Bug ID
int64 961
1.91M
| Comment ID
int64 3.98k
17.1M
| Author
stringlengths 8
48
| Comment Text
stringlengths 1
64.3k
⌀ |
---|---|---|---|
1,906,903 | 17,017,724 |
Created attachment 9411815
Captura de pantalla_20240709_102504.png
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:127.0) Gecko/20100101 Firefox/127.0
Steps to reproduce:
When trying to read an email encrypted with GPG it is not possible since it is not sending or finding the sender's digital signature and shows the following warning in the email security
No Digital Signature
This message does not contain the sender's digital signature. The absence of a digital signature means that the message could have been sent by someone pretending to have this email address. It also means that the message may have been altered while being transmitted over the network.
Actual results:
Unable to read GPG-encrypted emails
Expected results:
Be able to decrypt emails with GPG and read their content and attachments
|
|
1,907,280 | 17,020,327 |
**Note**
* For easy keyboard navigation, the reader view panels should close when tapping the ESC key.
**Found in**
* Beta v129.0b2
**Affected versions**
* Nightly v130.0a1
* Beta v129.0b2
**Tested platforms**
* Affected platforms: all
* Unaffected platforms: none
**Steps to reproduce**
1. Load an article that supports reader view.
2. Enable Reader view.
3. Using keyboard navigation open any of the panels (Text and layout, Theme, Read aloud)
4. Press ESC key.
**Expected result**
* The panels should close.
**Actual result**
* The panels do not close.
**Regression range**
* Not a regression.
**Additional notes**
* The panel do close when tapping the UP/DOWN Arrows (the action of scrolling the page).
|
|
1,907,286 | 17,020,368 |
Spotted in crash telemetry. Stack trace is
```
Exception java.lang.IllegalStateException:
at androidx.fragment.app.Fragment.requireContext (Fragment.java:972)
at androidx.fragment.app.Fragment.getResources (Fragment.java:1036)
at org.mozilla.fenix.translations.TranslationsDialogFragment.onCreateDialog$lambda$1$lambda$0 (TranslationsDialogFragment.java:83)
at android.app.Dialog$ListenersHandler.handleMessage (Dialog.java:1501)
at android.os.Handler.dispatchMessage (Handler.java:106)
at android.os.Looper.loopOnce (Looper.java:224)
at android.os.Looper.loop (Looper.java:318)
at android.app.ActivityThread.main (ActivityThread.java:8772)
at java.lang.reflect.Method.invoke
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run (RuntimeInit.java:561)
at com.android.internal.os.ZygoteInit.main (ZygoteInit.java:1013)
```
|
|
1,907,627 | 17,022,520 |
### Steps to reproduce
1. Update to nightly 130.0a1 and open the app through the search widget
2. Using the search widget opens the app with the toolbar selected with the keyboard open
Another way to reproduce it in debug mode.
1. Clear storage/unistall app and rebuild.
2. Finish all the onboarding.
3. Navigation CFR will popup at the right place. Don't dismiss it.
4. Put the app in background and open it through search widget. Search anything.
5. Press the new tab button in navigation bar and CFR will show at the top.
|
|
1,907,783 | 17,023,592 |
#### Steps to reproduce:
1. Run Firefox version 128 stable or newer.
2. Make sure the `privacy.sanitize.useOldClearHistoryDialog` pref is set to "false", which is now the default.
3. Browse the web and open a few web pages to populate your local browsing history, or go directly to step 4 if you already have any history entries in your current profile.
4. Go to: Hamburger application menu → Settings → Privacy & Security (or directly to `about:preferences#privacy`), then enable the "Clear history when Firefox closes" option and configure it so that anything except browsing history is cleared for obvious reasons, let’s say temporary cached files and pages.
5. Forcefully close Firefox by issuing the following commands in a terminal: `taskkill /f /im firefox.exe` on Windows or `kill -SIGKILL $(ps -x | grep firefox | awk '{print $1}')` on Linux or in any other way that allows you to forcefully close a running application.
6. Normally launch Firefox again as if nothing had happened.
7. See what is described in the "Actual results" section.
#### Actual results:
During the very first launch after the forced shutdown, Firefox completely wipes out the entire browsing and download history, form data, site settings, cache, and cookies in the current profile, thereby causing permanent loss of user data with no built-in method to bring it back (or at least not until the profile backup is shipped later this year, which :mconley is actively working on).
#### Expected results:
After a forced shutdown of Firefox due to a freeze, BSOD/kernel panic, or an unexpected power loss, which are not pleasant experiences in themselves, Firefox should not further harm and intentionally get rid of user data without the user's consent.
#### Additional information:
One thing I noticed when comparing the new implementation in version 128 with the old one in 127, and without delving into the source code, is that every time Firefox is launched, it fills the `privacy.sanitize.pending` pref array with a few objects. One of them always contains the following array as one of its members: `"itemsToClear": ["cache", "cookies", "history", "formdata", "downloads", "sessions"]`, which was not the case in version 127, where the content of the array was dynamic and depended on the user's settings on what they wanted to be cleared during a shutdown.
During a shutdown, however, the new implementation seems to use some other preferences to determine what data the user wants cleared. It then resets that array to the default value `[]` as the old implementation did.
This comes down to the key thing. That empty array prevents the browsing history and other data from being cleared during the next startup. However, forcibly closing Firefox prevents it from resetting that array to the default value `[]` during the shutdown, so the next time Firefox is launched, the contents of that array (i.e. cache, cookies, history, form data, downloads, and sessions) are read, and all user data is wiped out.
#### Regression range:
With the `privacy.sanitize.useOldClearHistoryDialog` pref forced to false, Mozregression points to bug 1856417 and bug 1861450 as the culprits (otherwise, bug 1896949 is shown, which is the one that let the new clear history dialog ride the trains to the release channel). Here's the relevant pushlog: https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=8b80895bf4a3bd55d159062a8741c771555285dd&tochange=244e6e5092d8ec91690845b38264d332b87983c4
|
|
1,908,115 | 17,027,374 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:128.0) Gecko/20100101 Firefox/128.0
Steps to reproduce:
Regression in v128 compared to v127.0.2.
We have a local intranet portal that requires Windows authentication.
Its domain name is added to Firefox's `network.automatic-ntlm-auth.trusted-uris` so that Firefox sends the NTML credentials automatically.
That works.
Some pages on that portal include a javascript line `location.refresh(true);` to force a refresh on a timer. That has stopped working in 128 as compared to 127.0.2.
Actual results:
Starting from Firefox 128, executing `location.refresh(true);` results in a user prompt for credentials. Failure to provide them results in HTTP 401.
This was not the case in versions 127.0.2 and older.
Verified by rolling back to 127.0.2 and not observing this behaviour there.
Expected results:
`location.refresh(true);` should silently succeed.
|
|
1,908,312 | 17,028,719 |
Right now in the Firefox settings, the UI state for PPA remains checked and active even when the main telemetry setting is disabled. This is confusing UX, since DAP submission is disabled when telemetry is disabled. IOW, transmitting PPA is disabled when telemetry is disabled, and the UI should reflect that.
|
|
1,910,990 | 17,050,626 |
Firefox 129.0 release candidate 1, based on bisection late beta builds are affected. Windows 10
Drag and drop of local video files onto x.com page for posting causes page content to go blank and tab to be broken in late beta and upcoming release.
0. Have an account at x.com
1. Open https://x.com/home
2. In the left sidebar, click the 'Post' button.
3. Drag and drop a local video file into the area where the new post gets composed.
Actual results:
* Whole browser window goes blank for a short time.
* Content area of tab is blank
* Entering urls into the location bar and attempts to load them will fails (nothing happens)
* menu Tools > Browser Tools > Browser Console opens but fails to load console message
Expected:
* thumbnail for video shown
* video gets uploaded
This issue can be reproduced with videos uploaded successfully before with Firefox 128.0.x builds.
Other observations:
* Dragging and dropping images into the Compose area first, cancelling the composition and then starting a new one with the video dragged and dropped works as expected.
* If the Browser Toolbox is enabled, drag and drop of the video works as expected, even if the option 'Disable Cache' is not active.
* Toggling the options `media.hls.enabled` and `media.eme.playready.enabled` did not change behavior.
* Drag and drop of a video at https://imgur.com/upload works as expected but that site does not try to show a video thumbnail during upload.
Do you have further ideas how to debug this and which preference could alter the behavior in late beta and release?
|
|
1,909,795 | 17,040,730 | null |
|
1,909,666 | 17,039,956 |
Steps to reproduce:
Open https://www.frankfurt-marathon.com/ in Firefox 128.0 or 128.0.2
In Firefox 127.0 it works.
Actual results:
The initial request does not finish loading.
In the Timings section of the network tab of the dev tools, only a time for "Blocked" is shown, nothing further.
There are no errors, firefox just stops loading.
Expected results:
The initial request should finish loading.
|
|
1,909,219 | 17,036,761 |
Crash report: https://crash-stats.mozilla.org/report/index/66dc482c-970b-4280-b6e4-f33400240719
Reason: ```EXCEPTION_ACCESS_VIOLATION_READ```
Top 10 frames:
```
0 xul.dll mozilla::net::nsHttpChannel::ContinueProcessResponse1() netwerk/protocol/http/nsHttpChannel.cpp:2393
1 xul.dll mozilla::net::nsHttpChannel::ProcessResponse() netwerk/protocol/http/nsHttpChannel.cpp:2318
1 xul.dll mozilla::net::nsHttpChannel::OnStartRequest(nsIRequest*) netwerk/protocol/http/nsHttpChannel.cpp:7560
2 xul.dll nsInputStreamPump::OnStateStart() netwerk/base/nsInputStreamPump.cpp:504
2 xul.dll nsInputStreamPump::OnInputStreamReady(nsIAsyncInputStream*) netwerk/base/nsInputStreamPump.cpp:409
3 xul.dll CallbackHolder::CallbackHolder::<lambda_1>::operator()() const xpcom/io/nsPipe3.cpp:86
3 xul.dll NS_NewCancelableRunnableFunction<`lambda at /builds/worker/checkouts/gecko/xp... xpcom/threads/nsThreadUtils.h:636
4 xul.dll mozilla::RunnableTask::Run() xpcom/threads/TaskController.cpp:580
4 xul.dll mozilla::TaskController::DoExecuteNextTaskOnlyMainThreadInternal(mozilla::det... xpcom/threads/TaskController.cpp:907
5 xul.dll mozilla::TaskController::ExecuteNextTaskOnlyMainThreadInternal(mozilla::detai... xpcom/threads/TaskController.cpp:730
```
Looks like a new crash signature on release, found by the crash spike detector. There's a similar crash with the signature mozilla::net::nsHttpChannel::ContinueProcessResponse3 which I will file separately though it might be the same issue.
|
|
1,847,397 | 16,525,499 |
Steps to reproduce:
On git commit 0816653c3ab851fa0e362eaec48c643fb764eaf4 the attached (flaky) sample crashes with one of two assertion violation.
I observed `js::Mutex::assertOwnedByCurrentThread at js/src/threading/Mutex.cpp:73` when reproducing with rr --chaos and
`Assertion failure: kind == JS::TracerKind::Tenuring || kind == JS::TracerKind::MinorSweeping || kind == JS::TracerKind::Moving, at gc/Marking.cpp:137` when running without an attached debugger.
The sample is invoked as `obj-x86_64-pc-linux-gnu/dist/bin/js --baseline-warmup-threshold=10 --ion-warmup-threshold=100 --fuzzing-safe --small-function-length=512 --inlining-entry-threshold=16 --gc-zeal=10 crash.js`
The crash is quite flaky; it takes a couple of dozens of execution until the crash manifests. I failed to further minimize the sample, sorry about that.
Furthermore, I only observed the crash in an optimized build; the mozconfig file is attached.
If you cannot reproduce the crash locally I'll upload a pernosco session.
