Bug ID
int64
961
1.91M
Comment ID
int64
3.98k
17.1M
Author
stringlengths
8
48
Comment Text
stringlengths
1
64.3k
195,654
1,765,369
The application will not startup (i.e., show the first window) starting with 2003-03-01 trunk builds of mozilla and netscape on Mac OS X. This appears to be a smoketest blocker. Assigning to Jan for some quick traction on this issue.
202,555
1,821,283
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.4b) Gecko/20030418 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.4b) Gecko/20030418 When I try to load a message on an IMAP server, I get a dialog box stating access to the port has been disabled for security reasons, followed by an IMAP connection error dialog. I tried overriding the protection by adding port 143 to network.security.ports.banned.override, and then I got "This request was not recognized. Perform a trace." in the message area, possibly from my proxy, which would be even more bizarre. Reproducible: Always Steps to Reproduce: 1. Click on an IMAP account's inbox 2. Click on a message Actual Results: See above Expected Results: Display the message body :)
202,895
1,824,511
build ID: 2003042112 on Win2k. Steps to reproduce (100% on this computer): 1. Load URL http://www1.msfc.nasa.gov/NEWSROOM/news/photos/1998/photos98-050.htm 2. Having middle-click to open new tabs in background, quickly click on 4 or 5 'Large' JPG links, an example is http://www1.msfc.nasa.gov/NEWSROOM/news/photos/images/arizona1.jpg 3. While you see the images loading (via tab title), start to close tabs clicking on the 'X', beginning with the tab on the right 4. Close tabs quickly one after another, 5. Mozilla crashes. Talkback ID: TB19392027Z.
203,057
1,825,910
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.4b) Gecko/20030423 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.4b) Gecko/20030423 I am a new mozilla user. When connecting to any secure (https) web site via a proxy server I get prompted for my proxy account and then nothing further happens, the displayed page does not change and the status is reported as done. I have seen this work fine when connected directly to the internet. Reproducible: Always Steps to Reproduce: 1.start mozilla 2.Enter https://sourceforge.net 3. Actual Results: As described in details - prompt for proxy then nothing Expected Results: Display the secure web site
206,199
1,853,719
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.4b) Gecko/20030507 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.4b) Gecko/20030507 In 1.4b (not 1.4a or earlier) the mail client regularly crashes on startup. This seems unrelated to whether I've already opened a browser window, or to whether I've established a dialup connection (mail servers are all accessed over dialup). Incidents: TB20213764H TB20209157Q TB20209092M TB20206049X TB20201907G TB20193362Z Reproducible: Always Steps to Reproduce: Doesn't happen all the time - maybe 50% ? Just bring up the mail client and it happens. Actual Results: crash Expected Results: not crash I don't think this is related to bug #142615, which is the only mail crash on startup bug I can find in bugzilla. This problem is new in test release 1.4b - 1.3, 1.4a were both fine.
206,695
1,857,861
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4b) Gecko/20030507 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4b) Gecko/20030507 See for example bug #138499. Exactly the same thing. For pages served as application/xhtml+xml the form data is not restored when you go back, but you get the initial values. Reproducible: Always Steps to Reproduce: Just load my form.xhtml and form.html. This already shows the behaviour. Actual Results: If you remove the data in the text area, press Save and go back, your data is there again. Expected Results: Behave like the text/html mode. That one works fine.
206,947
1,860,246
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4b) Gecko/20030521 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4b) Gecko/20030521 XMLHttpRequest crashes the browser on approx 500th call, this number is cumulative, i.e. if call made 300 times then the window closed and the page is opened in another the browser will crash after ~200 calls. The same effect in Mozilla on Linux and Windows. On Windows it also says there's a problem in XPCOM library. Reproducible: Always Steps to Reproduce: 1.open the page test.html 2.wait until counter gets to ~500 Actual Results: browser crashes Expected Results: browser should keep working this bug does not depend on setTimeout() - with for(;;) loop it gives the same crash, and this bug does not depend on setting innerHTML of the element. <html><head> </head><body onload="changeSize();"> <script> var count = 0; var xml = null; if(document.all) xml = new ActiveXObject('Microsoft.XMLHTTP'); else xml = new XMLHttpRequest(); function changeSize(){ xml.open("GET", "about:blank", false); xml.send(null); document.getElementById("count").innerHTML = eval(++count); setTimeout("changeSize()", 50); } </script> <br> Count: <span id="count">0</span> </body> </html>
212,336
1,905,740
User-Agent: Mozilla/5.0 (Windows; U; Win95; en-US; rv:1.4) Gecko/20030624 Build Identifier: Mozilla/5.0 (Windows; U; Win95; en-US; rv:1.4) Gecko/20030624 I type in the address of a server on the intranet that is running Windows NT4, accessing a Virtual Directory that has Anonymous Authentication turned off, leaving only Integrated Windows Authentication. According to the release notes, Mozilla 1.4 supports NTLM Authentication. However, when I attempt to access the page, it returns the 401.2 error, "Unauthorized: Logon Failed due to server configuration" However, using Live HTTP Headers, I see that the WWW-Authenticate header field does have NTLM... Also, I can access the same URL using IE and it authenticates. Reproducible: Always Steps to Reproduce: 1. Type in a URL that goes to a folder or page that requires NTLM authentication. 2. Do this from a workstation that has an authorized person logged in. Actual Results: A page loads with the following text: HTTP Error 401 401.2 Unauthorized: Logon Failed due to server configuration This error indicates that the credentials passed to the server do not match the credentials required to log on to the server. This is usually caused by not sending the proper WWW-Authenticate header field. Please contact the Web server's administrator to verify that you have permission to access to requested resource. Expected Results: Performed the appropriate authentication and displayed the web page. Here's what Live HTTP Headers reports (names have been changed): ---------------------------------------------------------- http://intranet.example.com/VirtualDirectory/ GET http://intranet.example.com/VirtualDirectory/ HTTP/1.1 Host: intranet.example.com User-Agent: Mozilla/5.0 (Windows; U; Win95; en-US; rv:1.4) Gecko/20030624 Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,video/x-mng,image/png,image/jpeg,image/gif;q=0.2,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 300 Proxy-Connection: keep-alive Referer: http://intranet.example.com/ Cookie: ASPSESSIONIDQQGQGHWL=EPBPOKPBLBPCNHNPBFDHAICK HTTP/1.x 401 Unauthorized WWW-Authenticate: NTLM Content-Length: 644 Content-Type: text/html X-Cache: MISS from cache.example.com ----------------------------------------------------------
213,482
1,914,605
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.5a) Gecko/20030714 Mozilla Firebird/0.6 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.5a) Gecko/20030714 Mozilla Firebird/0.6 I had an input element on a page whose value property I was watching. However, I was new to using the watch method and was setting the value property from within the function called by the watch method. This (now) obviously leads to an infinite loop which caused Firebird to crash. Reproducible: Always Steps to Reproduce: 1. Set the value property of an input element from the function called by the watch method that is watching that property. Actual Results: Firebird crashed. Expected Results: Firebird should not crash. Here is a minimal case: <input id="test"> <script type="text/html"> test = document.getElementById('test'); function watched (a, b, c) { test.value = 'a'; } test.watch("value", watched); </script>
207,673
1,865,922
User-Agent: Mozilla/5.0 (X11; U; FreeBSD i386; en-US; rv:1.3a) Gecko/20030524 Phoenix/0.5 Build Identifier: Mozilla/5.0 (X11; U; FreeBSD sparc64; en-US; rv:1.4b) Gecko/20030526 In js/src/jsfun.c:fun_xdrObject(), JS_XDRUint32 is used on &userid (twice); userid is of type jsid, which is indirectly typedef'ed to long, while JS_XDRUint32 takes a pointer to an uint32 to read the data from or write the result into. This causes problems on architectures where sizeof(long) > sizeof(unit32) (i.e. 64-bit platforms): when the architecture is big-endian also, this will store/retrieve the most significant 4 bytes of userid, which is not what is desired (since the desired value is kept in the least significant 4 bytes). I have verified that this problem still is present in the latest sources. The bug triggers a SIGSEGV on startup when reading the XUL.mfasl FastLoad file, by causing invalid JavaScript state. I have attached a patch which fixes this problem for me; it changes the type of userid to uint32, thereby avoiding the problem. Since the XDR representation restricts the range to that of an uint32 anyway, this should not cause any problems. In case the patch gets mangled, it is also available at http://people.freebsd.org/~tmm/patch-jsfun.c Reproducible: Always Steps to Reproduce: Working on a big-endian 64-bit platform (with sizeof(long) == 8), Unixoid system: 1. Remove ~/.mozilla 2. start mozilla 3. quit it again immediately; XUL.mfasl will be generated in the preference directory 4. start mozilla again Actual Results: The browser will get a SIGSEGV and crash silently, because of incorrect JavaScript state caused by the above bug. Expected Results: Start up normally.
207,740
1,866,423
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.4) Gecko/20030529 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.4) Gecko/20030529 Mozilla 1.4 RC 1 crashes on accessing certain HTTPS sites (either entering them in the URL bar or clicking on a link.) At the moment I have only been able to reproduce this bug with my local web server. I haven't found public internet servers that trigger the same behaviour. But by accessing my local server I can reproduce the crash every time. Reproducible: Always Steps to Reproduce: 1. Enter an url in the location bar e.g. "https://www" and press enter Actual Results: Browser crashes. Expected Results: Browser opens this page using SSL. Talkback Incident IDs: TB20604478W, TB20604426Q, TB20604314K and TB20604306Z. My local web server is running Apache 1.3.27 and mod_ssl 2.8.12-1.3.27. The page requested is very simple: <HTML><BODY>-</BODY></HTML>.
207,781
1,866,626
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.4b) Gecko/20030526 Mozilla Firebird/0.6 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.4b) Gecko/20030526 Mozilla Firebird/0.6 Whenever I click a link (with the left one or the middle one), don't move the cursor, and then scroll with mouse wheel there is a systematic crash (memory can't be read...) Posted on YaBBSE but the answer was: "This is not a YaBB SE bug. It may be a bug in the template. I think it's in Firebird." Reproducible: Always Steps to Reproduce: 1.Move cursor on a link within the board 2.Click on it, and let the cursor on it 3.Scroll with your mouse wheel Actual Results: Memory can't be read - Mozilla crash Application Violation in gklayout.dll
208,095
1,869,270
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4) Gecko/20030529 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4) Gecko/20030529 Crashes Mozilla when I input space follows English text with kinput. Reproducible: Always Steps to Reproduce: 1.Open composer or webpage with text form. 2.Input something in English. (eg. "a") 3.Press "Shift + space" to start kinput Japanese input mode. 4.Press "Space" to input space Actual Results: Crash and start "Quality feedback agent". This problem was not cause in Windows or input Japanese with "jmode" instead kinput (on Linux).
209,032
1,877,441
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.4) Gecko/20030529 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.4) Gecko/20030529 crash if i try to do the steps necessary to reproduce the bug. Reproducible: Always Steps to Reproduce: 1. set mozilla to open search results in the sidebar 2. bookmark a (google) search result 3. open the bookmarks tab in the sidebar, click on the bookmarked search result and at the same moment right click on the (same) bookmark link Actual Results: mozilla crashed (while trying to switch to the search tab in the sidebar) Expected Results: switch to the search tab and close the opened right-click-window. Talkback crash ID: TB20936385H and TB20931617K
218,031
1,948,163
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.5b) Gecko/20030827 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.5b) Gecko/20030827 This looks like it's due to some interaction between Mathml and CSS. Eliminting the link to the style sheet makes things work. Reproducible: Always Steps to Reproduce: 1. 2. 3. Actual Results: This causes a repeatable crash. Simply try to open the page and the crash should occur Expected Results: This works fine in Mozilla 1.4 gklayout.dll
218,222
1,949,570
BUILD: 1.5b mozilla.org talkback zip build, on Windows 98 STEPS TO REPRODUCE: 1) Load http://uk.trendmicro-europe.com/PWT/pl/index.php 2) Hit Ctrl-Shift-I to start DOM Inspector 3) Click the binoculars at top left and search for the element with ID "cHoveruk" (a div containing an img) 4) In the right panel, select the "CSS Style Rules" viewer 5) Click on the third rule in the top right panel (the inline style rule) 6) Right-click on the "visibility" row in the bottom right panel and select "edit" 7) Replace the value with "visible" and hit "enter" ACTUAL RESULTS: crash EXPECTED RESULTS: no crash TALKBACK IDS: TB23305815Q, TB23305574Y A stack (based on those IDs or from a debug build) would be most helpful.
209,593
1,885,049
Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.5a) Gecko/20030615 Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.5a) Gecko/20030616 Moving several (at least two) mails per drag'n'drop from subfolder of POP3 inbox into subfolder of Local Folders crashes Mozilla. Talkback-ID TB21092337G: Incident ID 21092337 Stack Signature 0x95e3fcdb 8d61909d Email Address [email protected] Product ID MozillaTrunk Build ID 2003061611 Trigger Time 2003-06-16 14:25:46 Platform Win32 Operating System Windows NT 5.0 build 2195 Module URL visited User Comments moving several mails per drag'n'drop from subfolder of POP2-inbox into subfolder of Local Folders Trigger Reason Access violation Source File Name Trigger Line No. Stack Trace 0x95e3fcdb 0x01e2fa85 nsDragService::InvokeDragSession [c:/builds/seamonkey/mozilla/widget/src/windows/nsDragService.cpp, line 131] XPTC_InvokeByIndex [c:/builds/seamonkey/mozilla/xpcom/reflect/xptcall/src/md/win32/xptcinvoke.cpp, line 102] XPCWrappedNative::CallMethod [c:/builds/seamonkey/mozilla/js/src/xpconnect/src/xpcwrappednative.cpp, line 2019] XPC_WN_CallMethod [c:/builds/seamonkey/mozilla/js/src/xpconnect/src/xpcwrappednativejsops.cpp, line 1270] js_Invoke [c:/builds/seamonkey/mozilla/js/src/jsinterp.c, line 845] js_Interpret [c:/builds/seamonkey/mozilla/js/src/jsinterp.c, line 2856] js_Invoke [c:/builds/seamonkey/mozilla/js/src/jsinterp.c, line 861] js_InternalInvoke [c:/builds/seamonkey/mozilla/js/src/jsinterp.c, line 936] JS_CallFunctionValue [c:/builds/seamonkey/mozilla/js/src/jsapi.c, line 3533] nsJSContext::CallEventHandler [c:/builds/seamonkey/mozilla/dom/src/base/nsJSEnvironment.cpp, line 1114] nsJSEventListener::HandleEvent [c:/builds/seamonkey/mozilla/dom/src/events/nsJSEventListener.cpp, line 183] nsEventListenerManager::HandleEventSubType [c:/builds/seamonkey/mozilla/content/events/src/nsEventListenerManager.cpp, line 1192] nsEventListenerManager::HandleEvent [c:/builds/seamonkey/mozilla/content/events/src/nsEventListenerManager.cpp, line 2017] nsXULElement::HandleDOMEvent [c:/builds/seamonkey/mozilla/content/xul/content/src/nsXULElement.cpp, line 3303] nsEventStateManager::GenerateDragGesture [c:/builds/seamonkey/mozilla/content/events/src/nsEventStateManager.cpp, line 1527]
210,119
1,889,192
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.5a) Gecko/20030620 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.5a) Gecko/20030620 Nightly build 2003062004 browser crashes when opening this url: http://realtytimes.com/rtnews/rtapages/20020426_realist.htm Reproducible: Always Steps to Reproduce: 1. Open http://realtytimes.com/rtnews/rtapages/20020426_realist.htm 2. 3. Actual Results: Crash Expected Results: Opened page.
211,462
1,898,927
seen with 7.1 rtm build on JA locale on MacOS10.1.5 (does NOT happen with other IME neither on 10.2 steps to reproduce: - launch 7.1 on JA locale; - go to Composer; - JA IME will be a default IME; - type something into the Composer; - no need to save; - restart/reopen the application; - open Composer; //note: cursor is not blinking at the beginning of the line; - try to input something in JA, crash
179,524
1,630,105
User-Agent: Mozilla/5.0 (Windows; U; WinNT4.0; en-US; rv:1.3a) Gecko/20021111 Build Identifier: Mozilla/5.0 (Windows; U; WinNT4.0; en-US; rv:1.3a) Gecko/20021111 Pretty simple, mozilla crashed 100% of the time when opening similar pages. It started early in the 1.2 development cycle and has not yet been fixed. See attached zip file for the page that causes the crash. Reproducible: Always Steps to Reproduce: 1. unzip attached file 2. open test.html page in Mozilla 3. Actual Results: Mozilla crashes Expected Results: Mozilla should display the page I work for a giant corporation and our standard intranet header/footer is based on the same theme for the file I attached. (I tried to sanitize the attachment. I can assure you the real version is correct html; however, in either case, Mozilla should not crash). Previous versions of Netscape and Mozilla <= 1.1 work fine. I am submitting this as Critial, but for me personally, it is a blocker. I simply cannot use Mozilla to access any intranet web site at my company. I have submitted several talkback crashes mostly under other email addresses... TB13796296Q or if you can search on my last name in the email field for submitted talkbacks you will probably find many others.
