Closed Bug 736289 Opened 12 years ago Closed 12 years ago

Very frequent NSS startup crashes in and around libsoftokn3.so!sftk_EvaluateConfigDir

Categories

(Firefox for Android Graveyard :: General, defect)

ARM
Android
defect
Not set
blocker

Tracking

(firefox13 affected)

RESOLVED FIXED
Tracking Status
firefox13 --- affected

People

(Reporter: philor, Assigned: wesj)

References

Details

(Keywords: intermittent-failure)

https://tbpl.mozilla.org/php/getParsedLog.php?id=10092271&tree=Mozilla-Inbound
Android Tegra 250 mozilla-inbound opt test jsreftest-1 on 2012-03-15 05:37:38 PDT for push 2205ed382ab0

INFO | automation.py | Application ran for: 0:00:18.217396
INFO | automation.py | Reading PID log: /tmp/tmpZ_j1SZpidlog
getting files in '/mnt/sdcard/tests/reftest/profile/minidumps/'
Downloading symbols from: http://stage.mozilla.org/pub/mozilla.org/mobile/tinderbox-builds/mozilla-inbound-android/1331811928/fennec-14.0a1.en-US.android-arm.crashreporter-symbols.zip
PROCESS-CRASH | automation.py | application crashed (minidump found)
Crash dump filename: /tmp/tmpTZhzfg/1f1c9ec8-a5f8-fd3a-25cf2901-625e5d93.dmp
Operating system: Linux
                  0.0.0 Linux 2.6.32.9 #1 SMP PREEMPT Fri Nov 5 19:33:10 UTC 2010 armv7l
CPU: arm
     0 CPUs

Crash reason:  SIGSEGV
Crash address: 0x2

Thread 4 (crashed)
 0  libsoftokn3.so!sftk_EvaluateConfigDir [sftkpars.c : 598 + 0xa]
     r4 = 0x4a7e5130    r5 = 0x4766f4a4    r6 = 0x477cd1c9    r7 = 0x00000000
     r8 = 0x477cd1c1    r9 = 0x477cd1bc   r10 = 0x4766f4a0    fp = 0x4a6ce010
     sp = 0x4766f438    lr = 0xafd10500    pc = 0x477c49c0
    Found by: given as instruction pointer in context
 1  libsoftokn3.so!sftk_getSecmodName [sftkpars.c : 633 + 0x0]
     r4 = 0x4a7f4050    r5 = 0x4a6ce273    r6 = 0x4a7e5130    r7 = 0x4766f4a8
     r8 = 0x477cd208    r9 = 0x477cd1e8   r10 = 0x4766f4a0    fp = 0x4a6ce010
     sp = 0x4766f458    pc = 0x477c5545
    Found by: call frame info
 2  libsoftokn3.so!NSC_ModuleDBFunc [pkcs11.c : 2659 + 0x10]
     r4 = 0x00000000    r5 = 0x00000000    r6 = 0x00000000    r7 = 0x4a6ce010
     r8 = 0x00000000    r9 = 0x47815e10   r10 = 0x4766f4e8    fp = 0x47986571
     sp = 0x4766f498    pc = 0x477b5e69
    Found by: call frame info
 3  libnss3.so!SECMOD_GetModuleSpecList [pk11pars.c : 1029 + 0x0]
     r4 = 0x00000000    r5 = 0x48f82800    r6 = 0x4a7e45c0    r7 = 0x00000000
     r8 = 0x00000000    r9 = 0x47815e10   r10 = 0x4766f4e8    fp = 0x47986571
     sp = 0x4766f4c8    pc = 0x479299df
    Found by: call frame info
 4  libnss3.so!SECMOD_LoadModule [pk11pars.c : 1139 + 0x6]
     r4 = 0x00000000    r5 = 0x48f82800    r6 = 0x4a7e45c0    r7 = 0x00000000
     r8 = 0x00000000    r9 = 0x47815e10   r10 = 0x4766f4e8    fp = 0x47986571
     sp = 0x4766f4d0    pc = 0x4792b2c7
    Found by: call frame info
 5  libnss3.so!nss_Init [nssinit.c : 469 + 0xa]
     r4 = 0x4a7e24c0    r5 = 0x478243b0    r6 = 0x4a7e5100    r7 = 0x00000000
     r8 = 0x478243b4    r9 = 0x4a7f4030   r10 = 0x478243b8    fp = 0x478243bc
     sp = 0x4766f518    pc = 0x47910609
    Found by: call frame info
 6  libnss3.so!NSS_Initialize [nssinit.c : 851 + 0x0]
     r4 = 0x00000000    r5 = 0x00000000    r6 = 0x4cdb50ec    r7 = 0x80004005
     r8 = 0x4cdb45c4    r9 = 0x00000001   r10 = 0x00000000    fp = 0x4766f748
     sp = 0x4766f590    pc = 0x47910a6d
    Found by: call frame info
 7  libxul.so!nsNSSComponent::InitializeNSS [nsNSSComponent.cpp:2205ed382ab0 : 1761 + 0x0]
     r4 = 0x48e51770    r5 = 0x4cdc63c8    r6 = 0x4cdb50ec    r7 = 0x80004005
     r8 = 0x4cdb45c4    r9 = 0x00000001   r10 = 0x00000000    fp = 0x4766f748
     sp = 0x4766f5e0    pc = 0x4c693f59

or

https://tbpl.mozilla.org/php/getParsedLog.php?id=10091509&tree=Mozilla-Inbound
Android Tegra 250 mozilla-inbound opt test jsreftest-2 on 2012-03-15 04:46:45 PDT for push e5b860072f6e