```
#0 js::Mutex::assertOwnedByCurrentThread (this=0x551e58e26c68)
at js/src/threading/Mutex.cpp:73
#1 0x000056358f6a4536 in js::gc::StoreBuffer::unput<js::gc::StoreBuffer::MonoTypeBuffer<js::gc::StoreBuffer::CellPtrEdge<JSString> >, js::gc::StoreBuffer::CellPtrEdge<JSString> > (buffer=...,
edge=..., this=<optimized out>) at js/src/gc/StoreBuffer.h:409
#2 js::gc::StoreBuffer::unputCell (strp=0x551e58e539e8, this=<optimized out>)
at js/src/gc/StoreBuffer.h:481
#3 js::gc::PostWriteBarrierImpl<JSString> (cellp=<optimized out>, prev=<optimized out>,
next=<optimized out>) at js/src/gc/StoreBuffer.h:636
#4 js::gc::PostWriteBarrier<JSString> (vp=<optimized out>, prev=<optimized out>,
next=<optimized out>) at js/src/gc/StoreBuffer.h:647
#5 js::InternalBarrierMethods<JSString*, void>::postBarrier (vp=<optimized out>,
prev=<optimized out>, next=<optimized out>)
at js/src/gc/Barrier.h:349
#6 js::WriteBarriered<JSString*>::post (this=<optimized out>, prev=<optimized out>,
next=<optimized out>) at js/src/gc/Barrier.h:509
#7 js::HeapPtr<JSString*>::~HeapPtr (this=0x551e58e539e8)
at js/src/gc/Barrier.h:703
#8 js::RegExpStatics::~RegExpStatics (this=0x551e58e53940)
at js/src/vm/RegExpStatics.h:17
#9 0x000056358f67ea2d in js_delete<js::RegExpStatics> (p=0x551e58e53940)
at obj-x86_64-pc-linux-gnu/dist/include/js/Utility.h:566
#10 JS::DeletePolicy<js::RegExpStatics>::operator() (this=<optimized out>, ptr=0x551e58e53940)
at obj-x86_64-pc-linux-gnu/dist/include/js/Utility.h:639
#11 mozilla::UniquePtr<js::RegExpStatics, JS::DeletePolicy<js::RegExpStatics> >::reset (
this=0x551e58ec3ed0, aPtr=0x0)
at obj-x86_64-pc-linux-gnu/dist/include/mozilla/UniquePtr.h:301
#12 mozilla::UniquePtr<js::RegExpStatics, JS::DeletePolicy<js::RegExpStatics> >::~UniquePtr (
this=0x551e58ec3ed0)
at obj-x86_64-pc-linux-gnu/dist/include/mozilla/UniquePtr.h:249
#13 js::GlobalObjectData::~GlobalObjectData (this=0x551e58ec3800)
at js/src/vm/GlobalObject.cpp:1002
#14 JS::GCContext::delete_<js::GlobalObjectData> (this=0x551e58e23740, cell=0x1d29829ab240,
p=0x551e58ec3800, nbytes=1808, use=js::MemoryUse::GlobalObjectData)
at js/src/gc/GCContext.h:163
#15 JS::GCContext::delete_<js::GlobalObjectData> (this=0x551e58e23740, cell=0x1d29829ab240,
p=0x551e58ec3800, use=js::MemoryUse::GlobalObjectData)
at js/src/gc/GCContext.h:151
#16 js::GlobalObject::releaseData (this=0x1d29829ab240, gcx=0x551e58e23740)
at js/src/vm/GlobalObject.cpp:997
#17 0x000056358fecc1ef in js::gc::GCRuntime::sweepRealmGlobals (this=0x551e58e23728)
at js/src/gc/Sweeping.cpp:1233
#18 js::gc::GCRuntime::beginSweepingSweepGroup (this=0x551e58e23728, gcx=0x551e58e23740,
budget=...) at js/src/gc/Sweeping.cpp:1570
#19 0x000056358fef1481 in sweepaction::SweepActionSequence::run (this=0x551e58e06970, args=...)
at js/src/gc/Sweeping.cpp:2165
#20 0x000056358feeca00 in sweepaction::SweepActionForEach<js::gc::SweepGroupsIter, JSRuntime*>::run (this=0x551e58e1a100, args=...) at js/src/gc/Sweeping.cpp:2200
#21 0x000056358fed4cda in js::gc::GCRuntime::performSweepActions (this=0x551e58e23728,
budget=...) at js/src/gc/Sweeping.cpp:2342
#22 0x000056358fe13dd2 in js::gc::GCRuntime::incrementalSlice (this=0x551e58e23728, budget=...,
reason=JS::GCReason::DESTROY_RUNTIME, budgetWasIncreased=<optimized out>)
at js/src/gc/GC.cpp:3670
#23 0x000056358fe19bfa in js::gc::GCRuntime::gcCycle (this=0x551e58e23728,
nonincrementalByAPI=<optimized out>, budgetArg=..., reason=JS::GCReason::DESTROY_RUNTIME)
at js/src/gc/GC.cpp:4181
#24 0x000056358fe1b670 in js::gc::GCRuntime::collect (this=0x551e58e23728,
nonincrementalByAPI=<optimized out>, budget=..., reason=JS::GCReason::DESTROY_RUNTIME)
at js/src/gc/GC.cpp:4372
#25 0x000056358fde06aa in js::gc::GCRuntime::gc (this=0x551e58e23728,
options=JS::GCOptions::Shutdown, reason=JS::GCReason::DESTROY_RUNTIME)
at js/src/gc/GC.cpp:4449
#26 0x000056358f846848 in JSRuntime::destroyRuntime (this=0x551e58e23000)
at js/src/vm/Runtime.cpp:266
#27 0x000056358f6c4a91 in js::DestroyContext (cx=0x551e58e31500)
at js/src/vm/JSContext.cpp:222
#28 0x000056358f3b01d4 in JS_DestroyContext (cx=0x551e58e31500)
at js/src/jsapi.cpp:405
#29 main::$_2::operator() (this=<optimized out>)
at js/src/shell/js.cpp:11283
#30 mozilla::ScopeExit<main::$_2>::~ScopeExit (this=<optimized out>)
at obj-x86_64-pc-linux-gnu/dist/include/mozilla/ScopeExit.h:106
#31 main (argc=<optimized out>, argv=<optimized out>)
at js/src/shell/js.cpp:11404
```
|
|
1,847,658 | 16,529,146 |
Steps to reproduce:
Thunderbird version 115.1.0 (64-bit), Mozilla Thunderbird Snap for Ubuntu, ubuntu-snap-build - 1.0
Use a calendar with a connected email account (local calendar, no server, but might affect other calendars as well).
Create an event in the calendar.
Add participants.
(make sure "notify participants" is set (default))
Click "send and close".
Other option that should send the invitations are also affected. Verified are:
- save and send
- delete an event and send notification
Actual results:
No invitation is sent to the participants (that's a bug).
(In general no event notifications are sent to participants at all. So not invitation, no updates, no deletion, etc.)
An "Accepted: <name of event>" email is sent via the connected email account for the organizer to himself/herself (that's new, it did not happen in the last version).
(In case you delete the event and send a notification an "Invitation Declined: <name of event>" email is sent to the organizer himself/herself.)
The same calendar worked fine before the update. Unfortunately I don't know the exact version number that was installed before the update but it was the most current one rolled out via Snap for Ubuntu.
So something is wrong with this last update. Please look into what changed in this functionality. The bug is likely to be easy to spot but I am not familiar with the code base.
I wasn't able to spot any error messages or warnings that could be connected to the error in the error console. Only once the following error appeared (after some time) but it might be totally unconnected to the problem. So please do not let it distract you. I add it anyway because if it is connected to the bug it might help:
mailnews.smtp:
error { target: TCPSocket, isTrusted: true, name: "NetworkTimeoutError", message: "Network", errorCode: 2152398862, srcElement: TCPSocket, currentTarget: TCPSocket, eventPhase: 2, bubbles: false, cancelable: false, … }
SmtpClient.jsm:434:17
Please remember that emails are sent (the wrong accept email to the organizer himself/herself). So there is no problem with sending emails. It is the calendar that does not generate an invitation.
Different attempts to solve the problem failed:
- restart in save mode
- create a new local calendar connected to a different email account (also with a different email server)
- adding only one participant or adding multiple participants
- adding a participant with a different email address
- changing an event and send updates
- deleting an event -> only sends decline email for organizer himself/herself to himself/herself
The functionality to send invitations is gone as it doesn't exist anymore.
Expected results:
An invitation email should be send to all participants.
No accept email should be send for the organizer to himself/herself.
The two strange behaviors might be connected.
|
|
1,847,989 | 16,531,600 |
In bug 1847619 we will be correcting an issue that occurs when Firefox users of Adobe Photoshop online upgrade from <=Fx115 to 116(the bug prevented them from accessing old or creating new files).
This ticket is to address the profiles that were already affected.
|
|
1,848,518 | 16,535,386 |
User Agent: Mozilla/5.0 (Android 11; Mobile; rv:109.0) Gecko/117.0 Firefox/117.0
Steps to reproduce:
Sound has stopped working on my Samsung Tab A running Android 10. YouTube, etc. load and play fine, just without audio. Audio works on literally everything else, including Beta and stable releases. Worked as of at least two nightly releases ago, I believe.
118.0a1 (Build #2015967809), e1c9818038+
GV: 118.0a1-20230811213712
AS: 118.20230811050249
Actual results:
No sound plays when loading any videos, etc, from browser.
Expected results:
Sound should play.
|
|
1,848,890 | 16,540,056 |
@ Lee, this UAF OffscreenCanvas crash seems to have spiked in 116.
+++ This bug was initially created as a clone of Bug #1815890 +++
Crash report: https://crash-stats.mozilla.org/report/index/5e81a1b8-d8de-4975-9cc7-057c00230209
Reason: ```SIGSEGV / SEGV_MAPERR```
Top 10 frames of crashing thread:
```
0 libxul.so mozilla::UniquePtr<base::SharedMemory, mozilla::DefaultDelete<base::SharedMemory> >::get const mfbt/UniquePtr.h:286
0 libxul.so mozilla::UniquePtr<base::SharedMemory, mozilla::DefaultDelete<base::SharedMemory> >::operator-> const mfbt/UniquePtr.h:281
0 libxul.so mozilla::fontlist::FontList::ShmBlock::Memory const gfx/thebes/SharedFontList-impl.h:311
0 libxul.so mozilla::fontlist::Pointer::ToPtr const gfx/thebes/SharedFontList.cpp:78
1 libxul.so mozilla::fontlist::Family::FindAllFacesForStyleInternal const gfx/thebes/SharedFontList.cpp:347
2 libxul.so mozilla::fontlist::Family::FindAllFacesForStyle const gfx/thebes/SharedFontList.cpp:392
2 libxul.so mozilla::fontlist::Family::FindFaceForStyle const gfx/thebes/SharedFontList.cpp:442
3 libxul.so gfxFontGroup::GetDefaultFont gfx/thebes/gfxTextRun.cpp:2174
4 libxul.so gfxFontGroup::GetFirstValidFont gfx/thebes/gfxTextRun.cpp:2370
5 libxul.so mozilla::dom::CanvasRenderingContext2D::DrawOrMeasureText dom/canvas/CanvasRenderingContext2D.cpp:4083
```
75 crashes with this signature on poison values in the last week. 96% Android. All of them had OffscreenCanvasRenderingContext2D_Binding, and the 10 I looked at were all on DOM worker threads. Some crashes are on 111.
|
|
1,848,916 | 16,540,375 |
Database manager version 001 doesn't rehash files or directories on rename, unique EntryIds are generated instead if there are collisions. Database manager version 002 started doing the rehashing, but the upgrade from version 001 to version 002 doesn't rehash all the files and directories, so if an entry is accessed with database manager version 002 which was previously renamed, the code tries to insert the same EntryId into Entries and Files tables. There are several options how to fix this problem:
1. Rehash everything during the existing upgrade
2. Rehash everything during a new upgrade (a new version would be introduced)
3. ~~Allow generation of unique EntryIds in database manager version 002~~
|
|
1,848,973 | 16,540,939 |
Created attachment 9349222
rec of the issue.gif
**[Notes]:**
- Considering that in Firefox 117 we turned on by default the “Embedded Import Wizard” in the "about:welcome" page, the QA opinion is that we should do the same for the "Import Data" upgrading users modal in order to avoid dismissing the whole upgrading users Oboarding flow.
**[Affected versions]:**
- Firefox Release 117.0b8 - Build ID: 20230815180041
- Firefox Nightly 118.0a1 - Build ID: 20230816094547
**[Affected Platforms]:**
- Windows 10 x64
- macOS 13.4.1
- Ubuntu 22.04 x64
**[Prerequisites]:**
- Have a Firefox Beta version older or equal to 116 installed.
**[Steps to reproduce]:**
1. Open the browser with the profile from the prerequisites.
2. Upgrade the browser to the latest version.
3. Navigate through the Onboarding flow for the upgrading users until the "Import Data" modal is displayed.
4. Click the "Import from previous browser" button and observe the behavior.
**[Expected result]:**
- The Embedded Import Wizard is opened and the Onboarding modal is not dismissed.
OR
- The Import Wizard from the "about:preferences" page is opened a new tab and the Onboarding modal is not dismissed.
**[Actual result]:**
- Client is redirected in the same tab to the "about:preferences" page and the Onboarding modal for upgrading users is dismissed.
**[Additional Notes]:**
- This issue is not reproducible on Firefox 116.0.2 because on this version the “legacy” version of the Import Wizard is still the default one.
- If the “about:preferences#general” page is already opened in a separate tab, that tab will be focused and the Onboarding modal for upgrading users is not dismissed.
- Attached is a screen recording of the issue:
@Ed could you please take a look over this behavior? We are unsure if the Onboarding flow for existing users will be displayed in Firefox 117 after a browser update.
|
|
1,848,999 | 16,541,135 |
Crash report: https://crash-stats.mozilla.org/report/index/216d8f1c-a90e-4669-84c4-983d70230816
Reason: ```EXCEPTION_ACCESS_VIOLATION_READ```
Top 10 frames of crashing thread:
```
0 xul.dll mozilla::net::TLSTransportLayer::OutputStreamWrapper::WriteDirectly netwerk/protocol/http/TLSTransportLayer.cpp:213
1 xul.dll mozilla::net::TLSTransportLayer::OutputInternal netwerk/protocol/http/TLSTransportLayer.cpp:742
2 nss3.dll ssl_DefSend security/nss/lib/ssl/ssldef.c:105
3 nss3.dll ssl3_SendRecord security/nss/lib/ssl/ssl3con.c:2578
4 nss3.dll SSL3_SendAlert security/nss/lib/ssl/ssl3con.c:2903
5 nss3.dll ssl_SecureClose security/nss/lib/ssl/sslsecur.c:739
6 xul.dll NSSSocketControl::CloseSocketAndDestroy security/manager/ssl/NSSSocketControl.cpp:500
7 xul.dll mozilla::net::TLSTransportLayer::~TLSTransportLayer::<lambda_0>::operator const netwerk/protocol/http/TLSTransportLayer.cpp:350
7 xul.dll mozilla::detail::RunnableFunction<`lambda at /builds/worker/checkouts/gecko/netwerk/protocol/http/TLSTransportLayer.cpp:347:22'>::Run xpcom/threads/nsThreadUtils.h:548
8 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1193
```
|
|
1,849,554 | 16,546,679 |
Created attachment 9349759
ddressshopping.png
**Found in**
* Nightly 118.0a1 (2023-08-21)
**Affected versions**
* Nightly 118.0a1 (2023-08-21)
**Affected platforms**
* Windows
**Preconditions:**
Set the browser.shopping.experience2023.enabled - TRUE
Enable High Contrast.