187,306
1,693,621
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.2.1) Gecko/20021230 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.2.1) Gecko/20021230 After setting the memory cache size to non-zero and opening a web-page the browser crashes immediately. Reproducible: Always Steps to Reproduce: 1. set memory cache to 0 (I use 'compare the page(...)' set to 'every time I view the page', do not know if it's related) 2. exit mozilla and re-start it. 3. open a web-page, it opens up fine. 4. set memory cache to non-zero (I used 1024) 5. try to open a web-page, and the browser crashes. Actual Results: browser crash Expected Results: obviously not crash! ;)
187,673
1,696,926
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020823 Netscape/7.0 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020823 Netscape/7.0 Mail title is not consistent with the mail message Reproducible: Always Steps to Reproduce: Steps to Repro: 1.Start mozilla Mail. 2.Quick search by inputing a word in field"Subject or Sender contains:". 3.Double click a message. 4.Click Clear at the right of the quick search field to show all the messages. 5.Double click another message(not in the previous list resulted from search). Actual Results: The title of the new opened message is the old one. Expected Results: The title of the new opened message is the current selected messgae
181,592
1,648,227
Build ID: 2002-11-21-08, Windows XP. Summary: Crash in nsCOMArrayEnumerator::~nsCOMArrayEnumerator shutting down the browser (only Mail and Nav were open). Steps to Reproduce: I haven't been able to reproduce yet, but I had WinDVD running (as well as mIRC) in the background. Even though it didn't say 'App not responding' in the taskmanager, it was taking a long time to close down the Mail window and when it finally closed down mail, once I closed Nav down, I crashed. (Catch all that? ;-) Incident ID 14282742 Stack Signature nsCOMArrayEnumerator::~nsCOMArrayEnumerator f8b23811 Product ID MozillaTrunk Build ID 2002112108 Trigger Time 2002-11-22 22:57:14 Platform Win32 Operating System Windows NT 5.1 build 2600 Module xpcom.dll URL visited User Comments I was just shutting down the browser (it was in the background] Trigger Reason Access violation Source File Name c:/builds/seamonkey/mozilla/xpcom/ds/nsArrayEnumerator.cpp Trigger Line No. 135 Stack Trace nsCOMArrayEnumerator::~nsCOMArrayEnumerator [c:/builds/seamonkey/mozilla/xpcom/ds/nsArrayEnumerator.cpp, line 135] nsCOMArrayEnumerator::`scalar deleting destructor' ObserverListEnumerator::Release [c:/builds/seamonkey/mozilla/xpcom/ds/nsObserverList.cpp, line 167] nsCOMPtr_base::~nsCOMPtr_base [c:/builds/seamonkey/mozilla/xpcom/glue/nsCOMPtr.cpp, line 65] nsHttpHandler::OnExamineResponse [c:/builds/seamonkey/mozilla/netwerk/protocol/http/src/nsHttpHandler.cpp, line 635] nsHttpChannel::ProcessResponse [c:/builds/seamonkey/mozilla/netwerk/protocol/http/src/nsHttpChannel.cpp, line 606] nsHttpChannel::OnStartRequest [c:/builds/seamonkey/mozilla/netwerk/protocol/http/src/nsHttpChannel.cpp, line 2922] nsOnStartRequestEvent::HandleEvent [c:/builds/seamonkey/mozilla/netwerk/base/src/nsRequestObserverProxy.cpp, line 162] PL_HandleEvent [c:/builds/seamonkey/mozilla/xpcom/threads/plevent.c, line 645] PL_ProcessPendingEvents [c:/builds/seamonkey/mozilla/xpcom/threads/plevent.c, line 578] nsEventQueueImpl::ProcessPendingEvents [c:/builds/seamonkey/mozilla/xpcom/threads/nsEventQueue.cpp, line 392]
185,357
1,677,218
User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98) Opera 6.02 [en] Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.2.1) Gecko/20021130 When print previewing an iframe that will not fit on one page after scaling, moz crashes. See test case (based on http://www.pcmag.com/article2/0,4149,715464,00.asp). Reproducible: Always Steps to Reproduce: 1. Print preview the test case. Actual Results: Crash. See TB15027476Z May be linked to other iframe print layout bugs e.g. 113217, tho they do not crash.
186,132
1,684,516
Build ID: 2002121808 on Win2k. Steps to reproduce 100%: 1. Load URL http://www.t-mobile.com/hotspot/ 2. Mouse over the 'About us' box, grey should change to white, 3. remove mouse from box, 4. Wait, Mozilla crashes. Talkback ID: TB15275544K could be regression from bug 103055, see bug 185850.
186,606
1,688,251
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.3b) Gecko/20021220 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.3b) Gecko/20021220 talkback id TB15427908X how to reproduce 1. email yourself http://www.codingstyle.com/ 2. click on the email arrived Reproducible: Always Steps to Reproduce: 1. email yourself http://www.codingstyle.com/ 2. click on the email arrived Actual Results: CRASH Expected Results: be able to read email
190,549
1,722,152
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.3b) Gecko/20030118 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.3b) Gecko/20030118 Using the above URL (vipersoft.co.uk/form1.html) if I click on "Go" it stays on the first page. This is broken between the 20020116 and 20020118 builds. Reproducible: Always Steps to Reproduce: 1.Load URL (http://vipersoft.co.uk/form1.html) 2.Click Go 3.Does it stay on first page (form1) or go through to second page (form2) Actual Results: stays on first page (form1) Expected Results: should go to second page (form2)
190,946
1,725,361
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.3b) Gecko/20030127 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.3b) Gecko/20030127 Refreshing newsgroups (news.helsinki.fi) does not show (or download?) all groups. I just tested 1.2.1 too and it works ok. (news.helsinki.fi has about 15 000 groups, but only some of them shows up outside helsinki.fi-domain. So testing might be difficult.) Reproducible: Always Steps to Reproduce:
190,988
1,725,766
Mozilla hang when displaying image attachments. Small attachments seems to work, but most images just hangs. 2003011708 is last nightly that works, all after that hangs. Header seems to load ok (window caption is updated) but then hangs. Steps to reproduce: 1. start mailnews 2. subscribe to some group with pictures 3. view some images Actual results: Hang Expected: Image viewed gdb backtrace when hang: #0 0x420293d5 in sigsuspend () from /lib/i686/libc.so.6 #1 0x4012f609 in __pthread_wait_for_restart_signal () from /lib/i686/libpthread.so.0 #2 0x4012beec in pthread_cond_wait () from /lib/i686/libpthread.so.0 #3 0x400fc3f8 in PR_WaitCondVar (cvar=0x8837320, timeout=4294967295) at ../../../../../nsprpub/pr/src/pthreads/ptsynch.c:389 #4 0x400fcbaf in PR_Wait (mon=0x879d118, timeout=4294967295) at ../../../../../nsprpub/pr/src/pthreads/ptsynch.c:567 #5 0x40504549 in nsAutoMonitor::Wait (this=0xbfffef50, interval=4294967295) at ../../dist/include/xpcom/nsAutoLock.h:278 #6 0x40502670 in nsPipeOutputStream::Wait (this=0x885fb90) at ../../../xpcom/io/nsPipe3.cpp:917 #7 0x40502b3f in nsPipeOutputStream::WriteSegments (this=0x885fb90, reader=0x40502c54 <nsReadFromRawBuffer(nsIOutputStream *, void *, char *, unsigned int, unsigned int, unsigned int *)>, closure=0x877fe38, count=58, writeCount=0xbfffeffc) at ../../../xpcom/io/nsPipe3.cpp:1029 #8 0x40502ccb in nsPipeOutputStream::Write (this=0x885fb90, from Buf=0x877fe38 "M4T1(*[email protected]:5ZH`@2Q!U3()?:7]B2H['9]'2AU)D2#HUE64N!]+ZJ*;-[]", bufLen=61, writeCount=0xbfffeffc) at ../../../xpcom/io/nsPipe3.cpp:1088 #9 0x4560b6bc in nsNNTPProtocol::DisplayArticle (this=0x87ce728, inputStream=0x89188bc, length=16384) at ../../../../mailnews/news/src/nsNNTPProtocol.cpp:2557 #10 0x4560b8e3 in nsNNTPProtocol::ReadArticle (this=0x87ce728, inputStream=0x89188bc, length=16384) at ../../../../mailnews/news/src/nsNNTPProtocol.cpp:2599 #11 0x45614ac9 in nsNNTPProtocol::ProcessProtocolState (this=0x87ce728, url=0x88868ac, inputStream=0x89188bc, sourceOffset=41930, length=16384) at ../../../../mailnews/news/src/nsNNTPProtocol.cpp:5128 #12 0x431ee723 in nsMsgProtocol::OnDataAvailable (this=0x87ce734, request=0x88be198, ctxt=0x88868a8, inStr=0x89188bc, sourceOffset=41930, count=16384) at ../../../../mailnews/base/util/nsMsgProtocol.cpp:327 #13 0x40895212 in nsInputStreamPump::OnStateTransfer (this=0x88be198) at ../../../../netwerk/base/src/nsInputStreamPump.cpp:402 #14 0x40894e33 in nsInputStreamPump::OnInputStreamReady (this=0x88be198, stream=0x89188bc) at ../../../../netwerk/base/src/nsInputStreamPump.cpp:317 #15 0x4050604d in nsInputStreamReadyEvent::EventHandler (plevent=0x8308a08) at ../../../xpcom/io/nsStreamUtils.cpp:101 #16 0x4052b9f0 in PL_HandleEvent (self=0x8308a08) at ../../../xpcom/threads/plevent.c:663 #17 0x4052b805 in PL_ProcessPendingEvents (self=0x8123cd8) at ../../../xpcom/threads/plevent.c:593 #18 0x4052db06 in nsEventQueueImpl::ProcessPendingEvents (this=0x8123c90) at ../../../xpcom/threads/nsEventQueue.cpp:387 #19 0x4154cc50 in event_processor_callback (data=0x8123c90, source=6, condition=GDK_INPUT_READ) at ../../../../widget/src/gtk/nsAppShell.cpp:198 #20 0x4154c6e3 in our_gdk_io_invoke (source=0x82ba7b0, condition=G_IO_IN, data=0x82c7988) at ../../../../widget/src/gtk/nsAppShell.cpp:77 #21 0x402b4f9e in g_io_unix_dispatch () from /usr/lib/libglib-1.2.so.0 #22 0x402b6773 in g_main_dispatch () from /usr/lib/libglib-1.2.so.0 #23 0x402b6d39 in g_main_iterate () from /usr/lib/libglib-1.2.so.0 #24 0x402b6eec in g_main_run () from /usr/lib/libglib-1.2.so.0 #25 0x401d22e3 in gtk_main () from /usr/lib/libgtk-1.2.so.0 #26 0x4154d1d9 in nsAppShell::Run (this=0x8188368) at ../../../../widget/src/gtk/nsAppShell.cpp:346 #27 0x414fba8d in nsAppShellService::Run (this=0x8180aa8) at ../../../../xpfe/appshell/src/nsAppShellService.cpp:479 #28 0x08066819 in main1 (argc=2, argv=0xbffff714, nativeApp=0x8103380) at ../../../xpfe/bootstrap/nsAppRunner.cpp:1298 #29 0x080673d7 in main (argc=2, argv=0xbffff714) at ../../../xpfe/bootstrap/nsAppRunner.cpp:1668 #30 0x42017589 in __libc_start_main () from /lib/i686/libc.so.6
191,246
1,727,905
STEPS TO REPRODUCE: Click the link in the "url" field ACTUAL RESULTS: crash EXPECTED RESULT: act like a browser instead of wimping out PROBLEM: Bug 131065 introduced the following code in nsObjectFrame::GetDesiredSize: 904 else {// unconstrained percent case 905 nsCOMPtr<nsIAtom> fType; 906 const nsHTMLReflowState* cbrs = aReflowState.parentReflowState; 907 nsIFrame* f = cbrs->parentReflowState->frame; 908 f->GetFrameType(getter_AddRefs(fType)); This code has one little problem -- it's missing some major null-checking, starting with the fact that for fixed-positioned frames there _is_ no parent reflow state (this coule be construed as a bug in the viewport frame, but read on). If there were, you're getting the _grandparent_ too and not checking it.
191,588
1,731,002
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3a; MultiZilla v1.1.33 (b)) Gecko/20030115 Netscape6/6.5 Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3a; MultiZilla v1.1.33 (b)) Gecko/20030128 Netscape6/6.5 This PCH magazine page, http://sb.pch.com/cat/05-55/multimag-step1-top-titles.html?ID_Type=151&Source=XX619&Segment_SourceKey=LP600 creates a crash in gklayout.dll every time I try to access it. It will load ok in build 20020115 and all other prior builds that I have tried, but will crash 20020128 and 20020131. I am using Win98SE on a 56K dialup connection. Reproducible: Always Steps to Reproduce: 1.Wait for page at http://sb.pch.com/cat/05-55/multimag-step1-top-titles.html?ID_Type=151&Source=XX619&Segment_SourceKey=LP600 to load. 2. 3. Actual Results: Page creates a crash in gklayout.dll before it completely loads. Expected Results: Page should completely load without any error. This appears to be similar to what was happening a while back with some e-bay pages. Not being a programmer, I can not tell what change in recent Mozilla builds causes this crash.
191,703
1,732,019
User-Agent: Mozilla/5.0 (X11; U; NetBSD i386; en-US; rv:1.2.1) Gecko/20021223 Build Identifier: Mozilla/5.0 (X11; U; NetBSD i386; en-US; rv:1.2.1) Gecko/20021223 PR_FormatTime() from nsprpub/pr/src/misc/prtime.c calls strftime() on line 1676 with a partially initialized tm struct. On NetBSD (and others), struct tm has a char* field calld tm_zone. If this field is non-null, strftime() thinks it points to valid data. If tm_zone is null, strftime() assumes the local time zone. Reproducible: Always Steps to Reproduce: Because of the nature of this bug it may not be easily reproducable. I've been reproducing this using phoenix 0.5. I ... * click on a link to a file, get prompted on whether/where to save it * just click save * seg fault occurs Actual Results: seg fault Expected Results: successfully save file, return to the page I was browsing If I have assigned this to the wrong component, please tell me how I can determine the right component. (gdb) bt #0 0x48546c95 in strftime () from /usr/lib/libc.so.12 #1 0x48546b13 in strftime () from /usr/lib/libc.so.12 #2 0x48545fba in strftime () from /usr/lib/libc.so.12 #3 0x4822443c in PR_FormatTime (buf=0xbfbfc1c0 "32", buflen=40, fmt=0x4823451c "%Z", tm=0xbfbfc330) at prtime.c:1676 (gdb) frame 3 #3 0x4822443c in PR_FormatTime (buf=0xbfbfc1c0 "32", buflen=40, fmt=0x4823451c "%Z", tm=0xbfbfc330) at prtime.c:1676 1676 return 0; (gdb) disp a 2: a = {tm_sec = 32, tm_min = 11, tm_hour = 20, tm_mday = 2, tm_mon = 1, tm_year = 103, tm_wday = 0, tm_yday = 32, tm_isdst = 0, tm_gmtoff = 1210282000, tm_zone = 0x2 <Error reading address 0x2: Invalid argument>} (gdb) Notice this value of tm_zone, 0x2. Simply initializing a to 0 will fix this bug. Patch attached.
