Closed Bug 1456203 Opened 6 years ago Closed 6 years ago

Failure to report crashes on x86 Android O

Categories

(Toolkit :: Crash Reporting, defect)

x86
Android
defect
Not set
normal

Tracking

()

RESOLVED FIXED
mozilla61
Tracking Status
firefox59 --- wontfix
firefox60 --- wontfix
firefox61 --- fixed

People

(Reporter: snorp, Assigned: snorp)

Details

Attachments

(1 file)

Android O uses seccomp to filter which syscalls are allowed[0]. The waitpid syscall is among those not allowed. The lss headers mostly use wait4 to implement waitpid(), but not on x86, which uses the waitpid syscall directly. There is an upstream patch to make this also use wait4[1]

[0] https://android-developers.googleblog.com/2017/07/seccomp-filter-in-android-o.html
[1] https://chromium-review.googlesource.com/c/linux-syscall-support/+/699213
OS: Unspecified → Android
Hardware: Unspecified → x86
Comment on attachment 8970265 [details]
Bug 1456203 - Take patch from upstream lss to fix use of disallowed syscalls on Android

https://reviewboard.mozilla.org/r/239058/#review244970

Looks like they updated the DEPS in Breakpad to pick this up as well so we shouldn't accidentally lose this patch if we sync up with upstream Breakpad:
https://chromium.googlesource.com/breakpad/breakpad/+/2aaeead73fbc70860c6bc0ff477500f84ab595e9
Attachment #8970265 - Flags: review?(ted) → review+
Pushed by jwillcox@mozilla.com:
https://hg.mozilla.org/integration/mozilla-inbound/rev/6bf69d965bbe
Take patch from upstream lss to fix use of disallowed syscalls on Android r=ted
https://hg.mozilla.org/mozilla-central/rev/6bf69d965bbe
Status: NEW → RESOLVED
Closed: 6 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla61
Assignee: nobody → snorp
You need to log in before you can comment on or make changes to this bug.