Crash in _platform_memset_pattern16$VARIANT$Haswell
Categories
(Toolkit :: Safe Browsing, defect, P1)
Tracking
()
People
(Reporter: marcia, Assigned: dimi)
References
Details
(4 keywords, Whiteboard: [fixed by bug 1542744?][post-critsmash-triage][adv-main68+])
Crash Data
Updated•7 years ago
|
Updated•7 years ago
|
Updated•7 years ago
|
Assignee | ||
Updated•7 years ago
|
Updated•7 years ago
|
Assignee | ||
Updated•7 years ago
|
Assignee | ||
Comment 1•6 years ago
|
||
This probably the same bug as Bug 1362761 with a different signature.
- Both happen when applying an update and setting prefixes
- Bug 1362761 has around 95% crashes happened in Mac while this one is 100%
Assignee | ||
Updated•6 years ago
|
Updated•6 years ago
|
Comment 2•6 years ago
|
||
Virtually every crash in this is a wildptr crash (likely to freed/unmapped memory, or bounds violation more likely). Might be sec-crit if so.
Goes back to at least 53. NI dveditz for check on priority
Comment 3•6 years ago
|
||
Crash pattern is different than Bug 1362761
Comment 4•6 years ago
|
||
(In reply to Randell Jesup [:jesup] (needinfo me) from comment #2)
Goes back to at least 53.
Maybe, but something changed significantly with the 63 release. Crashes went from a couple a day before release to 40 a day after.
All the crashes I looked at had "rcx": "0x00000000e5e5e5e5" so it looks like something got freed.
The crashing addresses are from rdi which might point at a bogus move destination. How suspicious is it they all end "f30"?
sec-high seems reasonable.
Comment 5•6 years ago
|
||
The V57 crash I looked at has rcx = e5e5e5e5 also
Assignee | ||
Comment 6•6 years ago
|
||
Keep the NI, I'll see if I can find anything.
Updated•6 years ago
|
Assignee | ||
Comment 7•6 years ago
|
||
I suspect this may relate to we allocate a large array(around 1.5M 4-bytes prefixes) and even allocate additional one for little-endian platform.
I will work on a patch to see if we can reduce that.
Assignee | ||
Updated•6 years ago
|
Comment 8•6 years ago
|
||
memshrink for the 6MB-ish array alloc
(Is this Main Process only, or Content Processes also?)
Assignee | ||
Comment 9•6 years ago
|
||
(In reply to Randell Jesup [:jesup] (needinfo me) from comment #8)
memshrink for the 6MB-ish array alloc
(Is this Main Process only, or Content Processes also?)
Main Process only
Comment 10•6 years ago
|
||
Looks like the array allocations are already fallible and we're not looking at OOMs. Clearing memshrink for now.
Assignee | ||
Comment 11•6 years ago
|
||
just an update that I am working on this now, probably submit a patch to review next week
Assignee | ||
Comment 12•6 years ago
|
||
I implement that patch that refines memory allocation for prefix generation algorithm in Bug 1542744.
I'll monitor the result to see if that helps fix this problem.
Updated•6 years ago
|
Assignee | ||
Comment 13•6 years ago
|
||
I don't find any crash since landing Bug 1542744 two weeks ago.
This bug should be fixed.
Updated•6 years ago
|
Updated•6 years ago
|
Assignee | ||
Comment 15•6 years ago
|
||
(In reply to Ryan VanderMeulen [:RyanVM] from comment #14)
Do we have any options for ESR60 here?
I think it would be too risky.
The patch itself is not a trival one. It not only changes the algorithm in safebrowsing, but also affects the data we write to disk.
I'll play safe here.
Comment 16•6 years ago
|
||
Lowering the severity to sec-moderate because this crash happens while processing background updates of the classifier data, not something malicious web content can trigger or influence.
Updated•6 years ago
|
Updated•6 years ago
|
Updated•6 years ago
|
Updated•5 years ago
|
Description
•