**Steps to reproduce**
1. Reach https://www.walmart.com/ip/Home-Office-Chair-Big-Tall-Chair-8-Hours-Heavy-Duty-Design-Ergonomic-High-Back-Cushion-Lumbar-Support-Computer-Desk-Adjustable-Executive-Leather-Arms/889963233?athbdg=L1600&adsRedirect=true.
2. Hover over the Fakespot address bar icon using the mouse cursor.
**Expected result**
* The Fakespot Address bar icon should be visible with High Contrast.
**Actual result**
* The Fakespot address bar icon has the same color when hovered over with High contrast enabled.
**Regression range**
Not Applicable
|
|
1,832,470 | 16,405,765 |
Created attachment 9332994
hover_bug.webm
Steps to reproduce:
1) Navigate to attachment 8857315
2) Right click on the video
3) Hover over the menuitem labeled `Speed`
Actual results:
The menuitem has no hover state and its arrow disappears
Expected results:
The menuitem turns blue and its arrow does not disappear
|
|
1,832,582 | 16,406,494 |
Crash report: https://crash-stats.mozilla.org/report/index/5127780f-32a4-4fa5-abed-4fdbb0230511
Reason: ```EXCEPTION_ACCESS_VIOLATION_READ```
Top 10 frames of crashing thread:
```
0 xul.dll js::jit::AnalyzeBytecodeForIon js/src/jit/BytecodeAnalysis.cpp:253
1 xul.dll js::jit::JitScript::ensureHasCachedIonData js/src/jit/JitScript.cpp:465
2 xul.dll WarpScriptOracle::createScriptSnapshot js/src/jit/WarpOracle.cpp:305
3 xul.dll js::jit::WarpOracle::createSnapshot js/src/jit/WarpOracle.cpp:154
4 xul.dll js::jit::CreateWarpSnapshot js/src/jit/Ion.cpp:1586
4 xul.dll js::jit::IonCompile js/src/jit/Ion.cpp:1656
4 xul.dll js::jit::Compile js/src/jit/Ion.cpp:1861
5 xul.dll BaselineCanEnterAtEntry js/src/jit/Ion.cpp:1993
5 xul.dll IonCompileScriptForBaseline js/src/jit/Ion.cpp:2117
5 xul.dll js::jit::IonCompileScriptForBaselineAtEntry js/src/jit/Ion.cpp:2144
```
This crash is spiking since 114.0b2
|
|
1,832,662 | 16,406,909 |
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0
Steps to reproduce:
1. Add a "Move to" button to a toolbar.
2. Open a mail folder and hit one message.
3. Hit the "Move to" button and pick a folder.
Actual results:
Not only the current message, but also an adjacent one is moved into the same folder: next one or previous one if there's no next one, not sure about an exact condition.
Expected results:
Only one message is moved.
The "Move To" item in the message context menu does not seem to have this side effect.
|
|
1,832,710 | 16,407,256 |
Masayuki, this bug is a regression from your fix for bug 1815969. I bisected this regression to this pushlog:
https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=0e5722e588dfcf4b62e3d34ea5b96139d10c0453&tochange=55c1f2ce765b4df00a8b676bda791f0fcfa0ad90
### Steps to reproduce
1. Open Slack in Firefox 115.
2. Copy some text to your clipboard, such as the word `test`.
3. Focus Slack's message editor.
4. Shift+Ctrl+V to paste the clipboard text. Shift+Ctrl+V is a keyboard short that commonly pastes clipboard text without any rich text formatting that may have been copied.
### Expected behavior
`test`
In Firefox 114 and Chrome, Shift+Ctrl+V pastes the clipboard text. In Safari, Shift+Ctrl+V doesn't paste anything, which seems like a different bug.
### Actual behavior
`testtest`
In Firefox 115, Shift+Ctrl+V pastes two copies of the clipboard text.
|
|
1,833,128 | 16,412,047 |
Created attachment 9333626
QA-1847-treatment-c.png
**[Affected versions]:**
- Firefox Release 113.0 - Build ID: 20230504192738
- Firefox Beta 114.0b4 - Build ID: 20230514175823
- Firefox Nightly 115.0a1 - Build ID: 20230514213610
**[Affected Platforms]:**
- Windows 10 x64
- Windows 11 x64
**[Prerequisites]:**
- Have a new Firefox Profile.
- Have the nimbus.debug pref set to true.
**[Steps to reproduce]:**
1. Open the browser from the prerequisites.
2. Copy and paste the following link in a new tab: `about:studies?optin_slug=prompt-fxa-creation-after-import&optin_branch=treatment-c&optin_collection=nimbus-preview`
3. Open a new tab and navigate to the `about:welcome` page.
4. Skip all slides until you get to the device migration one.
5. Observe the Primary and Secondary buttons.
**[Expected result]:**
- The Primary button is displayed above the Secondary button.
**[Actual result]:**
- The buttons are displayed on the same line without any space between them.
**[Notes]:**
- The issue is not reproducible on the `control`, `treatment-a`, or `treatment-b` branches.
- Attached is a screenshot of the issue.
|
|
1,833,339 | 16,413,463 |
The following testcase crashes on mozilla-central revision 20230509-44770d5c9e91 (fuzzing-asan-opt build, run with --no-threads --wasm-compiler=baseline):
modBuf = new Uint8Array([
,97,115,109,1,,,,1,34,2,96,,7,127,123,127,124,124,127,
124,96,20,112,124,124,124,124,124,124,124,124,124,124,
124,124,124,124,124,124,124,126,111,,2,8,1,2,,,,4,,1,
3,9,8,1,,,,,,,,,10,,,,,,,,,,,10,176,9,8,255,7,,67,,,,
,68,,,,,,,,,34,1,2,,253,12,,,,,,,,,,,,,,,,,253,31,,6,
64,,,,,,,,,,,,,,,,,,,,,,,,,,,7,,16,6,16,7,16,7,16,7,
16,7,16,7,16,6,252,6,16,7,16,7,16,7,6,,,,,,,,,,7,,16,
6,16,7,16,7,16,7,16,7,6,,,,,,,,,,7,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2,,,2,,,2,,,2,,,53,,,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,53,
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
53,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,1
]);
new WebAssembly.Module(modBuf);
Backtrace:
==32371==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62100002a4f0 at pc 0x55754fd5037b bp 0x7ffe91725e90 sp 0x7ffe91725e88
WRITE of size 4 at 0x62100002a4f0 thread T0
#0 0x55754fd5037a in new_<js::wasm::Stk> objdir/dist/include/mozilla/Vector.h:154:30
#1 0x55754fd5037a in infallibleEmplaceBack<js::wasm::Stk> objdir/dist/include/mozilla/Vector.h:805:5
#2 0x55754fd5037a in push<js::wasm::Stk> js/src/wasm/WasmBCStkMgmt-inl.h:44:8
#3 0x55754fd5037a in pushRef js/src/wasm/WasmBCStkMgmt-inl.h:530:3
#4 0x55754fd5037a in js::wasm::BaseCompiler::emitCatch() js/src/wasm/WasmBaselineCompile.cpp:4124:9
#5 0x55754fdb0aa6 in js::wasm::BaseCompiler::emitBody() js/src/wasm/WasmBaselineCompile.cpp:8997:9
#6 0x55754fdeb9b0 in emitFunction js/src/wasm/WasmBaselineCompile.cpp:10802:8
#7 0x55754fdeb9b0 in js::wasm::BaselineCompileFunctions(js::wasm::ModuleEnvironment const&, js::wasm::CompilerEnvironment const&, js::LifoAlloc&, mozilla::Vector<js::wasm::FuncCompileInput, 8ul, js::SystemAllocPolicy> const&, js::wasm::CompiledCode*, mozilla::UniquePtr<char [], JS::FreePolicy>*) js/src/wasm/WasmBaselineCompile.cpp:10976:12
#8 0x55754ff1382d in ExecuteCompileTask(js::wasm::CompileTask*, mozilla::UniquePtr<char [], JS::FreePolicy>*) js/src/wasm/WasmGenerator.cpp:702:12
#9 0x55754ff1505b in locallyCompileCurrentTask js/src/wasm/WasmGenerator.cpp:751:8
#10 0x55754ff1505b in js::wasm::ModuleGenerator::finishFuncDefs() js/src/wasm/WasmGenerator.cpp:882:24
#11 0x55754fed5f76 in bool DecodeCodeSection<js::wasm::Decoder>(js::wasm::ModuleEnvironment const&, js::wasm::Decoder&, js::wasm::ModuleGenerator&) js/src/wasm/WasmCompile.cpp:706:13
#12 0x55754fed52d1 in js::wasm::CompileBuffer(js::wasm::CompileArgs const&, js::wasm::ShareableBytes const&, mozilla::UniquePtr<char [], JS::FreePolicy>*, mozilla::Vector<mozilla::UniquePtr<char [], JS::FreePolicy>, 0ul, js::SystemAllocPolicy>*, JS::OptimizedEncodingListener*) js/src/wasm/WasmCompile.cpp:728:8
#13 0x55754ffa5a69 in js::WasmModuleObject::construct(JSContext*, unsigned int, JS::Value*) js/src/wasm/WasmJS.cpp:1726:7
#14 0x55754dc0b6ca in CallJSNative js/src/vm/Interpreter.cpp:486:13
[...]
0x62100002a4f0 is located 0 bytes after 4080-byte region [0x621000029500,0x62100002a4f0)
allocated by thread T0 here:
#0 0x55754d7f8eee in malloc /builds/worker/fetches/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:69:3
#1 0x55754fea3a70 in js_arena_malloc objdir/dist/include/js/Utility.h:366:10
#2 0x55754fea3a70 in js_pod_arena_malloc<js::wasm::Stk> objdir/dist/include/js/Utility.h:576:26
#3 0x55754fea3a70 in maybe_pod_arena_malloc<js::wasm::Stk> objdir/dist/include/js/AllocPolicy.h:33:12
#4 0x55754fea3a70 in pod_arena_malloc<js::wasm::Stk> objdir/dist/include/js/AllocPolicy.h:46:12
#5 0x55754fea3a70 in pod_malloc<js::wasm::Stk> objdir/dist/include/js/AllocPolicy.h:72:12
#6 0x55754fea3a70 in mozilla::Vector<js::wasm::Stk, 0ul, js::SystemAllocPolicy>::convertToHeapStorage(unsigned long) objdir/dist/include/mozilla/Vector.h:1027:30
#7 0x55754fdea0c5 in reserve objdir/dist/include/mozilla/Vector.h:1118:9
#8 0x55754fdea0c5 in js::wasm::BaselineCompileFunctions(js::wasm::ModuleEnvironment const&, js::wasm::CompilerEnvironment const&, js::LifoAlloc&, mozilla::Vector<js::wasm::FuncCompileInput, 8ul, js::SystemAllocPolicy> const&, js::wasm::CompiledCode*, mozilla::UniquePtr<char [], JS::FreePolicy>*) js/src/wasm/WasmBaselineCompile.cpp:10951:12
#9 0x55754ff1382d in ExecuteCompileTask(js::wasm::CompileTask*, mozilla::UniquePtr<char [], JS::FreePolicy>*) js/src/wasm/WasmGenerator.cpp:702:12
#10 0x55754ff1505b in locallyCompileCurrentTask js/src/wasm/WasmGenerator.cpp:751:8
#11 0x55754ff1505b in js::wasm::ModuleGenerator::finishFuncDefs() js/src/wasm/WasmGenerator.cpp:882:24
#12 0x55754fed5f76 in bool DecodeCodeSection<js::wasm::Decoder>(js::wasm::ModuleEnvironment const&, js::wasm::Decoder&, js::wasm::ModuleGenerator&) js/src/wasm/WasmCompile.cpp:706:13
#13 0x55754fed52d1 in js::wasm::CompileBuffer(js::wasm::CompileArgs const&, js::wasm::ShareableBytes const&, mozilla::UniquePtr<char [], JS::FreePolicy>*, mozilla::Vector<mozilla::UniquePtr<char [], JS::FreePolicy>, 0ul, js::SystemAllocPolicy>*, JS::OptimizedEncodingListener*) js/src/wasm/WasmCompile.cpp:728:8
#14 0x55754ffa5a69 in js::WasmModuleObject::construct(JSContext*, unsigned int, JS::Value*) js/src/wasm/WasmJS.cpp:1726:7
[...]
SUMMARY: AddressSanitizer: heap-buffer-overflow dist/include/mozilla/Vector.h:154:30 in new_<js::wasm::Stk>
Shadow bytes around the buggy address:
0x62100002a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x62100002a480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00[fa]fa
0x62100002a500: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Marking s-s due to buffer overflow.
|
|
1,833,786 | 16,416,962 |
Appears to have started in 111. Affects all Windows versions.
