Closed
Bug 725503
Opened 13 years ago
Closed 9 years ago
crash in radhslib.dll from Naomi Internet Filter
Categories
(Core :: Networking, defect)
Tracking
()
RESOLVED
WONTFIX
People
(Reporter: marcia, Unassigned)
References
(Depends on 1 open bug)
Details
(Keywords: crash)
Crash Data
This bug was filed from the Socorro interface and is
report bp-6f25c7a6-3635-417b-a9c1-757922120208 .
=============================================================
Seen while looking at Aurora crash stats but happens across all versions.
https://crash-stats.mozilla.com/report/list?signature=radhslib.dll@0x3b6f
Bug 519348 was filed back in the day to block something similar to this.
Correlations:
radhslib.dll@0x3b6f|EXCEPTION_ACCESS_VIOLATION_READ (13 crashes)
100% (13/13) vs. 0% (25/13378) radhslib.dll
100% (13/13) vs. 0% (25/13378) radprlib.dll
https://crash-stats.mozilla.com/report/index/73963a76-3c8f-44c9-8775-c2e912120204
Frame Module Signature [Expand] Source
0 radhslib.dll radhslib.dll@0x3b6f
1 @0x5f0e0009
2 nspr4.dll SocketRead nsprpub/pr/src/io/prsocket.c:657
3 xul.dll nsSocketInputStream::Read netwerk/base/src/nsSocketTransport2.cpp:362
4 xul.dll nsHttpConnection::OnWriteSegment netwerk/protocol/http/nsHttpConnection.cpp:1052
5 xul.dll nsHttpTransaction::WritePipeSegment netwerk/protocol/http/nsHttpTransaction.cpp:544
6 @0x7fff
7 xul.dll nsHttpTransaction::WriteSegments netwerk/protocol/http/nsHttpTransaction.cpp:574
8 xul.dll nsXULScrollFrame::DoLayout layout/generic/nsGfxScrollFrame.cpp:1292
9 xul.dll nsHttpConnection::OnSocketReadable netwerk/protocol/http/nsHttpConnection.cpp:1084
10 xul.dll nsHttpConnection::OnInputStreamReady netwerk/protocol/http/nsHttpConnection.cpp:1204
11 xul.dll nsSocketInputStream::OnSocketReady netwerk/base/src/nsSocketTransport2.cpp:255
12 xul.dll nsSocketTransport::OnSocketReady netwerk/base/src/nsSocketTransport2.cpp:1574
13 xul.dll nsSocketTransportService::DoPollIteration netwerk/base/src/nsSocketTransportService2.cpp:759
14 xul.dll nsSocketTransportService::Run netwerk/base/src/nsSocketTransportService2.cpp:642
15 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:657
16 xul.dll nsThreadStartupEvent::`scalar deleting destructor'
17 xul.dll nsThread::ThreadFunc xpcom/threads/nsThread.cpp:289
18 nspr4.dll _MD_CURRENT_THREAD nsprpub/pr/src/md/windows/w95thred.c:308
19 nspr4.dll pr_root nsprpub/pr/src/md/windows/w95thred.c:122
20 msvcr80.dll _callthreadstartex f:\\sp\\vctools\\crt_bld\\self_x86\\crt\\src\\threadex.c:348
21 msvcr80.dll _threadstartex f:\\sp\\vctools\\crt_bld\\self_x86\\crt\\src\\threadex.c:326
22 kernel32.dll BaseThreadStart
Comment 1•13 years ago
|
||
(In reply to Marcia Knous [:marcia] from comment #0)
> Bug 519348 was filed back in the day to block something similar to this.
radhslib.dll is still blocklisted. See http://mxr.mozilla.org/mozilla-central/source/toolkit/xre/nsWindowsDllBlocklist.cpp#119
Maybe there's something that bypasses it like with VKsaver (see bug 614966 comment 55).
Comment 2•13 years ago
|
||
It's #200 top browser crasher in 11.0 and #9 in 12.0b1.
tracking-firefox12:
--- → ?
Keywords: topcrash
Comment 3•13 years ago
|
||
Can we get some exploratory QA around this to ensure there haven't been any recent regressions in the blocklist? The DLL is still unversioned, and I've looked around Google to try to find new versions of the Naomi Internet Filter without success. We should also see if there's a correlation to a new version of Windows, which could have changed behavior out from under us.
Keywords: qawanted
Comment 4•13 years ago
|
||
(In reply to Alex Keybl [:akeybl] from comment #3)
> We should also see if there's a correlation to a new version of Windows, which
> could have changed behavior out from under us.
