Bug ID
int64 961
1.91M
| Comment ID
int64 3.98k
17.1M
| Author
stringlengths 8
48
| Comment Text
stringlengths 1
64.3k
⌀ |
---|---|---|---|
195,654 | 1,765,369 |
The application will not startup (i.e., show the first window) starting with
2003-03-01 trunk builds of mozilla and netscape on Mac OS X. This appears to be
a smoketest blocker. Assigning to Jan for some quick traction on this issue.
|
|
202,555 | 1,821,283 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.4b) Gecko/20030418
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.4b) Gecko/20030418
When I try to load a message on an IMAP server, I get a dialog box stating
access to the port has been disabled for security reasons, followed by an IMAP
connection error dialog.
I tried overriding the protection by adding port 143 to
network.security.ports.banned.override, and then I got "This request was not
recognized. Perform a trace." in the message area, possibly from my proxy, which
would be even more bizarre.
Reproducible: Always
Steps to Reproduce:
1. Click on an IMAP account's inbox
2. Click on a message
Actual Results:
See above
Expected Results:
Display the message body :)
|
|
202,895 | 1,824,511 |
build ID: 2003042112 on Win2k.
Steps to reproduce (100% on this computer):
1. Load URL http://www1.msfc.nasa.gov/NEWSROOM/news/photos/1998/photos98-050.htm
2. Having middle-click to open new tabs in background, quickly click on 4 or 5
'Large' JPG links, an example is
http://www1.msfc.nasa.gov/NEWSROOM/news/photos/images/arizona1.jpg
3. While you see the images loading (via tab title), start to close tabs
clicking on the 'X', beginning with the tab on the right
4. Close tabs quickly one after another,
5. Mozilla crashes.
Talkback ID: TB19392027Z.
|
|
203,057 | 1,825,910 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.4b) Gecko/20030423
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.4b) Gecko/20030423
I am a new mozilla user.
When connecting to any secure (https) web site via a proxy server I get prompted
for my proxy account and then nothing further happens, the displayed page does
not change and the status is reported as done. I have seen this work fine when
connected directly to the internet.
Reproducible: Always
Steps to Reproduce:
1.start mozilla
2.Enter https://sourceforge.net
3.
Actual Results:
As described in details - prompt for proxy then nothing
Expected Results:
Display the secure web site
|
|
206,199 | 1,853,719 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.4b) Gecko/20030507
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.4b) Gecko/20030507
In 1.4b (not 1.4a or earlier) the mail client regularly crashes on startup.
This seems unrelated to whether I've already opened a browser window, or to
whether I've established a dialup connection (mail servers are all accessed over
dialup).
Incidents:
TB20213764H
TB20209157Q
TB20209092M
TB20206049X
TB20201907G
TB20193362Z
Reproducible: Always
Steps to Reproduce:
Doesn't happen all the time - maybe 50% ?
Just bring up the mail client and it happens.
Actual Results:
crash
Expected Results:
not crash
I don't think this is related to bug #142615, which is the only mail crash on
startup bug I can find in bugzilla. This problem is new in test release 1.4b -
1.3, 1.4a were both fine.
|
|
206,695 | 1,857,861 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4b) Gecko/20030507
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4b) Gecko/20030507
See for example bug #138499. Exactly the same thing.
For pages served as application/xhtml+xml the form data is not restored when you
go back, but you get the initial values.
Reproducible: Always
Steps to Reproduce:
Just load my form.xhtml and form.html. This already shows the behaviour.
Actual Results:
If you remove the data in the text area, press Save and go back, your data is
there again.
Expected Results:
Behave like the text/html mode. That one works fine.
|
|
206,947 | 1,860,246 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4b) Gecko/20030521
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4b) Gecko/20030521
XMLHttpRequest crashes the browser on approx 500th call, this number is
cumulative, i.e. if call made 300 times then the window closed and the page is
opened in another the browser will crash after ~200 calls.
The same effect in Mozilla on Linux and Windows. On Windows it also says there's
a problem in XPCOM library.
Reproducible: Always
Steps to Reproduce:
1.open the page test.html
2.wait until counter gets to ~500
Actual Results:
browser crashes
Expected Results:
browser should keep working
this bug does not depend on setTimeout() - with for(;;) loop it gives the same
crash, and this bug does not depend on setting innerHTML of the element.
<html><head>
</head><body onload="changeSize();">
<script>
var count = 0;
var xml = null;
if(document.all)
xml = new ActiveXObject('Microsoft.XMLHTTP');
else
xml = new XMLHttpRequest();
function changeSize(){
xml.open("GET", "about:blank", false);
xml.send(null);
document.getElementById("count").innerHTML = eval(++count);
setTimeout("changeSize()", 50);
}
</script>
<br>
Count: <span id="count">0</span>
</body>
</html>
|
|
212,336 | 1,905,740 |
User-Agent: Mozilla/5.0 (Windows; U; Win95; en-US; rv:1.4) Gecko/20030624
Build Identifier: Mozilla/5.0 (Windows; U; Win95; en-US; rv:1.4) Gecko/20030624
I type in the address of a server on the intranet that is running Windows NT4,
accessing a Virtual Directory that has Anonymous Authentication turned off,
leaving only Integrated Windows Authentication. According to the release notes,
Mozilla 1.4 supports NTLM Authentication. However, when I attempt to access the
page, it returns the 401.2 error, "Unauthorized: Logon Failed due to server
configuration" However, using Live HTTP Headers, I see that the WWW-Authenticate
header field does have NTLM... Also, I can access the same URL using IE and it
authenticates.
Reproducible: Always
Steps to Reproduce:
1. Type in a URL that goes to a folder or page that requires NTLM authentication.
2. Do this from a workstation that has an authorized person logged in.
Actual Results:
A page loads with the following text:
HTTP Error 401
401.2 Unauthorized: Logon Failed due to server configuration
This error indicates that the credentials passed to the server do not match the
credentials required to log on to the server. This is usually caused by not
sending the proper WWW-Authenticate header field.
Please contact the Web server's administrator to verify that you have permission
to access to requested resource.
Expected Results:
Performed the appropriate authentication and displayed the web page.
Here's what Live HTTP Headers reports (names have been changed):
----------------------------------------------------------
http://intranet.example.com/VirtualDirectory/
GET http://intranet.example.com/VirtualDirectory/ HTTP/1.1
Host: intranet.example.com
User-Agent: Mozilla/5.0 (Windows; U; Win95; en-US; rv:1.4) Gecko/20030624
Accept:
text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,video/x-mng,image/png,image/jpeg,image/gif;q=0.2,*/*;q=0.1
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Proxy-Connection: keep-alive
Referer: http://intranet.example.com/
Cookie: ASPSESSIONIDQQGQGHWL=EPBPOKPBLBPCNHNPBFDHAICK
HTTP/1.x 401 Unauthorized
WWW-Authenticate: NTLM
Content-Length: 644
Content-Type: text/html
X-Cache: MISS from cache.example.com
----------------------------------------------------------
|
|
213,482 | 1,914,605 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.5a) Gecko/20030714 Mozilla Firebird/0.6
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.5a) Gecko/20030714 Mozilla Firebird/0.6
I had an input element on a page whose value property I was watching. However,
I was new to using the watch method and was setting the value property from
within the function called by the watch method. This (now) obviously leads to
an infinite loop which caused Firebird to crash.
Reproducible: Always
Steps to Reproduce:
1. Set the value property of an input element from the function called by the
watch method that is watching that property.
Actual Results:
Firebird crashed.
Expected Results:
Firebird should not crash.
Here is a minimal case:
<input id="test">
<script type="text/html">
test = document.getElementById('test');
function watched (a, b, c) {
test.value = 'a';
}
test.watch("value", watched);
</script>
|
|
207,673 | 1,865,922 |
User-Agent: Mozilla/5.0 (X11; U; FreeBSD i386; en-US; rv:1.3a) Gecko/20030524 Phoenix/0.5
Build Identifier: Mozilla/5.0 (X11; U; FreeBSD sparc64; en-US; rv:1.4b) Gecko/20030526
In js/src/jsfun.c:fun_xdrObject(), JS_XDRUint32 is used on &userid (twice);
userid is of type jsid, which is indirectly typedef'ed to long, while
JS_XDRUint32 takes a pointer to an uint32 to read the data from or write the
result into. This causes problems on architectures where sizeof(long) >
sizeof(unit32) (i.e. 64-bit platforms): when the architecture is big-endian
also, this will store/retrieve the most significant 4 bytes of userid, which is
not what is desired (since the desired value is kept in the least significant
4 bytes).
I have verified that this problem still is present in the latest sources.
The bug triggers a SIGSEGV on startup when reading the XUL.mfasl FastLoad file,
by causing invalid JavaScript state.
I have attached a patch which fixes this problem for me; it changes the type of
userid to uint32, thereby avoiding the problem. Since the XDR representation
restricts the range to that of an uint32 anyway, this should not cause any
problems.
In case the patch gets mangled, it is also available at
http://people.freebsd.org/~tmm/patch-jsfun.c
Reproducible: Always
Steps to Reproduce:
Working on a big-endian 64-bit platform (with sizeof(long) == 8), Unixoid system:
1. Remove ~/.mozilla
2. start mozilla
3. quit it again immediately; XUL.mfasl will be generated in the preference
directory
4. start mozilla again
Actual Results:
The browser will get a SIGSEGV and crash silently, because of incorrect JavaScript
state caused by the above bug.
Expected Results:
Start up normally.
|
|
207,740 | 1,866,423 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.4) Gecko/20030529
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.4) Gecko/20030529
Mozilla 1.4 RC 1 crashes on accessing certain HTTPS sites (either entering them
in the URL bar or clicking on a link.)
At the moment I have only been able to reproduce this bug with my local web
server. I haven't found public internet servers that trigger the same behaviour.
But by accessing my local server I can reproduce the crash every time.
Reproducible: Always
Steps to Reproduce:
1. Enter an url in the location bar e.g. "https://www" and press enter
Actual Results:
Browser crashes.
Expected Results:
Browser opens this page using SSL.
Talkback Incident IDs: TB20604478W, TB20604426Q, TB20604314K and TB20604306Z.
My local web server is running Apache 1.3.27 and mod_ssl 2.8.12-1.3.27. The page
requested is very simple: <HTML><BODY>-</BODY></HTML>.
|
|
207,781 | 1,866,626 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.4b) Gecko/20030526 Mozilla Firebird/0.6
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.4b) Gecko/20030526 Mozilla Firebird/0.6
Whenever I click a link (with the left one or the middle one), don't move the
cursor, and then scroll with mouse wheel there is a systematic crash (memory
can't be read...)
Posted on YaBBSE but the answer was:
"This is not a YaBB SE bug. It may be a bug in the template.
I think it's in Firebird."
Reproducible: Always
Steps to Reproduce:
1.Move cursor on a link within the board
2.Click on it, and let the cursor on it
3.Scroll with your mouse wheel
Actual Results:
Memory can't be read - Mozilla crash
Application Violation in gklayout.dll
|
|
208,095 | 1,869,270 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4) Gecko/20030529
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4) Gecko/20030529
Crashes Mozilla when I input space follows English text with kinput.
Reproducible: Always
Steps to Reproduce:
1.Open composer or webpage with text form.
2.Input something in English. (eg. "a")
3.Press "Shift + space" to start kinput Japanese input mode.
4.Press "Space" to input space
Actual Results:
Crash and start "Quality feedback agent".
This problem was not cause in Windows or input Japanese with "jmode" instead
kinput (on Linux).
|
|
209,032 | 1,877,441 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.4) Gecko/20030529
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.4) Gecko/20030529
crash if i try to do the steps necessary to reproduce the bug.
Reproducible: Always
Steps to Reproduce:
1. set mozilla to open search results in the sidebar
2. bookmark a (google) search result
3. open the bookmarks tab in the sidebar, click on the bookmarked search result and at the same moment right click on the (same) bookmark link
Actual Results:
mozilla crashed (while trying to switch to the search tab in the sidebar)
Expected Results:
switch to the search tab and close the opened right-click-window.
Talkback crash ID: TB20936385H and TB20931617K
|
|
218,031 | 1,948,163 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.5b) Gecko/20030827
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.5b) Gecko/20030827
This looks like it's due to some interaction between Mathml and CSS. Eliminting
the link to the style sheet makes things work.
Reproducible: Always
Steps to Reproduce:
1.
2.
3.
Actual Results:
This causes a repeatable crash. Simply try to open the page and the crash should
occur
Expected Results:
This works fine in Mozilla 1.4
gklayout.dll
|
|
218,222 | 1,949,570 |
BUILD: 1.5b mozilla.org talkback zip build, on Windows 98
STEPS TO REPRODUCE:
1) Load http://uk.trendmicro-europe.com/PWT/pl/index.php
2) Hit Ctrl-Shift-I to start DOM Inspector
3) Click the binoculars at top left and search for the element with
ID "cHoveruk" (a div containing an img)
4) In the right panel, select the "CSS Style Rules" viewer
5) Click on the third rule in the top right panel (the inline style rule)
6) Right-click on the "visibility" row in the bottom right panel and
select "edit"
7) Replace the value with "visible" and hit "enter"
ACTUAL RESULTS: crash
EXPECTED RESULTS: no crash
TALKBACK IDS: TB23305815Q, TB23305574Y
A stack (based on those IDs or from a debug build) would be most helpful.
|
|
209,593 | 1,885,049 |
Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.5a) Gecko/20030615
Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.5a) Gecko/20030616
Moving several (at least two) mails per drag'n'drop from subfolder of POP3 inbox
into subfolder of Local Folders crashes Mozilla.
Talkback-ID TB21092337G:
Incident ID 21092337
Stack Signature 0x95e3fcdb 8d61909d
Email Address [email protected]
Product ID MozillaTrunk
Build ID 2003061611
Trigger Time 2003-06-16 14:25:46
Platform Win32
Operating System Windows NT 5.0 build 2195
Module
URL visited
User Comments moving several mails per drag'n'drop from subfolder of
POP2-inbox into subfolder of Local Folders
Trigger Reason Access violation
Source File Name
Trigger Line No.
Stack Trace
0x95e3fcdb
0x01e2fa85
nsDragService::InvokeDragSession
[c:/builds/seamonkey/mozilla/widget/src/windows/nsDragService.cpp, line 131]
XPTC_InvokeByIndex
[c:/builds/seamonkey/mozilla/xpcom/reflect/xptcall/src/md/win32/xptcinvoke.cpp,
line 102]
XPCWrappedNative::CallMethod
[c:/builds/seamonkey/mozilla/js/src/xpconnect/src/xpcwrappednative.cpp,
line 2019]
XPC_WN_CallMethod
[c:/builds/seamonkey/mozilla/js/src/xpconnect/src/xpcwrappednativejsops.cpp,
line 1270]
js_Invoke [c:/builds/seamonkey/mozilla/js/src/jsinterp.c, line 845]
js_Interpret [c:/builds/seamonkey/mozilla/js/src/jsinterp.c, line 2856]
js_Invoke [c:/builds/seamonkey/mozilla/js/src/jsinterp.c, line 861]
js_InternalInvoke [c:/builds/seamonkey/mozilla/js/src/jsinterp.c, line 936]
JS_CallFunctionValue [c:/builds/seamonkey/mozilla/js/src/jsapi.c, line
3533]
nsJSContext::CallEventHandler
[c:/builds/seamonkey/mozilla/dom/src/base/nsJSEnvironment.cpp, line 1114]
nsJSEventListener::HandleEvent
[c:/builds/seamonkey/mozilla/dom/src/events/nsJSEventListener.cpp, line 183]
nsEventListenerManager::HandleEventSubType
[c:/builds/seamonkey/mozilla/content/events/src/nsEventListenerManager.cpp,
line 1192]
nsEventListenerManager::HandleEvent
[c:/builds/seamonkey/mozilla/content/events/src/nsEventListenerManager.cpp,
line 2017]
nsXULElement::HandleDOMEvent
[c:/builds/seamonkey/mozilla/content/xul/content/src/nsXULElement.cpp,
line 3303]
nsEventStateManager::GenerateDragGesture
[c:/builds/seamonkey/mozilla/content/events/src/nsEventStateManager.cpp,
line 1527]
|
|
210,119 | 1,889,192 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.5a) Gecko/20030620
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.5a) Gecko/20030620
Nightly build 2003062004 browser crashes when opening this url:
http://realtytimes.com/rtnews/rtapages/20020426_realist.htm
Reproducible: Always
Steps to Reproduce:
1. Open http://realtytimes.com/rtnews/rtapages/20020426_realist.htm
2.
3.
Actual Results:
Crash
Expected Results:
Opened page.
|
|
211,462 | 1,898,927 |
seen with 7.1 rtm build on JA locale on MacOS10.1.5 (does NOT happen with other
IME neither on 10.2
steps to reproduce:
- launch 7.1 on JA locale;
- go to Composer;
- JA IME will be a default IME;
- type something into the Composer;
- no need to save;
- restart/reopen the application;
- open Composer;
//note: cursor is not blinking at the beginning of the line;
- try to input something in JA, crash
|
|
179,524 | 1,630,105 |
User-Agent: Mozilla/5.0 (Windows; U; WinNT4.0; en-US; rv:1.3a) Gecko/20021111
Build Identifier: Mozilla/5.0 (Windows; U; WinNT4.0; en-US; rv:1.3a) Gecko/20021111
Pretty simple, mozilla crashed 100% of the time when opening similar pages. It
started early in the 1.2 development cycle and has not yet been fixed. See
attached zip file for the page that causes the crash.
