 60
,3...L.......N.`
0000000001bdff68 d0 56 f3 02 48 46 27 00 - 48 46 27 00 ff ff ff ff
.V..HF'.HF'.....
0000000001bdff78 c8 87 f1 02 2b 6f 17 60 - 80 32 e3 02 b0 a3 c3 77
....+o.`.2.....w
0000000001bdff88 80 32 e3 02 ff ff ff ff - 32 07 91 7c 08 4c ea 02
.2......2..|.L..
*----> State Dump for Thread Id 0x248 <----*
eax=71a5d5af ebx=c0000000 ecx=7c916315 edx=0f5827d9 esi=00000000 edi=71a87558
eip=7c90eb94 esp=01cdff7c ebp=01cdffb4 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01cdffb4 7c80b50b 71a5d8ec 7c913288 7c916433 ntdll!KiFastSystemCallRet
01cdffec 00000000 71a5d5af 03628ab0 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000001cdff7c 1b e3 90 7c 09 d6 a5 71 - a8 06 00 00 bc ff cd 01
...|...q........
0000000001cdff8c b0 ff cd 01 a4 ff cd 01 - 50 d6 a5 71 88 32 91 7c
........P..q.2.|
0000000001cdff9c 33 64 91 7c b0 8a 62 03 - 00 00 00 00 00 00 00 00
3d.|..b.........
0000000001cdffac 00 00 a5 71 e0 24 6d 03 - ec ff cd 01 0b b5 80 7c
...q.$m........|
0000000001cdffbc ec d8 a5 71 88 32 91 7c - 33 64 91 7c b0 8a 62 03
...q.2.|3d.|..b.
0000000001cdffcc 00 80 fd 7f 00 26 fc 82 - c0 ff cd 01 78 be e1 82
.....&......x...
0000000001cdffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00
.......|...|....
0000000001cdffec 00 00 00 00 00 00 00 00 - af d5 a5 71 b0 8a 62 03
...........q..b.
0000000001cdfffc 00 00 00 00 4d 5a 90 00 - 03 00 00 00 04 00 00 00
....MZ..........
0000000001ce000c ff ff 00 00 b8 00 00 00 - 00 00 00 00 40 00 00 00
............@...
0000000001ce001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0000000001ce002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0000000001ce003c e0 00 00 00 0e 1f ba 0e - 00 b4 09 cd 21 b8 01 4c
............!..L
0000000001ce004c cd 21 54 68 69 73 20 70 - 72 6f 67 72 61 6d 20 63 .!This
program c
0000000001ce005c 61 6e 6e 6f 74 20 62 65 - 20 72 75 6e 20 69 6e 20 annot be
run in
0000000001ce006c 44 4f 53 20 6d 6f 64 65 - 2e 0d 0d 0a 24 00 00 00 DOS
mode....$...
0000000001ce007c 00 00 00 00 8f 0a f5 a0 - cb 6b 9b f3 cb 6b 9b f3
.........k...k..
0000000001ce008c cb 6b 9b f3 b0 77 97 f3 - ce 6b 9b f3 48 77 95 f3
.k...w...k..Hw..
0000000001ce009c ce 6b 9b f3 48 63 c6 f3 - c0 6b 9b f3 cb 6b 9a f3
.k..Hc...k...k..
0000000001ce00ac 9c 6b 9b f3 23 74 91 f3 - 19 6b 9b f3 23 74 9f f3
.k..#t...k..#t..
*----> State Dump for Thread Id 0x24c <----*
eax=01e3ff04 ebx=60174840 ecx=00000000 edx=02cec6b8 esi=02f9b1c8 edi=6036e27e
eip=00000000 esp=4747474f ebp=47474747 iopl=0 nv up ei ng nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000286
function: <nosymbols>
No prior disassembly possible
:
00000000 ?? ???
00000002 ?? ???
00000004 ?? ???
00000006 ?? ???
00000008 ?? ???
0000000a ?? ???
0000000c ?? ???
0000000e ?? ???
FAULT ->:
00000000 ?? ???
Error 0x00000001
00000002 ?? ???
00000004 ?? ???
00000006 ?? ???
00000008 ?? ???
0000000a ?? ???
0000000c ?? ???
0000000e ?? ???
00000010 ?? ???
00000012 ?? ???
00000014 ?? ???