Thread 4 (crashed)
 0  0x0
     r4 = 0x00000000    r5 = 0x4d86a4a4    r6 = 0x4d86a46c    r7 = 0x4d86a4ac
     r8 = 0x4d86d280    r9 = 0x0000000b   r10 = 0x4d86d040    fp = 0x536ce010
     sp = 0x4d86a478    lr = 0x44932b19    pc = 0x00000000
    Found by: given as instruction pointer in context
 1  libsoftokn3.so!NSC_ModuleDBFunc [pkcs11.c : 2659 + 0x10]
     sp = 0x4d86a498    pc = 0x4d996e69
    Found by: stack scanning
 2  libnss3.so!SECMOD_GetModuleSpecList [pk11pars.c : 1029 + 0x0]
     r4 = 0x00000000    r5 = 0x4ef82800    r6 = 0x537e45c0    r7 = 0x00000000
     r8 = 0x00000000    sp = 0x4d86a4c8    pc = 0x4db299df
    Found by: call frame info
 3  libnss3.so!SECMOD_LoadModule [pk11pars.c : 1139 + 0x6]
     r4 = 0x00000000    r5 = 0x4ef82800    r6 = 0x537e45c0    r7 = 0x00000000
     r8 = 0x00000000    sp = 0x4d86a4d0    pc = 0x4db2b2c7
    Found by: call frame info
 4  libnss3.so!nss_Init [nssinit.c : 469 + 0xa]
     r4 = 0x537e24c0    r5 = 0x4da243b0    r6 = 0x537e5130    r7 = 0x00000000
     r8 = 0x4da243b4    r9 = 0x537f4030   r10 = 0x4da243b8    fp = 0x4da243bc
     sp = 0x4d86a518    pc = 0x4db10609
    Found by: call frame info
 5  libnss3.so!NSS_Initialize [nssinit.c : 851 + 0x0]
     r4 = 0x00000000    r5 = 0x00000000    r6 = 0x531c91a4    r7 = 0x80004005
     r8 = 0x531c867c    r9 = 0x00000001   r10 = 0x00000000    fp = 0x4d86a748
     sp = 0x4d86a590    pc = 0x4db10a6d
    Found by: call frame info
 6  libxul.so!nsNSSComponent::InitializeNSS [nsNSSComponent.cpp:e5b860072f6e : 1761 + 0x0]
     r4 = 0x4ee51770    r5 = 0x531da498    r6 = 0x531c91a4    r7 = 0x80004005
     r8 = 0x531c867c    r9 = 0x00000001   r10 = 0x00000000    fp = 0x4d86a748
     sp = 0x4d86a5e0    pc = 0x52aa7f61
    Found by: call frame info
 7  libxul.so!nsNSSComponent::Init [nsNSSComponent.cpp:e5b860072f6e : 1997 + 0x0]
     r4 = 0x4ee51770    r5 = 0x4d86a684    r6 = 0x00000000    r7 = 0x80004005
     r8 = 0x531c867c    r9 = 0x52c61151   r10 = 0x00000000    fp = 0x4d86a748
     sp = 0x4d86a678    pc = 0x52aa8927
    Found by: call frame info
 8  libxul.so!nsNSSComponentConstructor [nsNSSModule.cpp:e5b860072f6e : 211 + 0x1e]
     r4 = 0x4ee51770    r5 = 0x4d86a748    r6 = 0x531c867c    r7 = 0x80004005
     r8 = 0x531c867c    r9 = 0x52c61151   r10 = 0x00000000    fp = 0x4d86a748
This looks like my doing, so I guess I'll take this.
Assignee: nobody → wjohnston
Blocks: 722166
https://tbpl.mozilla.org/php/getParsedLog.php?id=10146454&tree=Firefox

It's possible that this will go away with the backout of bug 732069 - I triggered 15 rounds of mochitests on my try push, and didn't hit this once, which feels like enough to have caught it if it still happened without that. Not sure, though.
two days of nothing? I'm going to mark this fixed by bug 732069.
Status: NEW → RESOLVED
Closed: 12 years ago
Resolution: --- → FIXED
Whiteboard: [orange]
Product: Firefox for Android → Firefox for Android Graveyard
You need to log in before you can comment on or make changes to this bug.