widget/gtk/ProcInfo.cpp:249:55: error: too many arguments to function call, expected 0, have 1
Categories
(Core :: Widget: Gtk, defect)
Tracking
()
Tracking | Status | |
---|---|---|
firefox-esr68 | --- | unaffected |
firefox-esr78 | --- | unaffected |
firefox79 | --- | unaffected |
firefox80 | --- | unaffected |
firefox81 | --- | fixed |
firefox82 | --- | fixed |
People
(Reporter: jbeich, Assigned: Yoric)
References
(Regression)
Details
(Keywords: regression)
Attachments
(2 files)
1.37 KB,
patch
|
Yoric
:
review+
gaston
:
feedback+
gaston
:
feedback+
|
Details | Diff | Splinter Review |
47 bytes,
text/x-phabricator-request
|
RyanVM
:
approval-mozilla-beta+
|
Details | Review |
ProcInfo
and ResidentUnique
reporter are not implemented on Tier3 platforms (e.g., 4 BSDs, Solaris). ProcInfo
built fine before bug 1652813 but didn't work as well. Downstream no one complained about always empty about:processes
.
$ c++ --version
FreeBSD clang version 11.0.0 (git@github.com:llvm/llvm-project.git llvmorg-11.0.0-rc2-0-g414f32a9e86)
Target: x86_64-unknown-freebsd13.0
Thread model: posix
InstalledDir: /usr/bin
$ ./mach bootstrap
$ ./mach build
[...]
In file included from Unified_cpp_widget_gtk0.cpp:101:
widget/gtk/ProcInfo.cpp:249:55: error: too many arguments to function call, expected 0, have 1
nsMemoryReporterManager::ResidentUnique(request.pid);
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^~~~~~~~~~~
objdir/dist/include/nsMemoryReporterManager.h:188:3: note: 'ResidentUnique' declared here
static int64_t ResidentUnique();
^
In file included from Unified_cpp_xpcom_base2.cpp:29:
xpcom/base/nsMemoryReporterManager.cpp:2415:34: error: out-of-line definition of 'ResidentUnique' does not match any declaration in 'nsMemoryReporterManager'
int64_t nsMemoryReporterManager::ResidentUnique(ResidentUniqueArg) {
^~~~~~~~~~~~~~
(Sorry, I can't submit on Phabricator due to bug 1536716.)
https://treeherder.mozilla.org/#/jobs?repo=try&revision=fc7d7cdb98434556ca1565751859595ac359d12f
Can you help landing the fix or propose an alternative?
Comment hidden (offtopic) |
Comment hidden (offtopic) |
Assignee | ||
Comment 5•4 years ago
|
||
Comment on attachment 9172205 [details] [diff] [review] example fix Review of attachment 9172205 [details] [diff] [review]: ----------------------------------------------------------------- Yep, that would work! Thanks for the patch!
Assignee | ||
Updated•4 years ago
|
Comment 6•4 years ago
|
||
Comment on attachment 9172205 [details] [diff] [review]
example fix
Faced the same issue on OpenBSD, this patch (among others) allowed me to build 81.0b2.
Yoric, can you land this for jbeich ? Many thanks !
Comment 7•4 years ago
|
||
Comment on attachment 9172205 [details] [diff] [review]
example fix
Faced the same issue on OpenBSD, this patch (among others) allowed me to build 81.0b2.
Yoric, can you land this for jbeich ? Many thanks !
Comment 8•4 years ago
|
||
(In reply to Jan Beich from comment #4)
(In reply to Darkspirit, Servo QA from comment #3)
Please don't use one password for every website, it's highly problematic. With Firefox' built-in password manager you can create a unique password per website.
I'm fine with multiple passwords but I don't trust Mozilla enough to discard GitHub 2FA. Unfortunately, using both 2FA providers together is not possible.