192,124
1,735,892
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.3b) Gecko/20030205 Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.3b) Gecko/20030205 Filing more than one bookmark in a newly created folder cause bookmarks (all or all except the first one) not to be saved after quiting (normally, without crashing) the application. If the folder has been created in previous session, adding several bookmarks in that folder during the same session is OK. It' s also OK when adding bookmark directly in the "root" without creating folder. Reproducible: Always Steps to Reproduce: 1. add a bookmark with "File bookmark..." 2. Create a new folder in the dialog, select it then valid 3. within the same session file other bookmarks in the same folder 4. Quit Mozilla 5. Relaunch Mozilla Actual Results: Most time: Only the first filed bookmark (the one for wich we created the folder) is present in the folder Sometimes: the folder is here but there's no bookmark at all inside Expected Results: the folder should contain all filed bookmarks bug reproduced on 2 computers: IBook 600 with MacOSX 10.2.3 Dual G4/450 with MacOSX 10.2.3 (I'm on HFS+ filesystem and the Journaling is OFF) with the MachO version of Mozilla : 2003013103 2003020303 2003020503 My bookmarks.html is big (216k) but the problem occured on a brand new profile too. The sites I tried to add are not already in my bookmarks and the name for the folder are different from existing ones and contains no spaces ( I used dummy names like 'test', 'demo', etc for testing) The problem also occured when bookmarks (except the first one) are dragged from the url bar to the folder into the Bookmark view of the sidebar And it happens when the application is quitting correctly
182,490
1,654,954
User-Agent: Mozilla/5.0 (Windows; U; Win95; en-US; rv:1.2) Gecko/20021126 Build Identifier: Mozilla/5.0 (Windows; U; Win95; en-US; rv:1.2) Gecko/20021126 If you have N different username/password combinations for a site, the new password manager is effectively discarding N-1 of them! Reproducible: Always Steps to Reproduce: 1. Use Mozilla 1.2beta. Username/password stored as www.example.org/p1, etc 2. Install Mozilla 1.2. Go to a site. All possibilities listed. 3. Having logged in once, try to log in again. Actual Results: Mozilla automatically fills in only the previously successful data. Expected Results: Offered all the possible choices as before. Format has changed from www.example.org/p1, etc, to http://www.example.org/p1. Logging in to a site once causes the data to be converted FOR THAT ONE DATA PAIR ALONE, causing all others to be ignored from then on. There should either be (have been): a) A program run at install time to change the format of all entries or b) Mozilla should look up both data formats to get all relevant username/password pairs or c) The format conversion that's performed now should be performed on all data matching that site
183,234
1,660,126
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.3a) Gecko/20021202 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.3a) Gecko/20021202 If you type on the F7 key (whish make the cursor visible on the html page), Mozilla crash. Reproducible: Always Steps to Reproduce: 1. open a browser windows 2. click F7 Actual Results: Crash Expected Results: Not crash
183,768
1,664,820
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020823 Netscape/7.0 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020823 Netscape/7.0 HWND parentWnd = ::GetParent(mWnd); if (parentWnd) { nsWindow* parentWidget = GetNSWindowPtr(parentWnd); if (parentWidget->mIMEIsComposing && nsWindow::uWM_MSIME_MOUSE) { parentWnd is valid but parentWidget is NULL... crashola... Happens if you click on the gecko view window too soon. Reproducible: Always Steps to Reproduce: 1.Launch a gecko viewer 2.click on the window immediately after its viewable 3. Actual Results: Crash Expected Results: return
189,672
1,714,937
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3b) Gecko/20030118 Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3b) Gecko/20030118 Visit the page at http://www.geocities.com/squatter.geo/ or under the directories. After some seconds, thorbber animation stops. System resource is extremely reduced. If don't anything (exit mozilla, push ESC key, click Stop toolbar button or go another page), goes 0%. Therefore freeze mozilla. Reproducible: Always Steps to Reproduce: 1. Visit the page. http://www.geocities.com/squatter.geo/ 2. Wait for a while (about a minute). Actual Results: Freeze Mozilla. Resouce meter alarms few remain resouce. Sometimes OS freeze also. Expected Results: No freeze. OS: Win98 2003-01-18-04-trunk (Build ID: 2003011804)
189,897
1,716,676
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3b) Gecko/20030120 Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3b) Gecko/20030120 In the last days downloads often start with a box "Download Error", but Downloadmanager shows progress, and the files are saved to disk. After Download Error is shown, Cancel-Button is disabled, so there is no way to stop a download of maybe a 700 MB iso. If Download Error wasn´t shown, Cancel Button is working. I don´t believe this is a dup of bug 159186 Cannot cancel download, because there the same file had been downloaded twice to cause the errror. Here the error is caused by networking, and leads to a wrong state in downloadmanager: download is working, but cancel disabled, because download not active is assumed, I guess. I think this bug is visible now because of mozillas network problems. It will still be there in the underlying logic, if the network errors are solved. Besides, I had some problems removing (multiple) files from download manager. When cursor was blue, it was working, when cursorline was grey, it didn´t work. Maybe that was related to the state of cancel button. Reproducible: Sometimes Steps to Reproduce: 1.start download of a medium sized file 2.if download error pops up, acknowledge 3.try to cancel download with cancel button Actual Results: if download started normally, Cancel works. if download started with ErrorBox, Cancel Button grayed out, no way to stop download. Expected Results: Cancel ;-)
241,300
2,132,460
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8a) Gecko/20040420 Firefox/0.8.0+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8a) Gecko/20040420 Firefox/0.8.0+ From the Mozillazine forums: http://forums.mozillazine.org/viewtopic.php?t=70726&sid=4913fcda6a319ed8b94887ccfa1fed85 This url is reliably crashing Firefox (not Mozilla). The minimal testcase is this: <html><head></head> <body background="cid:00d201c264d0$feb75c80$0300a8c0@node3"> </body> </html> Not crashing in: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040305 Firefox/0.8.0+ Crashing in: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040309 Firefox/0.8.0+ Reproducible: Always Steps to Reproduce: 1.Visit the url 2. 3. Actual Results: Crash Expected Results: No crash
235,307
2,082,335
User-Agent: Build Identifier: There is a bug in line 261 (allocation of a new buffer): http://lxr.mozilla.org/mozilla/source/xpcom/ds/nsSupportsArray.cpp#261 The size of the new array is mArraySize instead of newArraySize which means that the array doesn't grow at all - the new value for mArraySize is set some lines later. I don't know where nsSupportsArray::Read() is used, but it will crash when reading some large array. Reproducible: Didn't try Steps to Reproduce:
235,355
2,082,689
User-Agent: Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; de-AT; rv:1.7a) Gecko/20040223 In "Mail&Newsgroup Account Settings" left Pane mark one after another the "Server Settings" without doing any changes, then leaving the Dialogue clicking "O.K." and Mozilla crashes. While crashing Mozilla uses a lot of Memory. The saved Username and Password for Newsgroup Accounts are deleted after the crash. Reproducible: Always Steps to Reproduce: 1. In Mail-News go to "Edit" "Mail&Newsgroup Account Settings" 2. Mark one after another "Server Settings" for every of the Accounts without change anything 3. Leave "Mail&Newsgroup Account Settings" with the O.K.-Button Actual Results: Mozilla crashes. Expected Results: Close the Dialogue. This Bug was first reported by Hartmut Figge in d.c.s.m.nb <[email protected]> under Debian GNU-Linux, thanks to him. I have succesfull tried to reproduce this crash under w2k. Adding Part of the DrWatson Crash Stack-Back-Trace: Funktion: nsSubstring::Replace 1004ab69 55 push ebp 1004ab6a 8bcb mov ecx,ebx 1004ab6c e8fffaffff call EmptyCString+0x250 (1004a670) 1004ab71 85ff test edi,edi 1004ab73 7617 jbe nsComponentManager::EnumerateContractIDs+0xbec (1005368c) 1004ab75 8b4304 mov eax,[ebx+0x4] ds:00bb7ae6=???????? 1004ab78 8d0c3f lea ecx,[edi+edi] ds:2f857558=???????? 1004ab7b 8bd1 mov edx,ecx 1004ab7d 8d3c68 lea edi,[eax+ebp*2] ds:0fbfffee=???????? 1004ab80 c1e902 shr ecx,0x2 FEHLER ->1004ab83 f3a5 rep movsd ds:0012dcb0=006f0074 es:2f857558=???????? 1004ab85 8bca mov ecx,edx 1004ab87 83e103 and ecx,0x3 1004ab8a f3a4 rep movsb ds:0012dcb0=74 es:2f857558=?? 1004ab8c 5f pop edi 1004ab8d 5e pop esi 1004ab8e 5d pop ebp 1004ab8f 5b pop ebx 1004ab90 81c498000000 add esp,0x98 1004ab96 c21000 ret 0x10 1004ab99 8bbc24b8000000 mov edi,[esp+0xb8] ss:0012db9c=00000006 1004aba0 83ffff cmp edi,0xff *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0FBFFFEE 00000000 00000000 00000000 00000000 00000000 !nsSubstring::Replace
235,537
2,084,250
win2k build 20040224 I got this a few time during the last weeks and I always fixed it by deleting the downloads.rdf in the profile... Steps to reproduce: 1) download http://matti.no-ip.org/downloads.zip 2) put the "downlods.rdf" in your profile and replace the exiting one 3) start Mozilla and open the Downloadmanager -> crash Top 2 lines from teh stack : nsInputStreamPump::AsyncRead(nsInputStreamPump * const 0x02d9f890, nsIStreamListener * 0x02d9f85c, nsISupports * 0x00000000) line 247 + 8 bytes nsIconChannel::AsyncOpen(nsIconChannel * const 0x00000000, nsIStreamListener * 0x029009f0, nsISupports * 0x00000000) line 210 Trying Networking first :-)
230,998
2,047,775
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.5) Gecko/20031007 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.5) Gecko/20031007 Mozilla crashes if I submit form and before the page is updated I press "Browse..." button to upload file. After the page updated (file upload window is still open), file is selected and open button is press mozilla crashes. Reproducible: Always Steps to Reproduce: 1. need a form with file upload input (<input type="file">) 2. submit form and press "Browse..." button (before the page is updated) 3. after the page is refreshed press "Open" button Actual Results: browser crashes
231,709
2,052,997
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.6) Gecko/20040113 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.6) Gecko/20040113 When I go to the given URL, the page loads correctly, but if I then reload or close Mozilla it crashes with the message "mozilla.exe has caused errors and will be terminated..." In the testcase (an XUL page)there are two frames, one points to a normal XUL page, the other points to a signed XUL page. The signing is done using signtool and using a certificate we created ourselves. This problem seems to have come up with version 1.6 Reproducible: Always Steps to Reproduce: 1. load up testcase (page loads fine) 2. click reload Actual Results: Mozilla crashes - error message is displayed Expected Results: displayed the page again
236,796
2,095,007
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040302 Firefox/0.8.0+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040302 Firefox/0.8.0+ See upcoming testcase. Select the text on the second line, starting somewhere in the string "binding content". When you reach the string "span inside div" the browser becomes unresponsive, cpu time reaches 99%. Only thing left to do is to kill the browser. Reproducible: Always Steps to Reproduce: 1. See above. 2. 3. Actual Results: Crash/freeze Expected Results: Select the text
236,947
2,096,671
If a product is chosen on a bugzilla query, Camino will hang-up. In addition, there is no problem in OSX version firefox nightly build. Reproducible: Always Steps to Reproduce: 1.Open bugzilla query. 2.Arbitrary products are chosen from a product list. e.g. select Camno Actual Results: Camino hangs-up. Expected Results: Camino does not hang-up. The component relevant to the selected product etc. is displayed. Mac OS X 10.3.2 and New Profile 2004030808 (v0.7+)
237,975
2,105,591
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040317 Firefox/0.8.0+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040317 Firefox/0.8.0+ See it at: http://home.hccnet.nl/m.wargers/test/mozilla/crash/blockquote_new.xhtml The attached testcase you must open local on your computer. to reproduce it: Open the the link you see in a new tab (in the background) and repeat those steps very quickly (ten times or so) Then close each tab very quickly again. In this way, you get the highest chance to get a crash, although you have a chance of a crash right the first time. See also: http://forums.mozillazine.org/viewtopic.php?t=62253 This post mentions that builds younger than 2004-01-27 are vulnerable to this crash: http://forums.mozillazine.org/viewtopic.php?t=62253#438689 Reproducible: Always Steps to Reproduce: 1.See details 2. 3. Actual Results: Crash Expected Results: No crash
238,005
2,105,757
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7b) Gecko/20040316 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7b) Gecko/20040316 DOM L2 HTML specifies that a NOT_FOUND_ERR should be thrown if the before param is an OPTION but not part of the target SELECT on a call to HTMLSelectElement.add. This previously mentioned page is a stripped down version of W3C DOM L2 HTML test HTMLSelectElement20 which tests that. Unfortunately, there does not appear to be any guard in the Mozilla code base that checks that and getting through results in a crash. Reproducible: Always Steps to Reproduce: 1. Open to http://home.houston.rr.com/curta/select_crash.html 2. Press OK on Starting test alert Actual Results: Stall and eventual crash Expected Results: Displayed a "Test Succeeded" alert. There would have been a Talkback on 18 Mar 2004 from me that would have been my initial observation of the problem.
1,375,461
12,421,310
This bug was filed from the Socorro interface and is report bp-1f929363-c217-4934-b4e2-f4cb60170622. ============================================================= Crashing Thread (87), Name: MediaPDecoder #2 Frame Module Signature Source 0 xul.dll mozilla::D3D11DXVA2Manager::CopyToImage(IMFSample*, mozilla::gfx::IntRectTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::Image**) dom/media/platforms/wmf/DXVA2Manager.cpp:960 1 xul.dll mozilla::WMFVideoMFTManager::CreateD3DVideoFrame(IMFSample*, __int64, mozilla::VideoData**) dom/media/platforms/wmf/WMFVideoMFTManager.cpp:900 2 xul.dll mozilla::WMFVideoMFTManager::Output(__int64, RefPtr<mozilla::MediaData>&) dom/media/platforms/wmf/WMFVideoMFTManager.cpp:1030 3 xul.dll mozilla::WMFMediaDataDecoder::ProcessOutput(nsTArray<RefPtr<mozilla::MediaData> >&) dom/media/platforms/wmf/WMFMediaDataDecoder.cpp:155 4 xul.dll mozilla::WMFMediaDataDecoder::ProcessDecode(mozilla::MediaRawData*) dom/media/platforms/wmf/WMFMediaDataDecoder.cpp:143 5 xul.dll mozilla::detail::ProxyRunnable<mozilla::MozPromise<nsTArray<RefPtr<mozilla::MediaData> >, mozilla::MediaResult, 1>, RefPtr<mozilla::MozPromise<nsTArray<RefPtr<mozilla::MediaData> >, mozilla::MediaResult, 1> > ( mozilla::WMFMediaDataDecoder::*)(mozilla::MediaRawData*), mozilla::WMFMediaDataDecoder, mozilla::MediaRawData*>::Run() obj-firefox/dist/include/mozilla/MozPromise.h:1394 6 xul.dll mozilla::TaskQueue::Runner::Run() xpcom/threads/TaskQueue.cpp:240 7 xul.dll nsThreadPool::Run() xpcom/threads/nsThreadPool.cpp:225 8 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1418 9 xul.dll NS_ProcessNextEvent(nsIThread*, bool) xpcom/threads/nsThreadUtils.cpp:472 10 xul.dll mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:338 11 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:231 12 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:211 13 xul.dll nsThread::ThreadFunc(void*) xpcom/threads/nsThread.cpp:501 14 nss3.dll _PR_NativeRunThread nsprpub/pr/src/threads/combined/pruthr.c:397 15 nss3.dll pr_root nsprpub/pr/src/md/windows/w95thred.c:95 16 ucrtbase.dll thread_start<unsigned int (__stdcall*)(void*)> 17 kernel32.dll BaseThreadInitThunk 18 mozglue.dll patched_BaseThreadInitThunk mozglue/build/WindowsDllBlocklist.cpp:809 19 ntdll.dll __RtlUserThreadStart 20 ntdll.dll _RtlUserThreadStart this is a low volume crash signature that's showing up a handful of times in early data from the 55.0b cycle, perhaps related to bug 1340398. so far all the reports are from users on windows 10 and a nvidia gpu.
