Closed Bug 995782 Opened 11 years ago Closed 10 years ago

Large OOM in nsUrlClassifierPrefixSet::GetPrefixes

Categories

(Toolkit :: Safe Browsing, defect)

x86
Windows NT
defect
Not set
critical

Tracking

()

RESOLVED DUPLICATE of bug 1014362

People

(Reporter: alex_mayorga, Unassigned)

Details

(Keywords: crash)

Crash Data

This bug was filed from the Socorro interface and is report bp-dd63aeed-0ffd-4626-bfa8-79e302140404. ============================================================= FWIW my SO got this crash on Firefox 28.0
Crashed again today. bp-f4a6ffd3-1654-42e7-98d6-065fe2140420 20/04/2014 01:54 p.m.
Happened to me today with FF 30b5 bp-e5991689-b832-4628-8772-65b162140521
Crash Signature: [@ mozalloc_abort(char const* const) | mozalloc_handle_oom(unsigned int) | moz_xmalloc | nsUrlClassifierPrefixSet::GetPrefixes(unsigned int*, unsigned int**)] → [@ mozalloc_abort(char const* const) | mozalloc_handle_oom(unsigned int) | moz_xmalloc | nsUrlClassifierPrefixSet::GetPrefixes(unsigned int*, unsigned int**)] [@ OOM | large | mozalloc_abort(char const* const) | mozalloc_handle_oom(unsigned int) | moz_xm…
Summary: crash in mozalloc_abort(char const* const) | mozalloc_handle_oom(unsigned int) | moz_xmalloc | nsUrlClassifierPrefixSet::GetPrefixes(unsigned int*, unsigned int**) → Large OOM in nsUrlClassifierPrefixSet::GetPrefixes
Crash Signature: , unsigned int**)] [@ OOM | large | mozalloc_abort(char const*) | mozalloc_handle_oom(unsigned int) | moz_xmalloc | nsUrlClassifierPrefixSet::GetPrefixes(unsigned int*, unsigned int**)] → , unsigned int**)] [@ OOM | large | mozalloc_abort(char const*) | mozalloc_handle_oom(unsigned int) | moz_xmalloc | nsUrlClassifierPrefixSet::GetPrefixes(unsigned int*, unsigned int**)] [@ OOM | large | mozalloc_abort(char const* const) | mozalloc_handl…
Component: Untriaged → Phishing Protection
Product: Firefox → Toolkit
The peak memory usage of this code was already reduced in another bug, but if VM is so tight that Firefox can't allocate 2M of RAM, You're Going To Have A Bad Time Anyway. (Most likely some other part of the code, or an add-on or plugin is leaking)
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → DUPLICATE
> if VM is so tight that Firefox can't allocate 2M of RAM, You're Going To > Have A Bad Time Anyway. We are usually pretty good at surviving with no 2M blocks available (referring to contiguous regions, not total free VM). With our allocation patterns, after long uptime we can be in a situation where there are only 1MB blocks available (but lots of them). So it's still good to fix the crashes that occur at >1MB sizes. KaiRo are you still seeing these after the fix from bug 1014362? If so then it might be worth looking at this some more. It seems that fallible allocations are not appropriate in this code, but maybe there are other options. Some kind of segmented array or something?
Flags: needinfo?(kairo)
(In reply to David Major [:dmajor] from comment #5) > KaiRo are you still seeing these after the fix from bug 1014362? If so then > it might be worth looking at this some more. This only landed in 32 and we barely have any data for OOM|large on Aurora and Nightly, so I can't tell. If it is still visible in significant ranges when 32 hits beta, we'll notice and reopen this, but for now I can't give much info.
Flags: needinfo?(kairo)
You need to log in before you can comment on or make changes to this bug.