It's Mozilla who needs to trust your Bugzilla session, "you don't need to trust Mozilla". With so many people laid off I wouldn't even assume someone had the time to revise this topic, to make the implementation more complex. You can still use Github on other Mozilla logins. This doesn't affect your Firefox Account or Mozilla IAM.
Are you able to set a password on https://bugzilla.mozilla.org/userprefs.cgi to switch from Github auth to Bugzilla auth?
Then you can log in to Phabricator. Also see Mozilla Phabricator User Guide. Thank you :)
(In reply to Darkspirit, Servo QA from comment #8)
It's Mozilla who needs to trust your Bugzilla session, "you don't need to trust Mozilla".
GitHub can require everyone in an organization to have 2FA enabled, show 2FA status of an organization member or any random user using their API key for read:user
(Read all user profile data) permission.
$ curl -H "Authorization: token <REDACTED>" https://api.github.com/users/jbeich |
jq '.two_factor_authentication'
true
You can still use Github on other Mozilla logins.
According to Preferences -> Two-Factor Authentication: "As part of this transition you will no longer be able to use GitHub to log in to Bugzilla."
Are you able to set a password on https://bugzilla.mozilla.org/userprefs.cgi to switch from Github auth to Bugzilla auth?
I don't want to switch "from" existing 2FA. If a password is necessary it should be on top of GitHub login, not instead.
Ironically, Mozilla spells 2FA as MFA in Phabricator except the said MFA doesn't support 3FA.
Comment 10•4 years ago
|
||
(In reply to Jan Beich from comment #9)
According to Preferences -> Two-Factor Authentication: "As part of this transition you will no longer be able to use GitHub to log in to Bugzilla."
Please do that. <3 You especially mentioned bug 1536716 in comment 1 (and many bugs before), but an own Bugzilla password and 2FA is unfortunaly required to get patches merged conveniently. It's even more unrealistic bug 1536716 could be implemented as 250 people have been fired, 25% of Mozilla. :/ In 1 minute you could configure a Bugzilla password and 2FA, saving yours and others valuable time to get a patch merged. Please, it's such a small task compared to an infrastructural change for one person by a such decimated workforce. You will like moz-phab. :)
Assignee | ||
Comment 11•4 years ago
|
||
Updated•4 years ago
|
Comment 12•4 years ago
|
||
Pushed by dteller@mozilla.com: https://hg.mozilla.org/integration/autoland/rev/827801d6b7eb Unbreak Gtk build on non-Linux after bug 1652813;r=froydnj
Assignee | ||
Updated•4 years ago
|
Comment 13•4 years ago
|
||
bugherder |
Comment 14•4 years ago
|
||
The patch landed in nightly and beta is affected.
:Yoric, is this bug important enough to require an uplift?
If not please set status_beta
to wontfix
.
For more information, please visit auto_nag documentation.
Assignee | ||
Comment 15•4 years ago
•
|
||
What do you think, Jan? (see comment 14)
Comment 16•4 years ago
|
||
Comment on attachment 9172595 [details]
Bug 1661274 - Unbreak Gtk build on non-Linux after bug 1652813;r?froydnj
Beta/Release Uplift Approval Request
- User impact if declined: FTBFS on non-linux
- Is this code covered by automated tests?: Unknown
- Has the fix been verified in Nightly?: Yes
- Needs manual test from QE?: No
- If yes, steps to reproduce:
- List of other uplifts needed: None
- Risk to taking this patch: Low
- Why is the change risky/not risky? (and alternatives if risky): NPOTB
- String changes made/needed: none
Comment 17•4 years ago
|
||
will be welcome in 81.0b4 or b5, thanks !
Comment 18•4 years ago
|
||
Comment on attachment 9172595 [details]
Bug 1661274 - Unbreak Gtk build on non-Linux after bug 1652813;r?froydnj
Approved for 81.0b5.
Comment 19•4 years ago
|
||
bugherder uplift |
Updated•4 years ago
|
Description
•