New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 876539 link

Starred by 6 users

Issue metadata

Status: Fixed
Owner:
Closed: Aug 31
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Android
Pri: 1
Type: ----

Blocked on:
issue 875172
issue 877619



Sign in to add a comment

proguard/deobfuscation pegging Kitkat bots at 100% CPU

Project Member Reported by s...@chromium.org, Aug 21

Issue description

Hey! I'm not sure if this is a Trooper issue or what, but I'm very confused, hopefully you can at least point me in the right direction. I've got two KitKat builders that have failed their last two unit_tests and components_unittests targets

https://ci.chromium.org/p/chromium/builders/luci.chromium.ci/android-kitkat-arm-rel
https://ci.chromium.org/p/chromium/builders/luci.chromium.ci/KitKat%20Phone%20Tester%20%28dbg%29

I don't understand though, why they're failing. Looking at an old successful run
https://logs.chromium.org/logs/chromium/buildbucket/cr-buildbucket.appspot.com/8937564530967616976/+/steps/components_unittests_on_Android_device_Nexus_5/0/stdout
and a new failing run:
https://logs.chromium.org/logs/chromium/buildbucket/cr-buildbucket.appspot.com/8937554695184194864/+/steps/components_unittests_on_Android_device_Nexus_5/0/stdout

I don't see the difference.. I see that on https://ci.chromium.org/p/chromium/builders/luci.chromium.ci/android-kitkat-arm-rel/8791 under components_unittests there's "shard #2 (failed)" but I don't get what that means.. https://chromium-swarm.appspot.com/task?id=3f76c62068df1e10&refresh=10&show_raw=1

Any help is appreciated!
 
Cc: s...@chromium.org
Labels: Sheriff-Chromium
I heard that swarming pushes happen on Tuesdays, and today is a Tuesday! Is it possible the push happened a little before ~12:30 pm today?
Owner: bpastene@chromium.org
Status: Assigned (was: Untriaged)
There does look to be an outage wrt android bots in swarming. Bots are falling offline:
http://shortn/_1MMrUNTcod

It's unclear if it's the same cause for the failures you're seeing here. The majority seems to be a timeout when pushing data deps to the device. I'm actively investigating.
Cc: lizeb@chromium.org tiborg@chromium.org amaralp@chromium.org agrieve@chromium.org digit@chromium.org
Labels: Pri-0
Summary: proguard/deobfuscation pegging Kitkat bots at 100% CPU (was: Passing tests that fail for build? (KitKat unit_tests and components_unittests))
The underlying cause for a lot of the android failures we're seeing (including a backed-up CQ https://ci.chromium.org/p/chromium/builders/luci.chromium.try/android-kitkat-arm-rel?limit=200) is an overloaded CPU. The host machines that run the tests are getting pegged at 100% cpu usage, which causes a whole bunch of things (tests included) to fall over or freeze. For example: http://shortn/_cpqqyvmyjm

And that appears to be happening for almost every kitkat bot. Logged onto one of the bots, and it appears the source of the cpu load is a whole bunch of java proceses:
chrome-bot@build94-b4:(Linux 14.04):~$ ps aux | grep java
chrome-+   450 12.4  0.3 9017124 76984 ?       Sl   12:14  41:23 java -classpath bin/../lib.java/build/android/stacktrace/java_deobfuscate.jar:bin/../lib.java/build/android/stacktrace/java_deobfuscate.jar:bin/../lib.java/third_party/proguard/proguard.jar:bin/../lib.java/third_party/proguard/retrace.jar -enableassertions org.chromium.build.FlushingReTrace /b/swarming/w/ir/out/Release/apks/ChromeSyncShellTest.apk.mapping
chrome-+   586  7.8  0.8 9017124 203284 ?      Sl   12:07  26:31 java -classpath bin/../lib.java/build/android/stacktrace/java_deobfuscate.jar:bin/../lib.java/build/android/stacktrace/java_deobfuscate.jar:bin/../lib.java/third_party/proguard/proguard.jar:bin/../lib.java/third_party/proguard/retrace.jar -enableassertions org.chromium.build.FlushingReTrace /b/swarming/w/ir/out/Release/apks/ChromePublicTest.apk.mapping
chrome-+   591  7.7  0.8 9017124 215524 ?      Sl   12:07  26:14 java -classpath bin/../lib.java/build/android/stacktrace/java_deobfuscate.jar:bin/../lib.java/build/android/stacktrace/java_deobfuscate.jar:bin/../lib.java/third_party/proguard/proguard.jar:bin/../lib.java/third_party/proguard/retrace.jar -enableassertions org.chromium.build.FlushingReTrace /b/swarming/w/ir/out/Release/apks/ChromePublicTest.apk.mapping
....
and many more. 78 in total.

