Issue metadata
Sign in to add a comment
|
"SSLUITest.TestGoodFrameNavigation" crashes in Surface hit-testing |
||||||||||||||||||||||||
Issue description"SSLUITest.TestGoodFrameNavigation" is flaky. This issue was created automatically by the chromium-try-flakes app. Please find the right owner to fix the respective test/step and assign this issue to them. If the step/test is infrastructure-related, please add Infra-Troopers label and change issue status to Untriaged. When done, please remove the issue from Sheriff Bug Queue by removing the Sheriff-Chromium label. We have detected 3 recent flakes. List of all flakes can be found at https://chromium-try-flakes.appspot.com/all_flake_occurrences?key=ahVzfmNocm9taXVtLXRyeS1mbGFrZXNyLAsSBUZsYWtlIiFTU0xVSVRlc3QuVGVzdEdvb2RGcmFtZU5hdmlnYXRpb24M. Flaky tests should be disabled within 30 minutes unless culprit CL is found and reverted. Please see more details here: https://sites.google.com/a/chromium.org/dev/developers/tree-sheriffs/sheriffing-bug-queues#triaging-auto-filed-flakiness-bugs
,
Nov 29 2016
These are on linux_chromium_rel_ng.
,
Nov 29 2016
Current flaky test: SSLUITest.TestGoodFrameNavigation (run #1): [ RUN ] SSLUITest.TestGoodFrameNavigation Xlib: extension "RANDR" missing on display ":9". Xlib: extension "RANDR" missing on display ":9". [22706:22706:1125/045104:WARNING:audio_manager.cc(317)] Multiple instances of AudioManager detected [22706:22706:1125/045104:WARNING:audio_manager.cc(278)] Multiple instances of AudioManager detected [22706:22706:1125/045104:WARNING:password_store_factory.cc(248)] Using basic (unencrypted) store for password storage. See https://chromium.googlesource.com/chromium/src/+/master/docs/linux_password_storage.md for more information about password storage options. [22706:22885:1125/045104:WARNING:simple_synchronous_entry.cc(1054)] Could not open platform files for entry. [22706:22774:1125/045104:ERROR:cert_verify_proc_nss.cc(942)] CERT_PKIXVerifyCert for 127.0.0.1 failed err=-8181 [22706:22706:1125/045104:WARNING:web_contents_impl.cc(3533)] https://127.0.0.1:53493/ ran insecure content from http://example.test:54532/ssl/google.html [22706:22706:1125/045104:INFO:CONSOLE(10)] "Mixed Content: The page at 'https://127.0.0.1:53493/ssl/top_frame.html?replace_text=UkVQTEFDRV9XSVRIX0ZSQU1FX0xFRlRfUEFUSA==:ZnJhbWVfbGVmdC5odG1sP3JlcGxhY2VfdGV4dD1Va1ZRVEVGRFJWOVhTVlJJWDBoVVZGQmZVRTlTVkE9PTpOVFExTXpJPSZyZXBsYWNlX3RleHQ9VWtWUVRFRkRSVjlYU1ZSSVgwZFBUMFJmU0ZSVVVGTmZVRUZIUlE9PTphSFIwY0hNNkx5OHhNamN1TUM0d0xqRTZOVE0wT1RNdmMzTnNMMmR2YjJkc1pTNW9kRzFzJnJlcGxhY2VfdGV4dD1Va1ZRVEVGRFJWOVhTVlJJWDBKQlJGOUlWRlJRVTE5UVFVZEY6YUhSMGNITTZMeTh4TWpjdU1DNHdMakU2TkRjd05UZ3ZjM05zTDJKaFpGOXBabkpoYldVdWFIUnRiQT09' was loaded over HTTPS, but requested an insecure resource 'http://example.test:54532/ssl/google.html'. This content should also be served over HTTPS.", source: https://127.0.0.1:53493/ssl/top_frame.html?replace_text=UkVQTEFDRV9XSVRIX0ZSQU1FX0xFRlRfUEFUSA==:ZnJhbWVfbGVmdC5odG1sP3JlcGxhY2VfdGV4dD1Va1ZRVEVGRFJWOVhTVlJJWDBoVVZGQmZVRTlTVkE9PTpOVFExTXpJPSZyZXBsYWNlX3RleHQ9VWtWUVRFRkRSVjlYU1ZSSVgwZFBUMFJmU0ZSVVVGTmZVRUZIUlE9PTphSFIwY0hNNkx5OHhNamN1TUM0d0xqRTZOVE0wT1RNdmMzTnNMMmR2YjJkc1pTNW9kRzFzJnJlcGxhY2VfdGV4dD1Va1ZRVEVGRFJWOVhTVlJJWDBKQlJGOUlWRlJRVTE5UVFVZEY6YUhSMGNITTZMeTh4TWpjdU1DNHdMakU2TkRjd05UZ3ZjM05zTDJKaFpGOXBabkpoYldVdWFIUnRiQT09 (10) [22706:22706:1125/045104:WARNING:web_contents_impl.cc(3533)] https://127.0.0.1:53493/ ran insecure content from http://example.test:54532/ssl/google.html [22706:22706:1125/045104:INFO:CONSOLE(0)] "Mixed Content: The page at 