1,375,902
12,425,544
This bug was filed from the Socorro interface and is report bp-35db4048-99ba-46d3-b9fb-a0f930170623. ============================================================= Frame Module Signature Source 0 firefox mozalloc_abort memory/mozalloc/mozalloc_abort.cpp:33 1 firefox abort memory/mozalloc/mozalloc_abort.cpp:80 2 libxul.so std::panicking::rust_panic /checkout/src/libpanic_abort/lib.rs:61 3 libxul.so std::panicking::rust_panic_with_hook /checkout/src/libstd/panicking.rs:565 4 libxul.so std::panicking::begin_panic<collections::string::String> /checkout/src/libstd/panicking.rs:511 5 libxul.so std::panicking::begin_panic_fmt /checkout/src/libstd/panicking.rs:495 6 libxul.so core::panicking::panic_fmt /checkout/src/libstd/panicking.rs:471 7 libxul.so core::panicking::panic /checkout/src/libcore/panicking.rs:49 8 libxul.so geckoservo::glue::Servo_TraverseSubtree /checkout/src/libcore/macros.rs:21 9 libxul.so mozilla::ServoStyleSet::PrepareAndTraverseSubtree layout/style/ServoStyleSet.cpp:446 10 libxul.so libxul.so@0x1e28b25 11 libxul.so nsCSSFrameConstructor::ProcessChildren(nsFrameConstructorState&, nsIContent*, nsStyleContext*, nsContainerFrame*, bool, nsFrameItems&, bool, PendingBinding*, nsIFrame*) 12 libxul.so nsCSSFrameConstructor::ConstructFrameFromItemInternal(nsCSSFrameConstructor::FrameConstructionItem&, nsFrameConstructorState&, nsContainerFrame*, nsFrameItems&) 13 libxul.so nsCSSFrameConstructor::ConstructFramesFromItemList layout/base/nsCSSFrameConstructor.cpp:6313 14 libxul.so nsCSSFrameConstructor::ProcessChildren(nsFrameConstructorState&, nsIContent*, nsStyleContext*, nsContainerFrame*, bool, nsFrameItems&, bool, PendingBinding*, nsIFrame*) 15 libxul.so nsCSSFrameConstructor::ConstructBlock(nsFrameConstructorState&, nsIContent*, nsContainerFrame*, nsContainerFrame*, nsStyleContext*, nsContainerFrame**, nsFrameItems&, nsIFrame*, PendingBinding*) 16 libxul.so nsCSSFrameConstructor::ConstructNonScrollableBlockWithConstructor(nsFrameConstructorState&, nsCSSFrameConstructor::FrameConstructionItem&, nsContainerFrame*, nsStyleDisplay const*, nsFrameItems&, nsBlockFrame* (*)(nsIPresShell*, nsStyleContext*)) 17 libxul.so nsCSSFrameConstructor::ConstructFrameFromItemInternal(nsCSSFrameConstructor::FrameConstructionItem&, nsFrameConstructorState&, nsContainerFrame*, nsFrameItems&) 18 libxul.so nsCSSFrameConstructor::ConstructFramesFromItemList layout/base/nsCSSFrameConstructor.cpp:6313 19 libxul.so nsCSSFrameConstructor::ProcessChildren(nsFrameConstructorState&, nsIContent*, nsStyleContext*, nsContainerFrame*, bool, nsFrameItems&, bool, PendingBinding*, nsIFrame*) 20 libxul.so nsCSSFrameConstructor::ConstructFrameFromItemInternal(nsCSSFrameConstructor::FrameConstructionItem&, nsFrameConstructorState&, nsContainerFrame*, nsFrameItems&) 21 libxul.so nsCSSFrameConstructor::ConstructFramesFromItemList layout/base/nsCSSFrameConstructor.cpp:6313 22 libxul.so nsCSSFrameConstructor::ProcessChildren(nsFrameConstructorState&, nsIContent*, nsStyleContext*, nsContainerFrame*, bool, nsFrameItems&, bool, PendingBinding*, nsIFrame*) 23 libxul.so nsCSSFrameConstructor::ConstructFrameFromItemInternal(nsCSSFrameConstructor::FrameConstructionItem&, nsFrameConstructorState&, nsContainerFrame*, nsFrameItems&) 24 libxul.so nsCSSFrameConstructor::ConstructFramesFromItemList layout/base/nsCSSFrameConstructor.cpp:6313 25 libxul.so nsCSSFrameConstructor::ProcessChildren(nsFrameConstructorState&, nsIContent*, nsStyleContext*, nsContainerFrame*, bool, nsFrameItems&, bool, PendingBinding*, nsIFrame*) 26 libxul.so nsCSSFrameConstructor::ConstructBlock(nsFrameConstructorState&, nsIContent*, nsContainerFrame*, nsContainerFrame*, nsStyleContext*, nsContainerFrame**, nsFrameItems&, nsIFrame*, PendingBinding*) 27 libxul.so nsCSSFrameConstructor::ConstructNonScrollableBlockWithConstructor(nsFrameConstructorState&, nsCSSFrameConstructor::FrameConstructionItem&, nsContainerFrame*, nsStyleDisplay const*, nsFrameItems&, nsBlockFrame* (*)(nsIPresShell*, nsStyleContext*)) 28 libxul.so nsCSSFrameConstructor::ConstructFrameFromItemInternal(nsCSSFrameConstructor::FrameConstructionItem&, nsFrameConstructorState&, nsContainerFrame*, nsFrameItems&) 29 libxul.so nsCSSFrameConstructor::ConstructFramesFromItemList layout/base/nsCSSFrameConstructor.cpp:6313 30 libxul.so nsCSSFrameConstructor::ProcessChildren(nsFrameConstructorState&, nsIContent*, nsStyleContext*, nsContainerFrame*, bool, nsFrameItems&, bool, PendingBinding*, nsIFrame*) 31 libxul.so nsCSSFrameConstructor::ConstructBlock(nsFrameConstructorState&, nsIContent*, nsContainerFrame*, nsContainerFrame*, nsStyleContext*, nsContainerFrame**, nsFrameItems&, nsIFrame*, PendingBinding*) 32 libxul.so nsCSSFrameConstructor::ConstructNonScrollableBlockWithConstructor(nsFrameConstructorState&, nsCSSFrameConstructor::FrameConstructionItem&, nsContainerFrame*, nsStyleDisplay const*, nsFrameItems&, nsBlockFrame* (*)(nsIPresShell*, nsStyleContext*)) 33 libxul.so nsCSSFrameConstructor::ConstructFrameFromItemInternal(nsCSSFrameConstructor::FrameConstructionItem&, nsFrameConstructorState&, nsContainerFrame*, nsFrameItems&) 34 libxul.so nsCSSFrameConstructor::ConstructFramesFromItemList layout/base/nsCSSFrameConstructor.cpp:6313 35 libxul.so nsCSSFrameConstructor::ProcessChildren(nsFrameConstructorState&, nsIContent*, nsStyleContext*, nsContainerFrame*, bool, nsFrameItems&, bool, PendingBinding*, nsIFrame*) 36 libxul.so nsCSSFrameConstructor::ConstructBlock(nsFrameConstructorState&, nsIContent*, nsContainerFrame*, nsContainerFrame*, nsStyleContext*, nsContainerFrame**, nsFrameItems&, nsIFrame*, PendingBinding*) 37 libxul.so nsCSSFrameConstructor::ConstructDocElementFrame(mozilla::dom::Element*, nsILayoutHistoryState*) 38 libxul.so nsCSSFrameConstructor::ContentRangeInserted(nsIContent*, nsIContent*, nsIContent*, nsILayoutHistoryState*, bool, bool, TreeMatchContext*) 39 libxul.so nsCSSFrameConstructor::ContentInserted layout/base/nsCSSFrameConstructor.h:276 40 libxul.so mozilla::PresShell::Initialize(int, int) 41 libxul.so nsContentSink::StartLayout(bool) 42 libxul.so nsContentSink::StyleSheetLoaded(mozilla::StyleSheet*, bool, nsresult) 43 libxul.so mozilla::css::Loader::SheetComplete(mozilla::css::SheetLoadData*, nsresult) 44 libxul.so mozilla::css::Loader::ParseSheet(nsAString const&, mozilla::css::SheetLoadData*, bool&) 45 libxul.so mozilla::css::SheetLoadData::OnStreamComplete(nsIUnicharStreamLoader*, nsISupports*, nsresult, nsAString const&) 46 libxul.so nsUnicharStreamLoader::OnStopRequest(nsIRequest*, nsISupports*, nsresult) 47 libxul.so mozilla::net::nsHTTPCompressConv::OnStopRequest netwerk/streamconv/converters/nsHTTPCompressConv.cpp:170 48 libxul.so mozilla::net::HttpChannelChild::DoOnStopRequest netwerk/protocol/http/HttpChannelChild.cpp:1114 49 libxul.so mozilla::net::HttpChannelChild::OnStopRequest netwerk/protocol/http/HttpChannelChild.cpp:1043 50 libxul.so mozilla::net::ChannelEventQueue::RunOrEnqueue netwerk/ipc/ChannelEventQueue.h:215 51 libxul.so mozilla::net::HttpBackgroundChannelChild::RecvOnStopRequest netwerk/protocol/http/HttpBackgroundChannelChild.cpp:251 52 libxul.so mozilla::net::PHttpBackgroundChannelChild::OnMessageReceived obj-firefox/ipc/ipdl/PHttpBackgroundChannelChild.cpp:172 53 libxul.so mozilla::ipc::PBackgroundChild::OnMessageReceived(IPC::Message const&) 54 libxul.so mozilla::ipc::MessageChannel::DispatchAsyncMessage(IPC::Message const&) 55 libxul.so libxul.so@0xc71121 56 libxul.so mozilla::ipc::MessageChannel::MessageTask::Run() 57 libxul.so nsThread::ProcessNextEvent(bool, bool*) 58 libxul.so NS_ProcessNextEvent(nsIThread*, bool) 59 libxul.so mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) 60 libxul.so MessageLoop::Run() 61 libxul.so nsBaseAppShell::Run widget/nsBaseAppShell.cpp:156 62 libxul.so XRE_RunAppShell toolkit/xre/nsEmbedFunctions.cpp:896 63 libxul.so MessageLoop::Run() 64 libxul.so XRE_InitChildProcess toolkit/xre/nsEmbedFunctions.cpp:712 65 firefox content_process_main ipc/contentproc/plugin-container.cpp:64 66 firefox _init Ø 67 libc-2.25.so libc-2.25.so@0x204d9 68 firefox firefox@0x1182f 69 firefox firefox@0x1aeef 70 firefox firefox@0x1182f 71 firefox mozilla::ReadAheadLib(char const*) Ø 72 ld-2.25.so ld-2.25.so@0x1105f 73 firefox firefox@0x1aeef 74 firefox _start This was on loading linkedin it crashed 3 times then let it load. I have layout.css.servo.enabled enabled.
1,376,410
12,430,967
This bug was filed from the Socorro interface and is report bp-c47fb23e-cc7e-468e-8bbd-b7f460170627. ============================================================= Crashing Thread (46), Name: Classifier Update Frame Module Signature Source 0 xul.dll NS_ABORT_OOM(unsigned int) xpcom/base/nsDebugImpl.cpp:610 1 xul.dll nsACString::Replace(unsigned int, unsigned int, char const*, unsigned int) xpcom/string/nsTSubstring.cpp:564 2 xul.dll mozilla::safebrowsing::AppendPrefixToMap toolkit/components/url-classifier/LookupCacheV4.cpp:195 3 xul.dll mozilla::safebrowsing::LookupCacheV4::ApplyUpdate(mozilla::safebrowsing::TableUpdateV4*, nsClassHashtable<nsUint32HashKey, nsCString>&, nsClassHashtable<nsUint32HashKey, nsCString>&) toolkit/components/url-classifier/LookupCacheV4.cpp:287 4 xul.dll mozilla::safebrowsing::Classifier::UpdateTableV4(nsTArray<mozilla::safebrowsing::TableUpdate*>*, nsACString const&) toolkit/components/url-classifier/Classifier.cpp:1358 5 xul.dll mozilla::safebrowsing::Classifier::ApplyUpdatesBackground(nsTArray<mozilla::safebrowsing::TableUpdate*>*, nsACString&) toolkit/components/url-classifier/Classifier.cpp:829 6 xul.dll <lambda_b69fb69cf3ba961377d01f45253c0d68>::operator() toolkit/components/url-classifier/Classifier.cpp:746 7 xul.dll mozilla::detail::RunnableFunction<<lambda_b69fb69cf3ba961377d01f45253c0d68> >::Run() obj-firefox/dist/include/nsThreadUtils.h:461 8 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1428 9 xul.dll NS_ProcessNextEvent(nsIThread*, bool) xpcom/threads/nsThreadUtils.cpp:477 10 xul.dll mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:368 11 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:313 12 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:293 13 xul.dll nsThread::ThreadFunc(void*) xpcom/threads/nsThread.cpp:503 14 nss3.dll _PR_NativeRunThread nsprpub/pr/src/threads/combined/pruthr.c:397 15 nss3.dll pr_root nsprpub/pr/src/md/windows/w95thred.c:95 16 ucrtbase.dll thread_start<unsigned int (__stdcall*)(void*)> 17 kernel32.dll BaseThreadInitThunk 18 mozglue.dll patched_BaseThreadInitThunk mozglue/build/WindowsDllBlocklist.cpp:849 19 ntdll.dll __RtlUserThreadStart 20 ntdll.dll _RtlUserThreadStart Application Basics: Name: Firefox Version: 56.0a1 Build ID: 20170621102301 Update Channel: nightly User Agent: Mozilla/5.0 (Windows NT 10.0; rv:56.0) Gecko/20100101 Firefox/56.0 OS: Windows_NT 10.0
1,376,754
12,433,690
This bug was filed from the Socorro interface and is report bp-867d880c-f871-4c91-a075-93ac10170628. ============================================================= Steps to reproduce: 1. visit http://voetbalzone.nl/ 2. accept cookies 3. wait until the page is fully loaded (if no crash occurs, then browse pages until a crash happens. Less than five pages should be sufficient.) Current result: tab crashes Expected result: no crash According to mozregression this is caused by Bug 1342433 - onclick changes shouldn't recreate the tree, r=yzen
1,376,825
12,434,154
This bug was filed from the Socorro interface and is report bp-b2b3d531-86ea-41de-b214-4465b0170628. ============================================================= There are 400 crashes in beta 55 and is #34 in top crashers. :surkov, could you investigate please ?
1,376,874
12,434,560
This bug was filed from the Socorro interface and is report bp-30da927f-631a-4a75-89a1-4fb690170628. ============================================================= these async shutdownhangs are spiking cross-platform on 56.0a1 after build 20170627030209. Correlations for Firefox Nightly (100.0% in signature vs 00.03% overall) abort_message = ###!!! ABORT: file resource://gre/modules/Sqlite.jsm, line 156 (100.0% in signature vs 03.62% overall) moz_crash_reason = MOZ_CRASH() (100.0% in signature vs 05.54% overall) Module "twinapi.appcore.dll" = true (100.0% in signature vs 05.63% overall) Module "twinapi.dll" = true (83.33% in signature vs 07.64% overall) process_type = null [100.0% vs 06.75% if startup_crash = 0] (100.0% in signature vs 08.29% overall) Module "explorerframe.dll" = true (100.0% in signature vs 09.27% overall) Module "winsta.dll" = true (100.0% in signature vs 09.40% overall) Module "FWPUCLNT.DLL" = true (100.0% in signature vs 09.55% overall) Module "rasadhlp.dll" = true (100.0% in signature vs 11.11% overall) shutdown_progress = profile-before-change (83.33% in signature vs 08.50% overall) Module "ondemandconnroutehelper.dll" = true graph from nightly: https://crash-stats.mozilla.com/signature/?release_channel=nightly&signature=AsyncShutdownTimeout%20%7C%20profile-before-change%20%7C%20Sqlite.jsm%20shutdown%20blocker&date=%3E%3D2017-03-01T00%3A00%3A00.000Z&date=%3C2017-06-28T18%3A25%3A45.000Z#graphs
1,366,446
12,334,842
Created attachment 8869679 asan report 1. http://www.lovedroids.com/ 2. AddressSanitizer: heap-use-after-free /home/worker/workspace/build/src/gfx/skia/skia/src/opts/SkBitmapProcState_opts_SSSE3.cpp:291:9 in ProcessTwoPixelPairs<false> Fedora and Ubuntu. On Windows I see low and high exploitable EXCEPTION_ACCESS_VIOLATION_READ at `anonymous namespace'::S32_generic_D32_filter_DX_SSSE3<int> BitmapProcShaderContext::shadeSpan SkARGB32_Shader_Blitter::blitRect antifilldot8 antifillrect https://crash-stats.mozilla.com/signature/?_sort=-date&signature=%60anonymous%20namespace%27%27%3A%3AProcessTwoPixelPairs%3CT%3E&date=%3E%3D2017-05-13T05%3A45%3A00.000Z&date=%3C2017-05-20T05%3A45%3A00.000Z which also rates this as low to high exploitable on Windows back to at least 53.
1,366,700
12,337,184
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:55.0) Gecko/20100101 Firefox/55.0 Build ID: 20170521100319 Steps to reproduce: (In reply to Kartikaya Gupta (email:[email protected]) from bug 1341478 comment #4) > (In reply to Darkspirit from bug 1341478 comment #3) > > Please consider to reopen this bug. > > Let's open a new bug for the crash you are seeing. This one was filed for > Android, and the one you are seeing is in a webrender codepath which is > different although the signature is the same. Windows 10 x64: crash while doing a Radeon RX480 driver update. (After my whole desktop turned black for a second when windows activated the new driver). gpu process force-enabled, webrender enabled, hardware accelleration (force-)enabled where possible Meldungs-ID Sendedatum bp-897e9aee-9f80-435d-a90f-9acf90170521 21.05.2017 15:09 = [@ mozilla::gl::GLContextEGLFactory::Create ] = this bug bp-8177c9fe-a27e-4313-9276-30e500170521 21.05.2017 15:08 = [@ mozilla::layers::PWebRenderBridgeChild::SendCreate ] = bug 1350408
1,366,808
12,338,082
This bug was filed from the Socorro interface and is report bp-d31fb160-b65a-4914-9dd5-edfff0170516. ============================================================= Seen while looking at Mac crashes in Nightly - this one appears to have started around 20170401030204 on 55 - so far a small amount of crashes (but typical of Mac volume: http://bit.ly/2qORDu0 Possible regression range based on Build ID: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=8df9fabf2587b7020889755acb9e75b664fe13cf&tochange=00a166a8640dffa2e0f48650f966d75ca3c1836e Bug 1344629 touched some code. ni on dmajor in case he has ideas about this crash. Comments: trying to open a file: url for some rustdoc output One URL: https://developer.mozilla.org/en-US/docs/Web/CSS/image-resolution
1,367,372
12,344,044
User Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Steps to reproduce: 1- go: data:text/html,<script>function loaded(){alert();}window.addEventListener('DOMContentLoaded',loaded,false);</script> 2- open Inspect Element 3- F5 4- crash
1,368,468
12,355,360
Created attachment 8872321 Client 29-05-2017, 14-23.crash Build: master 2f1b9f0dfdec Device: iPhone SE iOS: 9.3.2 Steps to reproduce: 1. Launch Firefox in portrait (Top Sites are displayed) 2. Change device orientation to landscape 3. Change device orientation to portrait 4. Change device orientation to landscape Actual result: - Firefox will crash. Note: - Issue reproducible on iPhones running iOS 9.x - Issue reproducible only on master.