So some proguard/deobfuscation process is hogging the CPU. And it started doing so recently. +agrieve/tiborg/digit: Any idea if something changed recently in that area? If so, let's revert it. Things are actively dying off, and I'm having a hard time keeping a handle on it.

+ clank sheriffs FYI
We recently added synchronized proguarding for bundles (4bbde2a8f25943e648e568d3e208d28926481e0e). That is hard to revert at this point since other changes landed on top of it. I'm also not sure whether it is the culprit since I don't know what these deobfuscation/retracing commands do.

The synchronized proguarding added three proguarding steps that each take ~2 minutes on my machine to execute. For testing purposes we could try to disable proguarding on bundles to see if that fixes something (set proguard_enabled = false on all bundles, e.g. here https://cs.chromium.org/chromium/src/chrome/android/BUILD.gn?rcl=5dc92e19e7d6a7e23df906529ca55bbfb170d5d4&l=1744).
Cc: jonr...@chromium.org
jonross@ pointed out that https://ci.chromium.org/p/chromium/builders/luci.chromium.ci/android-kitkat-arm-rel/8791 seems to be the first failing build. The oldest revision in the build is from yesterday. However, synchronized proguarding was added three weeks ago. Seems unlikely to be the culprit.
Cc: jmad...@chromium.org
Cc: twelling...@chromium.org kbr@chromium.org bajones@chromium.org cwallez@chromium.org
Issue 876748 has been merged into this issue.
Keep in mind that a single host in our infra can run up to 7 different tests simultaneously. So any load you test out locally... you might have to septuple that. Additionally, maybe a given test isn't cleaning up after itself properly and leaving proguard procs around?

Anyway, I've taken the kitkat bot off the CQ in https://chromium-review.googlesource.com/c/chromium/src/+/1185229 while we investigate.
And why aren't we seeing the same thing on the M CQ bot:
https://ci.chromium.org/p/chromium/builders/luci.chromium.try/android-marshmallow-arm64-rel?limit=200

What could the tests be doing differently wrt proguard on M...?
Project Member

Comment 12 by bugdroid1@chromium.org, Aug 22

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/80a5f1d80b3c9a08a519405a3d98661bb383471a

commit 80a5f1d80b3c9a08a519405a3d98661bb383471a
Author: Ben Pastene <bpastene@chromium.org>
Date: Wed Aug 22 16:08:29 2018

Demote android-kitkat-arm-rel to 100% CQ experiment.

It's not doing well.
https://ci.chromium.org/p/chromium/builders/luci.chromium.try/android-kitkat-arm-rel?limit=200

Fortunately, the M bot is ok:
https://ci.chromium.org/p/chromium/builders/luci.chromium.try/android-marshmallow-arm64-rel?limit=200

NOTRY=true

Bug:  876539 
Change-Id: Icb9770bf0df60fe28ad92dfabeb0c5c8f14f30af
Reviewed-on: https://chromium-review.googlesource.com/1185229
Commit-Queue: Ben Pastene <bpastene@chromium.org>
Reviewed-by: Dirk Pranke <dpranke@chromium.org>
Reviewed-by: John Budorick <jbudorick@chromium.org>
Cr-Commit-Position: refs/heads/master@{#585029}
[modify] https://crrev.com/80a5f1d80b3c9a08a519405a3d98661bb383471a/infra/config/branch/cq.cfg