Crash report: https://crash-stats.mozilla.org/report/index/667db0ae-beb5-449b-9290-71ca50230410
Reason: ```EXCEPTION_ACCESS_VIOLATION_READ```
Top 10 frames of crashing thread:
```
0 xul.dll mozilla::detail::nsTStringRepr<char16_t>::BeginReading const xpcom/string/nsTStringRepr.h:147
0 xul.dll nsTSubstring<char16_t>::operator Span const xpcom/string/nsTSubstring.h:1077
0 xul.dll NS_ConvertUTF16toUTF8::NS_ConvertUTF16toUTF8 xpcom/string/nsString.h:99
1 xul.dll mozilla::EMEDecoderModule::SupportsMimeType const dom/media/platforms/agnostic/eme/EMEDecoderModule.cpp:468
2 xul.dll mozilla::EMEDecoderModule::AsyncCreateDecoder dom/media/platforms/agnostic/eme/EMEDecoderModule.cpp:398
3 xul.dll mozilla::PDMFactory::CreateDecoderWithPDM dom/media/platforms/PDMFactory.cpp:458
4 xul.dll RefPtr<mozilla::PlatformDecoderModule>::get const mfbt/RefPtr.h:286
4 xul.dll RefPtr<mozilla::PlatformDecoderModule>::operator mozilla::PlatformDecoderModule* const mfbt/RefPtr.h:299
4 xul.dll mozilla::PDMFactory::CreateDecoder dom/media/platforms/PDMFactory.cpp:356
5 xul.dll mozilla::MediaChangeMonitor::CreateDecoder dom/media/platforms/wrappers/MediaChangeMonitor.cpp:699
```
|
|
1,833,810 | 16,417,111 |
Origin clearing, origin listing and IndexedDB database maintenance need to iterate over all origin directories and get metadata for each origin directory. We currently use `LoadFullOriginMetadataWithRestore` method for that which loads data from the metadata file. Opening and loading of the metadata file is not cheap, so if there are many origin directories the whole operation can take long time. The good news is that we don't use the extra information provided by `FullOriginMetadata`, like the last access time and the persisted flag. So we can add a new method which just returns `OriginMetadata` and doesn't touch the metadata file at all.
|
|
1,833,876 | 16,417,476 |
Created attachment 9334823
The working demos of the Canvas restriction bypassing
The attached demo (A modified example from the demo page https://developer.mozilla.org/en-US/docs/Web/API/Canvas_API/Tutorial/Pixel_manipulation_with_canvas ) tries to overcome the restriction that doesn't allow accessing the canvas pixel data when a locally accessed image was drawn on it.
Steps to reproduce:
* Extract the archive locally (Windows 7 in my case).
* Open file .... main_entry\UntaintingFFDemo.htm
* Click at Grayscale/Invated/Sepia.
What happened:
* the switching works without limitations in Firefox showing the modified images. So the pixels of the image from the local exposed_image folder is accessed by the script.
What expected
* no change in canvas, possible security-related errors in the console related to the security restrictions.
I thought that it was a feature, not a bug, but In Chrome ( Version 109.0.5414.120 (Official Build) (64-bit) ) they are not drawn with the console error
> Uncaught DOMException: Failed to execute 'getImageData' on 'OffscreenCanvasRenderingContext2D': The canvas has been tainted by cross-origin data. ... at GetUnrestrictedImageData
The code fragment that "launders" the image is this
```
function GetUnrestrictedImageData(restrImage)
{
var img = new Image(restrImage.width, restrImage.height);
var offscreen = new OffscreenCanvas(restrImage.width, restrImage.height);
var gctx = offscreen.getContext("2d");
gctx.drawImage(restrImage, 0, 0);
var testImageData = gctx.getImageData(0, 0, offscreen.width, offscreen.height);
return testImageData;
}
```
|
|
1,834,830 | 16,426,178 |
This crash signature's volume doubled in 113. In many of these crash reports, JNI is trying to allocate buffers larger than 100 MB.
Crash report: https://crash-stats.mozilla.org/report/index/dc70daf1-a862-49b5-8d46-d400d0230524
Java stack trace:
```
java.lang.OutOfMemoryError: Failed to allocate a 181111568 byte allocation with 11580152 free bytes and 11MB until OOM, max allowed footprint 201326592, growth limit 201326592
at org.mozilla.gecko.mozglue.GeckoLoader.nativeRun(Native Method)
at org.mozilla.gecko.GeckoThread.run(GeckoThread.java:613)
```
```
Frame Module Signature Source Trust
0 libxul.so NS_ABORT_OOM(unsigned long) xpcom/base/nsDebugImpl.cpp:674 context
1 libxul.so mozilla::jni::ReportException(_JNIEnv*, _jthrowable*, _jstring*) widget/android/jni/Utils.cpp:237 cfi
2 libxul.so mozilla::jni::HandleUncaughtException(_JNIEnv*) widget/android/jni/Utils.cpp:206 cfi
3 libxul.so mozilla::jni::ArrayRefBase<_jbyteArray*, signed char>::New(signed char const*, unsigned long) widget/android/jni/Refs.h:821 cfi
4 libxul.so mozilla::jni::detail::BoxByteArray(JSContext*, JS::Handle<JSObject*>, mozilla::jni::LocalRef<mozilla::jni::Object>&) widget/android/jni/GeckoBundleUtils.cpp:98 inlined
4 libxul.so mozilla::jni::detail::BoxObject(JSContext*, JS::Handle<JS::Value>, mozilla::jni::LocalRef<mozilla::jni::Object>&) widget/android/jni/GeckoBundleUtils.cpp:227 cfi
5 libxul.so mozilla::jni::detail::BoxValue(JSContext*, JS::Handle<JS::Value>, mozilla::jni::LocalRef<mozilla::jni::Object>&) widget/android/jni/GeckoBundleUtils.cpp:287 inlined
5 libxul.so mozilla::jni::detail::BoxObject(JSContext*, JS::Handle<JS::Value>, mozilla::jni::LocalRef<mozilla::jni::Object>&) widget/android/jni/GeckoBundleUtils.cpp:255 cfi
6 libxul.so mozilla::jni::BoxData(JSContext*, JS::Handle<JS::Value>, mozilla::jni::LocalRef<mozilla::jni::Object>&, bool) widget/android/jni/GeckoBundleUtils.cpp:0 cfi
7 libxul.so mozilla::widget::detail::BoxData(nsTSubstring<char16_t> const&, JSContext*, JS::Handle<JS::Value>, mozilla::jni::LocalRef<mozilla::jni::Object>&, bool) widget/android/EventDispatcher.cpp:45 cfi
8 libxul.so mozilla::widget::EventDispatcher::Dispatch(JS::Handle<JS::Value>, JS::Handle<JS::Value>, nsIAndroidEventCallback*, nsIAndroidEventFinalizer*, JSContext*) widget/android/EventDispatcher.cpp:539 cfi
9 libxul.so _NS_InvokeByIndex cfi
10 libxul.so NS_InvokeByIndex xpcom/reflect/xptcall/md/unix/xptcinvoke_aarch64.cpp:167 inlined
10 libxul.so CallMethodHelper::Invoke() js/xpconnect/src/XPCWrappedNative.cpp:1626 inlined
10 libxul.so CallMethodHelper::Call() js/xpconnect/src/XPCWrappedNative.cpp:1179 inlined
10 libxul.so XPCWrappedNative::CallMethod(XPCCallContext&, XPCWrappedNative::CallMode) js/xpconnect/src/XPCWrappedNative.cpp:1125 cfi
11 libxul.so XPC_WN_CallMethod(JSContext*, unsigned int, JS::Value*) js/xpconnect/src/XPCWrappedNativeJSOps.cpp:965 cfi
12 libxul.so CallJSNative(JSContext*, bool (*)(JSContext*, unsigned int, JS::Value*), js::CallReason, JS::CallArgs const&) js/src/vm/Interpreter.cpp:486 inlined
12 libxul.so js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) js/src/vm/Interpreter.cpp:580 cfi
13 libxul.so InternalCall(JSContext*, js::AnyInvokeArgs const&, js::CallReason) js/src/vm/Interpreter.cpp:647 inlined
13 libxul.so js::CallFromStack(JSContext*, JS::CallArgs const&, js::CallReason) js/src/vm/Interpreter.cpp:652 inlined
13 libxul.so js::Interpret(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:3395 cfi
14 libxul.so MaybeEnterInterpreterTrampoline(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:400 inlined
14 libxul.so js::RunScript(JSContext*, js::RunState&) js/src/vm/Interpreter.cpp:458 inlined
14 libxul.so js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) js/src/vm/Interpreter.cpp:612 inlined
14 libxul.so InternalCall(JSContext*, js::AnyInvokeArgs const&, js::CallReason) js/src/vm/Interpreter.cpp:647 inlined
14 libxul.so js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>, js::CallReason) js/src/vm/Interpreter.cpp:679 cfi
15 libxul.so js::CallSelfHostedFunction(JSContext*, JS::Handle<js::PropertyName*>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) js/src/vm/SelfHosting.cpp:1473 inlined
15 libxul.so AsyncFunctionResume(JSContext*, JS::Handle<js::AsyncFunctionGeneratorObject*>, ResumeKind, JS::Handle<JS::Value>) js/src/vm/AsyncFunction.cpp:149 inlined
15 libxul.so js::AsyncFunctionAwaitedFulfilled(JSContext*, JS::Handle<js::AsyncFunctionGeneratorObject*>, JS::Handle<JS::Value>) js/src/vm/AsyncFunction.cpp:190 inlined
15 libxul.so AsyncFunctionPromiseReactionJob(JSContext*, JS::Handle<PromiseReactionRecord*>) js/src/builtin/Promise.cpp:2111 inlined
15 libxul.so PromiseReactionJob(JSContext*, unsigned int, JS::Value*) js/src/builtin/Promise.cpp:2174 cfi
16 libxul.so CallJSNative(JSContext*, bool (*)(JSContext*, unsigned int, JS::Value*), js::CallReason, JS::CallArgs const&) js/src/vm/Interpreter.cpp:486 inlined
16 libxul.so js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) js/src/vm/Interpreter.cpp:580 inlined
16 libxul.so InternalCall(JSContext*, js::AnyInvokeArgs const&, js::CallReason) js/src/vm/Interpreter.cpp:647 inlined
16 libxul.so js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>, js::CallReason) js/src/vm/Interpreter.cpp:679 cfi
17 libxul.so JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) js/src/vm/CallAndConstruct.cpp:117 inlined
17 libxul.so mozilla::dom::PromiseJobCallback::Call(mozilla::dom::BindingCallContext&, JS::Handle<JS::Value>, mozilla::ErrorResult&) dom/bindings/PromiseBinding.cpp:83 inlined
17 libxul.so mozilla::dom::PromiseJobCallback::Call(mozilla::ErrorResult&, char const*, mozilla::dom::CallbackObject::ExceptionHandling, JS::Realm*) dist/include/mozilla/dom/PromiseBinding.h:198 inlined
17 libxul.so mozilla::dom::PromiseJobCallback::Call(char const*) dist/include/mozilla/dom/PromiseBinding.h:211 inlined
17 libxul.so mozilla::PromiseJobRunnable::Run(mozilla::AutoSlowOperation&) xpcom/base/CycleCollectedJSContext.cpp:213 cfi
18 libxul.so mozilla::CycleCollectedJSContext::PerformMicroTaskCheckPoint(bool) xpcom/base/CycleCollectedJSContext.cpp:676 cfi
19 libxul.so mozilla::CycleCollectedJSContext::AfterProcessTask(unsigned int) xpcom/base/CycleCollectedJSContext.cpp:463 inlined
19 libxul.so XPCJSContext::AfterProcessTask(unsigned int) js/xpconnect/src/XPCJSContext.cpp:1482 inlined
19 libxul.so nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:1276 inlined
19 libxul.so NS_ProcessNextEvent(nsIThread*, bool) xpcom/threads/nsThreadUtils.cpp:479 cfi
20 libxul.so mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:85 cfi
21 libxul.so MessageLoop::RunInternal() ipc/chromium/src/base/message_loop.cc:369 inlined
21 libxul.so MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc:362 inlined
21 libxul.so MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:344 cfi
22 libxul.so nsBaseAppShell::Run() widget/nsBaseAppShell.cpp:148 cfi
23 libxul.so nsAppStartup::Run() toolkit/components/startup/nsAppStartup.cpp:295 cfi
24 libxul.so XREMain::XRE_mainRun() toolkit/xre/nsAppRunner.cpp:5643 inlined
24 libxul.so XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&) toolkit/xre/nsAppRunner.cpp:5843 cfi
25 libxul.so XRE_main(int, char**, mozilla::BootstrapConfig const&) toolkit/xre/nsAppRunner.cpp:5899 cfi
26 libxul.so GeckoStart toolkit/xre/nsAndroidStartup.cpp:54 cfi
27 libmozglue.so Java_org_mozilla_gecko_mozglue_GeckoLoader_nativeRun mozglue/android/APKOpen.cpp:386 cfi
```
|
|
1,834,862 | 16,426,385 |
Crash report: https://crash-stats.mozilla.org/report/index/866c49c5-2c8e-4824-b0a4-245e40230508
Reason: ```SIGSEGV / SI_KERNEL```
Top 10 frames of crashing thread:
```
0 libnss3.so HASH_Destroy /usr/src/debug/nss/nss/lib/cryptohi/sechash.c:435
1 libxul.so mozilla::UniqueHASHContextDeletePolicy::operator /build/firefox/src/firefox-112.0.2/security/manager/ssl/ScopedNSSTypes.h:411
1 libxul.so std::__uniq_ptr_impl<HASHContextStr, mozilla::UniqueHASHContextDeletePolicy>::reset /usr/include/c++/12.2.1/bits/unique_ptr.h:203
1 libxul.so std::unique_ptr<HASHContextStr, mozilla::UniqueHASHContextDeletePolicy>::reset /usr/include/c++/12.2.1/bits/unique_ptr.h:501
1 libxul.so nsCryptoHash::Init /build/firefox/src/firefox-112.0.2/security/manager/ssl/nsCryptoHash.cpp:73
1 libxul.so mozilla::safebrowsing::SafebrowsingHash< /build/firefox/src/firefox-112.0.2/toolkit/components/url-classifier/Entries.h:47
1 libxul.so mozilla::safebrowsing::Classifier::CheckURIFragments /build/firefox/src/firefox-112.0.2/toolkit/components/url-classifier/Classifier.cpp:486
2 libxul.so nsUrlClassifierDBServiceWorker::DoSingleLocalLookupWithURIFragments /build/firefox/src/firefox-112.0.2/toolkit/components/url-classifier/nsUrlClassifierDBService.cpp:352
2 libxul.so nsUrlClassifierDBService::FeatureHolder::DoLocalLookup /build/firefox/src/firefox-112.0.2/toolkit/components/url-classifier/nsUrlClassifierDBService.cpp:174
3 libxul.so nsUrlClassifierDBServiceWorker::DoLookup /build/firefox/src/firefox-112.0.2/toolkit/components/url-classifier/nsUrlClassifierDBService.cpp:389
```
I'm not sure how actionable this is, but there's a handful of crashes that look like this, on jemalloc poison values. They're all from safe browsing as far as I can see. I don't know if something is going weird from using it off the main thread or what.