It's correlated to Windows XP:
100% (111/111) vs. 10% (2240/21798) wtsapi32.dll
60% (67/111) vs. 2% (461/21798) 5.1.2600.2180 (SP2)
40% (44/111) vs. 4% (907/21798) 5.1.2600.5512 (SP3)
> Can we get some exploratory QA around this to ensure there haven't been any
> recent regressions in the blocklist?
Based on correlations per module version, the DLL blocklist is ineffective whatever the version (11.0 or 12.0) for:
* Accelerator.dll
* GoogleDesktopNetwork3.dll
* HOOK.DLL
* radhslib.dll
* vksaver.dll
It's not a startup crash that could have made it spike.
It's not caused by the Beta population (#139 in 11.0b8).
Fx 12 is more sensitive to this DLL for an unknown reason.
Comment 5•13 years ago
|
||
Thanks Scoobidiver. I'm going to talk to smooney about this one. I'm not sure that the right path forward here would be to try to find root cause for why this crash signature jumped up, as opposed to fixing our DLL blocklist code.
Comment 6•13 years ago
|
||
When I install the software, I immediately get a startup crash in Firefox (and many other apps, including IE and Visual Studio:
radprlib.dll!003e001c()
[Frames below may be incorrect and/or missing, no symbols loaded for radprlib.dll]
> mozutils.dll!je_free(void * ptr) Line 6260 + 0xc1 bytes C
nspr4.dll!_MD_CURRENT_THREAD() Line 310 C
nspr4.dll!PR_GetEnv(const char * var) Line 84 C
xul.dll!XRE_main(int argc, char * * argv, const nsXREAppData * aAppData) Line 2801 + 0x1b bytes C++
ntdll.dll!_ZwReadFile@36() + 0xc bytes
kernel32.dll!_ReadFile@20() + 0x67 bytes
xul.dll!nsLocalFile::`vftable'() + 0x11b bytes C++
Although the stack seems to be corrupted.
Comment 7•13 years ago
|
||
Note that the crash happens in radprlib.dll for me, not in radhslib.dll which is what we have blacklisted.
Comment 8•13 years ago
|
||
Both radprlib.dll and radhslib.dll are injected into our process before XRE_SetupDllBlocklist has executed, which means that our DLL blocklist is ineffective here.
Comment 9•13 years ago
|
||
They are indeed both loaded before __tmainCRTStartup, which suggests to me that they're injected by a system DLL of some sort. Note that these are not regular AppInit_DLLs. Here's their load sequence:
'firefox.exe': Loaded 'C:\Program Files\Mozilla Firefox\firefox.exe', Symbols loaded.
'firefox.exe': Loaded 'C:\WINDOWS\system32\ntdll.dll', Symbols loaded (source information stripped).
'firefox.exe': Loaded 'C:\WINDOWS\system32\kernel32.dll', Symbols loaded (source information stripped).
'firefox.exe': Loaded 'C:\WINDOWS\system32\user32.dll', Symbols loaded (source information stripped).
'firefox.exe': Loaded 'C:\WINDOWS\system32\gdi32.dll', Symbols loaded (source information stripped).
'firefox.exe': Loaded 'C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4027_x-ww_e69378d0\msvcr80.dll', Symbols loaded (source information stripped).
'firefox.exe': Loaded 'C:\WINDOWS\system32\msvcrt.dll', Symbols loaded (source information stripped).
'firefox.exe': Loaded 'C:\WINDOWS\system32\imm32.dll', Symbols loaded (source information stripped).
'firefox.exe': Loaded 'C:\WINDOWS\system32\advapi32.dll', Symbols loaded (source information stripped).
'firefox.exe': Loaded 'C:\WINDOWS\system32\rpcrt4.dll', Symbols loaded (source information stripped).
'firefox.exe': Loaded 'C:\WINDOWS\system32\secur32.dll', Symbols loaded (source information stripped).
'firefox.exe': Loaded 'C:\Program Files\rnamfler\radprlib.dll', Binary was not built with debug information.
'firefox.exe': Loaded 'C:\WINDOWS\system32\oleaut32.dll', Symbols loaded (source information stripped).
'firefox.exe': Loaded 'C:\WINDOWS\system32\ole32.dll', Symbols loaded (source information stripped).
'firefox.exe': Loaded 'C:\Program Files\rnamfler\radhslib.dll', Binary was not built with debug information.