Issue 876756 has been merged into this issue.
Labels: -Restrict-View-Google
Labels: sheriff-android
I don't know of anything that's changed wrt to this code. The processes are quite expensive RAM-wise (500MB per process when I added them):
https://cs.chromium.org/chromium/src/build/android/pylib/symbols/deobfuscator.py?rcl=580c69963c034832eabfa88f266e6408289e769e&l=130

There can be up to 4 per test, but even if 7 tests at a time run, that's not close to 78.
re #11 - certainly a mystery. There's nothing OS-specific about obfuscation.
Blockedon: 875172
Note that one change on this bot recently is that the webkit_layout_tests step was un-broken in  Issue 875172 . Not sure it is related but linked to it just in case.

webkit_layout_tests currently only runs on the K dbg tester, and not the release CQ tester... Though it triggers tests into the same pool, so it's possible there could be some cross-contamination going on, but I'd be surprised.

And not surprisingly, the jump in cpu usage also correlates with jump in mem usage:
mem: http://shortn/_cbsOFd21kM
cpu: http://shortn/_TdcuubRdes
The Marshmallow 64 bit Tester is seeing a small number of test flakes. I think they look pretty similar to the KitKat failures we're seeing here.

https://ci.chromium.org/p/chromium/builders/luci.chromium.ci/Marshmallow%2064%20bit%20Tester

unit_tests target of https://ci.chromium.org/p/chromium/builders/luci.chromium.ci/Marshmallow%2064%20bit%20Tester/23419

1 failing shard that never gets to running tests https://chromium-swarm.appspot.com/task?id=3f7b757dfb7c9710&refresh=10
Cc: jbudorick@chromium.org
Narrowing it down, https://chromium-swarm.appspot.com/task?id=3f76b12f9122b710 is a pretty good starting point for when the problem started to first appear. That test contains many "deobfuscator: Timed out." warnings, which we're pretty sure is what's causing the proguard explosion. That task (though it ran on the CQ) ran at base revision r2eb57d5b5ea08f7bf15a67056fa03b2b6aabfd4b.

The culprit likely lays within the past few commits starting from there:
https://chromium.googlesource.com/chromium/src/+log/2eb57d5b5ea08f7bf15a67056fa03b2b6aabfd4b

We've spotted a few candidates (namely https://chromium-review.googlesource.com/c/chromium/src/+/1179251) and are testing them out.
FWIW, the task in #22 contains quite a few dalvik errors like "unable to resolve virtual method" in the logcat when proguard timesout:
https://luci-logdog.appspot.com/logs/chromium/android/swarming/logcats/3f76b12f9122b711/+/logcat_logcat_org.chromium.chrome.browser.TabThemeTest.testThemeColorIsCorrect_20180821T190814-UTC_022b169f0c33f7a5

Could be related, but I'm not sure... a bit out of my depth at this point. Fortunately, repro'ing locally isn't very hard, so hopefully we can narrow down what exactly broke it soon.
Project Member

Comment 24 by bugdroid1@chromium.org, Aug 22

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/b81f63ce2e0725921c81fb977d33fe5b95e951b5

commit b81f63ce2e0725921c81fb977d33fe5b95e951b5
Author: John Budorick <jbudorick@chromium.org>
Date: Wed Aug 22 19:05:52 2018

android: disable deobfuscation in tests.

Deobfuscation appears to be hanging in ways that cause it to peg
bots' CPUs and kill test runs. This CL temporarily disables it as
a mitigation.