1,368,479
12,355,519
Created attachment 8872348 Client 03-04-2017, 16-12.crash Build: master 2f1b9f0d Device: iPad Air 2 iOS: 10.2.1 Pre-requisites: - Activity Stream panel populated with sites Steps to reproduce: 1. Launch Firefox in portrait 2. Swipe left from the right to enter split screen view 3. Continue swiping left 4. Swipe right to exit split screen Actual results: 2. Activity stream layout is broken 3. Scrolling on top sites will crash Firefox 4. The Top Sites favicons will be displayed incorrectly when sliding right and exiting split screen Note: - Issue reproducible on iPads See video for more information: https://www.youtube.com/watch?v=AaimaRG4VQY
1,358,868
12,257,285
This bug was filed from the Socorro interface and is report bp-b51a6e42-803f-49e5-9128-8c2030170422. ============================================================= Crashing Thread (37) Frame Module Signature Source 0 xul.dll `anonymous namespace'::wasapi_stream_start media/libcubeb/src/cubeb_wasapi.cpp:1917 1 xul.dll cubeb_stream_start media/libcubeb/src/cubeb.c:349 2 xul.dll mozilla::AudioStream::InvokeCubeb<int (*)(cubeb_stream*)>(int (*)(cubeb_stream*)) dom/media/AudioStream.cpp:317 3 xul.dll mozilla::AudioStream::Resume() dom/media/AudioStream.cpp:450 4 xul.dll mozilla::media::AudioSink::SetPlaying(bool) dom/media/mediasink/AudioSink.cpp:189 5 xul.dll mozilla::media::AudioSinkWrapper::SetPlaying(bool) dom/media/mediasink/AudioSinkWrapper.cpp:164 6 xul.dll mozilla::media::VideoSink::SetPlaying(bool) dom/media/mediasink/VideoSink.cpp:156 7 xul.dll mozilla::MediaDecoderStateMachine::MaybeStartPlayback() dom/media/MediaDecoderStateMachine.cpp:2919 8 xul.dll mozilla::MediaDecoderStateMachine::DecodingState::Step() dom/media/MediaDecoderStateMachine.cpp:685 9 xul.dll mozilla::AutoTaskDispatcher::TaskGroupRunnable::Run() obj-firefox/dist/include/mozilla/TaskDispatcher.h:205 10 xul.dll mozilla::TaskQueue::Runner::Run() xpcom/threads/TaskQueue.cpp:232 11 xul.dll nsThreadPool::Run() xpcom/threads/nsThreadPool.cpp:225 12 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1270 13 xul.dll NS_ProcessNextEvent(nsIThread*, bool) xpcom/threads/nsThreadUtils.cpp:389 14 xul.dll mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:338 15 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:231 16 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:211 17 xul.dll nsThread::ThreadFunc(void*) xpcom/threads/nsThread.cpp:501 18 nss3.dll _PR_NativeRunThread nsprpub/pr/src/threads/combined/pruthr.c:397 19 nss3.dll pr_root nsprpub/pr/src/md/windows/w95thred.c:95 20 ucrtbase.dll _o__CIpow 21 kernel32.dll BaseThreadInitThunk 22 ntdll.dll __RtlUserThreadStart 23 ntdll.dll _RtlUserThreadStart these crashes started (re)appearing in firefox since 54.0a1 build 20170211030205 and in a regular fashion thereafter, so it's likely related to bug 1337805 which landed the day before. the crashes are hitting users of 32bit and 64bit versions of firefox on windows and all the report are annotated with MOZ_RELEASE_ASSERT(stm && !stm->thread && !stm->shutdown_event) added in bug 1280280. in stability data for 54.0b1 the signature currently accounts for 0.5% of browser crashes and 1.1% of content process crashes.
1,358,889
12,257,470
This bug was filed from the Socorro interface and is report bp-b80e48d0-6b48-4577-a388-892f60170423. ============================================================= Crashing Thread (10) Frame Module Signature Source 0 xul.dll mozilla::SingletonThreadHolder::ReleaseUse_i() media/mtransport/nr_socket_prsock.cpp:250 1 xul.dll mozilla::runnable_args_memfn<RefPtr<mozilla::SingletonThreadHolder>, void ( mozilla::SingletonThreadHolder::*)(void)>::Run() media/mtransport/runnable_utils.h:170 2 xul.dll mozilla::detail::RunOnThreadInternal media/mtransport/runnable_utils.h:50 3 xul.dll mozilla::NrUdpSocketIpc::~NrUdpSocketIpc() media/mtransport/nr_socket_prsock.cpp:1157 4 xul.dll mozilla::NrUdpSocketIpc::`scalar deleting destructor'(unsigned int) 5 xul.dll mozilla::NrUdpSocketIpc::Release() media/mtransport/nr_socket_prsock.h:240 6 xul.dll mozilla::DispatchedRelease<mozilla::NrUdpSocketIpc>::Run() media/mtransport/runnable_utils.h:244 7 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1264 8 xul.dll NS_ProcessNextEvent(nsIThread*, bool) xpcom/threads/nsThreadUtils.cpp:389 9 xul.dll mozilla::net::nsSocketTransportService::Run() netwerk/base/nsSocketTransportService2.cpp:945 10 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1264 11 xul.dll NS_ProcessNextEvent(nsIThread*, bool) xpcom/threads/nsThreadUtils.cpp:389 12 xul.dll mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:338 13 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:231 14 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:211 15 xul.dll nsThread::ThreadFunc(void*) xpcom/threads/nsThread.cpp:495 16 nss3.dll _PR_NativeRunThread nsprpub/pr/src/threads/combined/pruthr.c:397 17 nss3.dll pr_root nsprpub/pr/src/md/windows/w95thred.c:95 18 ucrtbase.dll _o__CIpow 19 kernel32.dll BaseThreadInitThunk 20 ntdll.dll __RtlUserThreadStart 21 ntdll.dll _RtlUserThreadStart crash reports with this signature are regressing since firefox 54 and later. they are occurring on 32bit/64bit builds of the browser on various versions of windows so far and always in the content process.
1,358,896
12,257,572
+++ This bug was initially created as a clone of Bug #1344580 +++ (In reply to Ting-Yu Chou [:ting] from comment #12) > I am still seeing audiounit_setup_stream on 54 and 55, and > audiounit_layout_init on 54. > > https://crash-stats.mozilla.com/signature/ > ?product=Firefox&signature=audiounit_setup_stream&date=%3E%3D2017-04- > 05T03%3A11%3A01.000Z&date=%3C2017-04-12T03%3A11%3A01. > 000Z&_columns=date&_columns=product&_columns=version&_columns=build_id&_colum > ns=platform&_columns=reason&_columns=address&_columns=install_time&_sort=- > date&page=1#aggregations > > https://crash-stats.mozilla.com/signature/ > ?signature=audiounit_layout_init&date=%3E%3D2017-03-29T03%3A12%3A09. > 000Z&date=%3C2017-04-12T03%3A12%3A09. > 000Z&_columns=date&_columns=product&_columns=version&_columns=build_id&_colum > ns=platform&_columns=reason&_columns=address&_columns=install_time&_sort=- > date&page=1#aggregations (In reply to Chun-Min Chang[:chunmin] from comment #13) > Thanks for the report. I'll try an ASAN build to test it. (In reply to Ting-Yu Chou [:ting] from comment #14) > Just double checked, it seems that audiounit_layout_init is fixed, but not > audiounit_setup_stream.
1,363,747
12,307,808
Created attachment 8866363 Client 10-05-2017, 17-20.crash Build: 8.0b6 Device: iPad Air 2 iOS: 10.3.1 Steps to reproduce: 1. Launch Firefox 2. Long tap on a site from Top Sites 3. Tap 'Share' Actual results: - Firefox will crash. Note: - Issue reproducible only on iPad. - Issue reproducible only on the Activity Stream context menu.
1,365,090
12,320,787
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36 Steps to reproduce: crash report at: https://crash-stats.mozilla.com/report/index/38edd174-7da8-42f0-96d0-ad7320170515 Note the actual error differs a bit from the line number in the attach crash report: # # Fatal error in /home/worker/workspace/build/src/media/webrtc/trunk/webrtc/video/video_send_stream.cc, line 188 # Check failed: ssrcs.size() == config_.rtp.rids.size() (3 vs. 6) # # The root cause is we believe is in WebrtcVideoConduit::ConfigureSendMediaCodec When completing renegotiation, mEncoderConfig is cleared then recreated from codecConfig's details. But, mSendStreamConfig simply push_back()s any rids without clearing first. So later, at the call level, the ssrc count and rid count differ. RIDs contains the correct values, but duplicated. If I add a clear to mSendStreamConfig in a local build things work fine. Unfortunately, we have not been able to create an isolated repro that we can send to you. If we do, I'll make sure to add it to the bug.
1,373,579
12,403,908
This bug was filed from the Socorro interface and is report bp-efb9200f-eef8-4f64-940e-3665f0170616. ============================================================= Crashing Thread (0) Frame Module Signature Source 0 vcruntime140.dll memcpy f:\dd\vctools\crt\vcruntime\src\string\i386\memcpy.asm:600 1 xul.dll js::SCInput::readArray<unsigned char>(unsigned char*, unsigned int) js/src/vm/StructuredClone.cpp:846 2 xul.dll mozilla::dom::StructuredCloneBlob::ReadStructuredCloneInternal(JSContext*, JSStructuredCloneReader*, mozilla::dom::StructuredCloneHolder*) dom/base/StructuredCloneBlob.cpp:137 3 xul.dll mozilla::dom::StructuredCloneBlob::ReadStructuredClone(JSContext*, JSStructuredCloneReader*, mozilla::dom::StructuredCloneHolder*) dom/base/StructuredCloneBlob.cpp:109 4 xul.dll mozilla::dom::StructuredCloneHolder::CustomReadHandler(JSContext*, JSStructuredCloneReader*, unsigned int, unsigned int) dom/base/StructuredCloneHolder.cpp:991 5 xul.dll mozilla::dom::`anonymous namespace'::StructuredCloneCallbacksRead dom/base/StructuredCloneHolder.cpp:64 6 xul.dll JSStructuredCloneReader::startRead(JS::MutableHandle<JS::Value>) js/src/vm/StructuredClone.cpp:2234 7 xul.dll JSStructuredCloneReader::read(JS::MutableHandle<JS::Value>) js/src/vm/StructuredClone.cpp:2537 8 xul.dll ReadStructuredClone(JSContext*, JSStructuredCloneData&, JS::StructuredCloneScope, JS::MutableHandle<JS::Value>, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:626 9 xul.dll JS::GCVector<JSObject*, 8, js::TempAllocPolicy>::trace(JSTracer*) obj-firefox/dist/include/js/GCVector.h:134 10 xul.dll mozilla::dom::ipc::StructuredCloneData::Read(JSContext*, JS::MutableHandle<JS::Value>, mozilla::ErrorResult&) dom/ipc/StructuredCloneData.cpp:103 11 xul.dll nsFrameMessageManager::ReceiveMessage(nsISupports*, nsIFrameLoader*, bool, nsAString const&, bool, mozilla::dom::ipc::StructuredCloneData*, mozilla::jsipc::CpowHolder*, nsIPrincipal*, nsTArray<mozilla::dom::ipc::StructuredCloneData>*) dom/base/nsFrameMessageManager.cpp:986 12 xul.dll nsFrameMessageManager::ReceiveMessage(nsISupports*, nsIFrameLoader*, bool, nsAString const&, bool, mozilla::dom::ipc::StructuredCloneData*, mozilla::jsipc::CpowHolder*, nsIPrincipal*, nsTArray<mozilla::dom::ipc::StructuredCloneData>*) dom/base/nsFrameMessageManager.cpp:1121 13 xul.dll nsSameProcessAsyncMessageBase::ReceiveMessage(nsISupports*, nsIFrameLoader*, nsFrameMessageManager*) dom/base/nsFrameMessageManager.cpp:2073 14 xul.dll nsAsyncMessageToSameProcessParent::HandleMessage() dom/base/nsFrameMessageManager.cpp:1887 15 xul.dll mozilla::dom::SameProcessMessageQueue::Runnable::Run() dom/base/SameProcessMessageQueue.cpp:73 16 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1428 17 xul.dll mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:96 18 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:311 19 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:291 20 xul.dll nsBaseAppShell::Run() widget/nsBaseAppShell.cpp:156 21 xul.dll nsAppShell::Run() widget/windows/nsAppShell.cpp:271 22 xul.dll nsAppStartup::Run() toolkit/components/startup/nsAppStartup.cpp:283 23 xul.dll XREMain::XRE_mainRun() toolkit/xre/nsAppRunner.cpp:4573 24 xul.dll XREMain::XRE_main(int, char** const, mozilla::BootstrapConfig const&) toolkit/xre/nsAppRunner.cpp:4757 25 xul.dll XRE_main(int, char** const, mozilla::BootstrapConfig const&) toolkit/xre/nsAppRunner.cpp:4852 26 xul.dll mozilla::BootstrapImpl::XRE_main(int, char** const, mozilla::BootstrapConfig const&) toolkit/xre/Bootstrap.cpp:45 27 firefox.exe do_main browser/app/nsBrowserApp.cpp:237 28 firefox.exe wmain toolkit/xre/nsWindowsWMain.cpp:115 29 firefox.exe __scrt_common_main_seh f:/dd/vctools/crt/vcstartup/src/startup/exe_common.inl:253 30 kernel32.dll BaseThreadInitThunk 31 ntdll.dll __RtlUserThreadStart 32 ntdll.dll _RtlUserThreadStart these crashes started showing up on 32bit versions of firefox on windows in a higher frequency since 55.0a1 build 20170608030205. so based on this timing, bug 1356546 might be the regressing patch. in early stability data from the 55.0b/devedition rollout, with 1.37 % of all browser crashes this signature is the #7 top crash there.
1,373,604
12,404,148
This bug was filed from the Socorro interface and is report bp-e5bae163-2159-4b05-8300-60d2e0170616. ============================================================= Crashing Thread (0) Frame Module Signature Source 0 xul.dll nsContentUtils::DispatchFocusChromeEvent(nsPIDOMWindowOuter*) dom/base/nsContentUtils.cpp:4415 1 xul.dll nsDocShell::InternalLoad(nsIURI*, nsIURI*, bool, nsIURI*, unsigned int, nsIPrincipal*, nsIPrincipal*, unsigned int, nsAString const&, char const*, nsAString const&, nsIInputStream*, nsIInputStream*, unsigned int, nsISHEntry*, bool, nsAString const&, nsIDocShell*, nsIURI*, bool, nsIDocShell**, nsIRequest**) docshell/base/nsDocShell.cpp:10166 2 xul.dll nsDocShell::OnLinkClickSync(nsIContent*, nsIURI*, char16_t const*, nsAString const&, nsIInputStream*, nsIInputStream*, bool, nsIDocShell**, nsIRequest**, nsIPrincipal*) docshell/base/nsDocShell.cpp:14212 3 xul.dll OnLinkClickEvent::Run() docshell/base/nsDocShell.cpp:13966 4 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1406 5 xul.dll mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:96 6 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:231 7 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:211 8 xul.dll nsBaseAppShell::Run() widget/nsBaseAppShell.cpp:156 9 xul.dll nsAppShell::Run() widget/windows/nsAppShell.cpp:271 10 xul.dll nsAppStartup::Run() toolkit/components/startup/nsAppStartup.cpp:283 11 xul.dll XREMain::XRE_mainRun() toolkit/xre/nsAppRunner.cpp:4569 12 xul.dll XREMain::XRE_main(int, char** const, mozilla::BootstrapConfig const&) toolkit/xre/nsAppRunner.cpp:4749 13 xul.dll XRE_main(int, char** const, mozilla::BootstrapConfig const&) toolkit/xre/nsAppRunner.cpp:4844 14 xul.dll mozilla::BootstrapImpl::XRE_main(int, char** const, mozilla::BootstrapConfig const&) toolkit/xre/Bootstrap.cpp:45 15 firefox.exe wmain toolkit/xre/nsWindowsWMain.cpp:115 16 firefox.exe __scrt_common_main_seh f:/dd/vctools/crt/vcstartup/src/startup/exe_common.inl:253 17 kernel32.dll BaseThreadInitThunk 18 ntdll.dll __RtlUserThreadStart 19 ntdll.dll _RtlUserThreadStart this is a crash signature that's apparently regressing in 55.0b judging by early crash data from the staged rollout. it's happening in a codepath last touched by bug 1303838, so i'm tentatively setting it as blocking that bug.