Here's an example of an [@NSC_OpenSession] crash: bp-ba65755e-9908-4a9f-86cd-d38290230518 It looks similar, except that we're in HASH_Create instead of HASH_Destroy. I decided to file them together because they're similar.
|
|
1,844,875 | 16,506,157 |
Crash report: https://crash-stats.mozilla.org/report/index/5761c498-b202-4c4d-8b29-f32870230717
Java stack trace:
```
org.mozilla.geckoview.GeckoResult$UncaughtException: java.lang.NullPointerException: Attempt to invoke interface method 'void org.mozilla.gecko.util.EventCallback.sendError(java.lang.Object)' on a null object reference
at org.mozilla.geckoview.GeckoResult.dispatchLocked(GeckoResult.java:22)
at org.mozilla.geckoview.GeckoResult.completeExceptionally(GeckoResult.java:13)
at org.mozilla.geckoview.GeckoResult.lambda$thenInternal$6(GeckoResult.java:63)
at org.mozilla.geckoview.GeckoResult.$r8$lambda$nsAzyhhKgAo0Ha3SEAUSdsKADo8(GeckoResult.java:1)
at org.mozilla.geckoview.GeckoResult$$ExternalSyntheticLambda5.run(R8$$SyntheticClass:9)
at org.mozilla.geckoview.GeckoResult.lambda$dispatchLocked$7(GeckoResult.java:17)
at org.mozilla.geckoview.GeckoResult.$r8$lambda$JYfUuhIZf5JetbZ-qCaWvlWcPeE(GeckoResult.java:1)
at org.mozilla.geckoview.GeckoResult$$ExternalSyntheticLambda1.run(R8$$SyntheticClass:3)
at android.os.Handler.handleCallback(Handler.java:938)
at android.os.Handler.dispatchMessage(Handler.java:99)
at android.os.Looper.loopOnce(Looper.java:210)
at android.os.Looper.loop(Looper.java:299)
at android.app.ActivityThread.main(ActivityThread.java:8319)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:556)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1038)
Caused by: java.lang.NullPointerException: Attempt to invoke interface method 'void org.mozilla.gecko.util.EventCallback.sendError(java.lang.Object)' on a null object reference
at org.mozilla.geckoview.GeckoSession$3.lambda$handleMessage$2(GeckoSession.java:3)
at org.mozilla.geckoview.GeckoSession$3.$r8$lambda$KW-0YpDoyY6g1xhv2qXKqR6JTh0(GeckoSession.java:1)
at org.mozilla.geckoview.GeckoSession$3$$ExternalSyntheticLambda2.accept(R8$$SyntheticClass:5)
at org.mozilla.geckoview.GeckoResult.lambda$accept$3(GeckoResult.java:1)
at org.mozilla.geckoview.GeckoResult.$r8$lambda$zO-dvpJZFDUFLO0SiykRPqyMOOk(GeckoResult.java:1)
at org.mozilla.geckoview.GeckoResult$$ExternalSyntheticLambda7.onException(R8$$SyntheticClass:3)
at org.mozilla.geckoview.GeckoResult.lambda$thenInternal$6(GeckoResult.java:31)
```
|
|
1,845,087 | 16,509,488 |
Created attachment 9345349
PDF-UA_FF-nightly-add-img.pdf
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Steps to reproduce:
1. Using Firefox Nightly (117) open a tagged PDF: https://adrianroselli.com/files/xfr/PDF-UA.pdf
2. Activate the "Add an image" button
3. Click or tap in the document
4. Choose an image from your computer
5. Embed the image
Actual results:
When I saved the PDF, the image was not added to the tag structure of the document, making it unavailable to my screen reader. This also means a document that conformed to PDF/UA no longer conforms.
Expected results:
When the PDF is saved the image should be folded into the document tags.
I attached the PDF I created with Firefox Nightly 117 to this issue so you can compare them.
|
|
1,845,248 | 16,510,518 |
Steps to reproduce:
On git commit d6960b4e32d09bff32865694e32384eb9bca4af5 the attached sample crashes during gc when invoked as `obj-x86_64-pc-linux-gnu/dist/bin/js --fuzzing-safe --disable-oom-functions crash.js`.
```
for (let v1 = 0; v1 < 10; v1++) { }
for (let v5 = 0; v5 < 5; v5++) {
function f6(a7, a8, a9, a10) {
try { a8(a10, a9); } catch (e) {}
try { new a8(v5, a9, v5, a8); } catch (e) {}
gc();
const o15 = {
__proto__: a7,
};
for (let v20 = 0; v20 < 150; v20++) { }
}
f6(f6, f6, f6);
}
```
#0 0x561055be9155 in js::gc::detail::CellHasStoreBuffer(js::gc::Cell const*=0xfffe4b4b4b4b4b48) obj-x86_64-pc-linux-gnu/dist/include/js/HeapAPI.h:594:10
#1 0x561055be9133 in js::gc::IsInsideNursery(js::gc::Cell const*) obj-x86_64-pc-linux-gnu/dist/include/js/HeapAPI.h:601:10
#2 0x561055be9518 in js::gc::IsInsideNursery(js::gc::TenuredCell const*) obj-x86_64-pc-linux-gnu/dist/include/js/HeapAPI.h:606:3
#3 0x561056d0b143 in void js::CheckTracedThing<js::Shape>(JSTracer*, js::Shape*) js/src/gc/Marking.cpp:142:7
#4 0x56105610aa37 in js::gc::TraceEdgeInternal(JSTracer*, js::Shape**, char const*) js/src/gc/Tracer.h:106:1
#5 0x561056d0e74a in void js::TraceSameZoneCrossCompartmentEdge<js::Shape*>(JSTracer*, js::WriteBarriered<js::Shape*> const*, char const*) js/src/gc/Marking.cpp:520:3
#6 0x5610572f350a in void js::jit::TraceCacheIRStub<js::jit::ICCacheIRStub>(JSTracer*, js::jit::ICCacheIRStub*, js::jit::CacheIRStubInfo const*) js/src/jit/CacheIRCompiler.cpp:1225:13
#7 0x561056f1470c in js::jit::ICCacheIRStub::trace(JSTracer*) js/src/jit/BaselineIC.cpp:451:3
#8 0x56105764fb89 in js::jit::TraceBaselineStubFrame(JSTracer*, js::jit::JSJitFrameIter const&) js/src/jit/JitFrames.cpp:1110:30
#9 0x56105763e216 in js::jit::TraceJitActivation(JSTracer*, js::jit::JitActivation*) js/src/jit/JitFrames.cpp:1370:11
#10 0x56105763dfad in js::jit::TraceJitActivations(JSContext*, JSTracer*) js/src/jit/JitFrames.cpp:1412:5
#11 0x561056d4f1a2 in js::gc::GCRuntime::traceRuntimeCommon(JSTracer*, js::gc::GCRuntime::TraceOrMarkRuntime) js/src/gc/RootMarking.cpp:303:5
#12 0x561056d4663a in js::gc::GCRuntime::traceRuntimeForMinorGC(JSTracer*, js::gc::AutoGCSession&) js/src/gc/RootMarking.cpp:258:3
#13 0x561056d45ff6 in js::Nursery::traceRoots(js::gc::AutoGCSession&, js::gc::TenuringTracer&) js/src/gc/Nursery.cpp:1523:9
#14 0x561056d4496c in js::Nursery::doCollection(js::gc::AutoGCSession&, JS::GCOptions, JS::GCReason) js/src/gc/Nursery.cpp:1413:3
#15 0x561056d4427e in js::Nursery::collect(JS::GCOptions, JS::GCReason) js/src/gc/Nursery.cpp:1188:31
#16 0x561056c96a23 in js::gc::GCRuntime::collectNursery(JS::GCOptions, JS::GCReason, js::gcstats::PhaseKind) js/src/gc/GC.cpp:4609:13
#17 0x561056c968de in js::gc::GCRuntime::collectNurseryFromMajorGC(JS::GCReason) js/src/gc/GC.cpp:3755:3
#18 0x561056c95a28 in js::gc::GCRuntime::incrementalSlice(js::SliceBudget&, JS::GCReason, bool) js/src/gc/GC.cpp:3593:9
#19 0x561056c98194 in js::gc::GCRuntime::gcCycle(bool, js::SliceBudget const&, JS::GCReason) js/src/gc/GC.cpp:4181:3
#20 0x561056c99131 in js::gc::GCRuntime::collect(bool, js::SliceBudget const&, JS::GCReason) js/src/gc/GC.cpp:4372:9
#21 0x561056c78051 in js::gc::GCRuntime::gc(JS::GCOptions, JS::GCReason) js/src/gc/GC.cpp:4449:3
#22 0x561056ce6c1e in JS::NonIncrementalGC(JSContext*, JS::GCOptions, JS::GCReason) js/src/gc/GCAPI.cpp:298:21
#23 0x5610566a91ef in GC(JSContext*, unsigned int, JS::Value*) js/src/builtin/TestingFunctions.cpp:696:3
#24 0x12ffe91dccae (<unknown module>)
```
|
|
1,845,738 | 16,513,671 |
Created attachment 9346038
Screen Recording 2023-07-27 at 16.48.33.mov
**[Affected versions]:**
- Firefox Release, 116.0, BUILD ID: 20230724170120
**[Affected Platforms]:**
- Windows 10 x64
- Windows 11 x64
**[Prerequisites]:**
- Have the [“user.js”](https://drive.google.com/drive/folders/1kkJeF5FHyxXoYLfawdak5GJYmHxyMJNf) file downloaded on your computer.
- Have a different OS language than the browser’s one.
- Have Firefox pinned to the taskbar.
**[Steps to reproduce]:**
1. Create a new Firefox profile without opening it.
2. Navigate to the profile folder and paste the user.js files from prerequisites.
3. Open the browser using the previously created profile.
4. Skip the first onboarding screen.
**[Expected results]:**
- The “Choose your language” slide should be displayed.
**[Actual results]:**
- The Mobile Cross-Promo slide is displayed instead.
**[Notes]:**
- Attached a screen recording of the issue.
- This issue is reproducible on both branches of the experiment.
- This issue is not reproducible without the experiment.
|
|
1,846,306 | 16,518,567 |
### Steps to reproduce
java.lang.IllegalStateException: Unable to find session for null or selected session
at mozilla.components.feature.sitepermissions.SitePermissionsFeature.onContentPermissionRequested$feature_sitepermissions_release(SitePermissionsFeature.kt:831)
at mozilla.components.feature.sitepermissions.SitePermissionsFeature$setupPermissionRequestsCollector$1$3.emit(SitePermissionsFeature.kt:144)
at kotlinx.coroutines.flow.FlowKt__BuildersKt$asFlow$$inlined$unsafeFlow$3.collect(SafeCollector.common.kt:79)
at kotlinx.coroutines.flow.FlowKt__BuildersKt$asFlow$$inlined$unsafeFlow$3$1.invokeSuspend(SafeCollector.common.kt:13)
at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:9)
at kotlinx.coroutines.DispatchedTask.run(DispatchedTask.kt:112)
at android.os.Handler.handleCallback(Handler.java:751)
at android.os.Handler.dispatchMessage(Handler.java:95)
at android.os.Looper.loop(Looper.java:241)
at android.app.ActivityThread.main(ActivityThread.java:6274)
at java.lang.reflect.Method.invoke(Method.java)
at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:886)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:776)
### Expected behavior
### Actual behavior
### Device information
* Firefox version:
* Android device model:
* Android OS version:
### Any additional information?
|
|
1,846,687 | 16,520,771 |
Created attachment 9346868
ASAN.txt
While graphics rendering, |mStream| is used to receive rendering data[1]. |mStream| could be destroyed when initialized. However, there is no check in init function[2] and it could initialize twice. This could lead to use-after-free when |mStream| is destroyed during accessing rendering data.
[1]: https://searchfox.org/mozilla-central/source/gfx/layers/ipc/CanvasTranslator.h#261
[2]: https://searchfox.org/mozilla-central/source/gfx/layers/ipc/CanvasTranslator.cpp#138
REPRODUCE
Operating System: All
1.apply *patch1.diff and patch2.diff
2.visit index.html
*: patch1.diff is emulating a compromised content process. patch2.diff is patching the Graphic Process to improve the success rate (just for reproducing easily)
Crash State: see asan file
|
|
1,846,714 | 16,520,928 |
Created attachment 9346901
Long-pressed new tab creating multiple tabs
STR:
1. Long-press the new tab button and hold.
2. Select a container from the menu and then release the mouse button.
Expected:
One container tab is created.
Actual:
Two tabs are created, a normal tab and a container tab.
Does not occur when right-clicking the new tab button to create a container tab.
Regression window:
https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=728f4a4d08f5b369ce5c7bea17a23cdfbb30f196&tochange=92ad9c748611fc9b5be547415a651f136a27346f
Regressed by Bug 1792110.
|
|
1,846,765 | 16,521,528 |
https://bugzilla.mozilla.org/show_bug.cgi?id=1841408 refactored the rich suggestions layout and introduced using CSS -`moz-bool-pref` @ https://searchfox.org/mozilla-central/source/browser/themes/shared/urlbarView.css#67
This CSS requires a restart to be activated so when users are enrolled in an experiment that enables rich suggestions the feature will become activated without the relevant CSS being applied and will result in a broken UI.
|
|
1,835,103 | 16,427,677 |
Created attachment 9335932
FF_mozregression_Output.txt
Steps to reproduce:
On macOS Big Sur and Ventura (not tested on Monterey):
Navigate to an https page that requires client certificate authentication. The certificate is smartcard based.