Bug:  876539 
Change-Id: I6dced1a4c80e630bb701a17eaa8322450661adc5
Reviewed-on: https://chromium-review.googlesource.com/1185294
Reviewed-by: Ben Pastene <bpastene@chromium.org>
Commit-Queue: John Budorick <jbudorick@chromium.org>
Cr-Commit-Position: refs/heads/master@{#585190}
[modify] https://crrev.com/b81f63ce2e0725921c81fb977d33fe5b95e951b5/build/config/android/internal_rules.gni

Cc: mheikal@chromium.org tedc...@chromium.org
With the change in #24, we've turned off deobfuscation all together. We'll let that sit for a bit and see if things improve and bots stay healthy. (Will probably take a couple hours.)

After some repros and local reverts, we believe that https://chromium-review.googlesource.com/c/chromium/src/+/1179251 is the original cause. Though we're not entirely sure how (jbud was tracing proguard's logcat regexs at some point... not sure how far he got there). If the change in #24 does prove helpful, we'll revert crrev.com/c/1179251, then reenable deobfuscation for tests. And if all that goes as planned, we should be in a good place to put android-kitkat-arm-rel back on the CQ.

Unfortunately, given how much cleanup and confirmation still needs to be done, that likely won't happen until sometime tomorrow.
jstack output from local repro is ... pretty wild.
deobfuscate_hang.txt
13.3 KB View Download
Is this resolving itself? Any ETA or status update?
After #24, bots have stopped dropping offline. But I'm still trying to resuscitate the ones that have died over the past couple days:
http://shortn/_XsuKTMApgQ

That's proving a bit tricker than I had hoped given the state some of them are in (ie: some are failing to shutdown properly). I'm expecting everything to come back up by eod today. Then we need to decide if we want #24 reverted before putting the K bot back on the CQ. Given the state deobfuscation testing is in, I'm leaning toward keeping it off for now. (ie: we have little guarantee that something like crrev.com/c/1179251 won't cause this again). But I'll let jbud/agrieve decide that. (What benefit does deobfuscation on the CQ give us? Can we live w/o it for an extended period of time?)

tl;dr: I'm hoping we can re-enable android-kitkat-arm-rel sometime tomorrow.
Issue 876566 has been merged into this issue.
Things have just about settled down. Bots are back to being green and happy.

I'll plan on adding the K bot back to the CQ first thing tomorrow if things still look good then. (Leaving this bug at P0 until that's been done.)
Figured out how to repro the issue locally.

1. Build chrome_public_test_apk with is_java_debug=false
2. run: out/Release/bin/java_deobfuscate out/Release/apks/ChromePublicTest.apk < example-logcat.txt > output.txt

The process will just stay pegged at 100% CPU usage.
Attached the sample-logcat.txt. I took it from the first timed-out deobfuscation from the logs in #7
example-logcat.txt
51.2 KB View Download
Smaller repro:

echo '12742: LccB;.onDescendantInvalidated (Landroid/view/View;Landroid/view/View;)V' | bin/java_deobfuscate apks/ChromePublicForTest.apk.mapping

Obfuscating this class on its own works fine:
$ echo 'LccB;.onDescendantInvalidated' | bin/java_deobfuscate apks/ChromePublicForTest.apk.mapping
Lorg/chromium/webshare/mojom/ShareService_Internal$ShareServiceShareResponseParamsProxyToResponder;.onDescendantInvalidated

I used a local mapping file, so in reality this would deobfuscate to: ViewResourceFrameLayout, which was added in 2eb57d5b5ea08f7bf15a67056fa03b2b6aabfd4b (the commit identified in #22)


Full original line was:
VFY: unable to resolve virtual method 12742: LccB;.onDescendantInvalidated (Landroid/view/View;Landroid/view/View;)V


There are lots of "VFY: unable to resolve virtual method..." lines in the logcats, but this is the only one that has an obfuscated class name in it.


So... I don't know the fix yet, but the problem really is that retrace is getting caught in an infinite loop triggered by a kitkat-only VFY message introduced by a recent commit.