1,374,148
12,409,495
This bug was filed from the Socorro interface and is report bp-55e3cf62-192c-41d6-9dad-5d4340170619. ============================================================= Frame Module Signature Source Ø 0 nvwgf2um.dll nvwgf2um.dll@0xb53a7b Ø 1 nvwgf2um.dll nvwgf2um.dll@0xb5544a Ø 2 nvwgf2um.dll nvwgf2um.dll@0xb87118 Ø 3 nvwgf2um.dll nvwgf2um.dll@0xba8512 Ø 4 nvwgf2um.dll nvwgf2um.dll@0xbb7898 Ø 5 nvwgf2um.dll nvwgf2um.dll@0xb578e7 Ø 6 nvwgf2um.dll nvwgf2um.dll@0xb5d623 Ø 7 nvwgf2um.dll nvwgf2um.dll@0xb46ee3 Ø 8 nvwgf2um.dll nvwgf2um.dll@0x1b6a3d 9 d3d11.dll CDecodeContext::BeginFrame(ID3D11VideoDecoderOutputView*, void const*, unsigned int) 10 d3d11.dll CContext::DecoderBeginFrame(ID3D11VideoDecoder*, ID3D11VideoDecoderOutputView*, unsigned int, void const*) Ø 11 msmpeg2vdec.dll msmpeg2vdec.dll@0x77cab Ø 12 msmpeg2vdec.dll msmpeg2vdec.dll@0x7461f Ø 13 msmpeg2vdec.dll msmpeg2vdec.dll@0x75e50 Ø 14 msmpeg2vdec.dll msmpeg2vdec.dll@0x747e6 Ø 15 msmpeg2vdec.dll msmpeg2vdec.dll@0x78ebe Ø 16 msmpeg2vdec.dll msmpeg2vdec.dll@0x78c29 17 kernel32.dll BaseThreadInitThunk 18 ntdll.dll __RtlUserThreadStart 19 ntdll.dll _RtlUserThreadStart This is #7 topcrash of Firefox 54. Hi Blake, Can you help shed some light here?
1,361,008
12,278,478
Created attachment 8863314 Simple web pages showing the problem in Nightly +++ This bug was initially created as a clone of Bug #1297414 +++ See attached HTML document. We have text<br> <div>...</div> Instructions: 1) Position caret at the end of the line an hit "enter". 2) Observe the resulting *three* paragraphs where only *two* are expected.
1,361,132
12,279,864
This bug was filed from the Socorro interface and is report bp-a4c73517-54b1-42f4-8370-0a34d0170501. ============================================================= This bug has been at the top of crash stats, but looks like no one filed it - not sure of the component...all Windows 10 crashes. Currently #7 top Windows browser crash. In other versions, but fairly high in 55 relative to release: http://bit.ly/2pBbP46. 85 crashes on nightly and 113 on Release in the last 7 days. Comments: Seemingly random crash.
1,362,065
12,292,576
Hardware: Surface Pro 2 Windows version: Windows 10 — 1703 "Creators Update" On Nightly drag and drop appears to be broken. This affects dragging tabs, Customization Mode, dragging tiles on New Tab and content HTML based drag and drop. The release version of Firefox (53) works fine for me.
1,362,303
12,294,724
This bug was filed from the Socorro interface and is report bp-1575434e-83d5-440f-be91-3ba110170505. ============================================================= Attempting to drag the image at the given URL reliably results in this crash. Dragging other random images seems okay, so it may have something to do with the large size of this particular one.
1,362,321
12,295,016
This bug was filed from the Socorro interface and is report bp-f804adaa-a451-4a62-9e62-db6270170505. ============================================================= Crashing Thread (0) Frame Module Signature Source 0 xul.dll gfxPlatform::Init() gfx/thebes/gfxPlatform.cpp:740 1 xul.dll gfxPlatform::GetPlatform() gfx/thebes/gfxPlatform.cpp:536 2 xul.dll mozilla::widget::GfxInfo::GetDWriteEnabled(bool*) widget/windows/GfxInfo.cpp:69 3 xul.dll NS_InvokeByIndex xpcom/reflect/xptcall/md/win32/xptcinvoke_asm_x86_msvc.asm:54 4 xul.dll XPCWrappedNative::CallMethod(XPCCallContext&, XPCWrappedNative::CallMode) js/xpconnect/src/XPCWrappedNative.cpp:1296 5 xul.dll XPC_WN_GetterSetter(JSContext*, unsigned int, JS::Value*) js/xpconnect/src/XPCWrappedNativeJSOps.cpp:1019 6 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:460 7 xul.dll CallGetter js/src/vm/NativeObject.cpp:1812 8 xul.dll js::GetProperty(JSContext*, JS::Handle<JSObject*>, JS::Handle<JSObject*>, JS::Handle<jsid>, JS::MutableHandle<JS::Value>) js/src/jsobj.h:857 9 xul.dll Interpret js/src/vm/Interpreter.cpp:2827 10 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:406 11 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:478 12 xul.dll InternalCall js/src/vm/Interpreter.cpp:505 13 xul.dll Interpret js/src/vm/Interpreter.cpp:2989 14 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:406 15 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:478 16 xul.dll InternalCall js/src/vm/Interpreter.cpp:505 17 xul.dll Interpret js/src/vm/Interpreter.cpp:2989 18 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:406 19 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:478 20 xul.dll CallGetter js/src/vm/NativeObject.cpp:1812 21 xul.dll js::Wrapper::get(JSContext*, JS::Handle<JSObject*>, JS::Handle<JS::Value>, JS::Handle<jsid>, JS::MutableHandle<JS::Value>) js/src/proxy/Wrapper.cpp:143 22 xul.dll js::CrossCompartmentWrapper::get(JSContext*, JS::Handle<JSObject*>, JS::Handle<JS::Value>, JS::Handle<jsid>, JS::MutableHandle<JS::Value>) js/src/proxy/CrossCompartmentWrapper.cpp:209 23 xul.dll js::Proxy::get(JSContext*, JS::Handle<JSObject*>, JS::Handle<JS::Value>, JS::Handle<jsid>, JS::MutableHandle<JS::Value>) js/src/proxy/Proxy.cpp:311 24 xul.dll GetPropertyOperation js/src/vm/Interpreter.cpp:192 25 xul.dll Interpret js/src/vm/Interpreter.cpp:2706 26 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:406 27 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:478 28 xul.dll InternalCall js/src/vm/Interpreter.cpp:505 29 xul.dll nsXPCWrappedJSClass::CallMethod(nsXPCWrappedJS*, unsigned short, XPTMethodDescriptor const*, nsXPTCMiniVariant*) js/xpconnect/src/XPCWrappedJSClass.cpp:1213 30 xul.dll nsXPCWrappedJS::CallMethod(unsigned short, XPTMethodDescriptor const*, nsXPTCMiniVariant*) js/xpconnect/src/XPCWrappedJS.cpp:613 31 xul.dll PrepareAndDispatch xpcom/reflect/xptcall/md/win32/xptcstubs.cpp:85 32 xul.dll SharedStub xpcom/reflect/xptcall/md/win32/xptcstubs.cpp:112 33 xul.dll NS_CreateServicesFromCategory(char const*, nsISupports*, char const*, char16_t const*) xpcom/components/nsCategoryManager.cpp:821 the crash signature is rising in firefox 53 and subsequent builds. Correlations for Firefox Release (50.37% in signature vs 02.99% overall) startup_crash = 1 [98.55% vs 02.47% if process_type = null] (95.56% in signature vs 00.80% overall) GFX_ERROR "Failed to create DrawTarget, Type: " = true (100.0% in signature vs 30.51% overall) plugin_version = null (90.37% in signature vs 32.68% overall) platform_pretty_version = Windows 10 (93.33% in signature vs 14.94% overall) Module "igd10iumd32.dll" = true [93.94% vs 32.95% if platform_version = 10.0.10586] (86.67% in signature vs 12.68% overall) Module "igdusc32.dll" = true [97.06% vs 40.60% if platform_version = 10.0.10240] (93.33% in signature vs 17.90% overall) Module "ncrypt.dll" = true [93.94% vs 35.50% if platform_version = 10.0.10586] (92.59% in signature vs 12.21% overall) Module "ntasn1.dll" = true [93.94% vs 35.50% if platform_version = 10.0.10586] (96.30% in signature vs 00.40% overall) GFX_ERROR "[D2D1.1] 3CreateBitmap failure " = true [57.97% vs 00.25% if process_type = null] (48.15% in signature vs 00.03% overall) moz_crash_reason = MOZ_CRASH(Could not initialize mScreenReferenceDrawTarget) (44.44% in signature vs 01.70% overall) adapter_device_id = 0x22b1 (42.22% in signature vs 01.22% overall) CPU Info = GenuineIntel family 6 model 76 stepping 3
1,370,087
12,370,719
This bug was filed from the Socorro interface and is report bp-69b9124d-2244-4587-8edb-ac28e0170604. ============================================================= Crashing Thread (0) Frame Module Signature Source 0 xul.dll mozilla::dom::StorageUtils::GenerateOriginKey(nsIPrincipal*, nsACString&, nsACString&) dom/storage/StorageUtils.cpp:19 1 xul.dll mozilla::dom::LocalStorageManager::GetStorageInternal(mozilla::dom::LocalStorageManager::CreateMode, mozIDOMWindow*, nsIPrincipal*, nsAString const&, bool, nsIDOMStorage**) dom/storage/LocalStorageManager.cpp:220 2 xul.dll mozilla::dom::LocalStorageManager::PrecacheStorage(nsIPrincipal*, nsIDOMStorage**) dom/storage/LocalStorageManager.cpp:269 3 xul.dll NS_InvokeByIndex xpcom/reflect/xptcall/md/win32/xptcinvoke_asm_x86_msvc.asm:54 4 xul.dll XPC_WN_CallMethod(JSContext*, unsigned int, JS::Value*) js/xpconnect/src/XPCWrappedNativeJSOps.cpp:982 5 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:470 6 xul.dll InternalCall js/src/vm/Interpreter.cpp:515 7 xul.dll Interpret js/src/vm/Interpreter.cpp:3028 8 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:410 9 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:488 10 xul.dll js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) js/src/vm/Interpreter.cpp:534 11 xul.dll CallGetter js/src/vm/NativeObject.cpp:1912 12 xul.dll GetPropertyOperation js/src/vm/Interpreter.cpp:193 13 xul.dll Interpret js/src/vm/Interpreter.cpp:2743 14 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:410 15 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:488 16 xul.dll InternalCall js/src/vm/Interpreter.cpp:515 17 xul.dll js::Wrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/Wrapper.cpp:166 18 xul.dll js::CrossCompartmentWrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/CrossCompartmentWrapper.cpp:353 19 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:452 20 xul.dll InternalCall js/src/vm/Interpreter.cpp:515 21 xul.dll Interpret js/src/vm/Interpreter.cpp:3028 22 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:410 23 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:488 24 xul.dll InternalCall js/src/vm/Interpreter.cpp:515 25 xul.dll JS_CallFunctionValue(JSContext*, JS::Handle<JSObject*>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) js/src/jsapi.cpp:2832 26 xul.dll nsXPCWrappedJSClass::CallMethod(nsXPCWrappedJS*, unsigned short, XPTMethodDescriptor const*, nsXPTCMiniVariant*) js/xpconnect/src/XPCWrappedJSClass.cpp:1214 27 xul.dll nsXPCWrappedJS::CallMethod(unsigned short, XPTMethodDescriptor const*, nsXPTCMiniVariant*) js/xpconnect/src/XPCWrappedJS.cpp:615 28 xul.dll PrepareAndDispatch xpcom/reflect/xptcall/md/win32/xptcstubs.cpp:85 29 xul.dll SharedStub xpcom/reflect/xptcall/md/win32/xptcstubs.cpp:112 30 xul.dll NS_InvokeByIndex xpcom/reflect/xptcall/md/win32/xptcinvoke_asm_x86_msvc.asm:54 crash reports with this signature started showing up in 55.0a1 build 20170603030204. this would be the changelog to the day before: https://hg.mozilla.org/mozilla-central/pushloghtml?startdate=2017-06-02&tochange=43039280fe464869428f03b047bb7c762784f44b
1,371,246
12,382,296
This bug was filed from the Socorro interface and is report bp-e98e3306-637b-45ce-a796-958640170608. ============================================================= 0 mozglue.dll MOZ_CrashPrintf mfbt/Assertions.cpp:63 1 xul.dll InvalidArrayIndex_CRASH(unsigned __int64, unsigned __int64) xpcom/ds/nsTArray.cpp:26 2 xul.dll nsTArray_Impl<void*, nsTArrayInfallibleAllocator>::ElementAt(unsigned __int64) obj-firefox/dist/include/nsTArray.h:1048 3 xul.dll mozilla::dom::`anonymous namespace'::ReadBlob dom/base/StructuredCloneHolder.cpp:522 4 xul.dll mozilla::dom::StructuredCloneHolder::CustomReadHandler(JSContext*, JSStructuredCloneReader*, unsigned int, unsigned int) dom/base/StructuredCloneHolder.cpp:975 5 xul.dll mozilla::dom::`anonymous namespace'::StructuredCloneCallbacksRead dom/base/StructuredCloneHolder.cpp:64 6 xul.dll JSStructuredCloneReader::startRead(JS::MutableHandle<JS::Value>) js/src/vm/StructuredClone.cpp:2234 7 xul.dll JSStructuredCloneReader::read(JS::MutableHandle<JS::Value>) js/src/vm/StructuredClone.cpp:2537 8 xul.dll ReadStructuredClone(JSContext*, JSStructuredCloneData&, JS::StructuredCloneScope, JS::MutableHandle<JS::Value>, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:626 9 xul.dll JS_ReadStructuredClone(JSContext*, JSStructuredCloneData&, unsigned int, JS::StructuredCloneScope, JS::MutableHandle<JS::Value>, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:2578 10 xul.dll JSAutoStructuredCloneBuffer::read(JSContext*, JS::MutableHandle<JS::Value>, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:2742 11 xul.dll mozilla::dom::StructuredCloneHolderBase::Read(JSContext*, JS::MutableHandle<JS::Value>) dom/base/StructuredCloneHolder.cpp:206 12 xul.dll mozilla::dom::StructuredCloneHolder::Read(nsISupports*, JSContext*, JS::MutableHandle<JS::Value>, mozilla::ErrorResult&) dom/base/StructuredCloneHolder.cpp:301 13 xul.dll mozilla::dom::StructuredCloneBlob::Deserialize(JSContext*, JS::Handle<JSObject*>, JS::MutableHandle<JS::Value>, mozilla::ErrorResult&) dom/base/StructuredCloneBlob.cpp:81 14 xul.dll mozilla::dom::StructuredCloneHolderBinding::deserialize obj-firefox/dom/bindings/StructuredCloneHolderBinding.cpp:34 15 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:470 16 xul.dll js::Wrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/Wrapper.cpp:166 17 xul.dll js::CrossCompartmentWrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/CrossCompartmentWrapper.cpp:353 18 xul.dll js::Proxy::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/Proxy.cpp:479 19 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:452 20 xul.dll Interpret js/src/vm/Interpreter.cpp:3028 21 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:410 22 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:488 23 xul.dll js::Wrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/Wrapper.cpp:166 24 xul.dll js::CrossCompartmentWrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/CrossCompartmentWrapper.cpp:353 25 xul.dll js::Proxy::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) js/src/proxy/Proxy.cpp:479 26 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:452 27 xul.dll Interpret js/src/vm/Interpreter.cpp:3028 28 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:410 29 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:488 30 xul.dll Interpret js/src/vm/Interpreter.cpp:3028 31 xul.dll js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:410 32 xul.dll js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) js/src/vm/Interpreter.cpp:488 33 xul.dll js::jit::DoCallFallback js/src/jit/BaselineIC.cpp:2453 34 @0x338d24f6609 When I save a Blob data which came from <canvas> (with my private add-on), I always meet this crash. I tested with mozregression, this is a regression of bug 1356546.
1,371,248
12,382,314
This bug was filed from the Socorro interface and is report bp-07aa1d6b-dbf8-4a07-a751-4619d0170608. ============================================================= - STR: 1.Launch Firefox with a clean profile. 2.Install a webextension. 3.Spend some time testing it. 4.Navigate to about:addons and remove the webextension. 5.Restart the browser. - Ran into this on Windows 8.1 32-bit, using Firefox 55.0a1 (2017-06-07/08) on Windows 10 64-bit - This issue might not reproduce for each restart, but I encountered the crash in about 90% of the cases. - Crash reports: bp-19ba0742-1912-4309-8ddd-3592d0170608 bp-69c4e329-01a8-4ab3-a0fc-b29d00170608 bp-9e447097-2b84-49ad-9385-266950170608 bp-7a41dc78-be4f-4037-a835-599f20170608 bp-9c96d7e3-0427-4dcc-a078-951c30170607 bp-f2a24256-57f0-4219-a95a-103a40170607
1,355,168
12,222,313
This bug was filed from the Socorro interface and is report bp-37a74ca7-df8b-412f-8f55-638602170405. ============================================================= We have more crashes (132 in the past 7 days) than I expected for this signature, given that it's an internal API. Windows 7 65 49.2% OS X 10.12 17 12.9% Windows 10 17 12.9% Windows XP 15 11.4% Windows 8.1 10 7.6% Windows Vista 4 3.0% OS X 10.11 3 2.3% Android 1 0.8% Looks like all are null-pointer crashes. I'm guessing mTarget is null here: https://hg.mozilla.org/mozilla-central/annotate/7a3f514cf849/dom/canvas/CanvasRenderingContext2D.cpp#l5278 due to the nsContentUtils::FlushLayoutForTree call on line 5234.
