Closed
Bug 34834
Opened 25 years ago
Closed 24 years ago
runaway psm
Categories
(Core :: Security: PSM, defect, P3)
Tracking
()
VERIFIED
FIXED
M18
People
(Reporter: ben, Assigned: leaf)
References
Details
(Whiteboard: DO NOT REOPEN)
Attachments
(3 files)
17.03 KB,
patch
|
Details | Diff | Splinter Review | |
18.26 KB,
patch
|
Details | Diff | Splinter Review | |
76.80 KB,
text/plain
|
Details |
After browsing https documents for a while. PSM runs away and begins eating all
the CPU. The only way to fix it is to close the browser.
Comment 1•25 years ago
|
||
ben@valinux.com, when posting a bug please include build number and other
details to help develpers.
I have seen a few checkin's to improve Mozilla with PSM. Could be related.
Please follow up so we can direct approperly.
Comment 2•25 years ago
|
||
reporter - are you stills seeing this?
Reporter | ||
Comment 3•25 years ago
|
||
yes
Reporter | ||
Comment 4•25 years ago
|
||
Here is something that I just discovered. This problem doesn't occur when I am
connected to a fast network. Normally, I am connected with a ricochet which is
26Kbs and it happens all the time. However, when I am in the office and
connected via ethernet it never occurs.
Comment 5•25 years ago
|
||
->Security
Assignee: asadotzler → norris
Component: Browser-General → Security: General
QA Contact: jelwell → junruh
Comment 7•25 years ago
|
||
Change product to PSM
Component: Security: Crypto → Daemon
Product: Browser → PSM
Version: other → 1.01
Comment 8•25 years ago
|
||
ben@valinux.com - are you still seeing this problem with recent builds of
Mozilla? If so, could you add a comment giving the Build ID of the version you
tested with, and the version of the PSM, and we'll get this bug confirmed.
Gerv
tested on M16 2000-052408 Linux:
After having visited a site using SSL triggering the PSM module, and then having
left it, i realized things was going slower and slower and Moz barely reacting
anymore. Checked a ps -ef: There were 15 instances of ./psm running.
A quick "top" revealed this (excerpt):
1039 dark 17 0 34084 33M 12388 R 0 15.6 35.6 4:11 mozilla-bin
1064 dark 20 0 3204 3204 1540 R 0 14.3 3.3 1:00 psm
1115 dark 19 0 1044 1044 844 R 0 11.5 1.0 0:00 top
1061 dark 18 0 3204 3204 1540 R 0 10.9 3.3 1:17 psm
1062 dark 18 0 3204 3204 1540 R 0 10.9 3.3 1:00 psm
1063 dark 18 0 3204 3204 1540 R 0 10.9 3.3 1:00 psm
1066 dark 18 0 3204 3204 1540 R 0 10.9 3.3 1:00 psm
1069 dark 18 0 3204 3204 1540 R 0 10.2 3.3 1:00 psm
1067 dark 18 0 3204 3204 1540 R 0 8.8 3.3 1:00 psm
1068 dark 19 0 3204 3204 1540 R 0 5.4 3.3 0:45 psm
Comment 10•25 years ago
|
||
I am pretty sure that these are just threads in the PSM process.
Comment 11•25 years ago
|
||
loaded the page again and left it - you're right.. it spawn 15 threads right
away. But it never terminates them. They keep hanging in using heaps of CPU.
Reporter | ||
Comment 12•25 years ago
|
||
The problem isn't with the fact that there are lots of threads. The problem is
that combined the 15 or so threads bring your machine to a crawl.
Comment 14•25 years ago
|
||
*** Bug 32605 has been marked as a duplicate of this bug. ***
Comment 15•25 years ago
|
||
Reassigning all https/cartman/security bugs to valeski. He will be finding new
owner(s). This shift is so that I can focus on embedding issues. If the new
owner has questions that can not be resovled, I may be able to lend a (quick)
hand.
over to valeski....