'firefox.exe': Loaded 'C:\WINDOWS\system32\wtsapi32.dll', Symbols loaded (source information stripped).
'firefox.exe': Loaded 'C:\WINDOWS\system32\winsta.dll', Symbols loaded (source information stripped).
'firefox.exe': Loaded 'C:\WINDOWS\system32\netapi32.dll', Symbols loaded (source information stripped).
Comment 10•13 years ago
|
||
Dependency Walker also fails to detect what code is loading this DLL. I broke on LdrLoadDll in VC++, and it seems like it is the kernel which calls LdrLoadDll as the callback of some APC operations (given the fact that KiUserApcDispatcher seems to be the first frame on the stack when radprlib.dll gets loaded.)
This is scary, I don't know what they're doing.
But here's why we crash. One of these two DLLs is hooking LoadLibraryExW. We end up calling it with this call stack:
> kernel32.dll!_LoadLibraryExW@12()
version.dll!_GetFileVersionInfoSizeW@8() + 0x31 bytes
xul.dll!CrashReporter::SetExceptionHandler(nsILocalFile * aXREDirectory=0x0211b100, bool force=false) Line 733 C++
xul.dll!XRE_main(int argc=0x00000001, char * * argv=0x003940d0, const nsXREAppData * aAppData=0x004034d0) Line 2768 + 0x1d bytes C++
firefox.exe!wmain(int argc=0x00404030, wchar_t * * argv=0x00404038) Line 107 + 0x599 bytes C++
firefox.exe!pre_cpp_init() Line 338 + 0x27 bytes C
firefox.exe!__tmainCRTStartup() Line 594 + 0x17 bytes C
kernel32.dll!_BaseProcessStart@4() + 0x23 bytes
The first 5 bytes of this function are:
7C801AF5 FF 25 1E 00 08 5F jmp dword ptr ds:[5F08001Eh]
Which denotes a trampoline (similar to the one we generate for LdrLoadDll.) The target of the jmp does not fall into a module, so it's either JIT code or the uncompressed code for one of these DLLs (both of these DLLs are compressed.) Here's the code at the target:
5F070F5A push edi
5F070F5B push edx
5F070F5C push ecx
5F070F5D push eax
5F070F5E mov edi,5F07000Ah
5F070F63 mov edx,dword ptr [esp+10h]
5F070F67 mov ecx,118h
5F070F6C xor eax,eax
5F070F6E lock cmpxchg dword ptr [edi+1],edx
5F070F73 je 5F070F7E
5F070F75 add edi,0Eh
5F070F78 xor eax,eax
5F070F7A loop 5F070F6E
5F070F7C jmp 5F070F82
5F070F7E mov dword ptr [esp+10h],edi
5F070F82 pop eax
5F070F83 pop ecx
5F070F84 pop edx
5F070F85 pop edi
5F070F86 jmp 003E001C
The target of the jmp there is in radprlib.dll:
003E001C push ebp
Which crashes. It seems like the page does not have the execute bit set.
Given all this, I don't know if we can do anything to block this DLL. The only thing which I can think of is to verify that none of LoadLibrary(Ex)(A/W) functions are hooked, but I don't know if we want to go to such great lengths. Benjamin, what do you think?
Comment 11•13 years ago
|
||
(In reply to Alex Keybl [:akeybl] from comment #3)
> Can we get some exploratory QA around this to ensure there haven't been any
> recent regressions in the blocklist?
Since Ehsan's investigation suggests that we may not be able to do anything about this for FF12 (and the blocklist issue doesn't appear to be a recent regression), Let's get some QA testing to find out what change in FF12 caused this crash to jump up significantly. Once we know that, we can decide whether to back that change out or just take the hit.
Comment 12•13 years ago
|
||
FWIW, the crash that I reproduced locally is different with comment 0. I have not been able to reproduce the other crash, but my analysis leading to the conclusion that we can't do much to blacklist this remains unchanged.
Comment 13•13 years ago
|
||
It seems to happen more often after 12.0a1/20120112.
Component: Extension Compatibility → Networking
OS: Windows NT → Windows XP
Product: Firefox → Core
QA Contact: extension.compatibility → networking
Summary: crash radhslib.dll → crash in radhslib.dll from Naomi Internet Filter
Reporter | ||
Comment 14•13 years ago
|
||
Adding Anthony to help with the request in Comment 11.
Comment 15•13 years ago
|
||
Sheila asked me to help in terms of when this regressed in crash numbers.