We might want to consider changing a timeout to instead disable all future attempts rather than skipping the current job and continuing to deobfuscate all future jobs.


re: what to do in the meantime - should be fine to re-enable the bot with deobfuscation disabled. Some failures might be hard to debug in the meantime, but I think that's better than having the bot completely disabled.
Labels: -Sheriff-Chromium
I guess there is nothing what chromium-sheriff can do on this.
Removing Sheriff-Chromium.
fixing how the java_deobfuscate process gets killed on timeout & adding a repro case to java_deobfuscate_test.py here: https://chromium-review.googlesource.com/c/chromium/src/+/1186542
Found that a newer version of retrace doesn't have this bug. CL to update it here: https://chromium-review.googlesource.com/c/chromium/src/+/1187003
Project Member

Comment 37 by bugdroid1@chromium.org, Aug 23

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/ebbac47d5f40c5b1fa472000c042b1fe652cf611

commit ebbac47d5f40c5b1fa472000c042b1fe652cf611
Author: Ben Pastene <bpastene@chromium.org>
Date: Thu Aug 23 16:53:54 2018

Revert "Demote android-kitkat-arm-rel to 100% CQ experiment."

This reverts commit 80a5f1d80b3c9a08a519405a3d98661bb383471a.

Reason for revert: outage over

Original change's description:
> Demote android-kitkat-arm-rel to 100% CQ experiment.
> 
> It's not doing well.
> https://ci.chromium.org/p/chromium/builders/luci.chromium.try/android-kitkat-arm-rel?limit=200
> 
> Fortunately, the M bot is ok:
> https://ci.chromium.org/p/chromium/builders/luci.chromium.try/android-marshmallow-arm64-rel?limit=200
> 
> NOTRY=true
> 
> Bug:  876539 
> Change-Id: Icb9770bf0df60fe28ad92dfabeb0c5c8f14f30af
> Reviewed-on: https://chromium-review.googlesource.com/1185229
> Commit-Queue: Ben Pastene <bpastene@chromium.org>
> Reviewed-by: Dirk Pranke <dpranke@chromium.org>
> Reviewed-by: John Budorick <jbudorick@chromium.org>
> Cr-Commit-Position: refs/heads/master@{#585029}

TBR=dpranke@chromium.org,bpastene@chromium.org,jbudorick@chromium.org

# Not skipping CQ checks because original CL landed > 1 day ago.

Bug:  876539 
Change-Id: I3f137fb209f0decfc13be5dab518e9e644e98b8c
Reviewed-on: https://chromium-review.googlesource.com/1187084
Reviewed-by: Ben Pastene <bpastene@chromium.org>
Reviewed-by: Dirk Pranke <dpranke@chromium.org>
Commit-Queue: Ben Pastene <bpastene@chromium.org>
Cr-Commit-Position: refs/heads/master@{#585520}
[modify] https://crrev.com/ebbac47d5f40c5b1fa472000c042b1fe652cf611/infra/config/branch/cq.cfg

Labels: -Pri-0 Pri-1
Bot's back on the CQ. Lowering pri.
Labels: chops-pm-94
Post-mortem up at go/chops-pm-94
Is this having issues again? Just failed on a recent patch for me:
https://ci.chromium.org/p/chromium/builders/luci.chromium.try/android-kitkat-arm-rel/65602
#41: that appears to be a different failure mode.
Project Member

Comment 43 by bugdroid1@chromium.org, Aug 24

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/32813a502d0bc3d725e2445ca326770e6f73bf3c

commit 32813a502d0bc3d725e2445ca326770e6f73bf3c
Author: John Budorick <jbudorick@chromium.org>
Date: Fri Aug 24 15:18:57 2018

android: fix deobfuscator closing + add infinite loop test case.