Assignee: dougt → valeski
Updated•25 years ago
|
Target Milestone: --- → M17
Version: 1.01 → 1.2
Comment 16•25 years ago
|
||
*** Bug 35699 has been marked as a duplicate of this bug. ***
Comment 17•25 years ago
|
||
*** Bug 41205 has been marked as a duplicate of this bug. ***
Comment 18•25 years ago
|
||
be sure that you have the correct version of PSM. search your disk for any
other version of psm and delete them.
reassign this one to lord
Assignee: valeski → lord
Updated•25 years ago
|
Status: NEW → RESOLVED
Closed: 25 years ago
Resolution: --- → WORKSFORME
Comment 19•25 years ago
|
||
Worksforme. I've never seen this happen, or had a problem with the machine
slowing down when psm is a process.
Comment 20•25 years ago
|
||
The last time I saw this was last week. I should point out that this does not
happen all the time (even on the same site), so perhaps it is still present.
Comments from anyone?
Comment 21•25 years ago
|
||
I remember seeing this happen before and I believe it was caused by psm leaving
phantom processing when psm disappeared unexpectedly. (That's a nice way of
saying "psm crashed")
Comment 22•25 years ago
|
||
I am still seeing this on 2000072905 on Linux. Whenever I go to
https://webbanking.tdaccess.com/, login, and then logout, I get PSM
threads/processes that takes up all my CPU time.
Status: RESOLVED → REOPENED
Resolution: WORKSFORME → ---
Comment 23•25 years ago
|
||
This definitely occurs in M17.
debian woody
kernel 2.2.17p15
It's so bad that I'll end up with 70+ psm processes and I can't do much
debugging as I can fork any more processes.
Comment 24•24 years ago
|
||
Changing milestone to future.
Assignee: lord → ddrinan
Severity: normal → enhancement
Status: REOPENED → NEW
Target Milestone: M17 → M20
Comment 25•24 years ago
|
||
I can reproduce this quite well now, and I have some additional info that may be
of some use. I am definitely changing the severity of this bug from "enhancement".
1. Go to https://tdaccess.tdbank.ca/ Notice that there is a Javascript "bug"
(see bug 45099).
2. Now browse other non-secure sites. Eventually, you will see a bunch of psm
threads taking up all the CPUs. You may have to do quite a bit of surfing, but
it has always shown up eventually.
When I did "top", I see the following:
PID USER PRI NI SIZE RSS SHARE STAT LIB %CPU %MEM TIME COMMAND
14963 howard 15 0 4508 4508 2252 R 0 15.1 3.5 0:06 psm
14959 howard 15 0 4508 4508 2252 R 0 14.9 3.5 0:01 psm
14965 howard 15 0 4508 4508 2252 R 0 14.9 3.5 0:06 psm
14960 howard 15 0 4508 4508 2252 R 0 14.5 3.5 0:06 psm
14962 howard 15 0 4508 4508 2252 R 0 14.5 3.5 0:06 psm
14961 howard 15 0 4508 4508 2252 R 0 14.3 3.5 0:06 psm
I then attached gdb to some of these processes. They all look like the following:
(gdb) where
#0 0x401535bb in __pthread_mutex_trylock (mutex=0x82d348c) at spinlock.h:24
#1 0x40037567 in PR_EnterMonitor ()
from /home/howard/mozilla/nightly/package/psm/./libnspr4.so
#2 0x8083149 in SSL_DataPending ()
#3 0x8084f43 in ssl_Poll ()
#4 0x4003a3f5 in PR_Poll ()
from /home/howard/mozilla/nightly/package/psm/./libnspr4.so
#5 0x805b163 in SSM_SSLDataServiceThread ()
#6 0x4003b66e in _pt_root ()
from /home/howard/mozilla/nightly/package/psm/./libnspr4.so
#7 0x40152b85 in pthread_start_thread (arg=0xbe1ffe40) at manager.c:241
Severity: enhancement → major
Comment 26•24 years ago
|
||
This still happens (PSM 1.2, Linux nightly 2000090621). To me it happens
everytime when I go to a SSL site using proxy. When I go to SSL site on our
Intranet, it doesn't happen.
Comment 27•24 years ago
|
||
still happens; linux, build 2000090821, psm 1.2. not using proxy, just internet
dial-up. access my.sun.com and login to email. 18 psm threads running, the
last one ran (highest pid) is sucking all the cpu.