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
4747474b 00000000 00000000 00000000 00000000 0x0
Error 0x8007012B
*----> State Dump for Thread Id 0xd58 <----*
eax=77c3a341 ebx=0125150c ecx=6001a918 edx=00000000 esi=000001e4 edi=00000000
eip=7c90eb94 esp=0491fe78 ebp=0491fedc iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0491fedc 7c802542 000001e4 0000ea60 00000000 ntdll!KiFastSystemCallRet
0491fef0 6017804c 000001e4 0000ea60 012514f0 kernel32!WaitForSingleObject+0x12
0000ea60 00000000 00000000 00000000 00000000 nspr4!PR_MD_WAIT_CV+0x5c
*----> Raw Stack Dump <----*
000000000491fe78 c0 e9 90 7c db 25 80 7c - e4 01 00 00 00 00 00 00
...|.%.|........
000000000491fe88 ac fe 91 04 f4 15 25 01 - b0 2e be 02 0c 15 25 01
......%.......%.
000000000491fe98 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00
................
000000000491fea8 10 00 00 00 00 ba 3c dc - ff ff ff ff 00 c0 fd 7f
......<.........
000000000491feb8 00 60 fd 7f ac fe 91 04 - 18 ee 90 7c 8c fe 91 04
.`.........|....
000000000491fec8 ff ff ff ff a4 ff 91 04 - f3 99 83 7c 08 26 80 7c
...........|.&.|
000000000491fed8 00 00 00 00 f0 fe 91 04 - 42 25 80 7c e4 01 00 00
........B%.|....
000000000491fee8 60 ea 00 00 00 00 00 00 - 60 ea 00 00 4c 80 17 60
`.......`...L..`
000000000491fef8 e4 01 00 00 60 ea 00 00 - f0 14 25 01 b0 2e be 02
....`.....%.....
000000000491ff08 98 34 33 00 40 89 24 01 - ac 44 17 60 f4 15 25 01
.43.@.$..D.`..%.
000000000491ff18 0c 15 25 01 98 34 33 00 - 20 89 24 01 98 34 33 00 ..%..43.
.$..43.
000000000491ff28 f3 45 17 60 b0 2e be 02 - 80 15 25 01 f0 14 25 01
.E.`......%...%.
000000000491ff38 98 34 33 00 40 89 24 01 - 47 c1 44 00 80 15 25 01
.43.@.$.G.D...%.
000000000491ff48 98 34 33 00 5c 2f be 02 - b0 2e be 02 b4 ff 91 04
.43.\/..........
000000000491ff58 88 d0 e5 02 f0 14 25 01 - 20 89 24 01 c1 4e 17 60 ......%.
.$..N.`
000000000491ff68 b5 58 92 0c 48 46 27 00 - 48 46 27 00 72 2f 53 65
.X..HF'.HF'.r/Se
000000000491ff78 60 49 e1 02 2b 6f 17 60 - b0 2e be 02 b0 a3 c3 77
`I..+o.`.......w
000000000491ff88 b0 2e be 02 72 2f 53 65 - 63 75 72 65 88 d0 e5 02
....r/Secure....
000000000491ff98 00 00 00 00 8c ff 91 04 - 98 cc 7f f6 dc ff 91 04
................
000000000491ffa8 94 5c c3 77 d8 40 c1 77 - 00 00 00 00 ec ff 91 04
.\.w.@.w........
*----> State Dump for Thread Id 0x250 <----*
eax=77e76bf0 ebx=00000000 ecx=7c910732 edx=ffffffff esi=001532f0 edi=00153394
eip=7c90eb94 esp=04a1fe1c ebp=04a1ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
04a1ff80 77e76c22 04a1ffa8 77e76a3b 001532f0 ntdll!KiFastSystemCallRet
04a1ff88 77e76a3b 001532f0 0381fc98 7c90ee18 RPCRT4!I_RpcBCacheFree+0x5ea
04a1ffa8 77e76c0a 00163c18 04a1ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
04a1ffb4 7c80b50b 03675e78 0381fc98 7c90ee18 RPCRT4!I_RpcBCacheFree+0x5d2
04a1ffec 00000000 77e76bf0 03675e78 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000004a1fe1c 99 e3 90 7c 03 67 e7 77 - 14 06 00 00 70 ff a1 04
...|.g.w....p...
0000000004a1fe2c 00 00 00 00 e0 f3 62 03 - 4c ff a1 04 90 6d 7f e4
......b.L....m..