Reproducible: Always
Steps to Reproduce:
1. unzip attached file
2. open test.html page in Mozilla
3.
Actual Results:
Mozilla crashes
Expected Results:
Mozilla should display the page
I work for a giant corporation and our standard intranet header/footer is based
on the same theme for the file I attached. (I tried to sanitize the attachment.
I can assure you the real version is correct html; however, in either case,
Mozilla should not crash). Previous versions of Netscape and Mozilla <= 1.1
work fine.
I am submitting this as Critial, but for me personally, it is a blocker. I
simply cannot use Mozilla to access any intranet web site at my company.
I have submitted several talkback crashes mostly under other email addresses...
TB13796296Q or if you can search on my last name in the email field for
submitted talkbacks you will probably find many others.
|
|
187,306 | 1,693,621 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.2.1) Gecko/20021230
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.2.1) Gecko/20021230
After setting the memory cache size to non-zero and opening a web-page the
browser crashes immediately.
Reproducible: Always
Steps to Reproduce:
1. set memory cache to 0 (I use 'compare the page(...)' set to 'every time I
view the page', do not know if it's related)
2. exit mozilla and re-start it.
3. open a web-page, it opens up fine.
4. set memory cache to non-zero (I used 1024)
5. try to open a web-page, and the browser crashes.
Actual Results:
browser crash
Expected Results:
obviously not crash! ;)
|
|
187,673 | 1,696,926 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020823 Netscape/7.0
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020823 Netscape/7.0
Mail title is not consistent with the mail message
Reproducible: Always
Steps to Reproduce:
Steps to Repro:
1.Start mozilla Mail.
2.Quick search by inputing a word in field"Subject or Sender contains:".
3.Double click a message.
4.Click Clear at the right of the quick search field to show all the messages.
5.Double click another message(not in the previous list resulted from search).
Actual Results:
The title of the new opened message is the old one.
Expected Results:
The title of the new opened message is the current selected messgae
|
|
181,592 | 1,648,227 |
Build ID: 2002-11-21-08, Windows XP.
Summary: Crash in nsCOMArrayEnumerator::~nsCOMArrayEnumerator shutting down the
browser (only Mail and Nav were open).
Steps to Reproduce:
I haven't been able to reproduce yet, but I had WinDVD running (as well as mIRC)
in the background. Even though it didn't say 'App not responding' in the
taskmanager, it was taking a long time to close down the Mail window and when it
finally closed down mail, once I closed Nav down, I crashed. (Catch all that? ;-)
Incident ID 14282742
Stack Signature nsCOMArrayEnumerator::~nsCOMArrayEnumerator f8b23811
Product ID MozillaTrunk
Build ID 2002112108
Trigger Time 2002-11-22 22:57:14
Platform Win32
Operating System Windows NT 5.1 build 2600
Module xpcom.dll
URL visited
User Comments I was just shutting down the browser (it was in the background]
Trigger Reason Access violation
Source File Name c:/builds/seamonkey/mozilla/xpcom/ds/nsArrayEnumerator.cpp
Trigger Line No. 135
Stack Trace
nsCOMArrayEnumerator::~nsCOMArrayEnumerator
[c:/builds/seamonkey/mozilla/xpcom/ds/nsArrayEnumerator.cpp, line 135]
nsCOMArrayEnumerator::`scalar deleting destructor'
ObserverListEnumerator::Release
[c:/builds/seamonkey/mozilla/xpcom/ds/nsObserverList.cpp, line 167]
nsCOMPtr_base::~nsCOMPtr_base
[c:/builds/seamonkey/mozilla/xpcom/glue/nsCOMPtr.cpp, line 65]
nsHttpHandler::OnExamineResponse
[c:/builds/seamonkey/mozilla/netwerk/protocol/http/src/nsHttpHandler.cpp, line 635]
nsHttpChannel::ProcessResponse
[c:/builds/seamonkey/mozilla/netwerk/protocol/http/src/nsHttpChannel.cpp, line 606]
nsHttpChannel::OnStartRequest
[c:/builds/seamonkey/mozilla/netwerk/protocol/http/src/nsHttpChannel.cpp, line 2922]
nsOnStartRequestEvent::HandleEvent
[c:/builds/seamonkey/mozilla/netwerk/base/src/nsRequestObserverProxy.cpp, line 162]
PL_HandleEvent [c:/builds/seamonkey/mozilla/xpcom/threads/plevent.c, line 645]
PL_ProcessPendingEvents [c:/builds/seamonkey/mozilla/xpcom/threads/plevent.c,
line 578]
nsEventQueueImpl::ProcessPendingEvents
[c:/builds/seamonkey/mozilla/xpcom/threads/nsEventQueue.cpp, line 392]
|
|
185,357 | 1,677,218 |
User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98) Opera 6.02 [en]
Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.2.1) Gecko/20021130
When print previewing an iframe that will not fit on one page after scaling, moz crashes.
See test case (based on http://www.pcmag.com/article2/0,4149,715464,00.asp).
Reproducible: Always
Steps to Reproduce:
1. Print preview the test case.
Actual Results:
Crash.
See TB15027476Z
May be linked to other iframe print layout bugs e.g. 113217, tho they do not crash.
|
|
186,132 | 1,684,516 |
Build ID: 2002121808 on Win2k.
Steps to reproduce 100%:
1. Load URL http://www.t-mobile.com/hotspot/
2. Mouse over the 'About us' box, grey should change to white,
3. remove mouse from box,
4. Wait, Mozilla crashes.
Talkback ID: TB15275544K
could be regression from bug 103055, see bug 185850.
|
|
186,606 | 1,688,251 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.3b) Gecko/20021220
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.3b) Gecko/20021220
talkback id TB15427908X
how to reproduce
1. email yourself http://www.codingstyle.com/
2. click on the email arrived
Reproducible: Always
Steps to Reproduce:
1. email yourself http://www.codingstyle.com/
2. click on the email arrived
Actual Results:
CRASH
Expected Results:
be able to read email
|
|
190,549 | 1,722,152 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.3b) Gecko/20030118
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.3b) Gecko/20030118
Using the above URL (vipersoft.co.uk/form1.html) if I click on "Go" it stays on
the first page. This is broken between the 20020116 and 20020118 builds.
Reproducible: Always
Steps to Reproduce:
1.Load URL (http://vipersoft.co.uk/form1.html)
2.Click Go
3.Does it stay on first page (form1) or go through to second page (form2)
Actual Results:
stays on first page (form1)
Expected Results:
should go to second page (form2)
|
|
190,946 | 1,725,361 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.3b) Gecko/20030127
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.3b) Gecko/20030127
Refreshing newsgroups (news.helsinki.fi) does not show (or download?) all groups.
I just tested 1.2.1 too and it works ok.
(news.helsinki.fi has about 15 000 groups, but only some of
them shows up outside helsinki.fi-domain. So testing might be difficult.)
Reproducible: Always
Steps to Reproduce:
|
|
190,988 | 1,725,766 |
Mozilla hang when displaying image attachments. Small attachments seems
to work, but most images just hangs.
2003011708 is last nightly that works, all after that hangs.
Header seems to load ok (window caption is updated) but then hangs.
Steps to reproduce:
1. start mailnews
2. subscribe to some group with pictures
3. view some images
Actual results:
Hang
Expected:
Image viewed
gdb backtrace when hang:
#0 0x420293d5 in sigsuspend () from /lib/i686/libc.so.6
#1 0x4012f609 in __pthread_wait_for_restart_signal () from
/lib/i686/libpthread.so.0
#2 0x4012beec in pthread_cond_wait () from /lib/i686/libpthread.so.0
#3 0x400fc3f8 in PR_WaitCondVar (cvar=0x8837320, timeout=4294967295)
at ../../../../../nsprpub/pr/src/pthreads/ptsynch.c:389
#4 0x400fcbaf in PR_Wait (mon=0x879d118, timeout=4294967295)
at ../../../../../nsprpub/pr/src/pthreads/ptsynch.c:567
#5 0x40504549 in nsAutoMonitor::Wait (this=0xbfffef50, interval=4294967295)
at ../../dist/include/xpcom/nsAutoLock.h:278
#6 0x40502670 in nsPipeOutputStream::Wait (this=0x885fb90)
at ../../../xpcom/io/nsPipe3.cpp:917
#7 0x40502b3f in nsPipeOutputStream::WriteSegments (this=0x885fb90,
reader=0x40502c54 <nsReadFromRawBuffer(nsIOutputStream *, void *, char *,
unsigned int, unsigned int, unsigned int *)>, closure=0x877fe38, count=58,
writeCount=0xbfffeffc) at ../../../xpcom/io/nsPipe3.cpp:1029
#8 0x40502ccb in nsPipeOutputStream::Write (this=0x885fb90,
from Buf=0x877fe38
"M4T1(*[email protected]:5ZH`@2Q!U3()?:7]B2H['9]'2AU)D2#HUE64N!]+ZJ*;-[]",
bufLen=61, writeCount=0xbfffeffc) at ../../../xpcom/io/nsPipe3.cpp:1088
#9 0x4560b6bc in nsNNTPProtocol::DisplayArticle (this=0x87ce728,
inputStream=0x89188bc, length=16384)
at ../../../../mailnews/news/src/nsNNTPProtocol.cpp:2557
#10 0x4560b8e3 in nsNNTPProtocol::ReadArticle (this=0x87ce728,
inputStream=0x89188bc, length=16384)
at ../../../../mailnews/news/src/nsNNTPProtocol.cpp:2599
#11 0x45614ac9 in nsNNTPProtocol::ProcessProtocolState (this=0x87ce728,
url=0x88868ac, inputStream=0x89188bc, sourceOffset=41930, length=16384)
at ../../../../mailnews/news/src/nsNNTPProtocol.cpp:5128
#12 0x431ee723 in nsMsgProtocol::OnDataAvailable (this=0x87ce734,
request=0x88be198, ctxt=0x88868a8, inStr=0x89188bc, sourceOffset=41930,
count=16384) at ../../../../mailnews/base/util/nsMsgProtocol.cpp:327
#13 0x40895212 in nsInputStreamPump::OnStateTransfer (this=0x88be198)
at ../../../../netwerk/base/src/nsInputStreamPump.cpp:402
#14 0x40894e33 in nsInputStreamPump::OnInputStreamReady (this=0x88be198,
stream=0x89188bc) at ../../../../netwerk/base/src/nsInputStreamPump.cpp:317
#15 0x4050604d in nsInputStreamReadyEvent::EventHandler (plevent=0x8308a08)
at ../../../xpcom/io/nsStreamUtils.cpp:101
#16 0x4052b9f0 in PL_HandleEvent (self=0x8308a08)
at ../../../xpcom/threads/plevent.c:663
#17 0x4052b805 in PL_ProcessPendingEvents (self=0x8123cd8)
at ../../../xpcom/threads/plevent.c:593
#18 0x4052db06 in nsEventQueueImpl::ProcessPendingEvents (this=0x8123c90)
at ../../../xpcom/threads/nsEventQueue.cpp:387
#19 0x4154cc50 in event_processor_callback (data=0x8123c90, source=6,
condition=GDK_INPUT_READ) at ../../../../widget/src/gtk/nsAppShell.cpp:198
#20 0x4154c6e3 in our_gdk_io_invoke (source=0x82ba7b0, condition=G_IO_IN,
data=0x82c7988) at ../../../../widget/src/gtk/nsAppShell.cpp:77
#21 0x402b4f9e in g_io_unix_dispatch () from /usr/lib/libglib-1.2.so.0
#22 0x402b6773 in g_main_dispatch () from /usr/lib/libglib-1.2.so.0
#23 0x402b6d39 in g_main_iterate () from /usr/lib/libglib-1.2.so.0
#24 0x402b6eec in g_main_run () from /usr/lib/libglib-1.2.so.0
#25 0x401d22e3 in gtk_main () from /usr/lib/libgtk-1.2.so.0
#26 0x4154d1d9 in nsAppShell::Run (this=0x8188368)
at ../../../../widget/src/gtk/nsAppShell.cpp:346
#27 0x414fba8d in nsAppShellService::Run (this=0x8180aa8)
at ../../../../xpfe/appshell/src/nsAppShellService.cpp:479
#28 0x08066819 in main1 (argc=2, argv=0xbffff714, nativeApp=0x8103380)
at ../../../xpfe/bootstrap/nsAppRunner.cpp:1298
#29 0x080673d7 in main (argc=2, argv=0xbffff714)
at ../../../xpfe/bootstrap/nsAppRunner.cpp:1668
#30 0x42017589 in __libc_start_main () from /lib/i686/libc.so.6
|
|
191,246 | 1,727,905 |
STEPS TO REPRODUCE: Click the link in the "url" field
ACTUAL RESULTS: crash
EXPECTED RESULT: act like a browser instead of wimping out
PROBLEM: Bug 131065 introduced the following code in nsObjectFrame::GetDesiredSize:
904 else {// unconstrained percent case
905 nsCOMPtr<nsIAtom> fType;
906 const nsHTMLReflowState* cbrs = aReflowState.parentReflowState;
907 nsIFrame* f = cbrs->parentReflowState->frame;
908 f->GetFrameType(getter_AddRefs(fType));
This code has one little problem -- it's missing some major null-checking,
starting with the fact that for fixed-positioned frames there _is_ no parent
reflow state (this coule be construed as a bug in the viewport frame, but read
on). If there were, you're getting the _grandparent_ too and not checking it.
|
|
191,588 | 1,731,002 |
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3a; MultiZilla v1.1.33 (b)) Gecko/20030115 Netscape6/6.5
Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3a; MultiZilla v1.1.33 (b)) Gecko/20030128 Netscape6/6.5
This PCH magazine page,
http://sb.pch.com/cat/05-55/multimag-step1-top-titles.html?ID_Type=151&Source=XX619&Segment_SourceKey=LP600
creates a crash in gklayout.dll every time I try to access it. It will load ok
in build 20020115 and all other prior builds that I have tried, but will crash
20020128 and 20020131. I am using Win98SE on a 56K dialup connection.
Reproducible: Always
Steps to Reproduce:
1.Wait for page at
http://sb.pch.com/cat/05-55/multimag-step1-top-titles.html?ID_Type=151&Source=XX619&Segment_SourceKey=LP600
to load.
2.
3.
Actual Results:
Page creates a crash in gklayout.dll before it completely loads.
Expected Results:
Page should completely load without any error.
This appears to be similar to what was happening a while back with some e-bay
pages. Not being a programmer, I can not tell what change in recent Mozilla
builds causes this crash.
|
|
191,703 | 1,732,019 |
User-Agent: Mozilla/5.0 (X11; U; NetBSD i386; en-US; rv:1.2.1) Gecko/20021223
Build Identifier: Mozilla/5.0 (X11; U; NetBSD i386; en-US; rv:1.2.1) Gecko/20021223
PR_FormatTime() from nsprpub/pr/src/misc/prtime.c calls strftime() on line 1676
with a partially initialized tm struct.
On NetBSD (and others), struct tm has a char* field calld tm_zone. If this
field is non-null, strftime() thinks it points to valid data. If tm_zone is
null, strftime() assumes the local time zone.
Reproducible: Always
Steps to Reproduce:
Because of the nature of this bug it may not be easily reproducable.
I've been reproducing this using phoenix 0.5. I ...
* click on a link to a file, get prompted on whether/where to save it
* just click save
* seg fault occurs
Actual Results:
seg fault
Expected Results:
successfully save file, return to the page I was browsing
If I have assigned this to the wrong component, please tell me how I can
determine the right component.
(gdb) bt
#0 0x48546c95 in strftime () from /usr/lib/libc.so.12
#1 0x48546b13 in strftime () from /usr/lib/libc.so.12
#2 0x48545fba in strftime () from /usr/lib/libc.so.12
#3 0x4822443c in PR_FormatTime (buf=0xbfbfc1c0 "32", buflen=40,
fmt=0x4823451c "%Z", tm=0xbfbfc330) at prtime.c:1676
(gdb) frame 3
#3 0x4822443c in PR_FormatTime (buf=0xbfbfc1c0 "32", buflen=40,
fmt=0x4823451c "%Z", tm=0xbfbfc330) at prtime.c:1676
1676 return 0;
(gdb) disp a
2: a = {tm_sec = 32, tm_min = 11, tm_hour = 20, tm_mday = 2, tm_mon = 1,
tm_year = 103, tm_wday = 0, tm_yday = 32, tm_isdst = 0,
tm_gmtoff = 1210282000,
tm_zone = 0x2 <Error reading address 0x2: Invalid argument>}
(gdb)
Notice this value of tm_zone, 0x2. Simply initializing a to 0 will fix
this bug. Patch attached.
|
|
192,124 | 1,735,892 |
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.3b) Gecko/20030205
Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.3b) Gecko/20030205
Filing more than one bookmark in a newly created folder cause bookmarks (all or
all except the first one) not to be saved after quiting (normally, without
crashing) the application.
If the folder has been created in previous session, adding several bookmarks in
that folder during the same session is OK.
It' s also OK when adding bookmark directly in the "root" without creating folder.
Reproducible: Always
Steps to Reproduce:
1. add a bookmark with "File bookmark..."
2. Create a new folder in the dialog, select it then valid
3. within the same session file other bookmarks in the same folder
4. Quit Mozilla
5. Relaunch Mozilla
Actual Results:
Most time: Only the first filed bookmark (the one for wich we created the
folder) is present in the folder
Sometimes: the folder is here but there's no bookmark at all inside
Expected Results:
the folder should contain all filed bookmarks
bug reproduced on 2 computers:
IBook 600 with MacOSX 10.2.3
Dual G4/450 with MacOSX 10.2.3
(I'm on HFS+ filesystem and the Journaling is OFF)
with the MachO version of Mozilla :
2003013103
2003020303
2003020503
My bookmarks.html is big (216k) but the problem occured on a brand new profile too.