Comment 28•24 years ago
|
||
*** Bug 47130 has been marked as a duplicate of this bug. ***
Comment 29•24 years ago
|
||
*** Bug 55038 has been marked as a duplicate of this bug. ***
Comment 31•24 years ago
|
||
I think I'm seeing exactly this with BuildID 2000100621.
After getting cablemodem I've been able to get nightlies. Those of 30th Sept
2000 and 3rd October wouldn't install PSM at all. I was about to file this
when the 6th Oct nightly appeared to install it successfully. Except that as
soon as I tested it, I found www.fortify.net was adamant that I had no
encryption, and PSM started showing up in top just as it did in the top excerpt
from RK AA. Lots of psm processes (threads, whatever), each using about 10% of
CPU time. The only way to stop this is to kill off Mozilla. Waah.
What more information do you need? I wasn't sure. This is a K6 with 64Mb of RAM
running Linux.
Comment 32•24 years ago
|
||
Many people have mentioned this to me when using debian's M17 then installing
the official PSM. I still see this on recent builds on linux (both "official"
nightlyies and custom builds)
Comment 33•24 years ago
|
||
Well, here my tale of woe with PSM. I have seen the problem with PSM taking up
100% of the CPU quite a few times now, but what I see even more is PSM creating
hundreds of threads none of which ever terminate. On secure site I use is Green
Mountain Energy, http://www.greenmountain.com . Their secure pages have
menu-like constructs which are image links with onMouseOver and onMouseOut
handlers to display a highlighted image and then replace with the standard image
again. Every time I move the mouse over one of these links and trigger the
handlers, PSM creates another one or two threads. If I reload the page, PSM
creates another 52 (52!) threads. I can get hundreds of PSM threads with only
loading a few of the secure pages and moving the mouse over links. As I
continue causing PSM to create new threads, it will eventually start taking 100%
of the CPU though it seems that only 2 out of the hundreds of threads are
actually taking up the time. Also, PSM seems to be spending most of its time in
system calls rather than in user code. I get similar results viewing secure
pages on other sites. It used to work ok but seems to have busted about the
time PSM 1.3 came out.
I hope this is fixed before rtm, otherwise it will not be possible to say that
NS6 supports SSL on Linux.
Tested with Mozilla 101008, trunk build, with PSM 1.3 on Linux.
Comment 34•24 years ago
|
||
I'm currently investigating this problem. Apart from the sites mentioned in the
bug report already (https://webbanking.tdaccess.com/ and
http://www.greenmountain.com) are there other SSL sites where this is a problem.
I'm trying to see if there is some common link between these sites.
Comment 35•24 years ago
|
||
I have similar problems with http://www.netflix.com
Comment 36•24 years ago
|
||
I have psm 1.3 installed after compiling M18's source.
If psm is launched from command line, without running Mozilla, it consumes >90%
CPU immediately.
Comment 37•24 years ago
|
||
I've also seen this before. I don't log onto SSL sites often, however, so it's
been a while since I've seen it.
I think I've seen it mostly at http://www.amazon.com and at some internal
company sites where I work (inaccessible from offsite).
When it happens, switching virtual desktops under E will suddenly slow down
noticeably and looking at top will show psm taking up a lot of cpu resources
(usually between 60-90% on my PIII 500). Running `killall psm` usually fixes the
problem.
Comment 38•24 years ago
|
||
It's really bad bug. I think its source of my problem, that PSM 1.3 doesn't work
for me at all. When I open a site where the certificate is not signed by some
stored root certificate (for example: https://ca.ica.cz/) The PSM's window with
a message about it appears, but when I click to Next button, the buttons
disappear and nothing else happens (Linux 2000101521). There are at least 7 psm
threads/processes in background one of them consuming about 2% CPU. When I close
the window using close from windowmanager there appears a new window about
accepting the certificate, but again nothing happens when I click to Finish button.
So the PSM seems to be completely unusable to me.
Comment 39•24 years ago
|
||
*** Bug 56904 has been marked as a duplicate of this bug. ***
Comment 40•24 years ago
|
||
rtm. This happened to me, and I had to reboot the Linux server to get rid of
dozens of psm processes.