0000000004a1fe3c b8 00 e2 82 00 00 00 00 - 00 6f 7f e4 70 6f 7f e4
.........o..po..
0000000004a1fe4c c8 6c 34 e1 00 00 00 00 - 00 00 00 00 00 00 00 00
.l4.............
0000000004a1fe5c 46 02 00 00 ce 39 4e 80 - 00 00 00 00 80 a8 e1 82
F....9N.........
0000000004a1fe6c 00 00 00 00 80 cb 7f f6 - 27 87 4e 80 80 cc 7f f6
........'.N.....
0000000004a1fe7c 01 00 00 00 00 00 00 00 - 00 00 00 00 80 a8 e1 82
................
0000000004a1fe8c 00 00 00 00 f0 be a0 82 - 00 00 00 00 01 6d 7f e4
.............m..
0000000004a1fe9c e6 a6 4a 00 90 cb 7f f6 - 3b a7 4a f8 90 6d 7f e4
..J.....;.J..m..
0000000004a1feac b8 00 e2 82 1c cc 7f f6 - ba f4 4c f8 f0 be a0 82
..........L.....
0000000004a1febc 80 a8 e1 82 c8 f4 4c f8 - 90 a8 e1 82 d0 43 f6 82
......L......C..
0000000004a1fecc b8 00 e2 82 01 00 00 00 - 00 00 00 00 00 00 00 00
................
0000000004a1fedc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00
................
0000000004a1feec 00 00 00 00 00 00 00 00 - ac cb 7f f6 00 00 00 00
................
0000000004a1fefc 01 ca 7f f6 b0 cb 7f f6 - 02 00 00 00 b8 00 e2 82
................
0000000004a1ff0c 00 11 f5 82 44 5f 4f 82 - 20 cc 7f f6 46 02 00 00 ....D_O.
...F...
0000000004a1ff1c ba c2 4d 80 14 5f 4f 82 - a8 5d 4f 82 dc 5d 4f 82
..M.._O..]O..]O.
0000000004a1ff2c ff ff ff ff 80 ff a1 04 - 99 66 e7 77 4c ff a1 04
.........f.wL...
0000000004a1ff3c a9 66 e7 77 ed 10 90 7c - d8 91 63 03 78 5e 67 03
.f.w...|..c.x^g.
0000000004a1ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff
../M.....]......
i think that's a different crash. fwiw, that's a null pointer (probably
function pointer) dereference, see: *----> State Dump for Thread Id 0x24c <----*
if you're willing to run a debug build, i could probably find one for you (in
which case we'd setup your system to generate .dmp files which are more helpful
than the drwatson report).
Reporter | ||
Comment 9•19 years ago
|
||
I did various things before finally getting FireFox 1.5 Beta 1 to stop crashing
when going to a https website. I uninstalled browster from PC and extension
from FireFox, didn't work. Re-booted machine, still didn't work. I uninstalled
Firefox and re-installed, didn't work. I uninstalled Firefox and all of the
firefox data for the user, rebooted machine, installed Firefox 1.5 Beta 1,
importing new prefences, etc., from IE and Mozilla, that finally worked. I'll
now set Firefox 1.5 Beta 1 to my default browser and keep testing. Thanks for
the help.
Updated•19 years ago
|
Assignee: wtchang → rrelyea
Reporter | ||
Comment 10•19 years ago
|
||
After removing everything an re-installing FireFox 1.5 Beta 1, it is working.
However, it looks like Browster may not have been the only problem.
I tried to add the kx509 back inot FireFox 1.5 and that now causes FireFox to
crash. I added it back in by going to Tools/Options/Advanced/Security Devices
and Load a module called kx509 module, which I pointed to kpkcs11.dll. After
that, FireFox would start crashing. I had to removed the module to keep FireFox
from crashing. Any ideas
Summary: FireFox 1.5 Beta crashes any time I try to go to a https:// website [@ 0x000a0027 - SECMOD_WaitForAnyTokenEvent] → FireFox 1.5 with kpkcs11 (kerberos pki) crashes loading https:// [@ 0x000a0027 - SECMOD_WaitForAnyTokenEvent]
Assignee | ||
Comment 11•19 years ago
|
||
The most likely problem is kx509 isn't providing a stub for
C_WaitForSlotEvent(). PKCS #11 modules are supposed to provide entry points for
all PKCS #11 functions, and return CKR_NOT_IMPLEMENTED for those it doesn't
implement.
