Closed Bug 482969 Opened 16 years ago Closed 16 years ago

Selfserv crashed after tstclnt connects to it.

Categories

(NSS :: Tools, defect)

Sun
Solaris
defect
Not set
normal

Tracking

(Not tracked)

RESOLVED INVALID
3.12.3

People

(Reporter: slavomir.katuscak+mozilla, Assigned: nelson)

Details

Build: securitytip/20090310.1/simplify.1/SunOS5.10_DBG.OBJ Logfile: ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28373 >/dev/null 2>/dev/null selfserv with PID 28373 found at Tue Mar 10 23:58:58 PDT 2009 tstclnt -p 8444 -h simplify.red.iplanet.com -c :C008 \ -f -d ../ext_client -v -w nss < /share/builds/mccrel3/security/securitytip/builds/20090310.1/wozzeck_Solaris8/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12195: Peer does not recognize and trust the CA that issued your certificate. selfserv: HDX PR_Read returned error -12195: Peer does not recognize and trust the CA that issued your certificate. selfserv: HDX PR_Read returned error -12195: Peer does not recognize and trust the CA that issued your certificate. selfserv: HDX PR_Read returned error -12195: Peer does not recognize and trust the CA that issued your certificate. selfserv: HDX PR_Read returned error -12195: Peer does not recognize and trust the CA that issued your certificate. selfserv: HDX PR_Read returned error -12195: Peer does not recognize and trust the CA that issued your certificate. selfserv: HDX PR_Read returned error -12195: Peer does not recognize and trust the CA that issued your certificate. selfserv: HDX PR_Read returned error -12195: Peer does not recognize and trust the CA that issued your certificate. selfserv: HDX PR_Read returned error -12195: Peer does not recognize and trust the CA that issued your certificate. tstclnt: connecting to simplify.red.iplanet.com:8444 (address=192.18.72.148) tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1661: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28373 >/dev/null 2>/dev/null selfserv with PID 28373 found at Tue Mar 10 23:58:59 PDT 2009 tstclnt -p 8444 -h simplify.red.iplanet.com -c :C009 \ -f -d ../ext_client -v -w nss < /share/builds/mccrel3/security/securitytip/builds/20090310.1/wozzeck_Solaris8/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: 0 cache hits; 212 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination tstclnt: connecting to simplify.red.iplanet.com:8444 (address=192.18.72.148) tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: write to SSL socket failed: TCP connection reset by peer. tstclnt: exiting with return code 254 ssl.sh: #1662: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 254, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28373 >/dev/null 2>/dev/null ssl.sh: Exit: 10 Fatal - selfserv process not detectable - FAILED ssl.sh: #1663: 10 Fatal - selfserv process not detectable - FAILED Scenario: Running client/server tests - selfserv is already started, tstclnt is connecting to it more times testing different ciphers. Logm above contains 2 tests, one successfull, second (consequent) that failed. From log it seems that tstclnt successfully connected to selfserv, and then selfserv probably crashed, on tstclnt side writing to SSL socket failed and in next check with kill -0 command selfserv was not found. This bug occured on the same machine once more this day: Build: securitytip/20090310.1/simplify.2/SunOS5.10_OPT.OBJ Log: ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13925 >/dev/null 2>/dev/null selfserv with PID 13925 found at Wed Mar 11 05:18:50 PDT 2009 tstclnt -p 8444 -h simplify.red.iplanet.com -c :C00E -B -s \ -f -d ../ext_client -v -w nss < /share/builds/mccrel3/security/securitytip/builds/20090310.1/wozzeck_Solaris8/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination tstclnt: connecting to simplify.red.iplanet.com:8444 (address=192.18.72.148) tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: write to SSL socket failed: TCP connection reset by peer. tstclnt: exiting with return code 254 ssl.sh: #1927: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 254, expected is 0 - FAILED This time it was very similar test, only different cipher was used.
If it crashed, where's the stack trace?
Core was not found, verified core settings on machine and it is OK. Probably it was bit a crash, because there is a message: selfserv: normal termination After some analysis, this time it was possible that there were running 2 tests in parallel (reaper didn't clean memleak tests from previous days correctly), it's fixed now. I'm closing this bug as invalid for now, if it happens again, I'll reopen it.
Status: NEW → RESOLVED
Closed: 16 years ago
Resolution: --- → INVALID
You need to log in before you can comment on or make changes to this bug.