Keywords: rtm
Comment 41•24 years ago
|
||
Re-assigning this bug to Javier. He is going to run psm in a debugger and see
why these threads are not be cleaned up.
Assignee: ddrinan → javi
Comment 42•24 years ago
|
||
In order to make debugging this easier,I took a really long function and with
the magic of cut and paste, made it into many smaller functions. Should make
debugging this much easier.
Comment 43•24 years ago
|
||
The thread that polls socket for data had a block that checked the number of
sockets waiting for data only exited the thread when number of sockets ready was
less than zero.
By modifying the following line:
http://lxr.mozilla.org/mozilla/source/security/psm/server/sslconn.c#1107
to read
if (nReady <= 0) {
then the threads appear to properly clean up after themselves. This may be the
fix, but it needs some more testing before I can officially declare it the fix.
Comment 44•24 years ago
|
||
Checked in a fix to the tip of the PSM tree that appears to fix the problem.
Comment 45•24 years ago
|
||
For an RTM eval for Netscape 6, we need to understand what tag we're pulling for
PSM, and what set of tests have been run.
Can you comment on the pros and cons of advancing a tag to get this checkin (or
am I confused about how Netscape 6 is pulling PSM?).
Thanks,
Jim
Comment 46•24 years ago
|
||
Netscape6 bundles an xpi file that was generated off a tag.
This check-in is to help with embedding projects that see their systems slow to
a crawl after extended use of psm.
For Netscape6 to pick this up, we'd have to re-spin the xpi and then have leaf
incorporate that xpi into the daily builds.
Comment 48•24 years ago
|
||
We made some more changes for this, and we now appear to have fixed the problem.
The code is checked into PSM's tree. If Netscape6 wants to pick this up, we'll
need to do a new drop of PSM.
Comment 49•24 years ago
|
||
Comment 50•24 years ago
|
||
The following patch, when applied to the psm daemon, fixes this problem. We
have tested this patch with a 3rd party vendor implementing a set top box and
they confirmed PSM no longer eats up system resources.
(The reason the diff is so big is because I took a very long function and create
several smaller functions by cutting old sections and making them new functions.
Makes the function much easier to read and debug in the future.)
PSM team believes this is a re-spin bug.
Comment 51•24 years ago
|
||
Fix is good. r=ddrinan.
Comment 52•24 years ago
|
||
Adding more description about the diff for super reviewer's sake:
There are 4 changes that went into the diff to fix this bug:
1) When polling the sockets from the client (mozilla) and the SSL server, we
break out of the poll loop if the number of sockets waiting for data is equal to
0. That's the PR_Poll you see around the "@@ -1084,27 +1259,12 @@" block.
2)Break the function SSM_SSLDataServiceThread into smaller functions to improve
readability and make debugging much easier. This created the functions
SSM_SSLThreadMakeConnectionSSL, SSM_SSLThreadReadFromServer, and
SSM_SSLThreadReadFromClient. These functions were created by cutting a piece of
code out of SSM_SSLDataServiceThread and pasting it in. There were minor
modifications for adding '->' notation instead of array notation.
3) Instead of NULL'ing out the file descriptor in the PRPollDesc and
decrementing the counter, I zero out the in_flags so that PR_Poll will ignore
that file descriptor when polling. (This was recommended by larryh of the NSPR
team.) The old code would have something like this:
Array of Poll Descriptors
[Client socket,ie socket talking to Mozilla][Socket talking to SSL server]
nSockets = 2
If the client socket was shutdown first, then the old code would NULL out the
first index and decrement the counter. Leaving you with this scenario:
Array of Poll Descriptors:
[NULL socket][Socket talking to SSL server]
nSockets = 1
In this case, when we went to Poll, PR_Poll would only look at the first index,
see a NULL and exit right away. This would also cause the thread to loop one
more time and get stuck at a PR_Poll above which was testing for some condition
in regards to Keep Alive to properly close down the connection.
Now the code keeps the File descriptors around and zero's out the in_flags when
passing in the array to PR_Poll so that when PR_Poll returns, the socket we no
longer care about won't get a bit set for reading or sending.
