-
Notifications
You must be signed in to change notification settings - Fork 6.1k
Document hangdump known issues on macos #50346
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
docs/core/testing/microsoft-testing-platform-extensions-diagnostics.md
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull request overview
This PR documents known issues with generating hang dumps on macOS in the Microsoft Testing Platform Extensions documentation. The content addresses authentication popup issues that prevent dump generation in CI environments and provides two workarounds.
Key Changes
- Added a "Considerations for macOS" section explaining dump generation authentication issues
- Provided two workaround options: disabling UseAppHost or applying code signing with entitlements
- Included complete MSBuild target and plist configuration examples
docs/core/testing/microsoft-testing-platform-extensions-diagnostics.md
Outdated
Show resolved
Hide resolved
docs/core/testing/microsoft-testing-platform-extensions-diagnostics.md
Outdated
Show resolved
Hide resolved
docs/core/testing/microsoft-testing-platform-extensions-diagnostics.md
Outdated
Show resolved
Hide resolved
docs/core/testing/microsoft-testing-platform-extensions-diagnostics.md
Outdated
Show resolved
Hide resolved
docs/core/testing/microsoft-testing-platform-extensions-diagnostics.md
Outdated
Show resolved
Hide resolved
| <key>com.apple.security.cs.allow-jit</key> | ||
| <true/> | ||
| <key>com.apple.security.cs.allow-dyld-environment-variables</key> | ||
| <true/> | ||
| <key>com.apple.security.cs.disable-library-validation</key> | ||
| <true/> | ||
| <key>com.apple.security.cs.debugger</key> | ||
| <true/> | ||
| <key>com.apple.security.get-task-allow</key> | ||
| <true/> | ||
| </dict> |
Copilot
AI
Dec 4, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The suggested entitlements in mtp-test-entitlements.plist (com.apple.security.get-task-allow, com.apple.security.cs.debugger, com.apple.security.cs.disable-library-validation, com.apple.security.cs.allow-dyld-environment-variables, com.apple.security.cs.allow-jit) significantly weaken macOS code signing protections; if applied broadly (as later suggested via Directory.Build.targets), this can enable debugging and task access on production binaries, facilitating code injection and tampering. An attacker or unprivileged process could leverage these entitlements to attach, modify, or bypass library validation in production environments. Limit this workaround strictly to test/debug builds (e.g., add Condition="'$(Configuration)' == 'Debug' AND '$(IsTestingPlatformApplication)'=='true'"), avoid com.apple.security.get-task-allow and com.apple.security.cs.debugger for any release builds, and ensure it is not placed in Directory.Build.targets for projects that produce deployable artifacts.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@blowdart Please take a look. The condition IsTestingPlatformApplication should limit the workaround only to test applications. Is there any security considerations to document more clearly here?
Co-authored-by: Copilot <[email protected]>
docs/core/testing/microsoft-testing-platform-extensions-diagnostics.md
Outdated
Show resolved
Hide resolved
…stics.md Co-authored-by: Genevieve Warren <[email protected]>
Internal previews