So far, I see that 11 beta had 15-30 crashes of the top signature of this library (radhslib.dll@0x3b6f) while 12 beta has 100-180. Now the numbers for 11 release are even way below what 12 beta is showing, so there seems to be some regression between 11 and 12 at least.
Data from 12 Nightly is too low to make accurate conclusions (not even one crash every day for the most part of the cycle), but it look like there could possibly have been an increase on 2012-01-28 (from 1 every few days to a couple a day). Still, it's hard to pinpoint this more than saying the frequency seems to have regressed between 11 and 12.
Still, crashing in that DLL is nothing really new, this has been around in multiple versions before 12, only the frequency became worse in 12 somehow.
Comment 16•13 years ago
|
||
Yeah, I don't think we want to start trying to beat the arms race of trying to prevent other DLLs from hooking functions, as evil as this all is. Is it possible that we are using DEP settings which are interfering with libraries which try to uncompress themself?
Comment 17•13 years ago
|
||
So I wasn't able to crash but I did hit a horrible user experience...
1) Install and start Firefox 12.0b2
2) Download and install Naomi Internet Filter 3.2.90 from Softpedia
3) Started Naomi and set up a password
4) Restart Firefox
5) Went to news.google.ca and opened an article with "Prostitution" in the title
> Firefox hung
6) Force quit Firefox and try restarting it
> Firefox wouldn't start...no errors or UI or anything (it just does nothing)
7) Restart Windows and start Firefox
> Firefox wouldn't start...no errors or UI or anything (it just does nothing)
8) Uninstall Firefox and remove profiles
9) Reinstall Firefox and start Firefox
> Firefox wouldn't start...no errors or UI or anything (it just does nothing)
10) Disable Naomi and try to start Firefox
> Firefox wouldn't start...no errors or UI or anything (it just does nothing)
11) Uninstall Naomi
> Firefox now starts
Again, I never experienced a crash so I'm not sure this is helpful to the bug. It's definitely a horrible user experience.
Comment 18•13 years ago
|
||
(In reply to Benjamin Smedberg [:bsmedberg] from comment #16)
> Yeah, I don't think we want to start trying to beat the arms race of trying
> to prevent other DLLs from hooking functions, as evil as this all is. Is it
> possible that we are using DEP settings which are interfering with libraries
> which try to uncompress themself?
Yes, that is entirely possible, but I don't know what we can do to fix this? Really if such code doesn't use VirtualProtect to modify the protection bits of the uncompressed code to make them executable, that's their bug, not ours...
But still the fact remains that users would end up hitting a UX like comment 17 or like what I experienced (Firefox wouldn't start at all without any explanations.)
Comment 19•13 years ago
|
||
Also, note that once this turns into a startup crash, we don't have visibility info the crash data at all since the crash happens *before* breakpad is registered, so the crash reporter never gets a chance to start itself up... :(
Comment 20•13 years ago
|
||
So people pointed me to <> which suggests that Chromium blacklists these DLLs. I looked a bit into what Chromium does, and here's a summary.
Chromium does DLL blacklisting only for its "target processes" (the sandbox processes, for example renderers). What it does is that it creates the process paused, and intercepts NtMapViewOfSection and NtUnmapViewOfSection (the code lives in sandbox/src/target_interceptions.cc). In the interceptors, it checks whether the thing being mapped is a PE image, in which case it matches it against the blacklist info that it has, and fails the Map call if it does.
Firstly, this is a possibly better blacklisting method than what we have (intercepting NtLoadDll) and I think I may want to do that. However, I don't see how Chromium would manage to do this soon enough that it would catch these DLLs. Perhaps processes which are created in the paused state do not run *any* code so no modules will be loaded at all by that time (but how would you intercept stuff in ntdll.dll if that is the case?) I don't have a Windows machine now so I can't verify. Brian, do you know the answer?
If creating a paused process gives us a chance to intercept ntdll before these DLLs are loaded, we can create a simple stub which does that for firefox.exe. That would be a lot better than the blacklisting mechanism that we have today, but I don't know if that would be safe enough to take on branches, etc.
Benjamin, what do you think?
Comment 21•13 years ago
|
||
(In reply to Ehsan Akhgari [:ehsan] from comment #20)
> So people pointed me to <> which suggests that Chromium blacklists these
> DLLs. I looked a bit into what Chromium does, and here's a summary.
The link is http://code.google.com/p/chromium/issues/detail?id=12517.