'https://127.0.0.1:53493/' was loaded over HTTPS, but requested an insecure resource 'http://example.test:54532/ssl/google.html'. This content should also be served over HTTPS.", source: about:blank (0) [22706:22706:1125/045104:WARNING:render_frame_host_impl.cc(2154)] OnDidStopLoading was called twice. [22706:22706:1125/045104:INFO:CONSOLE(4)] "Mixed Content: The page at 'https://127.0.0.1:53493/' was loaded over a secure connection, but contains a form which targets an insecure endpoint 'http://example.test:54532/search'. This endpoint should be made available over a secure connection.", source: http://example.test:54532/ssl/google.html (4) [22706:22706:1125/045104:FATAL:unguessable_token.h(96)] Check failed: token. #0 0x000002bf561e base::debug::StackTrace::StackTrace() #1 0x000002c0dfcb logging::LogMessage::~LogMessage() #2 0x0000025f3e43 cc::LocalFrameId::hash() #3 0x000004504d5c cc::SurfaceManager::GetSurfaceForId() #4 0x0000045020f7 cc::SurfaceHittest::GetTransformToTargetSurfaceInternal() #5 0x0000045027b7 cc::SurfaceHittest::TransformPointToTargetSurface() #6 0x000002783d4e content::DelegatedFrameHost::TransformPointToLocalCoordSpace() #7 0x0000025f7d1e content::RenderWidgetHostViewAura::TransformPointToLocalCoordSpace() #8 0x0000023cefa3 content::CrossProcessFrameConnector::TransformPointToCoordSpaceForView() #9 0x0000023ceeec content::CrossProcessFrameConnector::TransformPointToRootCoordSpace() #10 0x000002416e77 content::RenderWidgetHostViewChildFrame::TransformPointToRootCoordSpace() #11 0x0000025ff06d content::TextInputManager::SelectionBoundsChanged() #12 0x0000025e90c7 content::RenderWidgetHostImpl::OnSelectionBoundsChanged() #13 0x0000025e8f2b _ZN3IPC8MessageTI39ViewHostMsg_SelectionBoundsChanged_MetaSt5tupleIJ34ViewHostMsg_SelectionBounds_ParamsEEvE8DispatchIN7content20RenderWidgetHostImplES8_vMS8_FvRKS3_EEEbPKNS_7MessageEPT_PT0_PT1_T2_ #14 0x0000025e5de1 content::RenderWidgetHostImpl::OnMessageReceived() #15 0x0000025d207e content::RenderProcessHostImpl::OnMessageReceived() #16 0x000003fad9b5 IPC::ChannelProxy::Context::OnDispatchMessage() #17 0x000002221dfa _ZN4base8internal7InvokerINS0_9BindStateINS0_18IgnoreResultHelperIMN7content20BrowserMessageFilter8InternalEFbRKN3IPC7MessageEEEEJ13scoped_refptrIS6_ES8_EEEFvvEE3RunEPNS0_13BindStateBaseE #18 0x000002c92d1e base::debug::TaskAnnotator::RunTask() #19 0x000002c15b4d base::MessageLoop::RunTask() #20 0x000002c16206 base::MessageLoop::DoWork() #21 0x000002c183ea base::(anonymous namespace)::WorkSourceDispatch() #22 0x7ff67d753d13 g_main_context_dispatch #23 0x7ff67d754060 <unknown> #24 0x7ff67d754124 g_main_context_iteration #25 0x000002c181c6 base::MessagePumpGlib::Run() #26 0x000002c158a1 base::MessageLoop::RunHandler() #27 0x000002c3b7f0 base::RunLoop::Run() #28 0x0000032d837c content::RunThisRunLoop() #29 0x0000032d9584 content::WindowedNotificationObserver::Wait() #30 0x000000efb939 SSLUITest_TestGoodFrameNavigation_Test::RunTestOnMainThread() #31 0x000002cbcc7f InProcessBrowserTest::RunTestOnMainThreadLoop() #32 0x0000032a9095 content::BrowserTestBase::ProxyRunTestOnMainThreadLoop() #33 0x0000030dca94 ChromeBrowserMainParts::PreMainMessageLoopRunImpl() #34 0x0000030db951 ChromeBrowserMainParts::PreMainMessageLoopRun() #35 0x0000022e2ad5 content::BrowserMainLoop::PreMainMessageLoopRun() #36 0x0000026ca5e6 content::StartupTaskRunner::RunAllTasksNow() #37 0x0000022e1077 content::BrowserMainLoop::CreateStartupTasks() #38 0x0000022e5ba7 content::BrowserMainRunnerImpl::Initialize() #39 0x0000022de468 content::BrowserMain() #40 0x000002bd4d77 