1,356,534
12,235,563
Created attachment 8858260 Client 14-04-2017, 11-35.crash Build: 58b02370e25 Device: iPad Pro iOS: 10.3 Steps to reproduce: 1. Install Firefox 2. Launch Firefox 3. Log in to FxA with sync data Actual results: - Firefox will crash after first sync. Note: - I am also logged in on desktop with this FxA.
1,356,812
12,237,909
This bug was filed from the Socorro interface and is report bp-46dae67d-1cd7-440f-a69d-2b50e2170415. ============================================================= There are 5 crashes (from 1 installation) in nightly 55 with buildid 20170414030225. In analyzing the backtrace, the regression may have been introduced by patch [1] to fix bug 1355414. [1] https://hg.mozilla.org/mozilla-central/rev?node=a121d68c6eec8c0d033581d8afceaba48b8ad8c5
1,357,040
12,239,836
This bug was filed from the Socorro interface and is report bp-631c3f32-056d-4d31-a121-d40c92170417. ============================================================= Seen while looking at nightly crash stats - earliest crashes seem to be in 20170331030216: http://bit.ly/2ppvgx2. Crashes affect Win, Linux and Android on nightly but the majority affect Linux. This crash is also present on Aurora. ni on :gerald since it appears he worked in this area of code and might have some ideas.
1,357,244
12,241,945
This bug was filed from the Socorro interface and is report bp-8774867c-4001-4581-baec-403592170417. ============================================================= https://hg.mozilla.org/mozilla-central/annotate/ce69b6e1773e/dom/media/MediaCache.cpp#l456 Looks like a null-deref on |entry|.
1,347,262
12,144,650
Upstream Skia security bug (https://bugs.chromium.org/p/skia/issues/detail?id=6294) details a variant of bug 1330166 that was not handled by that fix. All relevant security details of this bug should basically be the same as in bug 133016, just that this is a new way to trigger it. I've fixed up that case now with this patch that ensures the rounding is properly biased for all sides of the bounds rect. This patch was submitted upstream here: https://skia-review.googlesource.com/c/9700/
1,347,854
12,150,332
Created attachment 8848002 Client 16-03-2017, 11-05.crash Build: 849b926d5c Device: iPhone 7 iOS: 10.2.1 Steps to reproduce: 1. Go to Settings 2. Tap 'Sing in' 3. Use 3DT on 'Forgot password' (or any other link) 4. Tap on 'Add to Reading List' Actual results: - Firefox will crash. Expected results: - 3DT should be turned off for use for internal webviews as mentioned in Bug 1331972.
1,347,984
12,151,556
This bug was filed from the Socorro interface and is report bp-5b904ab8-0afe-4928-a86d-01beb2170314. ============================================================= There are a few dozen of these crashes across various channels in the last week. The ones with this signature that I looked at were all coming from nsJARChannel::OnStopRequest, into AsyncScriptLoader::OnStreamComplete, into js::PromiseObject::reject.
1,348,381
12,155,174
Created attachment 8848604 CreateBlackImage.html [57617] WARNING: SharedPlanarYCbCrImage::Allocate failed.: file /srv/mozilla/mozilla-inbound/gfx/layers/ipc/SharedPlanarYCbCrImage.cpp, line 196 Assertion failure: false, at /srv/mozilla/mozilla-inbound/dom/media/VideoSegment.cpp:85 #01: mozilla::VP8TrackEncoder::PrepareRawFrame(mozilla::VideoChunk&)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x67c8e3c] #02: mozilla::VP8TrackEncoder::GetEncodedTrack(mozilla::EncodedFrameContainer&)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x67ce6a6] #03: mozilla::MediaEncoder::WriteEncodedDataToMuxer(mozilla::TrackEncoder*)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x67b9eeb] #04: mozilla::MediaEncoder::GetEncodedData(nsTArray<nsTArray<unsigned char> >*, nsAString_internal&)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x67b7e04] #05: mozilla::dom::MediaRecorder::Session::Extract(bool)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x66bf4f2] #06: mozilla::dom::MediaRecorder::Session::ExtractRunnable::Run()[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x66bedc8] #07: nsThread::ProcessNextEvent(bool, bool*)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x3133ab] #08: NS_ProcessNextEvent(nsIThread*, bool)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x30e8d7] #09: mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x134b49c] #10: MessageLoop::RunInternal()[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x1260c18] #11: MessageLoop::Run()[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x12608dd] #12: nsThread::ThreadFunc(void*)[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL +0x309aea] #13: _pt_root[/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/libnss3.dylib +0x3694aa] #14: _pthread_body[/usr/lib/system/libsystem_pthread.dylib +0x3aab] #15: _pthread_body[/usr/lib/system/libsystem_pthread.dylib +0x39f7] ASAN:DEADLYSIGNAL ================================================================= ==57617==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00011f472e62 bp 0x7000071858d0 sp 0x700007185740 T99) #0 0x11f472e61 in mozilla::VideoFrame::CreateBlackImage(mozilla::gfx::IntSizeTyped<mozilla::gfx::UnknownUnits> const&) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x675fe61) #1 0x11f4dbe3b in mozilla::VP8TrackEncoder::PrepareRawFrame(mozilla::VideoChunk&) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x67c8e3b) #2 0x11f4e16a5 in mozilla::VP8TrackEncoder::GetEncodedTrack(mozilla::EncodedFrameContainer&) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x67ce6a5) #3 0x11f4cceea in mozilla::MediaEncoder::WriteEncodedDataToMuxer(mozilla::TrackEncoder*) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x67b9eea) #4 0x11f4cae03 in mozilla::MediaEncoder::GetEncodedData(nsTArray<nsTArray<unsigned char> >*, nsAString_internal&) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x67b7e03) #5 0x11f3d24f1 in mozilla::dom::MediaRecorder::Session::Extract(bool) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x66bf4f1) #6 0x11f3d1dc7 in mozilla::dom::MediaRecorder::Session::ExtractRunnable::Run() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x66bedc7) #7 0x1190263aa in nsThread::ProcessNextEvent(bool, bool*) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x3133aa) #8 0x1190218d6 in NS_ProcessNextEvent(nsIThread*, bool) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x30e8d6) #9 0x11a05e49b in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x134b49b) #10 0x119f73c17 in MessageLoop::RunInternal() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x1260c17) #11 0x119f738dc in MessageLoop::Run() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x12608dc) #12 0x11901cae9 in nsThread::ThreadFunc(void*) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x309ae9) #13 0x10ce3b4a9 in _pt_root (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/libnss3.dylib+0x3694a9) #14 0x7fffaae69aaa in _pthread_body (/usr/lib/system/libsystem_pthread.dylib+0x3aaa) #15 0x7fffaae699f6 in _pthread_start (/usr/lib/system/libsystem_pthread.dylib+0x39f6) #16 0x7fffaae691fc in thread_start (/usr/lib/system/libsystem_pthread.dylib+0x31fc) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x675fe61) in mozilla::VideoFrame::CreateBlackImage(mozilla::gfx::IntSizeTyped<mozilla::gfx::UnknownUnits> const&) Thread T99 created by T0 here: #0 0x10976f379 in wrap_pthread_create (/Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/lib/clang/8.0.0/lib/darwin/libclang_rt.asan_osx_dynamic.dylib+0x41379) #1 0x10ce37c1a in _PR_CreateThread (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/libnss3.dylib+0x365c1a) #2 0x10ce377da in PR_CreateThread (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/libnss3.dylib+0x3657da) #3 0x11901f72a in nsThread::Init(nsACString_internal const&) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x30c72a) #4 0x11902c346 in nsThreadManager::NewNamedThread(nsACString_internal const&, unsigned int, nsIThread**) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x319346) #5 0x11902f2f6 in NS_NewNamedThread(nsACString_internal const&, nsIThread**, nsIRunnable*, unsigned int) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x31c2f6) #6 0x11f3cb51e in mozilla::dom::MediaRecorder::Session::InitEncoder(unsigned char, int) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x66b851e) #7 0x11f3cca47 in mozilla::dom::MediaRecorder::Session::TracksAvailableCallback::NotifyTracksAvailable(mozilla::DOMMediaStream*) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x66b9a47) #8 0x11f0ecc26 in mozilla::DOMMediaStream::CheckTracksAvailable() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x63d9c26) #9 0x11f10d567 in mozilla::detail::RunnableMethodImpl<mozilla::DOMMediaStream*, void (mozilla::DOMMediaStream::*)(), true, false>::Run() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x63fa567) #10 0x1190263aa in nsThread::ProcessNextEvent(bool, bool*) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x3133aa) #11 0x11901e580 in NS_ProcessPendingEvents(nsIThread*, unsigned int) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x30b580) #12 0x120ab23cf in nsBaseAppShell::NativeEventCallback() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x7d9f3cf) #13 0x120bc3555 in nsAppShell::ProcessGeckoEvents(void*) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x7eb0555) #14 0x7fff9571a980 in __CFRUNLOOP_IS_CALLING_OUT_TO_A_SOURCE0_PERFORM_FUNCTION__ (/System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation+0xa7980) #15 0x7fff956fb9f6 in __CFRunLoopDoSources0 (/System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation+0x889f6) #16 0x7fff956faf75 in __CFRunLoopRun (/System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation+0x87f75) #17 0x7fff956fa973 in CFRunLoopRunSpecific (/System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation+0x87973) #18 0x7fff94c86a5b in RunCurrentEventLoopInMode (/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/HIToolbox.framework/Versions/A/HIToolbox+0x30a5b) #19 0x7fff94c86890 in ReceiveNextEventCommon (/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/HIToolbox.framework/Versions/A/HIToolbox+0x30890) #20 0x7fff94c866c5 in _BlockUntilNextEventMatchingListInModeWithFilter (/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/HIToolbox.framework/Versions/A/HIToolbox+0x306c5) #21 0x7fff9322c5b3 in _DPSNextEvent (/System/Library/Frameworks/AppKit.framework/Versions/C/AppKit+0x475b3) #22 0x7fff939a6d6a in -[NSApplication(NSEvent) _nextEventMatchingEventMask:untilDate:inMode:dequeue:] (/System/Library/Frameworks/AppKit.framework/Versions/C/AppKit+0x7c1d6a) #23 0x120bc1a6c in -[GeckoNSApplication nextEventMatchingMask:untilDate:inMode:dequeue:] (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x7eaea6c) #24 0x7fff93220f34 in -[NSApplication run] (/System/Library/Frameworks/AppKit.framework/Versions/C/AppKit+0x3bf34) #25 0x120bc45e6 in nsAppShell::Run() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0x7eb15e6) #26 0x124800c8d in nsAppStartup::Run() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0xbaedc8d) #27 0x124a20795 in XREMain::XRE_mainRun() (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0xbd0d795) #28 0x124a2376a in XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0xbd1076a) #29 0x124a24ddd in XRE_main(int, char**, mozilla::BootstrapConfig const&) (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/XUL+0xbd11ddd) #30 0x1016170df in main (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/firefox+0x1000020df) #31 0x101616993 in start (/srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/firefox+0x100001993) Command: /srv/mozilla/mozilla-inbound/ff-asan-debug/dist/NightlyDebug.app/Contents/MacOS/firefox -width 512 -height 512 /srv/logs/framboise/framboise_Fri_Mar_17_13-45-14_2017/faults/0/testcase.html
1,348,424
12,155,614
This bug was filed from the Socorro interface and is report bp-656f02c9-25a7-40b6-bcce-656632170316. ============================================================= Filing because I saw this in nightly, and it appears to be meet the criteria of a UAF. This crash is on Nightly, but there are a few other crashes on 52 that show the same crash address: http://bit.ly/2mBvhc0
1,341,131
12,083,353
This bug was filed from the Socorro interface and is report bp-74c00195-152a-4d5d-af11-4ed972170220. =============================================================
1,342,049
12,091,877
The following testcase crashes on mozilla-central revision 32dcdde1fc64 (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --enable-stdcxx-compat --disable-profiling --disable-debug --enable-optimize, run with --fuzzing-safe --ion-eager --no-threads): function assert(mustBeTrue, message) {}; assert.throws = function (expectedErrorConstructor, func, message) { try { func(); } catch (thrown) {} } gczeal(9); var nextItem; var iterable = {}; iterable[Symbol.iterator] = function() { return { next: function() { return { value: nextItem, done: false }; } }; }; assert.throws(TypeError, function() { new Map(iterable); }); nextItem = true; assert.throws(TypeError, function() { new Map(iterable); }); new Map(iterable); Backtrace: received signal SIGSEGV, Segmentation fault. 0x00000000006462aa in js::jit::SnapshotIterator::fromInstructionResult (index=<optimized out>, this=0x7fffffffc340) at js/src/jit/JitFrames.cpp:2209 #0 0x00000000006462aa in js::jit::SnapshotIterator::fromInstructionResult (index=<optimized out>, this=0x7fffffffc340) at js/src/jit/JitFrames.cpp:2209 #1 js::jit::SnapshotIterator::allocationValue (this=this@entry=0x7fffffffc340, alloc=..., rm=rm@entry=js::jit::SnapshotIterator::RM_Normal) at js/src/jit/JitFrames.cpp:1929 #2 0x0000000000648dd1 in js::jit::SnapshotIterator::read (this=0x7fffffffc340) at js/src/jit/JitFrameIterator.h:540 #3 js::jit::CloseLiveIteratorIon (tn=<optimized out>, frame=..., cx=0x7ffff6926800) at js/src/jit/JitFrames.cpp:352 #4 js::jit::HandleExceptionIon (overrecursed=0x7fffffffc1af, rfe=0x7fffffffc7a0, frame=..., cx=0x7ffff6926800) at js/src/jit/JitFrames.cpp:449 #5 js::jit::HandleException (rfe=<optimized out>) at js/src/jit/JitFrames.cpp:859 #6 0x000029391ff4215b in ?? () [...] #15 0x0000000000000000 in ?? () rax 0x0 0 rbx 0x7fffffffffff 140737488355327 rcx 0x6462a0 6578848 rdx 0x2 2 rsi 0x7fffffffc280 140737488339584 rdi 0x7fffffffc340 140737488339776 rbp 0x5 5 rsp 0x7fffffffc128 140737488339240 r8 0x7fffffffc0d0 140737488339152 r9 0x2 2 r10 0x83 131 r11 0x0 0 r12 0x7fffffffc340 140737488339776 r13 0x8 8 r14 0x7ffff5bc6bc8 140737316154312 r15 0x7ffff6926800 140737330178048 rip 0x6462aa <js::jit::SnapshotIterator::allocationValue(js::jit::RValueAllocation const&, js::jit::SnapshotIterator::ReadMethod)+186> => 0x6462aa <js::jit::SnapshotIterator::allocationValue(js::jit::RValueAllocation const&, js::jit::SnapshotIterator::ReadMethod)+186>: mov (%rax),%rax 0x6462ad <js::jit::SnapshotIterator::allocationValue(js::jit::RValueAllocation const&, js::jit::SnapshotIterator::ReadMethod)+189>: mov (%rax),%rax This looks like a crash at NULL but the test involves gczeal and it only reproduces with --no-threads, so I'm marking this s-s until investigated.