The sites I tried to add are not already in my bookmarks and the name for the
folder are different from existing ones and contains no spaces ( I used dummy
names like 'test', 'demo', etc for testing)
The problem also occured when bookmarks (except the first one) are dragged from
the url bar to the folder into the Bookmark view of the sidebar
And it happens when the application is quitting correctly
|
|
182,490 | 1,654,954 |
User-Agent: Mozilla/5.0 (Windows; U; Win95; en-US; rv:1.2) Gecko/20021126
Build Identifier: Mozilla/5.0 (Windows; U; Win95; en-US; rv:1.2) Gecko/20021126
If you have N different username/password combinations for a site, the new
password manager is effectively discarding N-1 of them!
Reproducible: Always
Steps to Reproduce:
1. Use Mozilla 1.2beta. Username/password stored as www.example.org/p1, etc
2. Install Mozilla 1.2. Go to a site. All possibilities listed.
3. Having logged in once, try to log in again.
Actual Results:
Mozilla automatically fills in only the previously successful data.
Expected Results:
Offered all the possible choices as before.
Format has changed from www.example.org/p1, etc, to http://www.example.org/p1.
Logging in to a site once causes the data to be converted FOR THAT ONE DATA PAIR
ALONE, causing all others to be ignored from then on.
There should either be (have been):
a) A program run at install time to change the format of all entries or
b) Mozilla should look up both data formats to get all relevant
username/password pairs or
c) The format conversion that's performed now should be performed on all data
matching that site
|
|
183,234 | 1,660,126 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.3a) Gecko/20021202
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.3a) Gecko/20021202
If you type on the F7 key (whish make the cursor visible on the html page),
Mozilla crash.
Reproducible: Always
Steps to Reproduce:
1. open a browser windows
2. click F7
Actual Results:
Crash
Expected Results:
Not crash
|
|
183,768 | 1,664,820 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020823 Netscape/7.0
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020823 Netscape/7.0
HWND parentWnd = ::GetParent(mWnd);
if (parentWnd) {
nsWindow* parentWidget = GetNSWindowPtr(parentWnd);
if (parentWidget->mIMEIsComposing && nsWindow::uWM_MSIME_MOUSE) {
parentWnd is valid but parentWidget is NULL... crashola...
Happens if you click on the gecko view window too soon.
Reproducible: Always
Steps to Reproduce:
1.Launch a gecko viewer
2.click on the window immediately after its viewable
3.
Actual Results:
Crash
Expected Results:
return
|
|
189,672 | 1,714,937 |
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3b) Gecko/20030118
Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3b) Gecko/20030118
Visit the page at http://www.geocities.com/squatter.geo/ or under the
directories.
After some seconds, thorbber animation stops.
System resource is extremely reduced. If don't anything (exit mozilla,
push ESC key, click Stop toolbar button or go another page), goes 0%.
Therefore freeze mozilla.
Reproducible: Always
Steps to Reproduce:
1. Visit the page. http://www.geocities.com/squatter.geo/
2. Wait for a while (about a minute).
Actual Results:
Freeze Mozilla.
Resouce meter alarms few remain resouce.
Sometimes OS freeze also.
Expected Results:
No freeze.
OS: Win98
2003-01-18-04-trunk (Build ID: 2003011804)
|
|
189,897 | 1,716,676 |
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3b) Gecko/20030120
Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3b) Gecko/20030120
In the last days downloads often start with a box "Download Error",
but Downloadmanager shows progress, and the files are saved to disk.
After Download Error is shown, Cancel-Button is disabled, so there is no way to
stop a download of maybe a 700 MB iso.
If Download Error wasn´t shown, Cancel Button is working.
I don´t believe this is a dup of bug 159186 Cannot cancel download,
because there the same file had been downloaded twice to cause the errror.
Here the error is caused by networking, and leads to a wrong state in
downloadmanager: download is working, but cancel disabled, because download not
active is assumed, I guess.
I think this bug is visible now because of mozillas network problems.
It will still be there in the underlying logic, if the network errors are solved.
Besides, I had some problems removing (multiple) files from download manager.
When cursor was blue, it was working, when cursorline was grey, it didn´t work.
Maybe that was related to the state of cancel button.
Reproducible: Sometimes
Steps to Reproduce:
1.start download of a medium sized file
2.if download error pops up, acknowledge
3.try to cancel download with cancel button
Actual Results:
if download started normally, Cancel works.
if download started with ErrorBox, Cancel Button grayed out, no way to stop
download.
Expected Results:
Cancel ;-)
|
|
241,300 | 2,132,460 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8a) Gecko/20040420 Firefox/0.8.0+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8a) Gecko/20040420 Firefox/0.8.0+
From the Mozillazine forums:
http://forums.mozillazine.org/viewtopic.php?t=70726&sid=4913fcda6a319ed8b94887ccfa1fed85
This url is reliably crashing Firefox (not Mozilla).
The minimal testcase is this:
<html><head></head>
<body background="cid:00d201c264d0$feb75c80$0300a8c0@node3">
</body>
</html>
Not crashing in:
Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040305
Firefox/0.8.0+
Crashing in:
Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040309
Firefox/0.8.0+
Reproducible: Always
Steps to Reproduce:
1.Visit the url
2.
3.
Actual Results:
Crash
Expected Results:
No crash
|
|
235,307 | 2,082,335 |
User-Agent:
Build Identifier:
There is a bug in line 261 (allocation of a new buffer):
http://lxr.mozilla.org/mozilla/source/xpcom/ds/nsSupportsArray.cpp#261
The size of the new array is mArraySize instead of newArraySize which means that
the array doesn't grow at all - the new value for mArraySize is set some lines
later. I don't know where nsSupportsArray::Read() is used, but it will crash
when reading some large array.
Reproducible: Didn't try
Steps to Reproduce:
|
|
235,355 | 2,082,689 |
User-Agent:
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; de-AT; rv:1.7a) Gecko/20040223
In "Mail&Newsgroup Account Settings" left Pane mark one after another the
"Server Settings" without doing any changes, then leaving the Dialogue clicking
"O.K." and Mozilla crashes.
While crashing Mozilla uses a lot of Memory. The saved Username and Password for
Newsgroup Accounts are deleted after the crash.
Reproducible: Always
Steps to Reproduce:
1. In Mail-News go to "Edit" "Mail&Newsgroup Account Settings"
2. Mark one after another "Server Settings" for every of the Accounts without
change anything
3. Leave "Mail&Newsgroup Account Settings" with the O.K.-Button
Actual Results:
Mozilla crashes.
Expected Results:
Close the Dialogue.
This Bug was first reported by Hartmut Figge in d.c.s.m.nb
<[email protected]> under Debian GNU-Linux, thanks to him. I have
succesfull tried to reproduce this crash under w2k.
Adding Part of the DrWatson Crash Stack-Back-Trace:
Funktion: nsSubstring::Replace
1004ab69 55 push ebp
1004ab6a 8bcb mov ecx,ebx
1004ab6c e8fffaffff call EmptyCString+0x250 (1004a670)
1004ab71 85ff test edi,edi
1004ab73 7617 jbe nsComponentManager::EnumerateContractIDs+0xbec
(1005368c)
1004ab75 8b4304 mov eax,[ebx+0x4]
ds:00bb7ae6=????????
1004ab78 8d0c3f lea ecx,[edi+edi]
ds:2f857558=????????
1004ab7b 8bd1 mov edx,ecx
1004ab7d 8d3c68 lea edi,[eax+ebp*2]
ds:0fbfffee=????????
1004ab80 c1e902 shr ecx,0x2
FEHLER ->1004ab83 f3a5 rep movsd ds:0012dcb0=006f0074
es:2f857558=????????
1004ab85 8bca mov ecx,edx
1004ab87 83e103 and ecx,0x3
1004ab8a f3a4 rep movsb ds:0012dcb0=74
es:2f857558=??
1004ab8c 5f pop edi
1004ab8d 5e pop esi
1004ab8e 5d pop ebp
1004ab8f 5b pop ebx
1004ab90 81c498000000 add esp,0x98
1004ab96 c21000 ret 0x10
1004ab99 8bbc24b8000000 mov edi,[esp+0xb8]
ss:0012db9c=00000006
1004aba0 83ffff cmp edi,0xff
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0FBFFFEE 00000000 00000000 00000000 00000000 00000000 !nsSubstring::Replace
|
|
235,537 | 2,084,250 |
win2k build 20040224
I got this a few time during the last weeks and I always fixed it by deleting the
downloads.rdf in the profile...
Steps to reproduce:
1) download http://matti.no-ip.org/downloads.zip
2) put the "downlods.rdf" in your profile and replace the exiting one
3) start Mozilla and open the Downloadmanager -> crash
Top 2 lines from teh stack :
nsInputStreamPump::AsyncRead(nsInputStreamPump * const 0x02d9f890,
nsIStreamListener * 0x02d9f85c, nsISupports * 0x00000000) line 247 + 8 bytes
nsIconChannel::AsyncOpen(nsIconChannel * const 0x00000000, nsIStreamListener *
0x029009f0, nsISupports * 0x00000000) line 210
Trying Networking first :-)
|
|
230,998 | 2,047,775 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.5) Gecko/20031007
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.5) Gecko/20031007
Mozilla crashes if I submit form and before the page is updated I press
"Browse..." button to upload file. After the page updated (file upload window is
still open), file is selected and open button is press mozilla crashes.
Reproducible: Always
Steps to Reproduce:
1. need a form with file upload input (<input type="file">)
2. submit form and press "Browse..." button (before the page is updated)
3. after the page is refreshed press "Open" button
Actual Results:
browser crashes
|
|
231,709 | 2,052,997 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.6) Gecko/20040113
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.6) Gecko/20040113
When I go to the given URL, the page loads correctly, but if I then reload or
close Mozilla it crashes with the message "mozilla.exe has caused errors and
will be terminated..."
In the testcase (an XUL page)there are two frames, one points to a normal XUL
page, the other points to a signed XUL page. The signing is done using signtool
and using a certificate we created ourselves. This problem seems to have come up
with version 1.6
Reproducible: Always
Steps to Reproduce:
1. load up testcase (page loads fine)
2. click reload
Actual Results:
Mozilla crashes - error message is displayed
Expected Results:
displayed the page again
|
|
236,796 | 2,095,007 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040302 Firefox/0.8.0+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040302 Firefox/0.8.0+
See upcoming testcase.
Select the text on the second line, starting somewhere in the string "binding
content".
When you reach the string "span inside div" the browser becomes unresponsive,
cpu time reaches 99%. Only thing left to do is to kill the browser.
Reproducible: Always
Steps to Reproduce:
1. See above.
2.
3.
Actual Results:
Crash/freeze
Expected Results:
Select the text
|
|
236,947 | 2,096,671 |
If a product is chosen on a bugzilla query, Camino will hang-up.
In addition, there is no problem in OSX version firefox nightly build.
Reproducible: Always
Steps to Reproduce:
1.Open bugzilla query.
2.Arbitrary products are chosen from a product list.
e.g. select Camno
Actual Results:
Camino hangs-up.
Expected Results:
Camino does not hang-up.
The component relevant to the selected product etc. is displayed.
Mac OS X 10.3.2 and New Profile
2004030808 (v0.7+)
|
|
237,975 | 2,105,591 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040317 Firefox/0.8.0+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040317 Firefox/0.8.0+
See it at:
http://home.hccnet.nl/m.wargers/test/mozilla/crash/blockquote_new.xhtml
The attached testcase you must open local on your computer.
to reproduce it:
Open the the link you see in a new tab (in the background) and repeat those
steps very quickly (ten times or so)
Then close each tab very quickly again.
In this way, you get the highest chance to get a crash, although you have a
chance of a crash right the first time.
See also:
http://forums.mozillazine.org/viewtopic.php?t=62253
This post mentions that builds younger than 2004-01-27 are vulnerable to this crash:
http://forums.mozillazine.org/viewtopic.php?t=62253#438689
Reproducible: Always
Steps to Reproduce:
1.See details
2.
3.
Actual Results:
Crash
Expected Results:
No crash
|
|
238,005 | 2,105,757 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7b) Gecko/20040316
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7b) Gecko/20040316
DOM L2 HTML specifies that a NOT_FOUND_ERR should be thrown if the before param
is an OPTION but not part of the target SELECT on a call to
HTMLSelectElement.add. This previously mentioned page is a stripped down
version of W3C DOM L2 HTML test HTMLSelectElement20 which tests that.
Unfortunately, there does not appear to be any guard in the Mozilla code base
that checks that and getting through results in a crash.
Reproducible: Always
Steps to Reproduce:
1. Open to http://home.houston.rr.com/curta/select_crash.html
2. Press OK on Starting test alert
Actual Results:
Stall and eventual crash
Expected Results:
Displayed a "Test Succeeded" alert.
There would have been a Talkback on 18 Mar 2004 from me that would have been my
initial observation of the problem.
|
|
1,375,461 | 12,421,310 |
This bug was filed from the Socorro interface and is
report bp-1f929363-c217-4934-b4e2-f4cb60170622.
=============================================================
Crashing Thread (87), Name: MediaPDecoder #2
Frame Module Signature Source
0 xul.dll mozilla::D3D11DXVA2Manager::CopyToImage(IMFSample*, mozilla::gfx::IntRectTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::Image**) dom/media/platforms/wmf/DXVA2Manager.cpp:960
1 xul.dll mozilla::WMFVideoMFTManager::CreateD3DVideoFrame(IMFSample*, __int64, mozilla::VideoData**) dom/media/platforms/wmf/WMFVideoMFTManager.cpp:900
2 xul.dll mozilla::WMFVideoMFTManager::Output(__int64, RefPtr<mozilla::MediaData>&) dom/media/platforms/wmf/WMFVideoMFTManager.cpp:1030
3 xul.dll mozilla::WMFMediaDataDecoder::ProcessOutput(nsTArray<RefPtr<mozilla::MediaData> >&) dom/media/platforms/wmf/WMFMediaDataDecoder.cpp:155
4 xul.dll mozilla::WMFMediaDataDecoder::ProcessDecode(mozilla::MediaRawData*) dom/media/platforms/wmf/WMFMediaDataDecoder.cpp:143
5 xul.dll mozilla::detail::ProxyRunnable<mozilla::MozPromise<nsTArray<RefPtr<mozilla::MediaData> >, mozilla::MediaResult, 1>, RefPtr<mozilla::MozPromise<nsTArray<RefPtr<mozilla::MediaData> >, mozilla::MediaResult, 1> > ( mozilla::WMFMediaDataDecoder::*)(mozilla::MediaRawData*), mozilla::WMFMediaDataDecoder, mozilla::MediaRawData*>::Run() obj-firefox/dist/include/mozilla/MozPromise.h:1394
6 xul.dll mozilla::TaskQueue::Runner::Run() xpcom/threads/TaskQueue.cpp:240
7 xul.dll nsThreadPool::Run() xpcom/threads/nsThreadPool.cpp:225
8 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1418
9 xul.dll NS_ProcessNextEvent(nsIThread*, bool) xpcom/threads/nsThreadUtils.cpp:472
10 xul.dll mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:338
11 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:231
12 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:211
13 xul.dll nsThread::ThreadFunc(void*) xpcom/threads/nsThread.cpp:501
14 nss3.dll _PR_NativeRunThread nsprpub/pr/src/threads/combined/pruthr.c:397
15 nss3.dll pr_root nsprpub/pr/src/md/windows/w95thred.c:95
16 ucrtbase.dll thread_start<unsigned int (__stdcall*)(void*)>
17 kernel32.dll BaseThreadInitThunk
18 mozglue.dll patched_BaseThreadInitThunk mozglue/build/WindowsDllBlocklist.cpp:809
19 ntdll.dll __RtlUserThreadStart
20 ntdll.dll _RtlUserThreadStart
this is a low volume crash signature that's showing up a handful of times in early data from the 55.0b cycle, perhaps related to bug 1340398.
so far all the reports are from users on windows 10 and a nvidia gpu.
|
|
1,375,902 | 12,425,544 |
This bug was filed from the Socorro interface and is
report bp-35db4048-99ba-46d3-b9fb-a0f930170623.