Actual results:
No Certificate Selection dialog is displayed.
Expected results:
The Certificate Selection dialog should be displayed in order to select the authentication certificate on the smartcard.
|
|
1,835,107 | 16,427,694 |
The crashes that we send to Sentry are now marked as handled. This is preventing us from painting an accurate picture of crash health
|
|
1,835,231 | 16,428,486 |
Created attachment 9336052
crash.mp4
### Steps to reproduce
1. Install Fenix Beta 114.0b8, or Beta 114.0b9, or the latest Nightly 115.0a1, on a device with Android 5.
2. Open Fenix.
### Expected behavior
Fenix can be opened.
### Actual behavior
Fenix crashes. Cannot open about:crashes to get the details.
### Device information
* Firefox version: Nightly 115.0a1 from 5/26, Beta 114.0b8, Beta 114.0b9
* Android devices: Samsung Galaxy Tab A6 (Android 5.1.1), and Xiaomi mi4i (Android 5.0.2)
* NOT reproducible on RC 113.2.0
|
|
1,835,561 | 16,430,197 |
On Nightly, click the "About Nightly" dialog to check for updates. Then look at the Browser Console. It contains the following warnings:
> [fluent] Missing message in locale en-US: update-manual aboutDialog.xhtml
> [fluent] Couldn't find a message: update-manual aboutDialog.xhtml
> [dom/l10n] Could not complete initial document translation. aboutDialog.xhtml
It looks like the message was deleted in bug 1820654 but `update-manual` is used here and should be brought back:
https://searchfox.org/mozilla-central/rev/f4d3fe187cf7dffa4c13b354bbde9bc47b5ccd3f/browser/base/content/aboutDialog.xhtml#91
|
|
1,835,581 | 16,430,277 |
Steps to reproduce:
1. Alt > Help > About Firefox
2. Press [Tab] key, and repeat step 2
Actual results:
No focus ring appears
Expected results
Focus ring should appear.
Regression window:
https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=850a5972994c7eb9705be5c598c7f304b2354927&tochange=1cdfa0b182b14ab3b9dbbb7d7b582f2a887a484e
|
|
1,835,886 | 16,433,998 |
While trying to see if I could potentially close Bug 1573262 I loaded the test case and discovered that it had gone from being a behaviour problem to a reproducible nightly tab crash.
Here's a crash report: https://crash-stats.mozilla.org/report/index/b543a66f-1951-4402-8668-f25310230530
I ran moz-regression, but unfortunately was only able to get it down to a single nightly as the taskcluster artifcats no longer exist:
```
5:52.82 INFO: Got as far as we can go bisecting nightlies...
5:52.82 INFO: Last good revision: 872b574394a6e1f97ed229b6d2d9a3fa5bbac298 (2022-04-11)
5:52.82 INFO: First bad revision: 85290d18c6eeab2c1b741e2c92d2b6eaa252a7d5 (2022-04-12)
```
Here's the associated [push log](https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=872b574394a6e1f97ed229b6d2d9a3fa5bbac298&tochange=85290d18c6eeab2c1b741e2c92d2b6eaa252a7d5).
In a debug build, we fail [this assert](https://searchfox.org/mozilla-central/source/js/loader/ModuleLoaderBase.cpp#536) inside of `ModuleLoaderBase::GetFetchedModule` -- we don't find the module we expected to.
Given the push log and the assertion both come from Bug 1761938, I'm going to call it the regressor.
I'm not sure if we should mark reproducible content crashes as security bugs -- I think it's sec-low if anything (low address dereference).
|
|
1,836,285 | 16,436,816 |
As seen from the [graph of new tab-kills telemetry]( https://sql.telemetry.mozilla.org/queries/92049/source#227789), the background tab-kills increased in Nightly and Beta for v114 train.
|
|
1,836,806 | 16,441,857 |
Created attachment 9337493
testcase.html
Found while fuzzing m-c 20230602-8c3b1c60fde7 (--enable-address-sanitizer --enable-fuzzing)
To reproduce via Grizzly Replay:
```
$ pip install fuzzfetch grizzly-framework
$ python -m fuzzfetch -d --fuzzing -n firefox
$ python -m grizzly.replay ./firefox/firefox testcase.html
```
Assertion failure: IsValid(), at /builds/worker/checkouts/gecko/widget/ContentCache.cpp:234
```
#0 0x7fc00fefabea in mozilla::ContentCacheInChild::CacheCaret(nsIWidget*, mozilla::widget::IMENotification const*) /builds/worker/checkouts/gecko/widget/ContentCache.cpp:234:3
#1 0x7fc00fefd612 in mozilla::ContentCacheInChild::SetSelection(nsIWidget*, mozilla::widget::IMENotification::SelectionChangeDataBase const&) /builds/worker/checkouts/gecko/widget/ContentCache.cpp:649:3
#2 0x7fc00ff17aa2 in mozilla::widget::PuppetWidget::NotifyIMEOfSelectionChange(mozilla::widget::IMENotification const&) /builds/worker/checkouts/gecko/widget/PuppetWidget.cpp:837:7
#3 0x7fc00ff2781f in mozilla::widget::TextEventDispatcher::NotifyIME(mozilla::widget::IMENotification const&) /builds/worker/checkouts/gecko/widget/TextEventDispatcher.cpp:486:40
#4 0x7fc00feef34a in nsBaseWidget::NotifyIME(mozilla::widget::IMENotification const&) /builds/worker/checkouts/gecko/widget/nsBaseWidget.cpp:1897:43
#5 0x7fc00e3bfde4 in mozilla::IMEStateManager::NotifyIME(mozilla::widget::IMENotification const&, nsIWidget*, mozilla::dom::BrowserParent*) /builds/worker/checkouts/gecko/dom/events/IMEStateManager.cpp
#6 0x7fc00e3c745d in mozilla::IMEContentObserver::IMENotificationSender::SendSelectionChange() /builds/worker/checkouts/gecko/dom/events/IMEContentObserver.cpp:1930:3
#7 0x7fc00e3c6419 in mozilla::IMEContentObserver::IMENotificationSender::Run() /builds/worker/checkouts/gecko/dom/events/IMEContentObserver.cpp:1753:7
#8 0x7fc0102f2680 in nsRefreshDriver::Tick(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp, nsRefreshDriver::IsExtraTick) /builds/worker/checkouts/gecko/layout/base/nsRefreshDriver.cpp:2522:13
#9 0x7fc0102fc201 in TickDriver /builds/worker/checkouts/gecko/layout/base/nsRefreshDriver.cpp:373:13
#10 0x7fc0102fc201 in mozilla::RefreshDriverTimer::TickRefreshDrivers(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp, nsTArray<RefPtr<nsRefreshDriver>>&) /builds/worker/checkouts/gecko/layout/base/nsRefreshDriver.cpp:351:7
#11 0x7fc0102fc100 in mozilla::RefreshDriverTimer::Tick(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp) /builds/worker/checkouts/gecko/layout/base/nsRefreshDriver.cpp:367:5
#12 0x7fc0102fbf9d in mozilla::VsyncRefreshDriverTimer::RunRefreshDrivers(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp) /builds/worker/checkouts/gecko/layout/base/nsRefreshDriver.cpp:911:5
#13 0x7fc0102fb316 in mozilla::VsyncRefreshDriverTimer::TickRefreshDriver(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp) /builds/worker/checkouts/gecko/layout/base/nsRefreshDriver.cpp:825:5
#14 0x7fc0102fa649 in mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::NotifyVsyncTimerOnMainThread() /builds/worker/checkouts/gecko/layout/base/nsRefreshDriver.cpp:592:14
#15 0x7fc00f68014b in mozilla::dom::VsyncMainChild::RecvNotify(mozilla::VsyncEvent const&, float const&) /builds/worker/checkouts/gecko/dom/ipc/VsyncMainChild.cpp:66:15
#16 0x7fc00f94ea2e in mozilla::dom::PVsyncChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/obj-build/ipc/ipdl/PVsyncChild.cpp:220:78
#17 0x7fc00f840b80 in mozilla::dom::PContentChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/obj-build/ipc/ipdl/PContentChild.cpp:8770:32
#18 0x7fc00b62e69f in mozilla::ipc::MessageChannel::DispatchAsyncMessage(mozilla::ipc::ActorLifecycleProxy*, IPC::Message const&) /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1811:25
#19 0x7fc00b62b3f2 in mozilla::ipc::MessageChannel::DispatchMessage(mozilla::ipc::ActorLifecycleProxy*, mozilla::UniquePtr<IPC::Message, mozilla::DefaultDelete<IPC::Message>>) /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1736:9
#20 0x7fc00b62c072 in mozilla::ipc::MessageChannel::RunMessage(mozilla::ipc::ActorLifecycleProxy*, mozilla::ipc::MessageChannel::MessageTask&) /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1536:3
#21 0x7fc00b62d1bf in mozilla::ipc::MessageChannel::MessageTask::Run() /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1634:14
#22 0x7fc00a966417 in mozilla::RunnableTask::Run() /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:555:16
#23 0x7fc00a9614ca in mozilla::TaskController::DoExecuteNextTaskOnlyMainThreadInternal(mozilla::detail::BaseAutoLock<mozilla::Mutex&> const&) /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:879:26
#24 0x7fc00a95fe37 in mozilla::TaskController::ExecuteNextTaskOnlyMainThreadInternal(mozilla::detail::BaseAutoLock<mozilla::Mutex&> const&) /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:702:15
#25 0x7fc00a960295 in mozilla::TaskController::ProcessPendingMTTask(bool) /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:491:36
#26 0x7fc00a969a86 in operator() /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:218:37
#27 0x7fc00a969a86 in mozilla::detail::RunnableFunction<mozilla::TaskController::TaskController()::$_0>::Run() /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.h:548:5
#28 0x7fc00a980a0a in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:1240:16
#29 0x7fc00a9878bd in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:479:10
#30 0x7fc00b6346d5 in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/checkouts/gecko/ipc/glue/MessagePump.cpp:85:21
#31 0x7fc00b550541 in RunHandler /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:361:3
#32 0x7fc00b550541 in MessageLoop::Run() /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:343:3
#33 0x7fc00ff475d8 in nsBaseAppShell::Run() /builds/worker/checkouts/gecko/widget/nsBaseAppShell.cpp:148:27
#34 0x7fc01224da8b in XRE_RunAppShell() /builds/worker/checkouts/gecko/toolkit/xre/nsEmbedFunctions.cpp:724:20
#35 0x7fc00b6355b6 in mozilla::ipc::MessagePumpForChildProcess::Run(base::MessagePump::Delegate*) /builds/worker/checkouts/gecko/ipc/glue/MessagePump.cpp:235:9
#36 0x7fc00b550541 in RunHandler /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:361:3
#37 0x7fc00b550541 in MessageLoop::Run() /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:343:3
#38 0x7fc01224d352 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/checkouts/gecko/toolkit/xre/nsEmbedFunctions.cpp:659:34
#39 0x561aef08b526 in content_process_main /builds/worker/checkouts/gecko/browser/app/../../ipc/contentproc/plugin-container.cpp:57:28
#40 0x561aef08b526 in main /builds/worker/checkouts/gecko/browser/app/nsBrowserApp.cpp:375:18
#41 0x7fc020429d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
#42 0x7fc020429e3f in __libc_start_main csu/../csu/libc-start.c:392:3
#43 0x561aef0627c8 in _start (/home/user/workspace/browsers/m-c-20230605094751-fuzzing-debug/firefox-bin+0x587c8) (BuildId: 12ad878cfaa70b2bc4a7191a0344fcaba161fd13)
```
|
|
1,836,851 | 16,442,128 |
**Filed by:** csabou [at] mozilla.com
**Parsed log:** https://treeherder.mozilla.org/logviewer?job_id=418166103&repo=mozilla-beta
**Full log:** https://firefox-ci-tc.services.mozilla.com/api/queue/v1/task/Rouyo3aGTXSStfuXJT_5Fg/runs/0/artifacts/public/logs/live_backing.log
---
```
[task 2023-06-05T19:51:14.060Z] FINISH ADD Contents/MacOS/XUL
[task 2023-06-05T19:51:14.060Z] FINISH ADD Contents/Library/LaunchServices/org.mozilla.updater
[task 2023-06-05T19:51:14.060Z] FINISH ADD Contents/Info.plist
[task 2023-06-05T19:51:14.060Z] succeeded
[task 2023-06-05T19:51:14.060Z] calling QuitProgressUI
[task 2023-06-05T19:51:14.092Z] Traceback (most recent call last):
[task 2023-06-05T19:51:14.092Z] File "../compare-directories.py", line 257, in <module>
[task 2023-06-05T19:51:14.092Z] file_list_diff = compare_listings(
[task 2023-06-05T19:51:14.092Z] File "../compare-directories.py", line 130, in compare_listings
[task 2023-06-05T19:51:14.092Z] if left_diff - set(ignore_missing):
[task 2023-06-05T19:51:14.092Z] TypeError: 'NoneType' object is not iterable
[task 2023-06-05T19:51:14.096Z] Comparing source/Firefox.app with target/Firefox.app...
[task 2023-06-05T19:51:14.097Z] TEST-UNEXPECTED-FAIL: unknown error from diff: 1
[task 2023-06-05T19:51:14.097Z] TEST-UNEXPECTED-FAIL: [99.0 en-US complete] check_updates returned unknown error for Darwin_x86_64-gcc3-u-i386-x86_64 downloads/Firefox 99.0b8.dmg vs. downloads/Firefox 115.0b1.dmg: 3
[task 2023-06-05T19:51:14.099Z] Using https://aus5.mozilla.org/update/3/Firefox/99.0/20220324185704/Darwin_x86_64-gcc3-u-i386-x86_64/ru/beta-localtest/default/default/default/update.xml?force=1
[task 2023-06-05T19:51:14.100Z] Retrieving 'https://aus5.mozilla.org/update/3/Firefox/99.0/20220324185704/Darwin_x86_64-gcc3-u-i386-x86_64/ru/beta-localtest/default/default/default/update.xml?force=1' from cache...