I'm presuming k509 has set the CKF_REMOVABLE_DEVICE in one of it's slots. Is
kx509 a PKCS #11 2.00 module (as opposed to 2.01 or later)?
bob
Assignee | ||
Comment 12•19 years ago
|
||
OK, I've found the source kpkcs11 and determined that it is indeed a PKCS #11
2.0 module. C_WaitForSlotEvent is a 2.01 function, and therefore can only be
called if the module is version 2.01. The bug is in NSS, I'll attach a patch
here shortly.
You can work around this issue if you add a C_WaitForSlotEvent to the end of
your PKCS #11 functions List (pkcs11_funcs.c in PKCS11_Init_FunctionList add a
line pFunctionList->C_WaitForSlotEvent = C_WaitForSlotEvent; in cki_funcs.c add
a a function CK_RV C_WaitForSlotEvent(CK_FLAGS flags, CK_SLOT_ID_PTR pSlot,
CK_VOID_PTR pReserved) which returns CKR_FUNCTION_NOT_SUPPORTED; in cki_funcs.h
add a definition for the previous function; in cki_types.h add CK_RV
(*C_WaitForSlotEvents)(); to the end of CK_FUNCTION_LIST).
I'll supply an NSS patch shortly
Status: NEW → ASSIGNED
Target Milestone: --- → 3.11
Assignee | ||
Comment 13•19 years ago
|
||
This patch is against NSS 3.11
The code only checks the minor version, since NSS already rejects all non-2.X
versions of PKCS #11.
Attachment #196807 -
Flags: review?(wtchang)
Assignee | ||
Comment 14•19 years ago
|
||
Comment on attachment 196807 [details] [diff] [review]
Don't call C_WaitForSlotEvent if the module is 2.0.
Julien, This is a fairly simple patch, so you could pass this off to Saul for
Neil for review if you want.
Attachment #196807 -
Flags: superreview?(julien.pierre.bugs)
Comment 15•19 years ago
|
||
Comment on attachment 196807 [details] [diff] [review]
Don't call C_WaitForSlotEvent if the module is 2.0.
I have some comments below that I want Bob to review.
1. In secmodt.h, you added a new field
"CK_VERSION cryptokiVersion" at the end of the SECMODModuleStr
structure, which is public. I wanted to make sure you considered
this issue and concluded that it's okay.
2. In pk11util.c, you have:
> #include "pki3hack.h"
> #include "secerr.h"
> #include "dev.h"
>+#include "pkcs11ni.h"
I can't find this header file. With this error this patch gets
a review-.
>- if (!pk11_getFinalizeModulesOption()) {
>+ if ((mod->cryptokiVersion.minor < 1) ||
>+ !pk11_getFinalizeModulesOption()) {
> /* if we are sharing the module with other software in our
>- * address space, we can't reliably use C_WaitForSlotEvent() */
>+ * address space, we can't reliably use C_WaitForSlotEvent(),
>+ * and if the module is version 2.0, C_WaitForSlotEvent() doesn't
>+ * exist */
> return secmod_HandleWaitForSlotEvent(mod, flags, latency);
> }
I suggest you reorder either the tests or the two if's in the comment
so that the orderings match. Right now your comment describe the second
test before the first test.
As defensive programming, it is better to test
mod->cryptokiVersion.major, too:
(mod->cryptokiVersion.major == 2 &&
mod->cryptokiVersion.minor < 1)
This eliminates one place you'll need to update when PKCS #11 v3 is
released.
Attachment #196807 -
Flags: superreview?(julien.pierre.bugs)
Attachment #196807 -
Flags: review?(wtchang)
Attachment #196807 -
Flags: review-
Assignee | ||
Comment 16•19 years ago
|
||
The extra include was part of another patch (I have 2 in this directory I need
to sort out). It doesn't belong in this fix.