=============================================================
Frame Module Signature Source
0 firefox mozalloc_abort memory/mozalloc/mozalloc_abort.cpp:33
1 firefox abort memory/mozalloc/mozalloc_abort.cpp:80
2 libxul.so std::panicking::rust_panic /checkout/src/libpanic_abort/lib.rs:61
3 libxul.so std::panicking::rust_panic_with_hook /checkout/src/libstd/panicking.rs:565
4 libxul.so std::panicking::begin_panic<collections::string::String> /checkout/src/libstd/panicking.rs:511
5 libxul.so std::panicking::begin_panic_fmt /checkout/src/libstd/panicking.rs:495
6 libxul.so core::panicking::panic_fmt /checkout/src/libstd/panicking.rs:471
7 libxul.so core::panicking::panic /checkout/src/libcore/panicking.rs:49
8 libxul.so geckoservo::glue::Servo_TraverseSubtree /checkout/src/libcore/macros.rs:21
9 libxul.so mozilla::ServoStyleSet::PrepareAndTraverseSubtree layout/style/ServoStyleSet.cpp:446
10 libxul.so libxul.so@0x1e28b25
11 libxul.so nsCSSFrameConstructor::ProcessChildren(nsFrameConstructorState&, nsIContent*, nsStyleContext*, nsContainerFrame*, bool, nsFrameItems&, bool, PendingBinding*, nsIFrame*)
12 libxul.so nsCSSFrameConstructor::ConstructFrameFromItemInternal(nsCSSFrameConstructor::FrameConstructionItem&, nsFrameConstructorState&, nsContainerFrame*, nsFrameItems&)
13 libxul.so nsCSSFrameConstructor::ConstructFramesFromItemList layout/base/nsCSSFrameConstructor.cpp:6313
14 libxul.so nsCSSFrameConstructor::ProcessChildren(nsFrameConstructorState&, nsIContent*, nsStyleContext*, nsContainerFrame*, bool, nsFrameItems&, bool, PendingBinding*, nsIFrame*)
15 libxul.so nsCSSFrameConstructor::ConstructBlock(nsFrameConstructorState&, nsIContent*, nsContainerFrame*, nsContainerFrame*, nsStyleContext*, nsContainerFrame**, nsFrameItems&, nsIFrame*, PendingBinding*)
16 libxul.so nsCSSFrameConstructor::ConstructNonScrollableBlockWithConstructor(nsFrameConstructorState&, nsCSSFrameConstructor::FrameConstructionItem&, nsContainerFrame*, nsStyleDisplay const*, nsFrameItems&, nsBlockFrame* (*)(nsIPresShell*, nsStyleContext*))
17 libxul.so nsCSSFrameConstructor::ConstructFrameFromItemInternal(nsCSSFrameConstructor::FrameConstructionItem&, nsFrameConstructorState&, nsContainerFrame*, nsFrameItems&)
18 libxul.so nsCSSFrameConstructor::ConstructFramesFromItemList layout/base/nsCSSFrameConstructor.cpp:6313
19 libxul.so nsCSSFrameConstructor::ProcessChildren(nsFrameConstructorState&, nsIContent*, nsStyleContext*, nsContainerFrame*, bool, nsFrameItems&, bool, PendingBinding*, nsIFrame*)
20 libxul.so nsCSSFrameConstructor::ConstructFrameFromItemInternal(nsCSSFrameConstructor::FrameConstructionItem&, nsFrameConstructorState&, nsContainerFrame*, nsFrameItems&)
21 libxul.so nsCSSFrameConstructor::ConstructFramesFromItemList layout/base/nsCSSFrameConstructor.cpp:6313
22 libxul.so nsCSSFrameConstructor::ProcessChildren(nsFrameConstructorState&, nsIContent*, nsStyleContext*, nsContainerFrame*, bool, nsFrameItems&, bool, PendingBinding*, nsIFrame*)
23 libxul.so nsCSSFrameConstructor::ConstructFrameFromItemInternal(nsCSSFrameConstructor::FrameConstructionItem&, nsFrameConstructorState&, nsContainerFrame*, nsFrameItems&)
24 libxul.so nsCSSFrameConstructor::ConstructFramesFromItemList layout/base/nsCSSFrameConstructor.cpp:6313
25 libxul.so nsCSSFrameConstructor::ProcessChildren(nsFrameConstructorState&, nsIContent*, nsStyleContext*, nsContainerFrame*, bool, nsFrameItems&, bool, PendingBinding*, nsIFrame*)
26 libxul.so nsCSSFrameConstructor::ConstructBlock(nsFrameConstructorState&, nsIContent*, nsContainerFrame*, nsContainerFrame*, nsStyleContext*, nsContainerFrame**, nsFrameItems&, nsIFrame*, PendingBinding*)
27 libxul.so nsCSSFrameConstructor::ConstructNonScrollableBlockWithConstructor(nsFrameConstructorState&, nsCSSFrameConstructor::FrameConstructionItem&, nsContainerFrame*, nsStyleDisplay const*, nsFrameItems&, nsBlockFrame* (*)(nsIPresShell*, nsStyleContext*))
28 libxul.so nsCSSFrameConstructor::ConstructFrameFromItemInternal(nsCSSFrameConstructor::FrameConstructionItem&, nsFrameConstructorState&, nsContainerFrame*, nsFrameItems&)
29 libxul.so nsCSSFrameConstructor::ConstructFramesFromItemList layout/base/nsCSSFrameConstructor.cpp:6313
30 libxul.so nsCSSFrameConstructor::ProcessChildren(nsFrameConstructorState&, nsIContent*, nsStyleContext*, nsContainerFrame*, bool, nsFrameItems&, bool, PendingBinding*, nsIFrame*)
31 libxul.so nsCSSFrameConstructor::ConstructBlock(nsFrameConstructorState&, nsIContent*, nsContainerFrame*, nsContainerFrame*, nsStyleContext*, nsContainerFrame**, nsFrameItems&, nsIFrame*, PendingBinding*)
32 libxul.so nsCSSFrameConstructor::ConstructNonScrollableBlockWithConstructor(nsFrameConstructorState&, nsCSSFrameConstructor::FrameConstructionItem&, nsContainerFrame*, nsStyleDisplay const*, nsFrameItems&, nsBlockFrame* (*)(nsIPresShell*, nsStyleContext*))
33 libxul.so nsCSSFrameConstructor::ConstructFrameFromItemInternal(nsCSSFrameConstructor::FrameConstructionItem&, nsFrameConstructorState&, nsContainerFrame*, nsFrameItems&)
34 libxul.so nsCSSFrameConstructor::ConstructFramesFromItemList layout/base/nsCSSFrameConstructor.cpp:6313
35 libxul.so nsCSSFrameConstructor::ProcessChildren(nsFrameConstructorState&, nsIContent*, nsStyleContext*, nsContainerFrame*, bool, nsFrameItems&, bool, PendingBinding*, nsIFrame*)
36 libxul.so nsCSSFrameConstructor::ConstructBlock(nsFrameConstructorState&, nsIContent*, nsContainerFrame*, nsContainerFrame*, nsStyleContext*, nsContainerFrame**, nsFrameItems&, nsIFrame*, PendingBinding*)
37 libxul.so nsCSSFrameConstructor::ConstructDocElementFrame(mozilla::dom::Element*, nsILayoutHistoryState*)
38 libxul.so nsCSSFrameConstructor::ContentRangeInserted(nsIContent*, nsIContent*, nsIContent*, nsILayoutHistoryState*, bool, bool, TreeMatchContext*)
39 libxul.so nsCSSFrameConstructor::ContentInserted layout/base/nsCSSFrameConstructor.h:276
40 libxul.so mozilla::PresShell::Initialize(int, int)
41 libxul.so nsContentSink::StartLayout(bool)
42 libxul.so nsContentSink::StyleSheetLoaded(mozilla::StyleSheet*, bool, nsresult)
43 libxul.so mozilla::css::Loader::SheetComplete(mozilla::css::SheetLoadData*, nsresult)
44 libxul.so mozilla::css::Loader::ParseSheet(nsAString const&, mozilla::css::SheetLoadData*, bool&)
45 libxul.so mozilla::css::SheetLoadData::OnStreamComplete(nsIUnicharStreamLoader*, nsISupports*, nsresult, nsAString const&)
46 libxul.so nsUnicharStreamLoader::OnStopRequest(nsIRequest*, nsISupports*, nsresult)
47 libxul.so mozilla::net::nsHTTPCompressConv::OnStopRequest netwerk/streamconv/converters/nsHTTPCompressConv.cpp:170
48 libxul.so mozilla::net::HttpChannelChild::DoOnStopRequest netwerk/protocol/http/HttpChannelChild.cpp:1114
49 libxul.so mozilla::net::HttpChannelChild::OnStopRequest netwerk/protocol/http/HttpChannelChild.cpp:1043
50 libxul.so mozilla::net::ChannelEventQueue::RunOrEnqueue netwerk/ipc/ChannelEventQueue.h:215
51 libxul.so mozilla::net::HttpBackgroundChannelChild::RecvOnStopRequest netwerk/protocol/http/HttpBackgroundChannelChild.cpp:251
52 libxul.so mozilla::net::PHttpBackgroundChannelChild::OnMessageReceived obj-firefox/ipc/ipdl/PHttpBackgroundChannelChild.cpp:172
53 libxul.so mozilla::ipc::PBackgroundChild::OnMessageReceived(IPC::Message const&)
54 libxul.so mozilla::ipc::MessageChannel::DispatchAsyncMessage(IPC::Message const&)
55 libxul.so libxul.so@0xc71121
56 libxul.so mozilla::ipc::MessageChannel::MessageTask::Run()
57 libxul.so nsThread::ProcessNextEvent(bool, bool*)
58 libxul.so NS_ProcessNextEvent(nsIThread*, bool)
59 libxul.so mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*)
60 libxul.so MessageLoop::Run()
61 libxul.so nsBaseAppShell::Run widget/nsBaseAppShell.cpp:156
62 libxul.so XRE_RunAppShell toolkit/xre/nsEmbedFunctions.cpp:896
63 libxul.so MessageLoop::Run()
64 libxul.so XRE_InitChildProcess toolkit/xre/nsEmbedFunctions.cpp:712
65 firefox content_process_main ipc/contentproc/plugin-container.cpp:64
66 firefox _init
Ø 67 libc-2.25.so libc-2.25.so@0x204d9
68 firefox firefox@0x1182f
69 firefox firefox@0x1aeef
70 firefox firefox@0x1182f
71 firefox mozilla::ReadAheadLib(char const*)
Ø 72 ld-2.25.so ld-2.25.so@0x1105f
73 firefox firefox@0x1aeef
74 firefox _start
This was on loading linkedin it crashed 3 times then let it load. I have layout.css.servo.enabled enabled.
|
|
1,376,410 | 12,430,967 |
This bug was filed from the Socorro interface and is
report bp-c47fb23e-cc7e-468e-8bbd-b7f460170627.
=============================================================
Crashing Thread (46), Name: Classifier Update
Frame Module Signature Source
0 xul.dll NS_ABORT_OOM(unsigned int) xpcom/base/nsDebugImpl.cpp:610
1 xul.dll nsACString::Replace(unsigned int, unsigned int, char const*, unsigned int) xpcom/string/nsTSubstring.cpp:564
2 xul.dll mozilla::safebrowsing::AppendPrefixToMap toolkit/components/url-classifier/LookupCacheV4.cpp:195
3 xul.dll mozilla::safebrowsing::LookupCacheV4::ApplyUpdate(mozilla::safebrowsing::TableUpdateV4*, nsClassHashtable<nsUint32HashKey, nsCString>&, nsClassHashtable<nsUint32HashKey, nsCString>&) toolkit/components/url-classifier/LookupCacheV4.cpp:287
4 xul.dll mozilla::safebrowsing::Classifier::UpdateTableV4(nsTArray<mozilla::safebrowsing::TableUpdate*>*, nsACString const&) toolkit/components/url-classifier/Classifier.cpp:1358
5 xul.dll mozilla::safebrowsing::Classifier::ApplyUpdatesBackground(nsTArray<mozilla::safebrowsing::TableUpdate*>*, nsACString&) toolkit/components/url-classifier/Classifier.cpp:829
6 xul.dll <lambda_b69fb69cf3ba961377d01f45253c0d68>::operator() toolkit/components/url-classifier/Classifier.cpp:746
7 xul.dll mozilla::detail::RunnableFunction<<lambda_b69fb69cf3ba961377d01f45253c0d68> >::Run() obj-firefox/dist/include/nsThreadUtils.h:461
8 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1428
9 xul.dll NS_ProcessNextEvent(nsIThread*, bool) xpcom/threads/nsThreadUtils.cpp:477
10 xul.dll mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:368
11 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:313
12 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:293
13 xul.dll nsThread::ThreadFunc(void*) xpcom/threads/nsThread.cpp:503
14 nss3.dll _PR_NativeRunThread nsprpub/pr/src/threads/combined/pruthr.c:397
15 nss3.dll pr_root nsprpub/pr/src/md/windows/w95thred.c:95
16 ucrtbase.dll thread_start<unsigned int (__stdcall*)(void*)>
17 kernel32.dll BaseThreadInitThunk
18 mozglue.dll patched_BaseThreadInitThunk mozglue/build/WindowsDllBlocklist.cpp:849
19 ntdll.dll __RtlUserThreadStart
20 ntdll.dll _RtlUserThreadStart
Application Basics:
Name: Firefox
Version: 56.0a1
Build ID: 20170621102301
Update Channel: nightly
User Agent: Mozilla/5.0 (Windows NT 10.0; rv:56.0) Gecko/20100101 Firefox/56.0
OS: Windows_NT 10.0
|
|
1,376,754 | 12,433,690 |
This bug was filed from the Socorro interface and is
report bp-867d880c-f871-4c91-a075-93ac10170628.
=============================================================
Steps to reproduce:
1. visit http://voetbalzone.nl/
2. accept cookies
3. wait until the page is fully loaded (if no crash occurs, then browse pages until a crash happens. Less than five pages should be sufficient.)
Current result: tab crashes
Expected result: no crash
According to mozregression this is caused by Bug 1342433 - onclick changes shouldn't recreate the tree, r=yzen
|
|
1,376,825 | 12,434,154 |
This bug was filed from the Socorro interface and is
report bp-b2b3d531-86ea-41de-b214-4465b0170628.
=============================================================
There are 400 crashes in beta 55 and is #34 in top crashers.
:surkov, could you investigate please ?
|
|
1,376,874 | 12,434,560 |
This bug was filed from the Socorro interface and is
report bp-30da927f-631a-4a75-89a1-4fb690170628.
=============================================================
these async shutdownhangs are spiking cross-platform on 56.0a1 after build 20170627030209.
Correlations for Firefox Nightly
(100.0% in signature vs 00.03% overall) abort_message = ###!!! ABORT: file resource://gre/modules/Sqlite.jsm, line 156
(100.0% in signature vs 03.62% overall) moz_crash_reason = MOZ_CRASH()
(100.0% in signature vs 05.54% overall) Module "twinapi.appcore.dll" = true
(100.0% in signature vs 05.63% overall) Module "twinapi.dll" = true
(83.33% in signature vs 07.64% overall) process_type = null [100.0% vs 06.75% if startup_crash = 0]
(100.0% in signature vs 08.29% overall) Module "explorerframe.dll" = true
(100.0% in signature vs 09.27% overall) Module "winsta.dll" = true
(100.0% in signature vs 09.40% overall) Module "FWPUCLNT.DLL" = true
(100.0% in signature vs 09.55% overall) Module "rasadhlp.dll" = true
(100.0% in signature vs 11.11% overall) shutdown_progress = profile-before-change
(83.33% in signature vs 08.50% overall) Module "ondemandconnroutehelper.dll" = true
graph from nightly: https://crash-stats.mozilla.com/signature/?release_channel=nightly&signature=AsyncShutdownTimeout%20%7C%20profile-before-change%20%7C%20Sqlite.jsm%20shutdown%20blocker&date=%3E%3D2017-03-01T00%3A00%3A00.000Z&date=%3C2017-06-28T18%3A25%3A45.000Z#graphs
|
|
1,366,446 | 12,334,842 |
Created attachment 8869679
asan report
1. http://www.lovedroids.com/
2. AddressSanitizer: heap-use-after-free /home/worker/workspace/build/src/gfx/skia/skia/src/opts/SkBitmapProcState_opts_SSSE3.cpp:291:9 in ProcessTwoPixelPairs<false>
Fedora and Ubuntu. On Windows I see low and high exploitable EXCEPTION_ACCESS_VIOLATION_READ at `anonymous namespace'::S32_generic_D32_filter_DX_SSSE3<int> BitmapProcShaderContext::shadeSpan SkARGB32_Shader_Blitter::blitRect antifilldot8 antifillrect
https://crash-stats.mozilla.com/signature/?_sort=-date&signature=%60anonymous%20namespace%27%27%3A%3AProcessTwoPixelPairs%3CT%3E&date=%3E%3D2017-05-13T05%3A45%3A00.000Z&date=%3C2017-05-20T05%3A45%3A00.000Z which also rates this as low to high exploitable on Windows back to at least 53.
|
|
1,366,700 | 12,337,184 |
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:55.0) Gecko/20100101 Firefox/55.0
Build ID: 20170521100319
Steps to reproduce:
(In reply to Kartikaya Gupta (email:[email protected]) from bug 1341478 comment #4)
> (In reply to Darkspirit from bug 1341478 comment #3)
> > Please consider to reopen this bug.
>
> Let's open a new bug for the crash you are seeing. This one was filed for
> Android, and the one you are seeing is in a webrender codepath which is
> different although the signature is the same.
Windows 10 x64: crash while doing a Radeon RX480 driver update. (After my whole desktop turned black for a second when windows activated the new driver).
gpu process force-enabled, webrender enabled, hardware accelleration (force-)enabled where possible
Meldungs-ID Sendedatum
bp-897e9aee-9f80-435d-a90f-9acf90170521 21.05.2017 15:09
= [@ mozilla::gl::GLContextEGLFactory::Create ]
= this bug
bp-8177c9fe-a27e-4313-9276-30e500170521 21.05.2017 15:08
= [@ mozilla::layers::PWebRenderBridgeChild::SendCreate ]
= bug 1350408
|
|
1,366,808 | 12,338,082 |
This bug was filed from the Socorro interface and is
report bp-d31fb160-b65a-4914-9dd5-edfff0170516.
=============================================================
Seen while looking at Mac crashes in Nightly - this one appears to have started around 20170401030204 on 55 - so far a small amount of crashes (but typical of Mac volume: http://bit.ly/2qORDu0
Possible regression range based on Build ID: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=8df9fabf2587b7020889755acb9e75b664fe13cf&tochange=00a166a8640dffa2e0f48650f966d75ca3c1836e
Bug 1344629 touched some code. ni on dmajor in case he has ideas about this crash.