content::RunNamedProcessTypeMain() #41 0x000002bd57db content::ContentMainRunnerImpl::Run() #42 0x000002bd4160 content::ContentMain() #43 0x0000032a89c0 content::BrowserTestBase::SetUp() #44 0x000002cbb2de InProcessBrowserTest::SetUp() #45 0x000003a3da18 testing::Test::Run() #46 0x000003a3e950 testing::TestInfo::Run() #47 0x000003a3ede7 testing::TestCase::Run() #48 0x000003a460d7 testing::internal::UnitTestImpl::RunAllTests() #49 0x000003a45cea testing::UnitTest::Run() #50 0x000002cc9141 base::TestSuite::Run() #51 0x000002be7628 ChromeTestSuiteRunner::RunTestSuite() #52 0x0000032d4b42 content::LaunchTests() #53 0x000002be75b7 main #54 0x7ff677df77ed __libc_start_main #55 0x0000005e7ff1 <unknown>
,
Nov 29 2016
This looks like the same failure as in https://bugs.chromium.org/p/chromium/issues/detail?id=668913 (that one is in SSLUITest.TestUnauthenticatedFrameNavigation, but the stack trace is otherwise the same, triggered from content::RenderWidgetHostImpl::OnSelectionBoundsChanged) I'm merging this failure into that bug, as the root cause is likely the same.
,
Nov 29 2016
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/05d8c5e2f99b074e54f1011868147ef21c2a50ea commit 05d8c5e2f99b074e54f1011868147ef21c2a50ea Author: apacible <apacible@chromium.org> Date: Tue Nov 29 18:48:42 2016 Disable flaky SSLUITest.TestGoodFrameNavigation test. BUG= 668360 TBR=palmer@chromium.org NOTRY=true Review-Url: https://codereview.chromium.org/2537193002 Cr-Commit-Position: refs/heads/master@{#435042} [modify] https://crrev.com/05d8c5e2f99b074e54f1011868147ef21c2a50ea/chrome/browser/ssl/ssl_browser_tests.cc
,
Nov 29 2016
As noted in #2, these flakes are on linux. 668913 is specific to N5Xs on swarming.
,
Nov 29 2016
Detected 4 new flakes for test/step "SSLUITest.TestGoodFrameNavigation". To see the actual flakes, please visit https://chromium-try-flakes.appspot.com/all_flake_occurrences?key=ahVzfmNocm9taXVtLXRyeS1mbGFrZXNyLAsSBUZsYWtlIiFTU0xVSVRlc3QuVGVzdEdvb2RGcmFtZU5hdmlnYXRpb24M. This message was posted automatically by the chromium-try-flakes app. Since flakiness is ongoing, the issue was moved back into Sheriff Bug Queue (unless already there).
,
Nov 29 2016
666821 is specific to the swarming bots, but 668913 is a very similar failure on 'Linux Tests (dbg)'. Comments #6 and #7 there could probably apply here.
,
Nov 30 2016
+Ryan as an empty unguessable token ("FATAL:unguessable_token.h(96)] Check failed: token.") in an SSL test sounds like his cup of tea.
,
Nov 30 2016
Actually assigning to Ryan to take this out of the sheriffing queue. He might know a good owner if it is not him.
,
Nov 30 2016
Nope, unguessable_token was brought into //base from the GPU/compositor folks. However, since the crash itself is coming from cc/, adding a cc/OWNER and marking it untriaged.
,
Nov 30 2016
,
Nov 30 2016
The likely issue here is that we either haven't received a CompositorFrame yet or we've evicted the frame, giving us an invalid LocalFrameId. Alternatively, we need to keep a LocalFrameId around just for targeting. This is kind of ick. :( Maybe we can just skip the targetting if we don't have a valid LocalFrameId. Assigning to staraz@ who introduced this.
,
Dec 16 2016
Hi, this is P1 but no action is being taken lately. Please prioritize accordingly.
,
Dec 16 2016
This bug has been fixed by CL https://codereview.chromium.org/2542463002 and re-enabled at https://codereview.chromium.org/2569813002. |
|||||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||||
Comment 1 by martiniss@chromium.org
, Nov 29 2016Status: Duplicate (was: Untriaged)