Comment 22•13 years ago
|
||
> Brian, do you know the answer?
Sorry, I do not.
Reporter | ||
Comment 23•13 years ago
|
||
While testing this I see just about the same thing as Anthony does in Comment 17, except after restarting Firefox I never get the browser to launch.
Comment 24•13 years ago
|
||
Marcia, out of curiosity, could you please test Chrome on that VM as well? If it can run and render pages successfully, could you look and see which one of its processes has these DLLs loaded, if any? Thanks!
Reporter | ||
Comment 25•13 years ago
|
||
Sure, will do.
(In reply to Ehsan Akhgari [:ehsan] from comment #24)
> Marcia, out of curiosity, could you please test Chrome on that VM as well?
> If it can run and render pages successfully, could you look and see which
> one of its processes has these DLLs loaded, if any? Thanks!
Reporter | ||
Comment 26•13 years ago
|
||
I just did some additional testing and my experience has been that as soon as I install Naomi Internet filter, I cannot launch any browser - IE, Chrome, Firefox, etc on this Windows XP VM.
As Anthony notes once I uninstall it everything seems to launch fine.
Comment 27•13 years ago
|
||
(In reply to Marcia Knous [:marcia] from comment #26)
> I just did some additional testing and my experience has been that as soon
> as I install Naomi Internet filter, I cannot launch any browser - IE,
> Chrome, Firefox, etc on this Windows XP VM.
>
> As Anthony notes once I uninstall it everything seems to launch fine.
I find it weird that we're having so much different of an experience than our users - they have to be able to use Firefox 10, WinXP SP 2/3, and Naomi Internet Filter at the same time in order to still show up in our crash data. Sadly I can't find any versions of the software besides 3.2.90.
status-firefox12:
--- → wontfix
Comment 28•13 years ago
|
||
I'm going to track for FF13 and FF14 in case we feel we can make some lower risk changes to our blocklisting techniques in that timeframe.
tracking-firefox13:
--- → +
tracking-firefox14:
--- → +
Comment 29•13 years ago
|
||
Perhaps I wontfix'd this prematurely. We're also seeing FF12 crashes in bug 738661 related to the Covenant internet filtering service. Including some networking folks to see if we made any fundamental changes in FF12 that would cause internet filtering to break.
status-firefox12:
wontfix → ---
Reporter | ||
Comment 30•13 years ago
|
||
Do we know why this shows up in Socorro as a plugin crash (plugin icon is next to crash)?
Comment 31•13 years ago
|
||
(In reply to Marcia Knous [:marcia] from comment #30)
> Do we know why this shows up in Socorro as a plugin crash (plugin icon is
> next to crash)?
When there is at least one plugin crash, it displays the plugin icon. In 12.0b2, there's one crash report classified as a plugin crash: bp-57025fd8-d430-4769-b915-03eaa2120323.
Comment 32•13 years ago
|
||
(In reply to Alex Keybl [:akeybl] from comment #29)
> Perhaps I wontfix'd this prematurely. We're also seeing FF12 crashes in bug
> 738661 related to the Covenant internet filtering service. Including some
> networking folks to see if we made any fundamental changes in FF12 that
> would cause internet filtering to break.
As far as my investigations here show, this has nothing to do with networking.
Comment 33•13 years ago
|
||
Removing qawanted for now RE comment 28. Please re-add if there is something specific QA can do to move this bug forward.
Keywords: qawanted
Comment 34•13 years ago
|
||
(In reply to Ehsan Akhgari [:ehsan] from comment #32)
> As far as my investigations here show, this has nothing to do with
> networking.
You haven't been able to reproduce the top crash signature though, correct? I find it very fishy that two internet filtering applications have major crash spikes in FF12.
Comment 35•13 years ago
|
||
That's right, I have not reproduced the topcrash signature yet.
Comment 36•13 years ago
|
||
Ok, so sounds like we can't reproduce it but the trend so far is that it will be top crash throughout beta and potentially release. Any others ideas out there how we might be able to track this down?
Comment 37•13 years ago
|
||
(In reply to Sheila Mooney from comment #36)
> Ok, so sounds like we can't reproduce it but the trend so far is that it
> will be top crash throughout beta and potentially release. Any others ideas
> out there how we might be able to track this down?
I'm waiting to hear from Benjamin about comment 20.