1,342,882
12,099,794
The following testcase crashes on mozilla-central revision a08ec245fa24 (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --enable-stdcxx-compat --disable-profiling --enable-debug --enable-optimize, run with --fuzzing-safe --ion-eager --ion-offthread-compile=off): for (let [k, map = send.log += "" + map] of map) {} Backtrace: received signal SIGSEGV, Segmentation fault. 0x00000000007921c0 in js::jit::LIRGenerator::visitToString (this=0x7fffffffbf30, ins=0x7ffff69cf1b0) at js/src/jit/Lowering.cpp:2323 #0 0x00000000007921c0 in js::jit::LIRGenerator::visitToString (this=0x7fffffffbf30, ins=0x7ffff69cf1b0) at js/src/jit/Lowering.cpp:2323 #1 0x00000000007a2849 in js::jit::LIRGenerator::visitInstruction (this=this@entry=0x7fffffffbf30, ins=ins@entry=0x7ffff69cf1b0) at js/src/jit/Lowering.cpp:4851 #2 0x00000000007a2bae in js::jit::LIRGenerator::visitInstruction (ins=0x7ffff69cf1b0, this=0x7fffffffbf30) at js/src/ds/LifoAlloc.h:338 #3 js::jit::LIRGenerator::visitBlock (this=this@entry=0x7fffffffbf30, block=block@entry=0x7ffff69a9f50) at js/src/jit/Lowering.cpp:4931 #4 0x00000000007a2f1b in js::jit::LIRGenerator::generate (this=this@entry=0x7fffffffbf30) at js/src/jit/Lowering.cpp:4999 #5 0x00000000006c9deb in js::jit::GenerateLIR (mir=mir@entry=0x7ffff69a91b8) at js/src/jit/Ion.cpp:1962 #6 0x00000000006f2c65 in js::jit::CompileBackEnd (mir=mir@entry=0x7ffff69a91b8) at js/src/jit/Ion.cpp:2057 #7 0x000000000042f6c6 in js::jit::IonCompile (cx=cx@entry=0x7ffff6948000, script=<optimized out>, baselineFrame=baselineFrame@entry=0x0, osrPc=osrPc@entry=0x0, recompile=<optimized out>, optimizationLevel=<optimized out>) at js/src/jit/Ion.cpp:2338 #8 0x00000000006f3168 in js::jit::Compile (cx=cx@entry=0x7ffff6948000, script=script@entry=..., osrFrame=osrFrame@entry=0x0, osrPc=osrPc@entry=0x0, forceRecompile=forceRecompile@entry=false) at js/src/jit/Ion.cpp:2525 #9 0x00000000006f3308 in js::jit::CanEnter (cx=cx@entry=0x7ffff6948000, state=...) at js/src/jit/Ion.cpp:2622 #10 0x00000000005354cd in js::RunScript (cx=cx@entry=0x7ffff6948000, state=...) at js/src/vm/Interpreter.cpp:369 [...] #19 main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at js/src/shell/js.cpp:8371 rax 0x0 0 rbx 0x7fffffffbf30 140737488338736 rcx 0x7ffff6c28a2d 140737333332525 rdx 0x0 0 rsi 0x7ffff6ef7770 140737336276848 rdi 0x7ffff6ef6540 140737336272192 rbp 0x7fffffffbdc0 140737488338368 rsp 0x7fffffffbd80 140737488338304 r8 0x7ffff6ef7770 140737336276848 r9 0x7ffff7fe4740 140737354024768 r10 0x58 88 r11 0x7ffff6b9f750 140737332770640 r12 0x7ffff69cf1b0 140737330868656 r13 0x7ffff69cf1b0 140737330868656 r14 0x7fffffffbf30 140737488338736 r15 0x7ffff4322580 140737290315136 rip 0x7921c0 <js::jit::LIRGenerator::visitToString(js::jit::MToString*)+800> => 0x7921c0 <js::jit::LIRGenerator::visitToString(js::jit::MToString*)+800>: movl $0x0,0x0 0x7921cb <js::jit::LIRGenerator::visitToString(js::jit::MToString*)+811>: ud2 Marking s-s until triaged because this is a LIR assertion, given the assertion message this might indicate some form of type mismatch.
1,345,409
12,125,518
Build: 7.0b1893 Device: iPad Air 2 iOS 10.2 Pre-requisites: - Close Private Tabs set to On Steps to reproduce: 1. Launch Firefox 2. Go to amazon.com in a private browsing session 3. Long tap on a link 4. Tap 'Open in New Private Tab' 5. Tap on the mask icon to return to normal browsing Actual results: - Firefox will crash. See video: - https://www.youtube.com/watch?v=sDoSAJ7lZhc Note: - The crash log is symbolicated on Nightly and on Beta I cannot find a crash log.
1,345,413
12,125,537
This bug was filed from the Socorro interface and is report bp-1bd8abb0-1846-4dda-8fd8-8a7292170308. ============================================================= It looks like we crash in XREMain::XRE_mainStartup if the LOGNAME environment variable is unset. We got a few of those crashes since yesterday on 52.0 release from Ubuntu users, and I can reproduce locally with "env -u LOGNAME firefox". Not sure why this triggers now, it doesn't look like a new issue as far as I can tell. My own crash reports got a "[@ XREMain::XRE_mainStartup ]" (52.0) or "[@ libxul.so@0x25c18db | XREMain::XRE_main ]" (55.0a1) signature.
1,345,815
12,129,527
This bug was filed from the Socorro interface and is report bp-2a9ef9a0-13c6-4b21-b266-a528b2170309. ============================================================= Crashing Thread (0) Frame Module Signature Source 0 mozglue.dll mozalloc_abort(char const* const) memory/mozalloc/mozalloc_abort.cpp:33 1 mozglue.dll mozalloc_handle_oom(unsigned int) memory/mozalloc/mozalloc_oom.cpp:46 2 mozglue.dll moz_xmalloc memory/mozalloc/mozalloc.cpp:85 3 xul.dll mozilla::layers::FillRectWithMask(mozilla::gfx::DrawTarget*, mozilla::gfx::RectTyped<mozilla::gfx::UnknownUnits, float> const&, mozilla::gfx::SourceSurface*, mozilla::gfx::SamplingFilter, mozilla::gfx::DrawOptions const&, mozilla::gfx::ExtendMode, mozilla::gfx::SourceSurface*, mozilla::gfx::Matrix const*, mozilla::gfx::Matrix const*) gfx/layers/basic/BasicLayersImpl.cpp:169 4 xul.dll mozilla::layers::FillRectWithMask(mozilla::gfx::DrawTarget*, mozilla::gfx::PointTyped<mozilla::gfx::UnknownUnits, float> const&, mozilla::gfx::RectTyped<mozilla::gfx::UnknownUnits, float> const&, mozilla::gfx::SourceSurface*, mozilla::gfx::SamplingFilter, mozilla::gfx::DrawOptions const&, mozilla::layers::Layer*) gfx/layers/basic/BasicLayersImpl.cpp:205 5 xul.dll mozilla::layers::BasicCanvasLayer::Paint(mozilla::gfx::DrawTarget*, mozilla::gfx::PointTyped<mozilla::gfx::UnknownUnits, float> const&, mozilla::layers::Layer*) gfx/layers/basic/BasicCanvasLayer.cpp:117 6 xul.dll mozilla::layers::BasicLayerManager::PaintSelfOrChildren(mozilla::layers::PaintLayerContext&, gfxContext*) gfx/layers/basic/BasicLayerManager.cpp:716 7 xul.dll mozilla::layers::BasicLayerManager::PaintLayer(gfxContext*, mozilla::layers::Layer*, void (*)(mozilla::layers::PaintedLayer*, gfxContext*, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::DrawRegionClip, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, void*), void*) gfx/layers/basic/BasicLayerManager.cpp:896 8 xul.dll mozilla::layers::BasicLayerManager::PaintSelfOrChildren(mozilla::layers::PaintLayerContext&, gfxContext*) gfx/layers/basic/BasicLayerManager.cpp:736 9 xul.dll mozilla::layers::BasicLayerManager::PaintLayer(gfxContext*, mozilla::layers::Layer*, void (*)(mozilla::layers::PaintedLayer*, gfxContext*, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::DrawRegionClip, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, void*), void*) gfx/layers/basic/BasicLayerManager.cpp:896 10 xul.dll mozilla::layers::BasicLayerManager::PaintSelfOrChildren(mozilla::layers::PaintLayerContext&, gfxContext*) gfx/layers/basic/BasicLayerManager.cpp:736 11 xul.dll mozilla::layers::BasicLayerManager::PaintLayer(gfxContext*, mozilla::layers::Layer*, void (*)(mozilla::layers::PaintedLayer*, gfxContext*, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::DrawRegionClip, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, void*), void*) gfx/layers/basic/BasicLayerManager.cpp:896 12 xul.dll mozilla::layers::BasicLayerManager::EndTransactionInternal(void (*)(mozilla::layers::PaintedLayer*, gfxContext*, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::DrawRegionClip, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, void*), void*, mozilla::layers::LayerManager::EndTransactionFlags) gfx/layers/basic/BasicLayerManager.cpp:622 13 xul.dll nsDisplayList::PaintRoot(nsDisplayListBuilder*, nsRenderingContext*, unsigned int) layout/painting/nsDisplayList.cpp:2055 14 xul.dll nsLayoutUtils::PaintFrame(nsRenderingContext*, nsIFrame*, nsRegion const&, unsigned int, nsDisplayListBuilderMode, nsLayoutUtils::PaintFrameFlags) layout/base/nsLayoutUtils.cpp:3675 15 xul.dll nsSimplePageSequenceFrame::PrintNextPage() layout/generic/nsSimplePageSequenceFrame.cpp:772 16 xul.dll nsPrintEngine::PrintPage(nsPrintObject*, bool&) layout/printing/nsPrintEngine.cpp:2745 17 xul.dll nsPagePrintTimer::Run() layout/printing/nsPagePrintTimer.cpp:89 18 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1240 19 xul.dll mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:96 20 xul.dll mozilla::ipc::MessagePumpForChildProcess::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:301 21 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:231 22 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:211 23 xul.dll nsBaseAppShell::Run() widget/nsBaseAppShell.cpp:156 24 xul.dll nsAppShell::Run() widget/windows/nsAppShell.cpp:262 25 xul.dll XRE_RunAppShell() toolkit/xre/nsEmbedFunctions.cpp:924 26 xul.dll mozilla::ipc::MessagePumpForChildProcess::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:269 27 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:231 28 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:211 29 xul.dll XRE_InitChildProcess(int, char** const, XREChildData const*) toolkit/xre/nsEmbedFunctions.cpp:756 30 xul.dll mozilla::BootstrapImpl::XRE_InitChildProcess(int, char** const, XREChildData const*) toolkit/xre/Bootstrap.cpp:65 31 firefox.exe content_process_main(mozilla::Bootstrap*, int, char** const) ipc/contentproc/plugin-container.cpp:115 32 firefox.exe wmain toolkit/xre/nsWindowsWMain.cpp:115 33 firefox.exe __scrt_common_main_seh f:/dd/vctools/crt/vcstartup/src/startup/exe_common.inl:253 34 kernel32.dll BaseThreadInitThunk 35 ntdll.dll __RtlUserThreadStart 36 ntdll.dll _RtlUserThreadStart these out-of-memory signatures on windows seem to be regressing since 53 and later (related to bug 1311512?). so far in very early crash data from 53.0b1 they account for 1.6% of all crashes there
1,346,269
12,134,317
This bug was filed from the Socorro interface and is report bp-02ae372f-45d3-46ac-8b4b-e32cd2170309. ============================================================= This is the #2 crash in the Android nightly of 20170309110217.
1,353,476
12,204,321
This bug was filed from the Socorro interface and is report bp-4319cf83-b45c-4115-b42d-f60ef2170403. ============================================================= Stack isn't clear due to lambdas, but almost certainly this is the one NewRunnableFrom() which uses [this instead of [self (and thus doesn't hold a ref to the object). Obvious safe fix, which hopefully fixes the problem.
1,353,610
12,206,654
We have https://crash-stats.mozilla.com/report/index/978fff99-50b0-406f-9d39-a0ecf2170329 https://crash-stats.mozilla.com/report/index/6bfbd5fb-b02f-4292-8549-9db5b2170329 https://crash-stats.mozilla.com/report/index/9edc3dbe-9217-485d-ae27-4f7da2170330 which look like a null deref and crashed on the main thread. I will add some null checks in the hope of reducing null deref crash so other UAF issues can stand out.
1,353,762
12,208,450
User Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.41 Safari/537.36 Steps to reproduce: Have a tab open (tested with a website, about:blank, and the your-tab-crashed-page) Open dev console (F12) (it opens in a new window for me) Paste and run the following code: var limit = 1<<20 var hash_data = new Uint8Array([97, 98, 99]) for (var i = 0; i < limit; i++) { crypto.subtle.digest("sha-512", hash_data) } console.log("done") Actual results: Firefox crashes, sometimes with the your-tab-crashed-page, and sometimes the entire thing with a small window opening for crash-report-submitting. Firefox seems to cope with a higher limit if dev console is open (I haven't tested this thoroughly). Expected results: Firefox shouldn't crash.
1,354,528
12,215,823
Created attachment 8855771 Screencast of the issue, USB headset unplugged around 00:47 STR: - Plug a USB headset (with microphone and headphones) in a Windows laptop (windows 7 and more recent). This laptop MUST have an internal microphone. - Set it as a default device, and default communication device. - This might be the default, depending on the configuration. If the device in the instructions below already have green ticks, no need to do anything. - To check, right click on the speaker icon on the systray - Click "Playback devices" - Right click on the USB device - Click "set as default device", "set as defaut communication device" - Click on the "Recording" tab, and do the same: - Right click on the USB device "Set as default device", "Set as default communication device". - When this is done, the USB device on both the Playback and Recording tab should have a green tick. - Open any page that uses getUserMedia, requesting an audio stream, for example, https://mozilla.github.io/webrtc-landing/gum_test.html, click on "Audio", accept the prompt (it should mention the USB device) - Unplug the USB headset Expected: - Firefox now uses the internal microphone Actual: - Clean crash on an exception This is caused by the fact that we miss a single line from this beta, we've uplifted the line in question to aurora and it's been in nightly for a while.
1,343,522
12,106,639
Created attachment 8842418 Client 01-03-2017, 16-18.crash Build: d66101cc Device: iPad Air 2 iOS: 10.2 Steps to reproduce: 1. Go to youtube.com 2. Long tap on a link to open the context menu 3. Dismiss the context menu by tapping on on the page 4. Change device orientation Actual results: - Firefox will crash Note: - This is a posible swift 3 migration regression - Issue reproducible only on iPads
1,343,550
12,106,914
Created attachment 8842452 testcase.html The attached testcase causes a crash near null in mozilla-central rev 34c6c2f302e7. ==19011==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x7f1ed98dfb62 bp 0x7ffeb84f8750 sp 0x7ffeb84f8640 T0) #0 0x7f1ed98dfb61 in mozilla::dom::AudioNode::AudioNode(mozilla::dom::AudioContext*, unsigned int, mozilla::dom::ChannelCountMode, mozilla::dom::ChannelInterpretation) /home/worker/workspace/build/src/dom/media/webaudio/AudioNode.cpp:5 7:25 #1 0x7f1ed997bc5d in mozilla::dom::ScriptProcessorNode::ScriptProcessorNode(mozilla::dom::AudioContext*, unsigned int, unsigned int, unsigned int) /home/worker/workspace/build/src/dom/media/webaudio/ScriptProcessorNode.cpp:491:5 #2 0x7f1ed98f836c in mozilla::dom::AudioContext::CreateScriptProcessor(unsigned int, unsigned int, unsigned int, mozilla::ErrorResult&) /home/worker/workspace/build/src/dom/media/webaudio/AudioContext.cpp:350:9 #3 0x7f1ed7324d99 in mozilla::dom::BaseAudioContextBinding::createScriptProcessor(JSContext*, JS::Handle<JSObject*>, mozilla::dom::AudioContext*, JSJitMethodCallArgs const&) /home/worker/workspace/build/src/obj-firefox/dom/bindings/Bas eAudioContextBinding.cpp:654:65 #4 0x7f1ed896b787 in mozilla::dom::GenericBindingMethod(JSContext*, unsigned int, JS::Value*) /home/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:2953:13 #5 0x7f1ede46943f in CallJSNative /home/worker/workspace/build/src/js/src/jscntxtinlines.h:282:15
1,343,723
12,108,922
The following testcase crashes on mozilla-central revision e91de6fb2b3d (build with --enable-debug --enable-more-deterministic, run with --fuzzing-safe --no-threads --ion-eager): // jsfunfuzz-generated oomTest(function() { // Adapted from randomly chosen test: js/src/tests/ecma_6/Promise/iterator-close.js class MyPromiseStaticResolveGetterThrows extends Promise {} (function() { for (y of [0]) { let x; z; (function() { return x; })(); } })() }) Backtrace: #0 js::jit::MachineState::read (reg=..., this=0x7ffeefca51d0) at js/src/jit/Registers.h:242 #1 js::jit::SnapshotIterator::fromRegister (this=0x7ffeefca5020, reg=...) at js/src/jit/JitFrameIterator.h:418 #2 js::jit::SnapshotIterator::allocationValue (this=this@entry=0x7ffeefca5020, alloc=..., rm=rm@entry=js::jit::SnapshotIterator::RM_Normal) at js/src/jit/JitFrames.cpp:1855 #3 0x0000000000811c99 in js::jit::SnapshotIterator::read (this=this@entry=0x7ffeefca5020) at js/src/jit/JitFrameIterator.h:540 #4 0x0000000000e6fbfb in InitFromBailout (caller=..., ionScript=<optimized out>, excInfo=0x7ffeefca55c0, callPC=<synthetic pointer>, nextCallee=..., startFrameFormals=..., builder=..., invalidate=true, iter=..., script=..., fun=..., callerPC=0x0, cx=0x7fc29a250000) at js/src/jit/BaselineBailouts.cpp:725 #5 js::jit::BailoutIonToBaseline (cx=0x7fc29a250000, activation=0x7ffeefca5db0, iter=..., invalidate=invalidate@entry=true, bailoutInfo=bailoutInfo@entry=0x7ffeefca5148, excInfo=excInfo@entry=0x7ffeefca55c0) at js/src/jit/BaselineBailouts.cpp:1620 /snip For detailed crash information, see attachment.