Comments:
trying to open a file: url for some rustdoc output
One URL: https://developer.mozilla.org/en-US/docs/Web/CSS/image-resolution
|
|
1,367,372 | 12,344,044 |
User Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36
Steps to reproduce:
1- go: data:text/html,<script>function loaded(){alert();}window.addEventListener('DOMContentLoaded',loaded,false);</script>
2- open Inspect Element
3- F5
4- crash
|
|
1,368,468 | 12,355,360 |
Created attachment 8872321
Client 29-05-2017, 14-23.crash
Build: master 2f1b9f0dfdec
Device: iPhone SE
iOS: 9.3.2
Steps to reproduce:
1. Launch Firefox in portrait (Top Sites are displayed)
2. Change device orientation to landscape
3. Change device orientation to portrait
4. Change device orientation to landscape
Actual result:
- Firefox will crash.
Note:
- Issue reproducible on iPhones running iOS 9.x
- Issue reproducible only on master.
|
|
1,368,479 | 12,355,519 |
Created attachment 8872348
Client 03-04-2017, 16-12.crash
Build: master 2f1b9f0d
Device: iPad Air 2
iOS: 10.2.1
Pre-requisites:
- Activity Stream panel populated with sites
Steps to reproduce:
1. Launch Firefox in portrait
2. Swipe left from the right to enter split screen view
3. Continue swiping left
4. Swipe right to exit split screen
Actual results:
2. Activity stream layout is broken
3. Scrolling on top sites will crash Firefox
4. The Top Sites favicons will be displayed incorrectly when sliding right and exiting split screen
Note:
- Issue reproducible on iPads
See video for more information:
https://www.youtube.com/watch?v=AaimaRG4VQY
|
|
1,358,868 | 12,257,285 |
This bug was filed from the Socorro interface and is
report bp-b51a6e42-803f-49e5-9128-8c2030170422.
=============================================================
Crashing Thread (37)
Frame Module Signature Source
0 xul.dll `anonymous namespace'::wasapi_stream_start media/libcubeb/src/cubeb_wasapi.cpp:1917
1 xul.dll cubeb_stream_start media/libcubeb/src/cubeb.c:349
2 xul.dll mozilla::AudioStream::InvokeCubeb<int (*)(cubeb_stream*)>(int (*)(cubeb_stream*)) dom/media/AudioStream.cpp:317
3 xul.dll mozilla::AudioStream::Resume() dom/media/AudioStream.cpp:450
4 xul.dll mozilla::media::AudioSink::SetPlaying(bool) dom/media/mediasink/AudioSink.cpp:189
5 xul.dll mozilla::media::AudioSinkWrapper::SetPlaying(bool) dom/media/mediasink/AudioSinkWrapper.cpp:164
6 xul.dll mozilla::media::VideoSink::SetPlaying(bool) dom/media/mediasink/VideoSink.cpp:156
7 xul.dll mozilla::MediaDecoderStateMachine::MaybeStartPlayback() dom/media/MediaDecoderStateMachine.cpp:2919
8 xul.dll mozilla::MediaDecoderStateMachine::DecodingState::Step() dom/media/MediaDecoderStateMachine.cpp:685
9 xul.dll mozilla::AutoTaskDispatcher::TaskGroupRunnable::Run() obj-firefox/dist/include/mozilla/TaskDispatcher.h:205
10 xul.dll mozilla::TaskQueue::Runner::Run() xpcom/threads/TaskQueue.cpp:232
11 xul.dll nsThreadPool::Run() xpcom/threads/nsThreadPool.cpp:225
12 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1270
13 xul.dll NS_ProcessNextEvent(nsIThread*, bool) xpcom/threads/nsThreadUtils.cpp:389
14 xul.dll mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:338
15 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:231
16 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:211
17 xul.dll nsThread::ThreadFunc(void*) xpcom/threads/nsThread.cpp:501
18 nss3.dll _PR_NativeRunThread nsprpub/pr/src/threads/combined/pruthr.c:397
19 nss3.dll pr_root nsprpub/pr/src/md/windows/w95thred.c:95
20 ucrtbase.dll _o__CIpow
21 kernel32.dll BaseThreadInitThunk
22 ntdll.dll __RtlUserThreadStart
23 ntdll.dll _RtlUserThreadStart
these crashes started (re)appearing in firefox since 54.0a1 build 20170211030205 and in a regular fashion thereafter, so it's likely related to bug 1337805 which landed the day before.
the crashes are hitting users of 32bit and 64bit versions of firefox on windows and all the report are annotated with MOZ_RELEASE_ASSERT(stm && !stm->thread && !stm->shutdown_event) added in bug 1280280. in stability data for 54.0b1 the signature currently accounts for 0.5% of browser crashes and 1.1% of content process crashes.
|
|
1,358,889 | 12,257,470 |
This bug was filed from the Socorro interface and is
report bp-b80e48d0-6b48-4577-a388-892f60170423.
=============================================================
Crashing Thread (10)
Frame Module Signature Source
0 xul.dll mozilla::SingletonThreadHolder::ReleaseUse_i() media/mtransport/nr_socket_prsock.cpp:250
1 xul.dll mozilla::runnable_args_memfn<RefPtr<mozilla::SingletonThreadHolder>, void ( mozilla::SingletonThreadHolder::*)(void)>::Run() media/mtransport/runnable_utils.h:170
2 xul.dll mozilla::detail::RunOnThreadInternal media/mtransport/runnable_utils.h:50
3 xul.dll mozilla::NrUdpSocketIpc::~NrUdpSocketIpc() media/mtransport/nr_socket_prsock.cpp:1157
4 xul.dll mozilla::NrUdpSocketIpc::`scalar deleting destructor'(unsigned int)
5 xul.dll mozilla::NrUdpSocketIpc::Release() media/mtransport/nr_socket_prsock.h:240
6 xul.dll mozilla::DispatchedRelease<mozilla::NrUdpSocketIpc>::Run() media/mtransport/runnable_utils.h:244
7 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1264
8 xul.dll NS_ProcessNextEvent(nsIThread*, bool) xpcom/threads/nsThreadUtils.cpp:389
9 xul.dll mozilla::net::nsSocketTransportService::Run() netwerk/base/nsSocketTransportService2.cpp:945
10 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1264
11 xul.dll NS_ProcessNextEvent(nsIThread*, bool) xpcom/threads/nsThreadUtils.cpp:389
12 xul.dll mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:338
13 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:231
14 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:211
15 xul.dll nsThread::ThreadFunc(void*) xpcom/threads/nsThread.cpp:495
16 nss3.dll _PR_NativeRunThread nsprpub/pr/src/threads/combined/pruthr.c:397
17 nss3.dll pr_root nsprpub/pr/src/md/windows/w95thred.c:95
18 ucrtbase.dll _o__CIpow
19 kernel32.dll BaseThreadInitThunk
20 ntdll.dll __RtlUserThreadStart
21 ntdll.dll _RtlUserThreadStart
crash reports with this signature are regressing since firefox 54 and later. they are occurring on 32bit/64bit builds of the browser on various versions of windows so far and always in the content process.
|
|
1,358,896 | 12,257,572 |
+++ This bug was initially created as a clone of Bug #1344580 +++
(In reply to Ting-Yu Chou [:ting] from comment #12)
> I am still seeing audiounit_setup_stream on 54 and 55, and
> audiounit_layout_init on 54.
>
> https://crash-stats.mozilla.com/signature/
> ?product=Firefox&signature=audiounit_setup_stream&date=%3E%3D2017-04-
> 05T03%3A11%3A01.000Z&date=%3C2017-04-12T03%3A11%3A01.
> 000Z&_columns=date&_columns=product&_columns=version&_columns=build_id&_colum
> ns=platform&_columns=reason&_columns=address&_columns=install_time&_sort=-
> date&page=1#aggregations
>
> https://crash-stats.mozilla.com/signature/
> ?signature=audiounit_layout_init&date=%3E%3D2017-03-29T03%3A12%3A09.
> 000Z&date=%3C2017-04-12T03%3A12%3A09.
> 000Z&_columns=date&_columns=product&_columns=version&_columns=build_id&_colum
> ns=platform&_columns=reason&_columns=address&_columns=install_time&_sort=-
> date&page=1#aggregations
(In reply to Chun-Min Chang[:chunmin] from comment #13)
> Thanks for the report. I'll try an ASAN build to test it.
(In reply to Ting-Yu Chou [:ting] from comment #14)
> Just double checked, it seems that audiounit_layout_init is fixed, but not
> audiounit_setup_stream.
|
|
1,363,747 | 12,307,808 |
Created attachment 8866363
Client 10-05-2017, 17-20.crash
Build: 8.0b6
Device: iPad Air 2
iOS: 10.3.1
Steps to reproduce:
1. Launch Firefox
2. Long tap on a site from Top Sites
3. Tap 'Share'
Actual results:
- Firefox will crash.
Note:
- Issue reproducible only on iPad.
- Issue reproducible only on the Activity Stream context menu.
|
|
1,365,090 | 12,320,787 |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
Steps to reproduce:
crash report at: https://crash-stats.mozilla.com/report/index/38edd174-7da8-42f0-96d0-ad7320170515
Note the actual error differs a bit from the line number in the attach crash report:
#
# Fatal error in /home/worker/workspace/build/src/media/webrtc/trunk/webrtc/video/video_send_stream.cc, line 188
# Check failed: ssrcs.size() == config_.rtp.rids.size() (3 vs. 6)
#
#
The root cause is we believe is in WebrtcVideoConduit::ConfigureSendMediaCodec
When completing renegotiation, mEncoderConfig is cleared then recreated from codecConfig's details.
But, mSendStreamConfig simply push_back()s any rids without clearing first. So later, at the call level, the ssrc count and rid count differ. RIDs contains the correct values, but duplicated.
If I add a clear to mSendStreamConfig in a local build things work fine.
Unfortunately, we have not been able to create an isolated repro that we can send to you. If we do, I'll make sure to add it to the bug.
|
|
1,373,579 | 12,403,908 |
This bug was filed from the Socorro interface and is
report bp-efb9200f-eef8-4f64-940e-3665f0170616.
=============================================================
Crashing Thread (0)
Frame Module Signature Source
0 vcruntime140.dll memcpy f:\dd\vctools\crt\vcruntime\src\string\i386\memcpy.asm:600
1 xul.dll js::SCInput::readArray<unsigned char>(unsigned char*, unsigned int) js/src/vm/StructuredClone.cpp:846
2 xul.dll mozilla::dom::StructuredCloneBlob::ReadStructuredCloneInternal(JSContext*, JSStructuredCloneReader*, mozilla::dom::StructuredCloneHolder*) dom/base/StructuredCloneBlob.cpp:137
3 xul.dll mozilla::dom::StructuredCloneBlob::ReadStructuredClone(JSContext*, JSStructuredCloneReader*, mozilla::dom::StructuredCloneHolder*) dom/base/StructuredCloneBlob.cpp:109
4 xul.dll mozilla::dom::StructuredCloneHolder::CustomReadHandler(JSContext*, JSStructuredCloneReader*, unsigned int, unsigned int) dom/base/StructuredCloneHolder.cpp:991
5 xul.dll mozilla::dom::`anonymous namespace'::StructuredCloneCallbacksRead dom/base/StructuredCloneHolder.cpp:64
6 xul.dll JSStructuredCloneReader::startRead(JS::MutableHandle<JS::Value>) js/src/vm/StructuredClone.cpp:2234
7 xul.dll JSStructuredCloneReader::read(JS::MutableHandle<JS::Value>) js/src/vm/StructuredClone.cpp:2537
8 xul.dll ReadStructuredClone(JSContext*, JSStructuredCloneData&, JS::StructuredCloneScope, JS::MutableHandle<JS::Value>, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:626
9 xul.dll JS::GCVector<JSObject*, 8, js::TempAllocPolicy>::trace(JSTracer*) obj-firefox/dist/include/js/GCVector.h:134
10 xul.dll mozilla::dom::ipc::StructuredCloneData::Read(JSContext*, JS::MutableHandle<JS::Value>, mozilla::ErrorResult&) dom/ipc/StructuredCloneData.cpp:103
11 xul.dll nsFrameMessageManager::ReceiveMessage(nsISupports*, nsIFrameLoader*, bool, nsAString const&, bool, mozilla::dom::ipc::StructuredCloneData*, mozilla::jsipc::CpowHolder*, nsIPrincipal*, nsTArray<mozilla::dom::ipc::StructuredCloneData>*) dom/base/nsFrameMessageManager.cpp:986
12 xul.dll nsFrameMessageManager::ReceiveMessage(nsISupports*, nsIFrameLoader*, bool, nsAString const&, bool, mozilla::dom::ipc::StructuredCloneData*, mozilla::jsipc::CpowHolder*, nsIPrincipal*, nsTArray<mozilla::dom::ipc::StructuredCloneData>*) dom/base/nsFrameMessageManager.cpp:1121
13 xul.dll nsSameProcessAsyncMessageBase::ReceiveMessage(nsISupports*, nsIFrameLoader*, nsFrameMessageManager*) dom/base/nsFrameMessageManager.cpp:2073
14 xul.dll nsAsyncMessageToSameProcessParent::HandleMessage() dom/base/nsFrameMessageManager.cpp:1887
15 xul.dll mozilla::dom::SameProcessMessageQueue::Runnable::Run() dom/base/SameProcessMessageQueue.cpp:73
16 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1428
17 xul.dll mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:96
18 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:311
19 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:291
20 xul.dll nsBaseAppShell::Run() widget/nsBaseAppShell.cpp:156
21 xul.dll nsAppShell::Run() widget/windows/nsAppShell.cpp:271
22 xul.dll nsAppStartup::Run() toolkit/components/startup/nsAppStartup.cpp:283
23 xul.dll XREMain::XRE_mainRun() toolkit/xre/nsAppRunner.cpp:4573
24 xul.dll XREMain::XRE_main(int, char** const, mozilla::BootstrapConfig const&) toolkit/xre/nsAppRunner.cpp:4757
25 xul.dll XRE_main(int, char** const, mozilla::BootstrapConfig const&) toolkit/xre/nsAppRunner.cpp:4852
26 xul.dll mozilla::BootstrapImpl::XRE_main(int, char** const, mozilla::BootstrapConfig const&) toolkit/xre/Bootstrap.cpp:45
27 firefox.exe do_main browser/app/nsBrowserApp.cpp:237
28 firefox.exe wmain toolkit/xre/nsWindowsWMain.cpp:115
29 firefox.exe __scrt_common_main_seh f:/dd/vctools/crt/vcstartup/src/startup/exe_common.inl:253
30 kernel32.dll BaseThreadInitThunk
31 ntdll.dll __RtlUserThreadStart
32 ntdll.dll _RtlUserThreadStart
these crashes started showing up on 32bit versions of firefox on windows in a higher frequency since 55.0a1 build 20170608030205. so based on this timing, bug 1356546 might be the regressing patch.
in early stability data from the 55.0b/devedition rollout, with 1.37 % of all browser crashes this signature is the #7 top crash there.
|
|
1,373,604 | 12,404,148 |
This bug was filed from the Socorro interface and is
report bp-e5bae163-2159-4b05-8300-60d2e0170616.
=============================================================
Crashing Thread (0)
Frame Module Signature Source
0 xul.dll nsContentUtils::DispatchFocusChromeEvent(nsPIDOMWindowOuter*) dom/base/nsContentUtils.cpp:4415
1 xul.dll nsDocShell::InternalLoad(nsIURI*, nsIURI*, bool, nsIURI*, unsigned int, nsIPrincipal*, nsIPrincipal*, unsigned int, nsAString const&, char const*, nsAString const&, nsIInputStream*, nsIInputStream*, unsigned int, nsISHEntry*, bool, nsAString const&, nsIDocShell*, nsIURI*, bool, nsIDocShell**, nsIRequest**) docshell/base/nsDocShell.cpp:10166
2 xul.dll nsDocShell::OnLinkClickSync(nsIContent*, nsIURI*, char16_t const*, nsAString const&, nsIInputStream*, nsIInputStream*, bool, nsIDocShell**, nsIRequest**, nsIPrincipal*) docshell/base/nsDocShell.cpp:14212
3 xul.dll OnLinkClickEvent::Run() docshell/base/nsDocShell.cpp:13966
4 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1406
5 xul.dll mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:96
6 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:231
7 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:211
8 xul.dll nsBaseAppShell::Run() widget/nsBaseAppShell.cpp:156
9 xul.dll nsAppShell::Run() widget/windows/nsAppShell.cpp:271
10 xul.dll nsAppStartup::Run() toolkit/components/startup/nsAppStartup.cpp:283
11 xul.dll XREMain::XRE_mainRun() toolkit/xre/nsAppRunner.cpp:4569
12 xul.dll XREMain::XRE_main(int, char** const, mozilla::BootstrapConfig const&) toolkit/xre/nsAppRunner.cpp:4749
13 xul.dll XRE_main(int, char** const, mozilla::BootstrapConfig const&) toolkit/xre/nsAppRunner.cpp:4844
14 xul.dll mozilla::BootstrapImpl::XRE_main(int, char** const, mozilla::BootstrapConfig const&) toolkit/xre/Bootstrap.cpp:45
15 firefox.exe wmain toolkit/xre/nsWindowsWMain.cpp:115
16 firefox.exe __scrt_common_main_seh f:/dd/vctools/crt/vcstartup/src/startup/exe_common.inl:253
17 kernel32.dll BaseThreadInitThunk
18 ntdll.dll __RtlUserThreadStart
19 ntdll.dll _RtlUserThreadStart
this is a crash signature that's apparently regressing in 55.0b judging by early crash data from the staged rollout. it's happening in a codepath last touched by bug 1303838, so i'm tentatively setting it as blocking that bug.
|
|
1,374,148 | 12,409,495 |
This bug was filed from the Socorro interface and is
report bp-55e3cf62-192c-41d6-9dad-5d4340170619.