[task 2023-06-05T19:51:14.105Z] Got this response:
[task 2023-06-05T19:51:14.106Z] <?xml version="1.0"?>
[task 2023-06-05T19:51:14.106Z] <updates>
[task 2023-06-05T19:51:14.106Z] <update actions="showURL" appVersion="115.0" buildID="20230605155701" detailsURL="https://www.mozilla.org/ru/firefox/115.0/releasenotes/" displayVersion="115.0 Beta 1" openURL="https://www.mozilla.org/ru/firefox/115.0beta/whatsnew/?oldversion=%OLD_VERSION%" type="minor">
[task 2023-06-05T19:51:14.106Z] <patch type="complete" URL="https://archive.mozilla.org/pub/firefox/candidates/115.0b1-candidates/build1/update/mac/ru/firefox-115.0b1.complete.mar" hashFunction="sha512" hashValue="3f8ad40540f48b41413dd18d230b9ba6c27130096ec27f9ca329da1d9ae601ecfa18a6809b616f93bfaad232d693ce2410ef01b42d7b82944dd8201c97c01cf2" size="100720933"/>
[task 2023-06-05T19:51:14.106Z] </update>
[task 2023-06-05T19:51:14.108Z] </updates>
[task 2023-06-05T19:51:14.108Z]
[task 2023-06-05T19:51:14.119Z] Retrieving 'https://archive.mozilla.org/pub/firefox/candidates/115.0b1-candidates/build1/update/mac/ru/firefox-115.0b1.complete.mar' from cache...
[task 2023-06-05T19:51:14.760Z] Retrieving 'https://archive.mozilla.org/pub/firefox/releases/99.0b8/linux-x86_64/ru/firefox-99.0b8.tar.bz2' from cache...
[task 2023-06-05T19:51:24.857Z] Found updater at updater
[task 2023-06-05T19:51:24.857Z] override_certs is '', not replacing any certificates
[task 2023-06-05T19:51:24.891Z] Retrieving 'https://archive.mozilla.org/pub/firefox/releases/99.0b8/mac/ru/Firefox 99.0b8.dmg' from cache...
[task 2023-06-05T19:51:24.983Z] Retrieving 'https://archive.mozilla.org/pub/firefox/candidates/115.0b1-candidates/build1/mac/ru/Firefox 115.0b1.dmg' from cache...
[task 2023-06-05T19:51:44.372Z] + /builds/worker/checkouts/gecko/tools/update-verify/release/updates/updater/firefox/updater /builds/worker/checkouts/gecko/tools/update-verify/release/updates/update /builds/worker/checkouts/gecko/tools/update-verify/release/updates/source/Firefox.app /builds/worker/checkouts/gecko/tools/update-verify/release/updates/source/Firefox.app 0
[task 2023-06-05T19:51:44.384Z] Unable to init server: Could not connect: Connection refused
[task 2023-06-05T19:51:53.580Z] + set +x
[task 2023-06-05T19:51:53.581Z] PATCH DIRECTORY /builds/worker/checkouts/gecko/tools/update-verify/release/updates/update
[task 2023-06-05T19:51:53.581Z] INSTALLATION DIRECTORY /builds/worker/checkouts/gecko/tools/update-verify/release/updates/source/Firefox.app
[task 2023-06-05T19:51:53.581Z] WORKING DIRECTORY /builds/worker/checkouts/gecko/tools/update-verify/release/updates/source/Firefox.app
[task 2023-06-05T19:51:53.581Z] UPDATE TYPE complete
```
|
|
1,836,963 | 16,442,886 |
Created attachment 9337668
ss of the issue.png
**[Affected versions]:**
- Firefox Release 114.0 - Build ID: 20230601151220
**[Affected Platforms]:**
- Windows 10 x64
**[Prerequisites]:**
- Have the `nimbus.debug` pref set to `true` in the "about:config" page.
- Have the browser's "Dark" theme enabled.
**[Steps to reproduce]:**
1. Open the browser with the profile from the prerequisites.
2. Navigate to "about:studies?optin_slug=mobile-screen-improvements&optin_branch=treatment-b&optin_collection=nimbus-preview".
3. Navigate to the "about:welcome" page until the "Mobile" screen is displayed.
4. Observe the star rating and the download number displayed above the image.
**[Expected result]:**
- The star rating and the download number are correctly displayed and fully visible.
**[Actual result]:**
- The star rating and the download number are not fully visible.
**[Notes]:**
- This issue is reproducible on the "Treatment A" branch of the experiment.
- This issue is also reproducible if the browser's theme is set to "Auto" and the system's theme is set to "Dark".
- Attached is a screenshot of the issue:
|
|
1,837,163 | 16,444,268 |
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/114.0
Steps to reproduce:
1. turn on the Orca ScreenReader on any Linux distribution.
2. Open Firefox, go to any webpage and press Oca plus F to announce the font information, such as font tipe, font size, forground and background colors.
Please note that the Orca key is usually mapped to the Insert key on the keyboard, although it can be changed to the caps lock key if needed.
Actual results:
Orca announces nothing
Expected results:
Orca should announce font information.
If a webpage, for example, has the font aset as Arial, a size of 13 PT and the forground and background colors are black and white orca should announce something like: "Font arial, 13 PT, forground color wite, background color black".
Info such as alignment and justification should be reported as well.
|
|
1,837,201 | 16,444,465 |
10 crashes from 8 installations of Firefox 114.0 released yesterday, all on startup
Crash report: https://crash-stats.mozilla.org/report/index/7b455f60-b108-4e38-b8f1-801220230607
MOZ_CRASH Reason: ```MOZ_CRASH(Should never get here!)```
Top 10 frames of crashing thread:
```
0 xul.dll mozilla::dom::quota::QuotaManager::GetInfoFromValidatedPrincipalInfo dom/quota/ActorsParent.cpp:6613
1 xul.dll mozilla::dom::quota::QuotaManager::LoadFullOriginMetadata dom/quota/ActorsParent.cpp:4500
2 xul.dll mozilla::dom::quota::QuotaManager::LoadFullOriginMetadataWithRestore dom/quota/ActorsParent.cpp:4541
3 xul.dll mozilla::dom::quota::QuotaManager::InitializeRepository<`lambda at /builds/worker/checkouts/gecko/dom/quota/ActorsParent.cpp:3879:7'&>::<lambda_2>::operator const dom/quota/ActorsParent.cpp:4634
3 xul.dll mozilla::dom::quota::QuotaManager::InitializeRepository<`lambda at /builds/worker/checkouts/gecko/dom/quota/ActorsParent.cpp:3879:7'&>::<lambda_2>::operator const dom/quota/ActorsParent.cpp:4634
3 xul.dll mozilla::CollectEach dom/quota/QuotaCommon.h:1141
3 xul.dll mozilla::dom::quota::detail::CollectEachFile dom/quota/QuotaCommon.h:1530
3 xul.dll mozilla::dom::quota::CollectEachFile dom/quota/QuotaCommon.h:1546
3 xul.dll mozilla::dom::quota::QuotaManager::InitializeRepository<`lambda at /builds/worker/checkouts/gecko/dom/quota/ActorsParent.cpp:3879:7'&>::<lambda_2>::operator const dom/quota/ActorsParent.cpp:4634
3 xul.dll mozilla::dom::quota::QuotaManager::InitializeRepository dom/quota/ActorsParent.cpp:4634
```
|
|
1,837,408 | 16,445,728 |
This crash signature existed before but got more frequent with Firefox 114.0. All crashes are reported for Windows with ~40% in the first minute after launch. 32 crashes from 32 installations after 1 day of rollout to 25% of users (4% effective update rate).
Crash report: https://crash-stats.mozilla.org/report/index/0a2d49e9-3270-4759-8986-3350f0230608
Reason: ```EXCEPTION_ACCESS_VIOLATION_READ```
Top 10 frames of crashing thread:
```
0 xul.dll mozilla::LinkedListElement<js::jit::IonCompileTask>::getNext mfbt/LinkedList.h:208
0 xul.dll mozilla::LinkedList<js::jit::IonCompileTask>::getFirst mfbt/LinkedList.h:531
0 xul.dll CancelOffThreadIonCompileLocked js/src/vm/HelperThreads.cpp:423
0 xul.dll js::CancelOffThreadIonCompile js/src/vm/HelperThreads.cpp:440
1 xul.dll js::CancelOffThreadIonCompile js/src/vm/HelperThreads.h:176
1 xul.dll js::Nursery::discardJitCodeForZone js/src/gc/Nursery.cpp:422
2 xul.dll js::Nursery::updateAllocFlagsForZone js/src/gc/Nursery.cpp:417
2 xul.dll js::Nursery::updateAllZoneAllocFlags js/src/gc/Nursery.cpp:403
2 xul.dll js::Nursery::disable js/src/gc/Nursery.cpp:371
3 xul.dll js::gc::GCRuntime::finish js/src/gc/GC.cpp:900
```
|
|
1,837,604 | 16,447,105 |
STR:
0. a machine / for a build where you've not given Firefox permission to look at Safari history files
1. open Firefox
2. open settings/preferences
3. click "Import data"
ER:
dialog pops up quickly, no errors
AR:
dialog shows grey frames for a second or two, 11 errors appear in the browser console:
```
NS_ERROR_FILE_ACCESS_DENIED: Could not open connection to /Users/<username>/Library/Safari/History.db
openConnection resource://gre/modules/Sqlite.sys.mjs:1336
MigrationUtils.sys.mjs:292:21
innerGetRows resource:///modules/MigrationUtils.sys.mjs:292
Error: Couldn't get rows from the Safari history database.
```
(the first error repeats 10 times)
The first error repeats at just over 100ms intervals, so I imagine we try 10 times at 100ms timeouts and fail each time.
I think for the Safari/History case we should probably catch this specific exception just when showing the dialog and deal with it.
On this machine, Safari also does not show up for me in the import dialog.
|
|
1,837,675 | 16,447,950 |
Created attachment 9338350
Firefox POC.mp4
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36 Edg/113.0.1774.42
Steps to reproduce:
Create Diagcab file.
Download In Firefox Browser And Open From Firefox Browser
No " Executable files may contain viruses or other malicious code that could harm your computer "
Actual results:
Diagcab File Comes Under harmful files.
Diagcab file extension Should Be blocklisted to prevent users To Open Directly from Firefox Browser
Diagcab file extension Leads to One-Click Exploits in Windows
This File is Already Blocklisted In Chrome & Edge Browsers
|
|
1,837,686 | 16,447,987 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/114.0
Steps to reproduce:
1. Open https://dos.zone/digger-may-06-1999/
2. Select emulation backend dosboxX
3. Press Play button
Actual results:
The game stuck at the beginning, with exception:
RuntimeError: unreachable executed
Expected results:
The game should work fine.
--
I am the creator of the js-dos project, and version 8 is almost ready to be released. However, Firefox is the only browser that does not work properly with the dosbox-x backend. The dosbox-x backend utilizes a new exception-handling feature of WebAssembly.
I cannot delay the release for an extended period of time. I can provide any additional information that you may need. It would be unfortunate if, in the end, I am forced to state that Firefox is not supported.
|
|
1,838,011 | 16,451,719 |
Created attachment 9338664
nested rules displayed as (invalid) properties
**Steps to reproduce**
1. On Nightly (so nesting is enabled), navigate to https://ffx-devtools-css-nesting.glitch.me/
1. Open the inspector
1. Make sure the `body` node is selected
**Expected results**
The rule view does not show nested rules
**Actual results**
Nested rules are displayed in the rule, but treated as property, making it confusing
---
We get the nested rules as declarations in https://searchfox.org/mozilla-central/rev/b91e9bef5a6d6f7b549fbc9cba70cb4665ed3866/devtools/server/actors/style-rule.js#393-396 , and so we should fix `parseDeclarationInternals` in [parsing-utils.js#266-294](https://searchfox.org/mozilla-central/rev/b91e9bef5a6d6f7b549fbc9cba70cb4665ed3866/devtools/shared/css/parsing-utils.js#266-294) so it does not include the nested rules (or at least handle them properly)
|
|
1,838,391 | 16,454,800 |
Starting 116 nightly, this [crash](https://mozilla.sentry.io/discover/results/?field=title&field=release&field=environment&field=user.display&field=timestamp&interval=1d&name=UninitializedPropertyAccessException%3A+lateinit+property+addons+has+not+been+initialized&project=6295546&query=issue%3AFENIX-NIGHTLY-4K1&sort=-timestamp&statsPeriod=90d&yAxis=count%28%29) has started occurring. This seems to be because a late init field is not initialised before it's used.
This [crash](https://mozilla.sentry.io/issues/4247270490/?project=6295546&query=is%3Aunresolved+level%3Afatal+firstSeen%3A-7d&referrer=issue-stream&sort=freq&statsPeriod=14d&stream_index=2) might also be related.
|
|
1,838,473 | 16,455,463 |
Very recent regression, current Nightly, Ubuntu 22.04 LTS on Linux, X11 + KDE
1) Click the address bar (any tab, including new ones)
2) See a list of sites but no URL
3) Click a site
4) End up on a random subsection of said site
Not seeing the URL makes it impossible to determine what the actual destination of the suggested sites is.
For example, I have a history suggestion "Reddit", but clicking this won't bring me to the reddit frontpage, but to whatever subsection I've been visiting a lot recently (as is actually the case now, one that's been closed due to protests, whereas if the link would have visited the actual frontpage it'd have worked).