4)When we get an error from a socket, we close out the socket on the other end
as well. If we get an EOF from the SSL server, we send all the data to the
client and then shut the socket down as well. We do the same thing the other
way around. Before, the code let the other socket stick around until Mozilla or
the SSL server closed the socket. This also caused threads to stick around
longer than needed.
Hope this helps when reading the diff.
Comment 53•24 years ago
|
||
Oh yeah, the reason the diff is between -r 1.5 and -r 1.8, is because 1.5 is the
version we've put up on the iPlanet web site and included with N6 PR3 and 1.8 is
what's on the tip which we got to work like we wanted to.
Comment 54•24 years ago
|
||
I asked for a blow-by-blow more for the PDT's sake than for mine. If you guys
had made a minimal change just for the Netscape 6 branch, we wouldn't be here
typing into a tiny textarea. I'll review the patch, but if you could come up
with a minimal-change patch to the Netscape 6 branch, you'd grease the skids for
sure.
/be
Comment 55•24 years ago
|
||
PR_SUCCESS should be SSM_SUCCESS (same value, but not same type):
@@ -107,7 +107,7 @@
SSMResource** res)
{
SSMStatus rv = PR_SUCCESS;
- SSMSSLDataConnection* conn;
+ SSMSSLDataConnection* conn=NULL;
Uh oh, the rest of that function (SSMSSLDataConnection_Create) seems to use rv
to hold a PRStatus. Consider changing the type of this variable, translating to
SSMStatus only on return?
Both read (hmm, famous Unix syscall name) and sent are uselessly initialized:
+SSM_SSLThreadReadFromClient(SSMSSLDataConnection* conn,
+ PRIntn oBufSize, char *outbound, PRPollDesc *pds)
+{
+ PRIntn read = 0;
+ PRIntn sent = 0;
Same goes for the same-named variables in SSM_SSLThreadReadFromServer. Also,
this line from SSM_SSLThreadReadFromServer must be wrong:
+ /* remove the socket from the array */
+ pds->in_flags = NULL;
NULL should be 0.
How about consistently indenting (by four-space increments) the code here:
+SSM_WaitingOnData(PRPollDesc *pds, PRIntn numPDs)
+{
+ PRBool retVal = PR_FALSE;
+ int i;
+
+ for (i=0; i<numPDs;i++) {
+ if (pds[i].in_flags & PR_POLL_READ) {
+ retVal = PR_TRUE;
+ break;
+ }
+ }
+
+ return retVal;
+}
So long as in_flags can't be 0 until you're done with the polldesc (done
including out_flags != 0 and there's something to do based on that condition),
then I think the patch is good. Set my mind at ease here, ok?
If you can fix the above nits, redo a diff, and also attach the entire new
(patched) file, I'll give a quick sr=.
/be
Comment 56•24 years ago
|
||
Comment 57•24 years ago
|
||
Comment 58•24 years ago
|
||
I've updated the patch with the additions Brendan asked for.
I added one more bit of code to zero out the pds.out_flags parameter every time
after processing the poll descriptors. PR_Poll doesn't modify the in_flags. In
talking to Larry Hardiman of the NSPR team, he didn't think re-setting out_flag
to zero was necessary but said it wouldn't hurt. (In testing, everything still
works.)
Comment 59•24 years ago
|
||
Thansk, sr=brendan@mozilla.org.
/be
Comment 62•24 years ago
|
||
This has a r=, and a sr=, and should go to rtm+.
Whiteboard: [rtm need info] → [rtm need info] sr=brendan, r=ddrinan
Comment 63•24 years ago
|
||
Nominating for approval. This only requires a new xpi drop to be sent to leaf.
The fix has been tested by a third party on an embedded system and the bug has
disappeared.
Whiteboard: [rtm need info] sr=brendan, r=ddrinan → [rtm+] sr=brendan, r=ddrinan
Comment 64•24 years ago
|
||
rtm++
Whiteboard: [rtm+] sr=brendan, r=ddrinan → [rtm++] sr=brendan, r=ddrinan
Comment 65•24 years ago
|
||
ok, I've received the drop for win32 and linux and am putting them in place.