The use of minor or only was purposeful. The change to allow version 3 PKCS #11
modules is expected to be extensive (version 3 implies it will not be binary
compatible with version 2, so things like this function would likely be
rewritten). On the other hand, the only reason for not doing a full compare is
'performance'. Since this call is on order of multiple of seconds to
minutes/hours, the cost of an extra compare is not work the confusion leaving
it out causes. So this patch restores the full compare
Attachment #196807 -
Attachment is obsolete: true
Attachment #196811 -
Flags: superreview?(julien.pierre.bugs)
Attachment #196811 -
Flags: review?(wtchang)
Assignee | ||
Comment 17•19 years ago
|
||
this patch would need 2 reviews if we want it for 3.10.2
Attachment #196812 -
Flags: superreview?(julien.pierre.bugs)
Attachment #196812 -
Flags: review?(wtchang)
Comment 18•19 years ago
|
||
Comment on attachment 196812 [details] [diff] [review]
Same patch for the 3.10 branch
This patch is fine. The test for cryptokiVersion.major is not necessary, since
we only support version 2, and the module will fail to load earlier if it's
anything else.
Attachment #196812 -
Flags: superreview?(julien.pierre.bugs) → superreview+
Comment 19•19 years ago
|
||
Comment on attachment 196811 [details] [diff] [review]
Updated patch with review comments.
This patch is fine. The test for cryptokiVersion.major isn't necessary. Also,
it would be better to cast mod->slotCount to CK_ULONG rather than to unsigned
long.
Attachment #196811 -
Flags: superreview?(julien.pierre.bugs) → superreview+
Updated•19 years ago
|
OS: Windows XP → All
Priority: -- → P2
Hardware: PC → All
Summary: FireFox 1.5 with kpkcs11 (kerberos pki) crashes loading https:// [@ 0x000a0027 - SECMOD_WaitForAnyTokenEvent] → NSS tries to call C_WaitForSlotEvent on PKCS#11 2.0 modules
Version: unspecified → 3.10
Comment 20•19 years ago
|
||
Comment on attachment 196811 [details] [diff] [review]
Updated patch with review comments.
r=wtc.
Attachment #196811 -
Flags: review?(wtchang) → review+
Comment 21•19 years ago
|
||
Comment on attachment 196812 [details] [diff] [review]
Same patch for the 3.10 branch
Not sure if this bug is critical enough for NSS 3.10.x, but
the risk of this patch is low. Its risk is that if a module
has the C_WaitForSlotEvent method but has a Cryptoki version
of 2.0, we won't be using the module optimally. Since NSS
uses 2.0 modules in single-threaded mode, I think modules
that support 2.1 or higher interfaces are motivated to set
their Cryptoki version correctly.
Attachment #196812 -
Flags: review?(wtchang) → review+
Assignee | ||
Comment 22•19 years ago
|
||
Actually the risk is the application will generate token insertion and removal
events (for this token) slowly versus the application crashing.
Not all 2.01 will take the C_WaitForSlotEvent() path, many tokens will return
CKR_FUNCTION_NOT_SUPPORTED (especially since NSS didn't use it pre 3.10), and
will also generate events slowly. This is an existing 3.10 semantic.
so the only risk is a currently crashing token may generate events slowly
instead of crash;).
Assignee | ||
Comment 23•19 years ago
|
||
NSS 3.11:
File: pk11load.c Working revision: 1.17
File: pk11util.c Working revision: 1.52
File: secmodt.h Working revision: 1.28
NSS 3.10
Checking in pk11load.c;
/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11load.c,v <-- pk11load.c
new revision: 1.15.8.1; previous revision: 1.15
done
Assignee | ||
Comment 24•19 years ago
|
||
The bug is now fixed in NSS. It won't show up in a mozilla build until 3.10.2 or
3.11 is picked up.
bob
Status: ASSIGNED → RESOLVED
Closed: 19 years ago
Resolution: --- → FIXED
Comment 25•19 years ago
|
||
Comment on attachment 196812 [details] [diff] [review]
Same patch for the 3.10 branch
Julien, please confirm that your review+ of this patch
indicated Sun's approval of the inclusion of this patch
in NSS 3.10.2.
Comment 26•19 years ago
|
||
Yes, it did.
Reporter | ||
Comment 27•19 years ago
|
||
Having just installed Beta 2, and still having the same problem, I take it that
the fix has not been incorporated into Beta 2. Is that correct?
Comment 28•19 years ago
|
||
Ray: that's correct. We missed the Firefox 1.5 Beta 2
deadline. We are now trying to get this into Firefox 1.5
RC1 or final. See bug 311402.
Target Milestone: 3.11 → 3.10.2
You need to log in
before you can comment on or make changes to this bug.
Description
•