=============================================================
Frame Module Signature Source
Ø 0 nvwgf2um.dll nvwgf2um.dll@0xb53a7b
Ø 1 nvwgf2um.dll nvwgf2um.dll@0xb5544a
Ø 2 nvwgf2um.dll nvwgf2um.dll@0xb87118
Ø 3 nvwgf2um.dll nvwgf2um.dll@0xba8512
Ø 4 nvwgf2um.dll nvwgf2um.dll@0xbb7898
Ø 5 nvwgf2um.dll nvwgf2um.dll@0xb578e7
Ø 6 nvwgf2um.dll nvwgf2um.dll@0xb5d623
Ø 7 nvwgf2um.dll nvwgf2um.dll@0xb46ee3
Ø 8 nvwgf2um.dll nvwgf2um.dll@0x1b6a3d
9 d3d11.dll CDecodeContext::BeginFrame(ID3D11VideoDecoderOutputView*, void const*, unsigned int)
10 d3d11.dll CContext::DecoderBeginFrame(ID3D11VideoDecoder*, ID3D11VideoDecoderOutputView*, unsigned int, void const*)
Ø 11 msmpeg2vdec.dll msmpeg2vdec.dll@0x77cab
Ø 12 msmpeg2vdec.dll msmpeg2vdec.dll@0x7461f
Ø 13 msmpeg2vdec.dll msmpeg2vdec.dll@0x75e50
Ø 14 msmpeg2vdec.dll msmpeg2vdec.dll@0x747e6
Ø 15 msmpeg2vdec.dll msmpeg2vdec.dll@0x78ebe
Ø 16 msmpeg2vdec.dll msmpeg2vdec.dll@0x78c29
17 kernel32.dll BaseThreadInitThunk
18 ntdll.dll __RtlUserThreadStart
19 ntdll.dll _RtlUserThreadStart
This is #7 topcrash of Firefox 54.
Hi Blake,
Can you help shed some light here?
|
|
1,361,008 | 12,278,478 |
Created attachment 8863314
Simple web pages showing the problem in Nightly
+++ This bug was initially created as a clone of Bug #1297414 +++
See attached HTML document. We have
text<br>
<div>...</div>
Instructions:
1) Position caret at the end of the line an hit "enter".
2) Observe the resulting *three* paragraphs where only *two* are expected.
|
|
1,361,132 | 12,279,864 |
This bug was filed from the Socorro interface and is
report bp-a4c73517-54b1-42f4-8370-0a34d0170501.
=============================================================
This bug has been at the top of crash stats, but looks like no one filed it - not sure of the component...all Windows 10 crashes. Currently #7 top Windows browser crash.
In other versions, but fairly high in 55 relative to release: http://bit.ly/2pBbP46. 85 crashes on nightly and 113 on Release in the last 7 days.
Comments:
Seemingly random crash.
|
|
1,362,065 | 12,292,576 |
Hardware: Surface Pro 2
Windows version: Windows 10 — 1703 "Creators Update"
On Nightly drag and drop appears to be broken.
This affects dragging tabs, Customization Mode, dragging tiles on New Tab and content HTML based drag and drop.
The release version of Firefox (53) works fine for me.
|
|
1,362,303 | 12,294,724 |
This bug was filed from the Socorro interface and is
report bp-1575434e-83d5-440f-be91-3ba110170505.
=============================================================
Attempting to drag the image at the given URL reliably results in this crash. Dragging other random images seems okay, so it may have something to do with the large size of this particular one.
|
|
1,362,321 | 12,295,016 |
This bug was filed from the Socorro interface and is
report bp-f804adaa-a451-4a62-9e62-db6270170505.
=============================================================
Crashing Thread (0)
Frame Module Signature Source
0 xul.dll gfxPlatform::Init() gfx/thebes/gfxPlatform.cpp:740
1 xul.dll gfxPlatform::GetPlatform() gfx/thebes/gfxPlatform.cpp:536
2 xul.dll mozilla::widget::GfxInfo::GetDWriteEnabled(bool*) widget/windows/GfxInfo.cpp:69
3 xul.dll NS_InvokeByIndex xpcom/reflect/xptcall/md/win32/xptcinvoke_asm_x86_msvc.asm:54
4 xul.dll XPCWrappedNative::CallMethod(XPCCallContext&, XPCWrappedNative::CallMode) js/xpconnect/src/XPCWrappedNative.cpp:1296
5 xul.dll XPC_WN_GetterSetter(JSContext*, unsigned int, JS::Value*) js/xpconnect/src/XPCWrappedNativeJSOps.cpp:1019
6 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:460
7 xul.dll CallGetter js/src/vm/NativeObject.cpp:1812
8 xul.dll js::GetProperty(JSContext*, JS::Handle<JSObject*>, JS::Handle<JSObject*>, JS::Handle<jsid>, JS::MutableHandle<JS::Value>) js/src/jsobj.h:857
9 xul.dll Interpret js/src/vm/Interpreter.cpp:2827
10 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:406
11 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:478
12 xul.dll InternalCall js/src/vm/Interpreter.cpp:505
13 xul.dll Interpret js/src/vm/Interpreter.cpp:2989
14 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:406
15 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:478
16 xul.dll InternalCall js/src/vm/Interpreter.cpp:505
17 xul.dll Interpret js/src/vm/Interpreter.cpp:2989
18 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:406
19 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:478
20 xul.dll CallGetter js/src/vm/NativeObject.cpp:1812
21 xul.dll js::Wrapper::get(JSContext*, JS::Handle<JSObject*>, JS::Handle<JS::Value>, JS::Handle<jsid>, JS::MutableHandle<JS::Value>) js/src/proxy/Wrapper.cpp:143
22 xul.dll js::CrossCompartmentWrapper::get(JSContext*, JS::Handle<JSObject*>, JS::Handle<JS::Value>, JS::Handle<jsid>, JS::MutableHandle<JS::Value>) js/src/proxy/CrossCompartmentWrapper.cpp:209
23 xul.dll js::Proxy::get(JSContext*, JS::Handle<JSObject*>, JS::Handle<JS::Value>, JS::Handle<jsid>, JS::MutableHandle<JS::Value>) js/src/proxy/Proxy.cpp:311
24 xul.dll GetPropertyOperation js/src/vm/Interpreter.cpp:192
25 xul.dll Interpret js/src/vm/Interpreter.cpp:2706
26 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:406
27 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:478
28 xul.dll InternalCall js/src/vm/Interpreter.cpp:505
29 xul.dll nsXPCWrappedJSClass::CallMethod(nsXPCWrappedJS*, unsigned short, XPTMethodDescriptor const*, nsXPTCMiniVariant*) js/xpconnect/src/XPCWrappedJSClass.cpp:1213
30 xul.dll nsXPCWrappedJS::CallMethod(unsigned short, XPTMethodDescriptor const*, nsXPTCMiniVariant*) js/xpconnect/src/XPCWrappedJS.cpp:613
31 xul.dll PrepareAndDispatch xpcom/reflect/xptcall/md/win32/xptcstubs.cpp:85
32 xul.dll SharedStub xpcom/reflect/xptcall/md/win32/xptcstubs.cpp:112
33 xul.dll NS_CreateServicesFromCategory(char const*, nsISupports*, char const*, char16_t const*) xpcom/components/nsCategoryManager.cpp:821
the crash signature is rising in firefox 53 and subsequent builds.
Correlations for Firefox Release
(50.37% in signature vs 02.99% overall) startup_crash = 1 [98.55% vs 02.47% if process_type = null]
(95.56% in signature vs 00.80% overall) GFX_ERROR "Failed to create DrawTarget, Type: " = true
(100.0% in signature vs 30.51% overall) plugin_version = null
(90.37% in signature vs 32.68% overall) platform_pretty_version = Windows 10
(93.33% in signature vs 14.94% overall) Module "igd10iumd32.dll" = true [93.94% vs 32.95% if platform_version = 10.0.10586]
(86.67% in signature vs 12.68% overall) Module "igdusc32.dll" = true [97.06% vs 40.60% if platform_version = 10.0.10240]
(93.33% in signature vs 17.90% overall) Module "ncrypt.dll" = true [93.94% vs 35.50% if platform_version = 10.0.10586]
(92.59% in signature vs 12.21% overall) Module "ntasn1.dll" = true [93.94% vs 35.50% if platform_version = 10.0.10586]
(96.30% in signature vs 00.40% overall) GFX_ERROR "[D2D1.1] 3CreateBitmap failure " = true [57.97% vs 00.25% if process_type = null]
(48.15% in signature vs 00.03% overall) moz_crash_reason = MOZ_CRASH(Could not initialize mScreenReferenceDrawTarget)
(44.44% in signature vs 01.70% overall) adapter_device_id = 0x22b1
(42.22% in signature vs 01.22% overall) CPU Info = GenuineIntel family 6 model 76 stepping 3
|
|
1,370,087 | 12,370,719 |
This bug was filed from the Socorro interface and is
report bp-69b9124d-2244-4587-8edb-ac28e0170604.
=============================================================
Crashing Thread (0)
Frame Module Signature Source
0 xul.dll mozilla::dom::StorageUtils::GenerateOriginKey(nsIPrincipal*, nsACString&, nsACString&) dom/storage/StorageUtils.cpp:19
1 xul.dll mozilla::dom::LocalStorageManager::GetStorageInternal(mozilla::dom::LocalStorageManager::CreateMode, mozIDOMWindow*, nsIPrincipal*, nsAString const&, bool, nsIDOMStorage**) dom/storage/LocalStorageManager.cpp:220
2 xul.dll mozilla::dom::LocalStorageManager::PrecacheStorage(nsIPrincipal*, nsIDOMStorage**) dom/storage/LocalStorageManager.cpp:269
3 xul.dll NS_InvokeByIndex xpcom/reflect/xptcall/md/win32/xptcinvoke_asm_x86_msvc.asm:54
4 xul.dll XPC_WN_CallMethod(JSContext*, unsigned int, JS::Value*) js/xpconnect/src/XPCWrappedNativeJSOps.cpp:982
5 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:470
6 xul.dll InternalCall js/src/vm/Interpreter.cpp:515
7 xul.dll Interpret js/src/vm/Interpreter.cpp:3028
8 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:410
9 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:488
10 xul.dll js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) js/src/vm/Interpreter.cpp:534
11 xul.dll CallGetter js/src/vm/NativeObject.cpp:1912
12 xul.dll GetPropertyOperation js/src/vm/Interpreter.cpp:193
13 xul.dll Interpret js/src/vm/Interpreter.cpp:2743
14 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:410
15 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:488
16 xul.dll InternalCall js/src/vm/Interpreter.cpp:515
17 xul.dll js::Wrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/Wrapper.cpp:166
18 xul.dll js::CrossCompartmentWrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/CrossCompartmentWrapper.cpp:353
19 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:452
20 xul.dll InternalCall js/src/vm/Interpreter.cpp:515
21 xul.dll Interpret js/src/vm/Interpreter.cpp:3028
22 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:410
23 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:488
24 xul.dll InternalCall js/src/vm/Interpreter.cpp:515
25 xul.dll JS_CallFunctionValue(JSContext*, JS::Handle<JSObject*>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) js/src/jsapi.cpp:2832
26 xul.dll nsXPCWrappedJSClass::CallMethod(nsXPCWrappedJS*, unsigned short, XPTMethodDescriptor const*, nsXPTCMiniVariant*) js/xpconnect/src/XPCWrappedJSClass.cpp:1214
27 xul.dll nsXPCWrappedJS::CallMethod(unsigned short, XPTMethodDescriptor const*, nsXPTCMiniVariant*) js/xpconnect/src/XPCWrappedJS.cpp:615
28 xul.dll PrepareAndDispatch xpcom/reflect/xptcall/md/win32/xptcstubs.cpp:85
29 xul.dll SharedStub xpcom/reflect/xptcall/md/win32/xptcstubs.cpp:112
30 xul.dll NS_InvokeByIndex xpcom/reflect/xptcall/md/win32/xptcinvoke_asm_x86_msvc.asm:54
crash reports with this signature started showing up in 55.0a1 build 20170603030204. this would be the changelog to the day before:
https://hg.mozilla.org/mozilla-central/pushloghtml?startdate=2017-06-02&tochange=43039280fe464869428f03b047bb7c762784f44b
|
|
1,371,246 | 12,382,296 |
This bug was filed from the Socorro interface and is
report bp-e98e3306-637b-45ce-a796-958640170608.
=============================================================
0 mozglue.dll MOZ_CrashPrintf mfbt/Assertions.cpp:63
1 xul.dll InvalidArrayIndex_CRASH(unsigned __int64, unsigned __int64) xpcom/ds/nsTArray.cpp:26
2 xul.dll nsTArray_Impl<void*, nsTArrayInfallibleAllocator>::ElementAt(unsigned __int64) obj-firefox/dist/include/nsTArray.h:1048
3 xul.dll mozilla::dom::`anonymous namespace'::ReadBlob dom/base/StructuredCloneHolder.cpp:522
4 xul.dll mozilla::dom::StructuredCloneHolder::CustomReadHandler(JSContext*, JSStructuredCloneReader*, unsigned int, unsigned int) dom/base/StructuredCloneHolder.cpp:975
5 xul.dll mozilla::dom::`anonymous namespace'::StructuredCloneCallbacksRead dom/base/StructuredCloneHolder.cpp:64
6 xul.dll JSStructuredCloneReader::startRead(JS::MutableHandle<JS::Value>) js/src/vm/StructuredClone.cpp:2234
7 xul.dll JSStructuredCloneReader::read(JS::MutableHandle<JS::Value>) js/src/vm/StructuredClone.cpp:2537
8 xul.dll ReadStructuredClone(JSContext*, JSStructuredCloneData&, JS::StructuredCloneScope, JS::MutableHandle<JS::Value>, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:626
9 xul.dll JS_ReadStructuredClone(JSContext*, JSStructuredCloneData&, unsigned int, JS::StructuredCloneScope, JS::MutableHandle<JS::Value>, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:2578
10 xul.dll JSAutoStructuredCloneBuffer::read(JSContext*, JS::MutableHandle<JS::Value>, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:2742
11 xul.dll mozilla::dom::StructuredCloneHolderBase::Read(JSContext*, JS::MutableHandle<JS::Value>) dom/base/StructuredCloneHolder.cpp:206
12 xul.dll mozilla::dom::StructuredCloneHolder::Read(nsISupports*, JSContext*, JS::MutableHandle<JS::Value>, mozilla::ErrorResult&) dom/base/StructuredCloneHolder.cpp:301
13 xul.dll mozilla::dom::StructuredCloneBlob::Deserialize(JSContext*, JS::Handle<JSObject*>, JS::MutableHandle<JS::Value>, mozilla::ErrorResult&) dom/base/StructuredCloneBlob.cpp:81
14 xul.dll mozilla::dom::StructuredCloneHolderBinding::deserialize obj-firefox/dom/bindings/StructuredCloneHolderBinding.cpp:34
15 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:470
16 xul.dll js::Wrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/Wrapper.cpp:166
17 xul.dll js::CrossCompartmentWrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/CrossCompartmentWrapper.cpp:353
18 xul.dll js::Proxy::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/Proxy.cpp:479
19 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:452
20 xul.dll Interpret js/src/vm/Interpreter.cpp:3028
21 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:410
22 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:488
23 xul.dll js::Wrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/Wrapper.cpp:166
24 xul.dll js::CrossCompartmentWrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/CrossCompartmentWrapper.cpp:353
25 xul.dll js::Proxy::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/Proxy.cpp:479
26 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:452
27 xul.dll Interpret js/src/vm/Interpreter.cpp:3028
28 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:410
29 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:488
30 xul.dll Interpret js/src/vm/Interpreter.cpp:3028
31 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:410
32 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:488
33 xul.dll js::jit::DoCallFallback js/src/jit/BaselineIC.cpp:2453
34 @0x338d24f6609
When I save a Blob data which came from <canvas> (with my private add-on), I always meet this crash. I tested with mozregression, this is a regression of bug 1356546.
|
|
1,371,248 | 12,382,314 |
This bug was filed from the Socorro interface and is
report bp-07aa1d6b-dbf8-4a07-a751-4619d0170608.
=============================================================
- STR:
1.Launch Firefox with a clean profile.
2.Install a webextension.
3.Spend some time testing it.
4.Navigate to about:addons and remove the webextension.
5.Restart the browser.
- Ran into this on Windows 8.1 32-bit, using Firefox 55.0a1 (2017-06-07/08) on Windows 10 64-bit
- This issue might not reproduce for each restart, but I encountered the crash in about 90% of the cases.
- Crash reports:
bp-19ba0742-1912-4309-8ddd-3592d0170608
bp-69c4e329-01a8-4ab3-a0fc-b29d00170608
bp-9e447097-2b84-49ad-9385-266950170608
bp-7a41dc78-be4f-4037-a835-599f20170608
bp-9c96d7e3-0427-4dcc-a078-951c30170607
bp-f2a24256-57f0-4219-a95a-103a40170607
|
|
1,355,168 | 12,222,313 |
This bug was filed from the Socorro interface and is
report bp-37a74ca7-df8b-412f-8f55-638602170405.