Comment 66•24 years ago
|
||
The new linux PSM drop has been placed on lithium. The new win32 PSM drop has
been checked into the shelf for both branch and trunk. These should show up in
10/26 morning builds.
Comment 67•24 years ago
|
||
PDT marking this bug resolved fixed since the 26th build has come and gone. QA,
please verify.
Status: NEW → RESOLVED
Closed: 25 years ago → 24 years ago
Resolution: --- → FIXED
Comment 68•24 years ago
|
||
I sat down with QA and Netscape6 builds have not picked up the correct PSM.
We're still seeing this problem with the daily buids. Did the xpi files get
bundled with both branch and trunk builds?
Status: RESOLVED → REOPENED
Resolution: FIXED → ---
Comment 69•24 years ago
|
||
yes, the new files I was given were put in place for win32 and linux for both
branch and trunk.
Comment 70•24 years ago
|
||
Then we need to sit down and figure out what happened. When I sit down and run
N6 with my build, the threads go away. When I sat down and ran N6 that nitinp
downloaded on Friday, the threads did not go away.
Comment 71•24 years ago
|
||
re-assigning to leaf since what's left to do is bundle the PSM xpi's.
According to ddrinan, he's doing that today.
Comment 73•24 years ago
|
||
new drop is imported to shelf, will get into the branch presently.
Status: NEW → ASSIGNED
Updated•24 years ago
|
Status: ASSIGNED → RESOLVED
Closed: 24 years ago → 24 years ago
Resolution: --- → FIXED
Comment 74•24 years ago
|
||
ok, branch for shelf is updated, candidates away. Should be able to verify tomorrow.
Comment 75•24 years ago
|
||
*** Bug 57970 has been marked as a duplicate of this bug. ***
Comment 76•24 years ago
|
||
I just tried testing this with linux trunk build 2000110108 using the psm that
came in the build. I still see psm creating more and more threads with every
secure page I visit (81 threads at the moment after about ten minutes browsing).
This fix should appear in the 11/01 daily build, right?
Comment 77•24 years ago
|
||
It seems that we passed the wrong bits over the wall. ddrinan has contacted
leaf and asked him to bundle the correct bits. (Our QA guy tested the bits
we've asked leaf to bundle to make sure this goes away for real.)
Comment 79•24 years ago
|
||
Where is the new psm.xpi for linux? Is it available to all mozilla users or it's
only for Netscape's internal engineers?
Comment 80•24 years ago
|
||
debug>install psm
Comment 81•24 years ago
|
||
the new psm.xpi is not public yet , so I don't think mozilla people can get it.
The new psm is in the daily builds of internal commercial netscape6 builds.
Comment 82•24 years ago
|
||
testing with todays linux build (installed) and psm 1.4, i have 39 psm threads
hanging forever after one login in my bank.
In addition, the lock-icon never triggered, and the processes did not go away
after i had logged out and left the site.
They don't suck CPU a lot, but are way too many.
Still problems, in other words. (I was directed to PSM 1.4 by a developer, to
test a PSM hang. Not sure whether that is the latest however.)
Tested this first as an ordinary user. Then quit mozilla and tested it again as
root. Same result.
Comment 83•24 years ago
|
||
RKA: please file a new bug on that, thanks.
Comment 84•24 years ago
|
||
*** Bug 59806 has been marked as a duplicate of this bug. ***
Comment 85•24 years ago
|
||
*** Bug 60617 has been marked as a duplicate of this bug. ***
Comment 86•24 years ago
|
||
I submitted the bug 60617, which was just marked as a duplicate of this one.
Here's some more info that might help?
I just went to a secure page (which unfortunately I can't give you the URL of;
it's a billing statement...). As I started, I had this "ps" list:
PID TTY STAT TIME COMMAND
3058 pts/2 S 0:00 sh /usr/local/src/mozilla/nightly-builds/001116/packa
3070 pts/2 S 14:55 /usr/local/src/mozilla/nightly-builds/001116/package/
3072 pts/2 S 0:00 /usr/local/src/mozilla/nightly-builds/001116/package/
3073 pts/2 S 0:01 /usr/local/src/mozilla/nightly-builds/001116/package/
...