Bug:  876539 
Change-Id: Ib28bf55e7213789186b8180904f7317cb5c0d8ce
Reviewed-on: https://chromium-review.googlesource.com/1186542
Commit-Queue: John Budorick <jbudorick@chromium.org>
Reviewed-by: agrieve <agrieve@chromium.org>
Cr-Commit-Position: refs/heads/master@{#585843}
[modify] https://crrev.com/32813a502d0bc3d725e2445ca326770e6f73bf3c/build/android/pylib/symbols/deobfuscator.py
[modify] https://crrev.com/32813a502d0bc3d725e2445ca326770e6f73bf3c/build/android/stacktrace/java_deobfuscate_test.py

Project Member

Comment 44 by bugdroid1@chromium.org, Aug 24

Cc: -kbr@chromium.org
We should be fine to re-enable deobfuscation now, but might be wise to wait until monday :)
Cc: -jmad...@chromium.org
Blockedon: 877619
#46: I'm going to look at 877149 before doing so.
Project Member

Comment 50 by bugdroid1@chromium.org, Aug 24

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/78561f5b9dca2d5e742a43ddf0f553eaf4a76c70

commit 78561f5b9dca2d5e742a43ddf0f553eaf4a76c70
Author: agrieve <agrieve@chromium.org>
Date: Fri Aug 24 19:55:43 2018

Revert "Android: Update version of retrace.jar to 6.0.3"

This reverts commit bd3c0e676955a999600b966e2c02bec00dbacabf.

Reason for revert: Broke angle_perftests

Original change's description:
> Android: Update version of retrace.jar to 6.0.3
> 
> The existing version was found to infinite loop at times.
> Also moves the jars to CIPD
> 
> NOTRY=true # windows bot failing
> 
> Bug:  876539 
> Change-Id: If822837f4958434372ef0cb40799aec32ec7cd37
> Reviewed-on: https://chromium-review.googlesource.com/1187003
> Commit-Queue: agrieve <agrieve@chromium.org>
> Reviewed-by: John Budorick <jbudorick@chromium.org>
> Cr-Commit-Position: refs/heads/master@{#585887}

TBR=agrieve@chromium.org,jbudorick@chromium.org

Change-Id: Icd2cf44c9e48390f6b13641d6fac97fd0f75df5d
No-Presubmit: true
No-Tree-Checks: true
No-Try: true
Bug:  876539 ,  877619 
Reviewed-on: https://chromium-review.googlesource.com/1188866
Reviewed-by: agrieve <agrieve@chromium.org>
Commit-Queue: agrieve <agrieve@chromium.org>
Cr-Commit-Position: refs/heads/master@{#585955}
[modify] https://crrev.com/78561f5b9dca2d5e742a43ddf0f553eaf4a76c70/DEPS
[modify] https://crrev.com/78561f5b9dca2d5e742a43ddf0f553eaf4a76c70/build/android/pylib/utils/proguard.py
[modify] https://crrev.com/78561f5b9dca2d5e742a43ddf0f553eaf4a76c70/third_party/.gitignore
[modify] https://crrev.com/78561f5b9dca2d5e742a43ddf0f553eaf4a76c70/third_party/proguard/BUILD.gn
[modify] https://crrev.com/78561f5b9dca2d5e742a43ddf0f553eaf4a76c70/third_party/proguard/README.chromium
[delete] https://crrev.com/daeda01281efc0810df252157bcf623f1faac38c/third_party/proguard/cipd.yaml
[add] https://crrev.com/78561f5b9dca2d5e742a43ddf0f553eaf4a76c70/third_party/proguard/lib/proguard.jar
[add] https://crrev.com/78561f5b9dca2d5e742a43ddf0f553eaf4a76c70/third_party/proguard/lib/retrace.jar

Project Member

Comment 51 by bugdroid1@chromium.org, Aug 27

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/40dece27d6b58fb916aa8d27aadaa5def856584f

commit 40dece27d6b58fb916aa8d27aadaa5def856584f
Author: Andrew Grieve <agrieve@chromium.org>
Date: Mon Aug 27 17:59:40 2018

Reland "Android: Update version of retrace.jar to 6.0.3"