=============================================================
We have more crashes (132 in the past 7 days) than I expected for this signature,
given that it's an internal API.
Windows 7 65 49.2%
OS X 10.12 17 12.9%
Windows 10 17 12.9%
Windows XP 15 11.4%
Windows 8.1 10 7.6%
Windows Vista 4 3.0%
OS X 10.11 3 2.3%
Android 1 0.8%
Looks like all are null-pointer crashes.
I'm guessing mTarget is null here:
https://hg.mozilla.org/mozilla-central/annotate/7a3f514cf849/dom/canvas/CanvasRenderingContext2D.cpp#l5278
due to the nsContentUtils::FlushLayoutForTree call on line 5234.
|
|
1,356,534 | 12,235,563 |
Created attachment 8858260
Client 14-04-2017, 11-35.crash
Build: 58b02370e25
Device: iPad Pro
iOS: 10.3
Steps to reproduce:
1. Install Firefox
2. Launch Firefox
3. Log in to FxA with sync data
Actual results:
- Firefox will crash after first sync.
Note:
- I am also logged in on desktop with this FxA.
|
|
1,356,812 | 12,237,909 |
This bug was filed from the Socorro interface and is
report bp-46dae67d-1cd7-440f-a69d-2b50e2170415.
=============================================================
There are 5 crashes (from 1 installation) in nightly 55 with buildid 20170414030225. In analyzing the backtrace, the regression may have been introduced by patch [1] to fix bug 1355414.
[1] https://hg.mozilla.org/mozilla-central/rev?node=a121d68c6eec8c0d033581d8afceaba48b8ad8c5
|
|
1,357,040 | 12,239,836 |
This bug was filed from the Socorro interface and is
report bp-631c3f32-056d-4d31-a121-d40c92170417.
=============================================================
Seen while looking at nightly crash stats - earliest crashes seem to be in 20170331030216: http://bit.ly/2ppvgx2. Crashes affect Win, Linux and Android on nightly but the majority affect Linux. This crash is also present on Aurora.
ni on :gerald since it appears he worked in this area of code and might have some ideas.
|
|
1,357,244 | 12,241,945 |
This bug was filed from the Socorro interface and is
report bp-8774867c-4001-4581-baec-403592170417.
=============================================================
https://hg.mozilla.org/mozilla-central/annotate/ce69b6e1773e/dom/media/MediaCache.cpp#l456
Looks like a null-deref on |entry|.
|
|
1,347,262 | 12,144,650 |
Upstream Skia security bug (https://bugs.chromium.org/p/skia/issues/detail?id=6294) details a variant of bug 1330166 that was not handled by that fix. All relevant security details of this bug should basically be the same as in bug 133016, just that this is a new way to trigger it. I've fixed up that case now with this patch that ensures the rounding is properly biased for all sides of the bounds rect.
This patch was submitted upstream here: https://skia-review.googlesource.com/c/9700/
|
|
1,347,854 | 12,150,332 |
Created attachment 8848002
Client 16-03-2017, 11-05.crash
Build: 849b926d5c
Device: iPhone 7
iOS: 10.2.1
Steps to reproduce:
1. Go to Settings
2. Tap 'Sing in'
3. Use 3DT on 'Forgot password' (or any other link)
4. Tap on 'Add to Reading List'
Actual results:
- Firefox will crash.
Expected results:
- 3DT should be turned off for use for internal webviews as mentioned in Bug 1331972.
|
|
1,347,984 | 12,151,556 |
This bug was filed from the Socorro interface and is
report bp-5b904ab8-0afe-4928-a86d-01beb2170314.
=============================================================
There are a few dozen of these crashes across various channels in the last week. The ones with this signature that I looked at were all coming from nsJARChannel::OnStopRequest, into AsyncScriptLoader::OnStreamComplete, into js::PromiseObject::reject.
|
|
1,348,381 | 12,155,174 |
Created attachment 8848604
CreateBlackImage.html
[57617] WARNING: SharedPlanarYCbCrImage::Allocate failed.: file /srv/mozilla/mozilla-inbound/gfx/layers/ipc/SharedPlanarYCbCrImage.cpp, line 196
Assertion failure: false, at /srv/mozilla/mozilla-inbound/dom/media/VideoSegment.cpp:85
#01: mozilla::VP8TrackEncoder::PrepareRawFrame(mozilla::VideoChunk&)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x67c8e3c]
#02: mozilla::VP8TrackEncoder::GetEncodedTrack(mozilla::EncodedFrameContainer&)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x67ce6a6]
#03: mozilla::MediaEncoder::WriteEncodedDataToMuxer(mozilla::TrackEncoder*)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x67b9eeb]
#04: mozilla::MediaEncoder::GetEncodedData(nsTArray<nsTArray<unsigned char> >*, nsAString_internal&)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x67b7e04]
#05: mozilla::dom::MediaRecorder::Session::Extract(bool)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x66bf4f2]
#06: mozilla::dom::MediaRecorder::Session::ExtractRunnable::Run()[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x66bedc8]
#07: nsThread::ProcessNextEvent(bool, bool*)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x3133ab]
#08: NS_ProcessNextEvent(nsIThread*, bool)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x30e8d7]
#09: mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x134b49c]
#10: MessageLoop::RunInternal()[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x1260c18]
#11: MessageLoop::Run()[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x12608dd]
#12: nsThread::ThreadFunc(void*)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x309aea]
#13: _pt_root[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/libnss3.dylib +0x3694aa]
#14: _pthread_body[/usr/lib/system/libsystem_pthread.dylib +0x3aab]
#15: _pthread_body[/usr/lib/system/libsystem_pthread.dylib +0x39f7]
ASAN:DEADLYSIGNAL
=================================================================
==57617==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00011f472e62 bp 0x7000071858d0 sp 0x700007185740 T99)
#0 0x11f472e61 in mozilla::VideoFrame::CreateBlackImage(mozilla::gfx::IntSizeTyped<mozilla::gfx::UnknownUnits> const&) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x675fe61)
#1 0x11f4dbe3b in mozilla::VP8TrackEncoder::PrepareRawFrame(mozilla::VideoChunk&) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x67c8e3b)
#2 0x11f4e16a5 in mozilla::VP8TrackEncoder::GetEncodedTrack(mozilla::EncodedFrameContainer&) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x67ce6a5)
#3 0x11f4cceea in mozilla::MediaEncoder::WriteEncodedDataToMuxer(mozilla::TrackEncoder*) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x67b9eea)
#4 0x11f4cae03 in mozilla::MediaEncoder::GetEncodedData(nsTArray<nsTArray<unsigned char> >*, nsAString_internal&) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x67b7e03)
#5 0x11f3d24f1 in mozilla::dom::MediaRecorder::Session::Extract(bool) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x66bf4f1)
#6 0x11f3d1dc7 in mozilla::dom::MediaRecorder::Session::ExtractRunnable::Run() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x66bedc7)
#7 0x1190263aa in nsThread::ProcessNextEvent(bool, bool*) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x3133aa)
#8 0x1190218d6 in NS_ProcessNextEvent(nsIThread*, bool) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x30e8d6)
#9 0x11a05e49b in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x134b49b)
#10 0x119f73c17 in MessageLoop::RunInternal() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x1260c17)
#11 0x119f738dc in MessageLoop::Run() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x12608dc)
#12 0x11901cae9 in nsThread::ThreadFunc(void*) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x309ae9)
#13 0x10ce3b4a9 in _pt_root (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/libnss3.dylib+0x3694a9)
#14 0x7fffaae69aaa in _pthread_body (/usr/lib/system/libsystem_pthread.dylib+0x3aaa)
#15 0x7fffaae699f6 in _pthread_start (/usr/lib/system/libsystem_pthread.dylib+0x39f6)
#16 0x7fffaae691fc in thread_start (/usr/lib/system/libsystem_pthread.dylib+0x31fc)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x675fe61) in mozilla::VideoFrame::CreateBlackImage(mozilla::gfx::IntSizeTyped<mozilla::gfx::UnknownUnits> const&)
Thread T99 created by T0 here:
#0 0x10976f379 in wrap_pthread_create (/Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/lib/clang/8.0.0/lib/darwin/libclang_rt.asan_osx_dynamic.dylib+0x41379)
#1 0x10ce37c1a in _PR_CreateThread (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/libnss3.dylib+0x365c1a)
#2 0x10ce377da in PR_CreateThread (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/libnss3.dylib+0x3657da)
#3 0x11901f72a in nsThread::Init(nsACString_internal const&) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x30c72a)
#4 0x11902c346 in nsThreadManager::NewNamedThread(nsACString_internal const&, unsigned int, nsIThread**) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x319346)
#5 0x11902f2f6 in NS_NewNamedThread(nsACString_internal const&, nsIThread**, nsIRunnable*, unsigned int) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x31c2f6)
#6 0x11f3cb51e in mozilla::dom::MediaRecorder::Session::InitEncoder(unsigned char, int) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x66b851e)
#7 0x11f3cca47 in mozilla::dom::MediaRecorder::Session::TracksAvailableCallback::NotifyTracksAvailable(mozilla::DOMMediaStream*) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x66b9a47)
#8 0x11f0ecc26 in mozilla::DOMMediaStream::CheckTracksAvailable() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x63d9c26)
#9 0x11f10d567 in mozilla::detail::RunnableMethodImpl<mozilla::DOMMediaStream*, void (mozilla::DOMMediaStream::*)(), true, false>::Run() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x63fa567)
#10 0x1190263aa in nsThread::ProcessNextEvent(bool, bool*) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x3133aa)
#11 0x11901e580 in NS_ProcessPendingEvents(nsIThread*, unsigned int) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x30b580)
#12 0x120ab23cf in nsBaseAppShell::NativeEventCallback() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x7d9f3cf)
#13 0x120bc3555 in nsAppShell::ProcessGeckoEvents(void*) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x7eb0555)
#14 0x7fff9571a980 in __CFRUNLOOP_IS_CALLING_OUT_TO_A_SOURCE0_PERFORM_FUNCTION__ (/System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation+0xa7980)
#15 0x7fff956fb9f6 in __CFRunLoopDoSources0 (/System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation+0x889f6)
#16 0x7fff956faf75 in __CFRunLoopRun (/System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation+0x87f75)
#17 0x7fff956fa973 in CFRunLoopRunSpecific (/System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation+0x87973)
#18 0x7fff94c86a5b in RunCurrentEventLoopInMode (/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/HIToolbox.framework/Versions/A/HIToolbox+0x30a5b)
#19 0x7fff94c86890 in ReceiveNextEventCommon (/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/HIToolbox.framework/Versions/A/HIToolbox+0x30890)
#20 0x7fff94c866c5 in _BlockUntilNextEventMatchingListInModeWithFilter (/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/HIToolbox.framework/Versions/A/HIToolbox+0x306c5)
#21 0x7fff9322c5b3 in _DPSNextEvent (/System/Library/Frameworks/AppKit.framework/Versions/C/AppKit+0x475b3)
#22 0x7fff939a6d6a in -[NSApplication(NSEvent) _nextEventMatchingEventMask:untilDate:inMode:dequeue:] (/System/Library/Frameworks/AppKit.framework/Versions/C/AppKit+0x7c1d6a)
#23 0x120bc1a6c in -[GeckoNSApplication nextEventMatchingMask:untilDate:inMode:dequeue:] (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x7eaea6c)
#24 0x7fff93220f34 in -[NSApplication run] (/System/Library/Frameworks/AppKit.framework/Versions/C/AppKit+0x3bf34)
#25 0x120bc45e6 in nsAppShell::Run() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x7eb15e6)
#26 0x124800c8d in nsAppStartup::Run() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0xbaedc8d)
#27 0x124a20795 in XREMain::XRE_mainRun() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0xbd0d795)
#28 0x124a2376a in XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0xbd1076a)
#29 0x124a24ddd in XRE_main(int, char**, mozilla::BootstrapConfig const&) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0xbd11ddd)
#30 0x1016170df in main (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/firefox+0x1000020df)
#31 0x101616993 in start (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/firefox+0x100001993)
Command: /srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/firefox -width 512 -height 512 /srv/logs/framboise/framboise_Fri_Mar_17_13-45-14_2017/faults/0/testcase.html
|
|
1,348,424 | 12,155,614 |
This bug was filed from the Socorro interface and is
report bp-656f02c9-25a7-40b6-bcce-656632170316.
=============================================================
Filing because I saw this in nightly, and it appears to be meet the criteria of a UAF.
This crash is on Nightly, but there are a few other crashes on 52 that show the same crash address: http://bit.ly/2mBvhc0
|
|
1,341,131 | 12,083,353 |
This bug was filed from the Socorro interface and is
report bp-74c00195-152a-4d5d-af11-4ed972170220.
=============================================================
|
|
1,342,049 | 12,091,877 |
The following testcase crashes on mozilla-central revision 32dcdde1fc64 (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --enable-stdcxx-compat --disable-profiling --disable-debug --enable-optimize, run with --fuzzing-safe --ion-eager --no-threads):
function assert(mustBeTrue, message) {};
assert.throws = function (expectedErrorConstructor, func, message) {
try {
func();
} catch (thrown) {}
}
gczeal(9);
var nextItem;
var iterable = {};
iterable[Symbol.iterator] = function() {
return {
next: function() {
return { value: nextItem, done: false };
}
};
};
assert.throws(TypeError, function() {
new Map(iterable);
});
nextItem = true;
assert.throws(TypeError, function() {
new Map(iterable);
});
new Map(iterable);
Backtrace:
received signal SIGSEGV, Segmentation fault.
0x00000000006462aa in js::jit::SnapshotIterator::fromInstructionResult (index=<optimized out>, this=0x7fffffffc340) at js/src/jit/JitFrames.cpp:2209
#0 0x00000000006462aa in js::jit::SnapshotIterator::fromInstructionResult (index=<optimized out>, this=0x7fffffffc340) at js/src/jit/JitFrames.cpp:2209
#1 js::jit::SnapshotIterator::allocationValue (this=this@entry=0x7fffffffc340, alloc=..., rm=rm@entry=js::jit::SnapshotIterator::RM_Normal) at js/src/jit/JitFrames.cpp:1929
#2 0x0000000000648dd1 in js::jit::SnapshotIterator::read (this=0x7fffffffc340) at js/src/jit/JitFrameIterator.h:540
#3 js::jit::CloseLiveIteratorIon (tn=<optimized out>, frame=..., cx=0x7ffff6926800) at js/src/jit/JitFrames.cpp:352
#4 js::jit::HandleExceptionIon (overrecursed=0x7fffffffc1af, rfe=0x7fffffffc7a0, frame=..., cx=0x7ffff6926800) at js/src/jit/JitFrames.cpp:449
#5 js::jit::HandleException (rfe=<optimized out>) at js/src/jit/JitFrames.cpp:859
#6 0x000029391ff4215b in ?? ()
[...]
#15 0x0000000000000000 in ?? ()
rax 0x0 0
rbx 0x7fffffffffff 140737488355327
rcx 0x6462a0 6578848
rdx 0x2 2
rsi 0x7fffffffc280 140737488339584
rdi 0x7fffffffc340 140737488339776
rbp 0x5 5
rsp 0x7fffffffc128 140737488339240
r8 0x7fffffffc0d0 140737488339152
r9 0x2 2
r10 0x83 131
r11 0x0 0
r12 0x7fffffffc340 140737488339776
r13 0x8 8
r14 0x7ffff5bc6bc8 140737316154312
r15 0x7ffff6926800 140737330178048
rip 0x6462aa <js::jit::SnapshotIterator::allocationValue(js::jit::RValueAllocation const&, js::jit::SnapshotIterator::ReadMethod)+186>
=> 0x6462aa <js::jit::SnapshotIterator::allocationValue(js::jit::RValueAllocation const&, js::jit::SnapshotIterator::ReadMethod)+186>: mov (%rax),%rax
0x6462ad <js::jit::SnapshotIterator::allocationValue(js::jit::RValueAllocation const&, js::jit::SnapshotIterator::ReadMethod)+189>: mov (%rax),%rax
This looks like a crash at NULL but the test involves gczeal and it only reproduces with --no-threads, so I'm marking this s-s until investigated.
|
|
1,342,882 | 12,099,794 |
The following testcase crashes on mozilla-central revision a08ec245fa24 (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --enable-stdcxx-compat --disable-profiling --enable-debug --enable-optimize, run with --fuzzing-safe --ion-eager --ion-offthread-compile=off):
for (let [k, map = send.log += "" + map] of map) {}
Backtrace:
received signal SIGSEGV, Segmentation fault.