Comment 38•13 years ago
|
||
The process is created in a suspended state at http://code.google.com/searchframe#OAMlx_jo-ck/src/sandbox/src/target_process.cc&l=152 using the CREATE_SUSPENDED flag to CreateProcess. The actual hooking is done here: http://code.google.com/searchframe#OAMlx_jo-ck/src/sandbox/src/target_interceptions.cc&l=18
I don't know about DllMain procedures, but I presume that they are not run.
I'm a bit skeptical that changing our startup sequence to use a stub would be a net win: it will undoubtedly have some startup time cost, and it may have other side effects. I believe that some parts of the chromium sandbox require Windows XP SP3, and that may affect our compatibility.
Comment 39•13 years ago
|
||
(In reply to Benjamin Smedberg [:bsmedberg] from comment #38)
> The process is created in a suspended state at
> http://code.google.com/searchframe#OAMlx_jo-ck/src/sandbox/src/
> target_process.cc&l=152 using the CREATE_SUSPENDED flag to CreateProcess.
> The actual hooking is done here:
> http://code.google.com/searchframe#OAMlx_jo-ck/src/sandbox/src/
> target_interceptions.cc&l=18
Right.
> I don't know about DllMain procedures, but I presume that they are not run.
Why do you think that DllMain would not get run?
> I'm a bit skeptical that changing our startup sequence to use a stub would
> be a net win: it will undoubtedly have some startup time cost, and it may
> have other side effects. I believe that some parts of the chromium sandbox
> require Windows XP SP3, and that may affect our compatibility.
About the platform compatibility, the stub would not do any sand-boxing itself, so that may not be a concern. But there's definitely the risk of regressions, and also a startup cost.
But in general, there's no good solution to this problem, any path that we decide to take (including not taking any actions) will suck in one way or the other. :(
Comment 40•13 years ago
|
||
See bug 733892 comment 48 for an idea to change the way the DLL blocklisting is done.
Comment 41•13 years ago
|
||
I believe that the code which loads dependent libraries runs in user mode in the newly created process. So by pausing the process before any user code runs, it hasn't had the opportunity to run anything including the dependent library loading code.
Comment 42•13 years ago
|
||
(In reply to Benjamin Smedberg [:bsmedberg] from comment #41)
> I believe that the code which loads dependent libraries runs in user mode in
> the newly created process. So by pausing the process before any user code
> runs, it hasn't had the opportunity to run anything including the dependent
> library loading code.
One gotcha is that the stub executable cannot protect itself against DLL injection as effectively, so we should be extremely careful about what the stub executable does. For example it should link to as few system DLLs as possible (e.g., not user32.dll) and it should run the minimum amount of code necessary to do its task (we'd probably need to avoid linking against libc etc).
Comment 43•13 years ago
|
||
It doesn't sound like we're going to do anything about this bug for FF12 unless the investigation in bug 738661 ends up resolving this crash as well. We've tried to blocklist radhslib.dll in the past for unrelated reasons, and we're unable to reproduce the crash users are running into here.
We will, however, continue to track for FF13 and FF14 so that we can continue discussion of how to handle DLL blocklisting for injected libraries.
status-firefox12:
--- → wontfix
Comment 44•13 years ago
|
||
What's the next step for hardening our ability to blocklist DLLs in the future? Is this the right bug to track that work?
tracking-firefox13:
+ → ---
Comment 45•13 years ago
|
||
(In reply to Alex Keybl [:akeybl] from comment #44)
> What's the next step for hardening our ability to blocklist DLLs in the
> future? Is this the right bug to track that work?
I think it's bug 750601.
Comment 46•13 years ago
|
||
(In reply to Alex Keybl [:akeybl] from comment #44)
> What's the next step for hardening our ability to blocklist DLLs in the
> future? Is this the right bug to track that work?
Perhaps starting up Firefox paused and do what Chrome does for its renderer processes (see comment 20)? That can potentially hurt startup though, so I'm not entirely convinced if we wanna go there.
Comment 47•12 years ago
|
||
It's #38 top browser crasher in 13.0.1, but #16 in 14.0b11.
What's up with the plan to harden the DLL blocklist?
Comment 48•12 years ago
|
||
There is currently no credible plan to harden the DLL blocklist.
Comment 50•12 years ago
|
||
Oh, marking as topcrash because it's #17 on 18.0b4 desktop.
Comment 51•12 years ago
|
||
Not a topcrash any more now, #53 on 17.0.1, #42 on 18.0b7, even lower in early 18.0 release data.
Keywords: topcrash
Updated•9 years ago
|
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → WONTFIX
You need to log in
before you can comment on or make changes to this bug.
Description
•