26828 pts/2 Z 0:00 [mozilla-bin <defunct>]
26996 pts/2 S 0:00 ./psm
26999 pts/2 S 0:00 ./psm
27000 pts/2 S 0:00 ./psm
27003 pts/2 S 0:00 ./psm
A minute or so later, after opening a *single* secure web page, I had this list
(different "ps" formatting option):
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
jpeek 3058 0.0 0.3 1696 832 pts/2 S Nov21 0:00 sh /usr/local/src
jpeek 3070 0.9 20.3 59148 52524 pts/2 S Nov21 14:59 /usr/local/src/mo
jpeek 3072 0.0 20.3 59148 52524 pts/2 S Nov21 0:00 /usr/local/src/mo
jpeek 3073 0.0 20.3 59148 52524 pts/2 S Nov21 0:02 /usr/local/src/mo
jpeek 26996 0.8 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 26999 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27000 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27003 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27004 0.0 20.3 59148 52524 pts/2 S 21:28 0:00 /usr/local/src/mo
jpeek 27008 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27009 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27010 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27011 0.0 20.3 59148 52524 pts/2 S 21:28 0:00 /usr/local/src/mo
jpeek 27012 0.1 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27013 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27014 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27015 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27016 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27017 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27018 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27019 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27020 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27021 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27022 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27023 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27024 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27025 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
jpeek 27026 0.0 1.8 7268 4896 pts/2 S 21:28 0:00 ./psm
That's not news, I bet. What might help is that this line appeared in
/var/log/messages at about the same time:
Nov 22 21:28:01 jpeek modprobe: modprobe: Can't locate module net-pf-10
I see that once in a while. I'm afraid I don't know much about how the Linux
kernel usees modules, what net-pf-10 is, etc. But that message is familiar, and
I think it might be related to the psm problem??
If I can do some testing or etc., let me know. I'm using build 2000111521 now, BTW.
Comment 87•24 years ago
|
||
When you open Tasks->Privacy And Security->Security Manager, click on About
Security tab, which version of PSM does that say you're running?
Comment 88•24 years ago
|
||
I'm using PSM 1.3 and I see this behavior
Comment 89•24 years ago
|
||
net-pf-10 is irrelevant and was mentioned in another bug.
Leaf, was this fixed for 1.2, 1.3 or 1.4?
Comment 90•24 years ago
|
||
This was fixed in PSM 1.4
We're working on integrating PSM into mozilla builds. That's why you haven't
seen an XPI for PSM 1.4
Comment 91•24 years ago
|
||
*** Bug 62222 has been marked as a duplicate of this bug. ***
Comment 92•24 years ago
|
||
*** Bug 63450 has been marked as a duplicate of this bug. ***
Comment 93•24 years ago
|
||
I don't know about other people, but on the 2001010504 Windows build, the
security info page reports PSM to be 1.4 already. However, I'm still seeing the
problems with PSM hogging CPU time and using up to 300(!) threads at times.
Does this mean the problem isn't fixed, or does it mean the wrong PSM is
actually included with the daily builds?
Comment 94•24 years ago
|
||
I just saw this problem with 2001011208/Mtrunk/Linux.
Logged into sourceforge (http://sourceforge.net), changed my email address in
prefs and then, not seeing a "log out" link, I closed the browser window (I had
two open). Within a minute or so, my cpu usage epplet shows almost all resources
used and running top shows a psm thread using over 80% cpu.
`killall psm` fixed the problem.
Comment 95•24 years ago
|
||
It seems to me like this bug should be reopened.
Comment 96•24 years ago
|
||
please file a new bug. I promise to shoot anyone who resolves your new bug as a
dupe. Please comment here w/ the name and number of the new bug. Be sure to
include build id, platform, steps to reproduce, and ideally a call stack or
core or something interesting [ps -aux output or something similar might also
be a good idea].
Keywords: rtm
Whiteboard: [rtm++] sr=brendan, r=ddrinan → DO NOT REOPEN
Comment 97•24 years ago
|
||
Timeless, I've entered this bug again as bug 65703.
Updated•24 years ago
|
Target Milestone: M20 → M18
You need to log in
before you can comment on or make changes to this bug.
Description
•