Reverted in: 78561f5b9dca2d5e742a43ddf0f553eaf4a76c70

Reason for reland:
 * Should now work with swarming
 * Contains fix for angle_perftest (ran locally)

The existing version was found to infinite loop at times.
Also moves the jars to CIPD

Bug:  876539 ,  877619 
Change-Id: I9564c9b5dd6339abd1ded62d9bba98f9692a601d
Reviewed-on: https://chromium-review.googlesource.com/1188601
Reviewed-by: John Budorick <jbudorick@chromium.org>
Commit-Queue: agrieve <agrieve@chromium.org>
Cr-Commit-Position: refs/heads/master@{#586312}
[modify] https://crrev.com/40dece27d6b58fb916aa8d27aadaa5def856584f/DEPS
[modify] https://crrev.com/40dece27d6b58fb916aa8d27aadaa5def856584f/build/android/BUILD.gn
[modify] https://crrev.com/40dece27d6b58fb916aa8d27aadaa5def856584f/build/android/pylib/constants/__init__.py
[modify] https://crrev.com/40dece27d6b58fb916aa8d27aadaa5def856584f/build/android/pylib/utils/device_dependencies.py
[modify] https://crrev.com/40dece27d6b58fb916aa8d27aadaa5def856584f/build/android/pylib/utils/proguard.py
[modify] https://crrev.com/40dece27d6b58fb916aa8d27aadaa5def856584f/third_party/.gitignore
[modify] https://crrev.com/40dece27d6b58fb916aa8d27aadaa5def856584f/third_party/proguard/BUILD.gn
[modify] https://crrev.com/40dece27d6b58fb916aa8d27aadaa5def856584f/third_party/proguard/README.chromium
[add] https://crrev.com/40dece27d6b58fb916aa8d27aadaa5def856584f/third_party/proguard/cipd.yaml
[delete] https://crrev.com/25113733c29967022d59118621aabe491a7bcc13/third_party/proguard/lib/proguard.jar
[delete] https://crrev.com/25113733c29967022d59118621aabe491a7bcc13/third_party/proguard/lib/retrace.jar

Project Member

Comment 52 by bugdroid1@chromium.org, Aug 30

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/e5e16ac5fd5b173293001345d6ae5fd139b1916f

commit e5e16ac5fd5b173293001345d6ae5fd139b1916f
Author: agrieve <agrieve@chromium.org>
Date: Thu Aug 30 19:32:42 2018

Revert "android: disable deobfuscation in tests."

This reverts commit b81f63ce2e0725921c81fb977d33fe5b95e951b5.

Reason for revert: retrace bug now fixed

Original change's description:
> android: disable deobfuscation in tests.
>
> Deobfuscation appears to be hanging in ways that cause it to peg
> bots' CPUs and kill test runs. This CL temporarily disables it as
> a mitigation.
>
> Bug:  876539 
> Change-Id: I6dced1a4c80e630bb701a17eaa8322450661adc5
> Reviewed-on: https://chromium-review.googlesource.com/1185294
> Reviewed-by: Ben Pastene <bpastene@chromium.org>
> Commit-Queue: John Budorick <jbudorick@chromium.org>
> Cr-Commit-Position: refs/heads/master@{#585190}

Bug:  876539 
Change-Id: If6c19b7345e769d51d1580980aca8e3967319a97
Reviewed-on: https://chromium-review.googlesource.com/1195432
Reviewed-by: Ben Pastene <bpastene@chromium.org>
Reviewed-by: agrieve <agrieve@chromium.org>
Commit-Queue: agrieve <agrieve@chromium.org>
Cr-Commit-Position: refs/heads/master@{#587707}
[modify] https://crrev.com/e5e16ac5fd5b173293001345d6ae5fd139b1916f/build/config/android/internal_rules.gni

Labels: -sheriff-android
Looks like Kitkat bots feel healthy, removing sheriff-android label.
Status: Fixed (was: Assigned)

Sign in to add a comment