On Thu, May 26, 2016, at 02:41 PM, Benoit Girard wrote:
> - Crash address can give you a hint as to what's going on: 0x0 -> null
> crash, 0x8 -> null offset accessing a member like this->mFoo,

N.B.: due to the way addressing works on x86-64, if the crash address is
"0x0" for a Linux/OS X crash report, or "0xffffffffffffffff" for a
Windows crash report, it's highly likely that the value is incorrect[1].
This is due to how these faults are reported from the CPU. (I have an
in-progress Breakpad patch[2] to detect this and attempt to find the
actual faulting address, but it needs some more work to land upstream.
The commit message also describes the root cause more thoroughly, if
you're interested.)

You can sanity check these crashes by clicking the "Raw Dump" tab. The
top frame of the crashing stack in that JSON data will contain the
registers from the crash context. If you see a suspicious value in one
of them (like a poison pattern) more thorough analysis may be warranted.

-Ted

1. https://bugzilla.mozilla.org/show_bug.cgi?id=974420
2.
https://github.com/luser/breakpad/commit/c8c0bbcdba178b74db171c21d2c6f4a59efd0131
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to