Closed
Bug 1256541
Opened 9 years ago
Closed 9 years ago
Exception-time crash annotations using incorrect paths when MOZ_CONTENT_SANDBOX is not defined
Categories
(Toolkit :: Crash Reporting, defect)
Toolkit
Crash Reporting
Tracking
()
RESOLVED
FIXED
mozilla48
People
(Reporter: bugzilla, Assigned: bugzilla)
References
Details
Attachments
(1 file)
(deleted),
text/x-review-board-request
|
benjamin
:
review+
lizzard
:
approval-mozilla-aurora+
lizzard
:
approval-mozilla-beta+
|
Details |
This is why bug 1236108 is not merging to aurora or beta cleanly.
Assignee | ||
Comment 1•9 years ago
|
||
Assignee | ||
Comment 2•9 years ago
|
||
Since the minidump path can be overridden programmatically in the chrome
process, using that path as the base for .extra files won't work since content
is unaware of it.
This patch changes everything to use the temp path when MOZ_CONTENT_SANDBOX is
not defined or when sandboxing is disabled via pref. It also moves the derivation
of the content temp path out of exception context on Windows and Mac, as I
found out that those functions touch the heap.
I also noticed that xpcshell is not sandbox-aware when utilized as a parent
process. I've filed bug 1257098 to take care of that, but this patch includes a
hack for the immediate term.
Review commit: https://reviewboard.mozilla.org/r/40833/diff/#index_header
See other reviews: https://reviewboard.mozilla.org/r/40833/
Attachment #8731785 -
Flags: review?(benjamin)
Comment 3•9 years ago
|
||
Comment on attachment 8731785 [details]
MozReview Request: Bug 1256541: Fix incorrect generation of path for child process .extra files when content sandboxing is disabled; r?bsmedberg
https://reviewboard.mozilla.org/r/40833/#review38747
Attachment #8731785 -
Flags: review?(benjamin) → review+
Comment 5•9 years ago
|
||
Thanks for fixing this, Aaron. I've marked it blocking all of the OOM | Unknowns we have that aren't related to the JS engine.
Updated•9 years ago
|
tracking-e10s:
--- → ?
Backed this out in https://hg.mozilla.org/integration/mozilla-inbound/rev/0974ea6ae83b for crashes like https://treeherder.mozilla.org/logviewer.html#?job_id=24573582&repo=mozilla-inbound
Flags: needinfo?(aklotz)
Assignee | ||
Comment 7•9 years ago
|
||
https://hg.mozilla.org/integration/mozilla-inbound/rev/faf8710ec82947959292a72c11790a340f70b083
Bug 1256541: Fix incorrect generation of path for child process .extra files when content sandboxing is disabled; r=bsmedberg
Assignee | ||
Comment 8•9 years ago
|
||
I made some false assumptions with that assertion that was firing. I removed it as the code can safely deal with that case.
Flags: needinfo?(aklotz)
Comment 9•9 years ago
|
||
bugherder |
Status: ASSIGNED → RESOLVED
Closed: 9 years ago
status-firefox48:
--- → fixed
Resolution: --- → FIXED
Target Milestone: --- → mozilla48
Can you request uplift? Then we can also uplift bug 1236108. :)
Flags: needinfo?(aklotz)
Assignee | ||
Comment 11•9 years ago
|
||
Comment on attachment 8731785 [details]
MozReview Request: Bug 1256541: Fix incorrect generation of path for child process .extra files when content sandboxing is disabled; r?bsmedberg
(Sheriff note: this needs to be landed by aklotz)
Approval Request Comment
[Feature/regressing bug #]: Crash reporter OOM annotations for e10s content processes
[User impact if declined]: Ability to analyze content OOM crashes would be impaired
[Describe test coverage new/current, TreeHerder]: Existing tests in xpcshell and browser-chrome
[Risks and why]: Low, this patch simplifies existing code which is mostly related to calculation of target directories for crash dump annotations.
[String/UUID change made/needed]: None
Flags: needinfo?(aklotz)
Attachment #8731785 -
Flags: approval-mozilla-beta?
Attachment #8731785 -
Flags: approval-mozilla-aurora?
Comment on attachment 8731785 [details]
MozReview Request: Bug 1256541: Fix incorrect generation of path for child process .extra files when content sandboxing is disabled; r?bsmedberg
Useful for e10s crash reports. Please uplift to aurora and beta
Attachment #8731785 -
Flags: approval-mozilla-beta?
Attachment #8731785 -
Flags: approval-mozilla-beta+
Attachment #8731785 -
Flags: approval-mozilla-aurora?
Attachment #8731785 -
Flags: approval-mozilla-aurora+
Hitting conflicts on both aurora and beta.
Flags: needinfo?(aklotz)
Assignee | ||
Updated•9 years ago
|
status-firefox46:
--- → fixed
status-firefox47:
--- → fixed
Assignee | ||
Comment 15•9 years ago
|
||
Comment 16•9 years ago
|
||
I think this one just broke VS2015 compilation in the beta tree:
c:/seamonkey/comm-beta/mozilla/toolkit/crashreporter/nsExceptionHandler.cpp(1198): error C2664: 'size_t CrashReporter::BuildTempPath
(wchar_t *,size_t)': cannot convert argument 1 from 'nsAString_internal::char_iterator' to 'wchar_t *'mozmake[7]: Entering directory
'c:/seabuild/release/comm-beta-15/obj-x86_64-pc-mingw32/intl/icu/target/tools/gencmn'
Flags: needinfo?(aklotz)
Comment 17•9 years ago
|
||
On aurora too.
c:/seamonkey/comm-aurora/mozilla/toolkit/crashreporter/nsExceptionHandler.cpp(1215): error C2664: 'size_t CrashReporter::BuildTempPath(wchar_t *,size_t)': cannot convert argument 1 from 'nsAString_internal::char_iterator' to 'wchar_t *'
c:/seamonkey/comm-aurora/mozilla/toolkit/crashreporter/nsExceptionHandler.cpp(1215): note: Types pointed to are unrelated; conversion requires reinterpret_cast, C-style cast or function-style cast
wwc fixed it:
>> size_t actualLen = BuildTempPath(wwc(aResult.BeginWriting()), XP_PATH_MAX);
Assignee | ||
Comment 18•9 years ago
|
||
Feel free to file a follow-up bug to fix this if you like, but since our official VC2015 support is effective for Version 48, I'm not personally inclined to request uplift for this change.
Flags: needinfo?(aklotz)
Comment 19•9 years ago
|
||
Doesn't make much sense to file a bug if it's likely not being checked in. Will just put private fixes in my trees.
Thanks for your time
FRG
You need to log in
before you can comment on or make changes to this bug.
Description
•