0x00000000007921c0 in js::jit::LIRGenerator::visitToString (this=0x7fffffffbf30, ins=0x7ffff69cf1b0) at js/src/jit/Lowering.cpp:2323
#0 0x00000000007921c0 in js::jit::LIRGenerator::visitToString (this=0x7fffffffbf30, ins=0x7ffff69cf1b0) at js/src/jit/Lowering.cpp:2323
#1 0x00000000007a2849 in js::jit::LIRGenerator::visitInstruction (this=this@entry=0x7fffffffbf30, ins=ins@entry=0x7ffff69cf1b0) at js/src/jit/Lowering.cpp:4851
#2 0x00000000007a2bae in js::jit::LIRGenerator::visitInstruction (ins=0x7ffff69cf1b0, this=0x7fffffffbf30) at js/src/ds/LifoAlloc.h:338
#3 js::jit::LIRGenerator::visitBlock (this=this@entry=0x7fffffffbf30, block=block@entry=0x7ffff69a9f50) at js/src/jit/Lowering.cpp:4931
#4 0x00000000007a2f1b in js::jit::LIRGenerator::generate (this=this@entry=0x7fffffffbf30) at js/src/jit/Lowering.cpp:4999
#5 0x00000000006c9deb in js::jit::GenerateLIR (mir=mir@entry=0x7ffff69a91b8) at js/src/jit/Ion.cpp:1962
#6 0x00000000006f2c65 in js::jit::CompileBackEnd (mir=mir@entry=0x7ffff69a91b8) at js/src/jit/Ion.cpp:2057
#7 0x000000000042f6c6 in js::jit::IonCompile (cx=cx@entry=0x7ffff6948000, script=<optimized out>, baselineFrame=baselineFrame@entry=0x0, osrPc=osrPc@entry=0x0, recompile=<optimized out>, optimizationLevel=<optimized out>) at js/src/jit/Ion.cpp:2338
#8 0x00000000006f3168 in js::jit::Compile (cx=cx@entry=0x7ffff6948000, script=script@entry=..., osrFrame=osrFrame@entry=0x0, osrPc=osrPc@entry=0x0, forceRecompile=forceRecompile@entry=false) at js/src/jit/Ion.cpp:2525
#9 0x00000000006f3308 in js::jit::CanEnter (cx=cx@entry=0x7ffff6948000, state=...) at js/src/jit/Ion.cpp:2622
#10 0x00000000005354cd in js::RunScript (cx=cx@entry=0x7ffff6948000, state=...) at js/src/vm/Interpreter.cpp:369
[...]
#19 main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at js/src/shell/js.cpp:8371
rax 0x0 0
rbx 0x7fffffffbf30 140737488338736
rcx 0x7ffff6c28a2d 140737333332525
rdx 0x0 0
rsi 0x7ffff6ef7770 140737336276848
rdi 0x7ffff6ef6540 140737336272192
rbp 0x7fffffffbdc0 140737488338368
rsp 0x7fffffffbd80 140737488338304
r8 0x7ffff6ef7770 140737336276848
r9 0x7ffff7fe4740 140737354024768
r10 0x58 88
r11 0x7ffff6b9f750 140737332770640
r12 0x7ffff69cf1b0 140737330868656
r13 0x7ffff69cf1b0 140737330868656
r14 0x7fffffffbf30 140737488338736
r15 0x7ffff4322580 140737290315136
rip 0x7921c0 <js::jit::LIRGenerator::visitToString(js::jit::MToString*)+800>
=> 0x7921c0 <js::jit::LIRGenerator::visitToString(js::jit::MToString*)+800>: movl $0x0,0x0
0x7921cb <js::jit::LIRGenerator::visitToString(js::jit::MToString*)+811>: ud2
Marking s-s until triaged because this is a LIR assertion, given the assertion message this might indicate some form of type mismatch.
|
|
1,345,409 | 12,125,518 |
Build: 7.0b1893
Device: iPad Air 2
iOS 10.2
Pre-requisites:
- Close Private Tabs set to On
Steps to reproduce:
1. Launch Firefox
2. Go to amazon.com in a private browsing session
3. Long tap on a link
4. Tap 'Open in New Private Tab'
5. Tap on the mask icon to return to normal browsing
Actual results:
- Firefox will crash.
See video:
- https://www.youtube.com/watch?v=sDoSAJ7lZhc
Note:
- The crash log is symbolicated on Nightly and on Beta I cannot find a crash log.
|
|
1,345,413 | 12,125,537 |
This bug was filed from the Socorro interface and is
report bp-1bd8abb0-1846-4dda-8fd8-8a7292170308.
=============================================================
It looks like we crash in XREMain::XRE_mainStartup if the LOGNAME environment variable is unset.
We got a few of those crashes since yesterday on 52.0 release from Ubuntu users, and I can reproduce locally with "env -u LOGNAME firefox". Not sure why this triggers now, it doesn't look like a new issue as far as I can tell. My own crash reports got a "[@ XREMain::XRE_mainStartup ]" (52.0) or "[@ libxul.so@0x25c18db | XREMain::XRE_main ]" (55.0a1) signature.
|
|
1,345,815 | 12,129,527 |
This bug was filed from the Socorro interface and is
report bp-2a9ef9a0-13c6-4b21-b266-a528b2170309.
=============================================================
Crashing Thread (0)
Frame Module Signature Source
0 mozglue.dll mozalloc_abort(char const* const) memory/mozalloc/mozalloc_abort.cpp:33
1 mozglue.dll mozalloc_handle_oom(unsigned int) memory/mozalloc/mozalloc_oom.cpp:46
2 mozglue.dll moz_xmalloc memory/mozalloc/mozalloc.cpp:85
3 xul.dll mozilla::layers::FillRectWithMask(mozilla::gfx::DrawTarget*, mozilla::gfx::RectTyped<mozilla::gfx::UnknownUnits, float> const&, mozilla::gfx::SourceSurface*, mozilla::gfx::SamplingFilter, mozilla::gfx::DrawOptions const&, mozilla::gfx::ExtendMode, mozilla::gfx::SourceSurface*, mozilla::gfx::Matrix const*, mozilla::gfx::Matrix const*) gfx/layers/basic/BasicLayersImpl.cpp:169
4 xul.dll mozilla::layers::FillRectWithMask(mozilla::gfx::DrawTarget*, mozilla::gfx::PointTyped<mozilla::gfx::UnknownUnits, float> const&, mozilla::gfx::RectTyped<mozilla::gfx::UnknownUnits, float> const&, mozilla::gfx::SourceSurface*, mozilla::gfx::SamplingFilter, mozilla::gfx::DrawOptions const&, mozilla::layers::Layer*) gfx/layers/basic/BasicLayersImpl.cpp:205
5 xul.dll mozilla::layers::BasicCanvasLayer::Paint(mozilla::gfx::DrawTarget*, mozilla::gfx::PointTyped<mozilla::gfx::UnknownUnits, float> const&, mozilla::layers::Layer*) gfx/layers/basic/BasicCanvasLayer.cpp:117
6 xul.dll mozilla::layers::BasicLayerManager::PaintSelfOrChildren(mozilla::layers::PaintLayerContext&, gfxContext*) gfx/layers/basic/BasicLayerManager.cpp:716
7 xul.dll mozilla::layers::BasicLayerManager::PaintLayer(gfxContext*, mozilla::layers::Layer*, void (*)(mozilla::layers::PaintedLayer*, gfxContext*, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::DrawRegionClip, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, void*), void*) gfx/layers/basic/BasicLayerManager.cpp:896
8 xul.dll mozilla::layers::BasicLayerManager::PaintSelfOrChildren(mozilla::layers::PaintLayerContext&, gfxContext*) gfx/layers/basic/BasicLayerManager.cpp:736
9 xul.dll mozilla::layers::BasicLayerManager::PaintLayer(gfxContext*, mozilla::layers::Layer*, void (*)(mozilla::layers::PaintedLayer*, gfxContext*, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::DrawRegionClip, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, void*), void*) gfx/layers/basic/BasicLayerManager.cpp:896
10 xul.dll mozilla::layers::BasicLayerManager::PaintSelfOrChildren(mozilla::layers::PaintLayerContext&, gfxContext*) gfx/layers/basic/BasicLayerManager.cpp:736
11 xul.dll mozilla::layers::BasicLayerManager::PaintLayer(gfxContext*, mozilla::layers::Layer*, void (*)(mozilla::layers::PaintedLayer*, gfxContext*, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::DrawRegionClip, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, void*), void*) gfx/layers/basic/BasicLayerManager.cpp:896
12 xul.dll mozilla::layers::BasicLayerManager::EndTransactionInternal(void (*)(mozilla::layers::PaintedLayer*, gfxContext*, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::DrawRegionClip, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, void*), void*, mozilla::layers::LayerManager::EndTransactionFlags) gfx/layers/basic/BasicLayerManager.cpp:622
13 xul.dll nsDisplayList::PaintRoot(nsDisplayListBuilder*, nsRenderingContext*, unsigned int) layout/painting/nsDisplayList.cpp:2055
14 xul.dll nsLayoutUtils::PaintFrame(nsRenderingContext*, nsIFrame*, nsRegion const&, unsigned int, nsDisplayListBuilderMode, nsLayoutUtils::PaintFrameFlags) layout/base/nsLayoutUtils.cpp:3675
15 xul.dll nsSimplePageSequenceFrame::PrintNextPage() layout/generic/nsSimplePageSequenceFrame.cpp:772
16 xul.dll nsPrintEngine::PrintPage(nsPrintObject*, bool&) layout/printing/nsPrintEngine.cpp:2745
17 xul.dll nsPagePrintTimer::Run() layout/printing/nsPagePrintTimer.cpp:89
18 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1240
19 xul.dll mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:96
20 xul.dll mozilla::ipc::MessagePumpForChildProcess::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:301
21 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:231
22 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:211
23 xul.dll nsBaseAppShell::Run() widget/nsBaseAppShell.cpp:156
24 xul.dll nsAppShell::Run() widget/windows/nsAppShell.cpp:262
25 xul.dll XRE_RunAppShell() toolkit/xre/nsEmbedFunctions.cpp:924
26 xul.dll mozilla::ipc::MessagePumpForChildProcess::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:269
27 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:231
28 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:211
29 xul.dll XRE_InitChildProcess(int, char** const, XREChildData const*) toolkit/xre/nsEmbedFunctions.cpp:756
30 xul.dll mozilla::BootstrapImpl::XRE_InitChildProcess(int, char** const, XREChildData const*) toolkit/xre/Bootstrap.cpp:65
31 firefox.exe content_process_main(mozilla::Bootstrap*, int, char** const) ipc/contentproc/plugin-container.cpp:115
32 firefox.exe wmain toolkit/xre/nsWindowsWMain.cpp:115
33 firefox.exe __scrt_common_main_seh f:/dd/vctools/crt/vcstartup/src/startup/exe_common.inl:253
34 kernel32.dll BaseThreadInitThunk
35 ntdll.dll __RtlUserThreadStart
36 ntdll.dll _RtlUserThreadStart
these out-of-memory signatures on windows seem to be regressing since 53 and later (related to bug 1311512?).
so far in very early crash data from 53.0b1 they account for 1.6% of all crashes there
|
|
1,346,269 | 12,134,317 |
This bug was filed from the Socorro interface and is
report bp-02ae372f-45d3-46ac-8b4b-e32cd2170309.
=============================================================
This is the #2 crash in the Android nightly of 20170309110217.
|
|
1,353,476 | 12,204,321 |
This bug was filed from the Socorro interface and is
report bp-4319cf83-b45c-4115-b42d-f60ef2170403.
=============================================================
Stack isn't clear due to lambdas, but almost certainly this is the one NewRunnableFrom() which uses [this instead of [self (and thus doesn't hold a ref to the object).
Obvious safe fix, which hopefully fixes the problem.
|
|
1,353,610 | 12,206,654 |
We have
https://crash-stats.mozilla.com/report/index/978fff99-50b0-406f-9d39-a0ecf2170329
https://crash-stats.mozilla.com/report/index/6bfbd5fb-b02f-4292-8549-9db5b2170329
https://crash-stats.mozilla.com/report/index/9edc3dbe-9217-485d-ae27-4f7da2170330
which look like a null deref and crashed on the main thread.
I will add some null checks in the hope of reducing null deref crash so other UAF issues can stand out.
|
|
1,353,762 | 12,208,450 |
User Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.41 Safari/537.36
Steps to reproduce:
Have a tab open (tested with a website, about:blank, and the your-tab-crashed-page)
Open dev console (F12) (it opens in a new window for me)
Paste and run the following code:
var limit = 1<<20
var hash_data = new Uint8Array([97, 98, 99])
for (var i = 0; i < limit; i++) {
crypto.subtle.digest("sha-512", hash_data)
}
console.log("done")
Actual results:
Firefox crashes, sometimes with the your-tab-crashed-page, and sometimes the entire thing with a small window opening for crash-report-submitting.
Firefox seems to cope with a higher limit if dev console is open (I haven't tested this thoroughly).
Expected results:
Firefox shouldn't crash.
|
|
1,354,528 | 12,215,823 |
Created attachment 8855771
Screencast of the issue, USB headset unplugged around 00:47
STR:
- Plug a USB headset (with microphone and headphones) in a Windows laptop (windows 7 and more recent). This laptop MUST have an internal microphone.
- Set it as a default device, and default communication device.
- This might be the default, depending on the configuration. If the device in the instructions below already have green ticks, no need to do anything.
- To check, right click on the speaker icon on the systray
- Click "Playback devices"
- Right click on the USB device
- Click "set as default device", "set as defaut communication device"
- Click on the "Recording" tab, and do the same:
- Right click on the USB device "Set as default device", "Set as default communication device".
- When this is done, the USB device on both the Playback and Recording tab should have a green tick.
- Open any page that uses getUserMedia, requesting an audio stream, for example, https://mozilla.github.io/webrtc-landing/gum_test.html, click on "Audio", accept the prompt (it should mention the USB device)
- Unplug the USB headset
Expected:
- Firefox now uses the internal microphone
Actual:
- Clean crash on an exception
This is caused by the fact that we miss a single line from this beta, we've uplifted the line in question to aurora and it's been in nightly for a while.
|
|
1,343,522 | 12,106,639 |
Created attachment 8842418
Client 01-03-2017, 16-18.crash
Build: d66101cc
Device: iPad Air 2
iOS: 10.2
Steps to reproduce:
1. Go to youtube.com
2. Long tap on a link to open the context menu
3. Dismiss the context menu by tapping on on the page
4. Change device orientation
Actual results:
- Firefox will crash
Note:
- This is a posible swift 3 migration regression
- Issue reproducible only on iPads
|
|
1,343,550 | 12,106,914 |
Created attachment 8842452
testcase.html
The attached testcase causes a crash near null in mozilla-central rev 34c6c2f302e7.
==19011==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x7f1ed98dfb62 bp 0x7ffeb84f8750 sp 0x7ffeb84f8640 T0)
#0 0x7f1ed98dfb61 in mozilla::dom::AudioNode::AudioNode(mozilla::dom::AudioContext*, unsigned int, mozilla::dom::ChannelCountMode, mozilla::dom::ChannelInterpretation) /home/worker/workspace/build/src/dom/media/webaudio/AudioNode.cpp:5
7:25
#1 0x7f1ed997bc5d in mozilla::dom::ScriptProcessorNode::ScriptProcessorNode(mozilla::dom::AudioContext*, unsigned int, unsigned int, unsigned int) /home/worker/workspace/build/src/dom/media/webaudio/ScriptProcessorNode.cpp:491:5
#2 0x7f1ed98f836c in mozilla::dom::AudioContext::CreateScriptProcessor(unsigned int, unsigned int, unsigned int, mozilla::ErrorResult&) /home/worker/workspace/build/src/dom/media/webaudio/AudioContext.cpp:350:9
#3 0x7f1ed7324d99 in mozilla::dom::BaseAudioContextBinding::createScriptProcessor(JSContext*, JS::Handle<JSObject*>, mozilla::dom::AudioContext*, JSJitMethodCallArgs const&) /home/worker/workspace/build/src/obj-firefox/dom/bindings/Bas
eAudioContextBinding.cpp:654:65
#4 0x7f1ed896b787 in mozilla::dom::GenericBindingMethod(JSContext*, unsigned int, JS::Value*) /home/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:2953:13
#5 0x7f1ede46943f in CallJSNative /home/worker/workspace/build/src/js/src/jscntxtinlines.h:282:15
|
|
1,343,723 | 12,108,922 |
The following testcase crashes on mozilla-central revision e91de6fb2b3d (build with --enable-debug --enable-more-deterministic, run with --fuzzing-safe --no-threads --ion-eager):
// jsfunfuzz-generated
oomTest(function() {
// Adapted from randomly chosen test: js/src/tests/ecma_6/Promise/iterator-close.js
class MyPromiseStaticResolveGetterThrows extends Promise {}
(function() {
for (y of [0]) {
let x;
z;
(function() {
return x;
})();
}
})()
})
Backtrace:
#0 js::jit::MachineState::read (reg=..., this=0x7ffeefca51d0) at js/src/jit/Registers.h:242
#1 js::jit::SnapshotIterator::fromRegister (this=0x7ffeefca5020, reg=...) at js/src/jit/JitFrameIterator.h:418
#2 js::jit::SnapshotIterator::allocationValue (this=this@entry=0x7ffeefca5020, alloc=..., rm=rm@entry=js::jit::SnapshotIterator::RM_Normal) at js/src/jit/JitFrames.cpp:1855
#3 0x0000000000811c99 in js::jit::SnapshotIterator::read (this=this@entry=0x7ffeefca5020) at js/src/jit/JitFrameIterator.h:540
#4 0x0000000000e6fbfb in InitFromBailout (caller=..., ionScript=<optimized out>, excInfo=0x7ffeefca55c0, callPC=<synthetic pointer>, nextCallee=..., startFrameFormals=..., builder=..., invalidate=true, iter=..., script=..., fun=..., callerPC=0x0, cx=0x7fc29a250000) at js/src/jit/BaselineBailouts.cpp:725
#5 js::jit::BailoutIonToBaseline (cx=0x7fc29a250000, activation=0x7ffeefca5db0, iter=..., invalidate=invalidate@entry=true, bailoutInfo=bailoutInfo@entry=0x7ffeefca5148, excInfo=excInfo@entry=0x7ffeefca55c0) at js/src/jit/BaselineBailouts.cpp:1620
/snip
For detailed crash information, see attachment.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.