Same issue exists with other news sites, where clicking the address bar feels like playing Chatroulette.
|
|
1,838,587 | 16,456,242 |
The following testcase crashes on mozilla-central revision 20230613-e974af195c98 (debug build, run with --fuzzing-safe --cpu-count=2 --ion-offthread-compile=off --baseline-eager):
See attachment.
Backtrace:
received signal SIGSEGV, Segmentation fault.
#0 0x0000555557b56617 in js::jit::CacheIRWriter::loadArgumentFixedSlot(js::jit::ArgumentKind, unsigned int, js::jit::CallFlags) ()
#1 0x0000555557b83bb2 in js::jit::CallIRGenerator::tryAttachBoundFunction(JS::Handle<js::BoundFunctionObject*>) ()
#2 0x0000555557b84849 in js::jit::CallIRGenerator::tryAttachStub() ()
#3 0x000055555791a12c in js::jit::DoCallFallback(JSContext*, js::jit::BaselineFrame*, js::jit::ICFallbackStub*, unsigned int, JS::Value*, JS::MutableHandle<JS::Value>) ()
#4 0x0000292b5070f487 in ?? ()
#5 0x0000000000000000 in ?? ()
rax 0x5555557f4ed2 93824994987730
rbx 0x7fffffffb558 140737488336216
rcx 0x5555585a1cf8 93825042881784
rdx 0x0 0
rsi 0x7ffff6abd770 140737331844976
rdi 0x7ffff6abc540 140737331840320
rbp 0x7fffffffb340 140737488335680
rsp 0x7fffffffb320 140737488335648
r8 0x7ffff6abd770 140737331844976
r9 0x7ffff7fe3840 140737354020928
r10 0x2 2
r11 0x0 0
r12 0x0 0
r13 0x7fffffffb3f8 140737488335864
r14 0x100 256
r15 0x1 1
rip 0x555557b56617 <js::jit::CacheIRWriter::loadArgumentFixedSlot(js::jit::ArgumentKind, unsigned int, js::jit::CallFlags)+199>
=> 0x555557b56617 <_ZN2js3jit13CacheIRWriter21loadArgumentFixedSlotENS0_12ArgumentKindEjNS0_9CallFlagsE+199>: movl $0x1d5,0x0
0x555557b56622 <_ZN2js3jit13CacheIRWriter21loadArgumentFixedSlotENS0_12ArgumentKindEjNS0_9CallFlagsE+210>: callq 0x555556ca5adf <abort>
Marking s-s because this is a range-like assert in JIT code.
|
|
1,839,073 | 16,459,479 |
By opening a new window maintaining it for 500ms and closing it, it bypasses clickjacking protections.
1. Go to https://haxatron1-bugs.glitch.me/clickjack.html and spam click on button
|
|
1,839,575 | 16,464,531 |
**Steps to reproduce**
1. Navigate to `data:text/html,<meta charset=utf8><style>main, div { aspect-ratio: 1;min-height: 100px; padding: 4em;} main { background: tomato; & > .yo { background: teal; } }</style><main><div class=yo></div></main>`
1. Open the inspector
1. Select the `div` element
1. Change the `teal` color to `black`
1. Select the `main` element
1. Change the `tomato` color to `blue`
**Actual results**
The `div` element background does back to `teal` in the page
---
The issue is quite visible at the moment when selecting the `main` element at step 5. : since we still display the nested rule, we can see that it still holds the previous text for the `div`:
```css
main {
background: tomato;
& > .yo { background: teal;
}: ;
}
```
So when updating a leaf rule, we should make sure the parent rule text is updated as well
|
|
1,842,595 | 16,490,123 |
Created attachment 9343071
Pin to taskbar.gif
**[Affected versions]:**
- Firefox Release 115.0.1 - Build ID: 20230706202047
**[Affected Platforms]:**
- Windows 10x64.
- Windows 11x64.
**[Prerequisites]:**
- Have this [Firefox Release 115.0.1](https://www.mozilla.org/de/firefox/new/?utm_medium=paidsearch&utm_source=google-rsa&utm_campaign=fxeu) version downloaded and installed on the machine.
- Have the [“user.js”](https://drive.google.com/file/d/19KusBuYmiC8uDQ0zg5EFt9YFMahKjjJC/view?usp=sharing) file saved on the computer.
- Have Firefox not pinned to the taskbar.
**[Steps to reproduce]:**
1. Copy and paste the following syntax in the Command Prompt Window: set MOZ_REMOTE_SETTINGS_DEVTOOLS=1
2. Create a new profile using the “-p –first-startup” syntax in the Command Prompt window but do not open it.
3. Navigate to the profile folder and paste the “user.js” file from prerequisites.
4. Open the browser using the previously created profile.
5. Click the “Pin to taskbar” button.
6. Observe the behavior.
**[Expected result]:**
- Firefox is successfully pinned to the taskbar.
**[Actual result]:**
- Firefox is NOT pinned to the taskbar.
**[Notes]:**
- This issue is also reproducible using the Treatment B branch of the experiment.
- Attaching a screen recording of the issue:
|
|
1,842,674 | 16,490,725 |
I was reading over custom refcnt implementations recently due to bug 1842190, and came across this one for `gfxCharacterMap` (https://searchfox.org/mozilla-central/rev/6220909421e5cdb2e706a87f77ba7c6f4f21e4d0/gfx/thebes/gfxFontEntry.h#71-88), which I believe has a thread-safety issue.
For this type, the `mRefCnt` member is atomic, but it's loaded multiple times to do the various checks in the function.
```
nsrefcnt Release() {
MOZ_ASSERT(0 != mRefCnt, "dup release");
--mRefCnt; // Load and decrement
NS_LOG_RELEASE(this, mRefCnt, "gfxCharacterMap"); // Additional load (could be different)
if (mRefCnt == 0) { // Additional load (could be different)
// Because we have a raw pointer in gfxPlatformFontList that we may race
// access with, we may not release here.
return NotifyMaybeReleased(); // mRefCnt loaded again in here (with the gfxPlatformFontList lock held)
}
return mRefCnt; // Additional load (could be different)
}
```
If Release() was interleaved correctly, we could end up loading the same `0` value from `mRefCnt` from multiple threads, ending up in `NotifyMaybeReleased()` multiple times, double-destroying & freeing the memory.
We should be recording the return value from `--mRefCnt` instead and using it for the other uses, like we do in other threadsafe refcounting situations for both [`Release`](https://searchfox.org/mozilla-central/rev/6220909421e5cdb2e706a87f77ba7c6f4f21e4d0/xpcom/base/nsISupportsImpl.h#893-899) and [`AddRef`](https://searchfox.org/mozilla-central/rev/6220909421e5cdb2e706a87f77ba7c6f4f21e4d0/xpcom/base/nsISupportsImpl.h#829-831).
This also could lead to issues with refcnt logging due to the read for refcnt logging being independent from the `++mRefCnt` and `--mRefCnt` calls, as well as due to the odd `gfxCharacterMap`-specific behaviour around allowing the reference count to increase from `0` due to it being present in a global table.
The handling of the shared table in the gfxPlatformFontList is also scary beyond the interaction with refcnt logging, and it'd be nice if we could use some other mechanism for it instead (like `ThreadSafeWeakPtr` or similar), to avoid the need for the sketchy resurrection of dead `gfxCharacterMap` objects through the table. If an alternative is found for the shared table using a type like that it may also be desirable to use it for [`gfxDWriteFontFileStream`](https://searchfox.org/mozilla-central/rev/6220909421e5cdb2e706a87f77ba7c6f4f21e4d0/gfx/thebes/gfxDWriteCommon.cpp#49-67) as well.
|
|
1,842,916 | 16,492,198 |
### Steps to reproduce
1. Open Add-ons manager
2. Tap + to install
3. Tap cancel on the permission dialog
### Expected behavior
Dismiss the dialog and not display an error.
### Actual behavior
Dismiss the dialog and an error is displayed.
### Device information
* Firefox version:
Fx 117 and 116
### Any additional information?
|
|
1,843,188 | 16,493,978 |
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/114.0
Steps to reproduce:
1. Enable Cards View in the Message List.
2. Hover a long title which is contracted with an ellipsis.
Actual results:
Nothing.
Expected results:
A tooltip with a full title, like in Table View.
|
|
1,843,486 | 16,495,576 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Steps to reproduce:
In the message list, I cannot use NVDA’s table navigation shortcuts to efficiently view mail information like in Thunderbird 102, including viewing the sender column, subject column, and time column separately.
Actual results:
Use NVDA's table navigation shortcut Ctrl+Alt+four arrow keys, not available in the message list, this control is not currently considered a table.
Expected results:
Ctrl+Alt+four arrow keys to navigate between table cells.
|
|
1,843,537 | 16,495,858 |
### Steps to reproduce
1. New Android device, install Firefox Nightly and Release
2. Make Nightly your default browser
3. Install Slack (or Element)
4. Connect to mozilla slack via auth0
### Expected behavior
- Default browser pops up and guides me through login
- redirect to app, login done, can use slack
### Actual behavior
- Default browser pops up and guides me through login
- The browser remains stuck on http://mozilla.slack.com/sso/saml
### Device information
* Firefox version: 117.0a build 2015961955
* Android device model: Samsung A54
* Android OS version: 13
### Any additional information?
If I set the current release version (115.2.0) as default browser, the flow works. Both browsers have no extensions and out-of-the-box preferences. I just connected them to my Firefox Account.
|
|
1,843,637 | 16,496,490 |
Steps to reproduce:
i run tb115/linux, upstream
Application Basics
Name: Thunderbird
Version: 115.0
Build ID: 20230711125218
Distribution ID:
Update Channel: release
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0 Thunderbird/115.0
OS: Linux 6.3.12-200.fc38.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Jul 6 04:05:18 UTC 2023
OS Theme: Breeze / Adwaita
Multiprocess Windows: 0/0
Fission Windows: 0/0
Enabled by user
Remote Processes: 5
Enterprise Policies: Inactive
Google Location Service Key: Missing
Google Safebrowsing Key: Missing
Mozilla Location Service Key: Missing
Safe Mode: false
Memory Size (RAM): 62.6 GB
Disk Space Available: 168 GB
my IMAP server is a local Dovecot instance
i've a 'deep' MAIL folder hiearchy
- myAccount
-- INBOX
-- Sent
-- Junk
-- Trash
-- Drafts
-- folderA
--- subA1
---- subA11
---- subA12
--- subA2
---- subA11
----- subA111
------ subA1111
----- subA112
------ subA1121
...
i do NOT save in TB for Offline -- I keep all @ IMAP
for any TB version <=v102, on account creation/setup, all the folders are seen, and the full (sub)folder hierarchy is dsiplayed & accessible in the client
if I
stop TB
cd /home/pgnd/.thunderbird/xA1B2C3y.Dovecot
rm -rf ImapMail
start TB
the hierarchy is correctly rebuilt, and, as above, all's good.
on upgrade to TB v115, whether I
create a new account
or
stop + delete ImapMail + start
TB only finds/displays to limited depth,
- myAccount
-- INBOX
-- Sent
-- Junk
-- Trash
-- Drafts
-- folderA
--- subA1
--- subA2
...
NONE of
- myAccount
...
--- subA1
---- subA11
---- subA12
...
---- subA11
----- subA111
------ subA1111
----- subA112
------ subA1121
or their contents are seen/displayed.
i'm unable to get v115 to walk to greater depth
drop back to v102, all's good again.
this is reproducible here, atm, on multiple TB clients, with 2 different Dovecot server instances, and one CyrusMail server instance (@ FastMail)
as a result, 1000's of messages per account are unavailable/hidden from TB v115 client view
|
|
1,844,036 | 16,500,967 |
Created attachment 9344384
2023-07-18_13h03_30.mp4
**Found in**
* Nightly 117.0a1 (2023-07-17)
**Affected versions**
* Nightly 117.0a1
**Affected platforms**
* All
**Steps to reproduce**
1. Open a PDF file in Firefox.
2. Add Several images types to the PDF file.
3. Click on the Print preview button.
4. Print the PDF file by pressing the "Save" button.
**Expected result**
The PDF file is correctly saved with its content unchanged and with its images/content successfully displayed.
**Actual result**
The PDF file is saved with blank pages and missing contents.
**Regression range**
N/A
**Notes**
Sometimes the PDF files are saved with only the images missing, other times the whole pages are saved blank.
|
|
1,844,733 | 16,505,326 |
Steps to reproduce:
1. Open app menu(hamburger menu)
2. Click on `History` or `Bookmarks`
3. Right mouse click on a history entry or a bookmark entry
4. Click on the other application button on Windows Taskbar
or
Click on `Bottom right Show Desktop button` of Windows Taskbar
Actual results:
The context menu popup stays at top most.
Expected results:
Context menu should disappear.
Regression window:
https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=b3b53ca8393c116374cfe24a0a0347075472b648&tochange=0c47c1159e0a060ee709f9f8f854bfad27f86c85
|
|
1,839,872 | 16,466,717 |
Created attachment 9340493
infinite loop
**Found in**
* Nightly 116.0a1
**Affected versions**
* 116.0a1 (20230621040008)
**Tested platforms**
Affected platforms:
* Ubuntu 22
* Windows 10
* macOS 10.14
**Preconditions**
* Ensure “signon.management.page.fileImport.enabled" is set on True in about:config.
* have a valid csv file with exported passwords from any browser
**Steps to reproduce**
1. Open Firefox and choose to import Passwords from CSV file.
2. Select the file from the preconditions.
**Expected result**
The import is successful.
**Actual result**
The import does not complete, it remains in progress in an infinite loop.
**Regression range**
https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=693d34c8447d4730b61eaad4858422001bdb1a7e&tochange=b865b19797f1adb2019d2845b4ad65c34869a433
**Notes**
* Screenshot attached
|
|
1,840,144 | 16,468,639 |
Created attachment 9340751
ssl-seturl-failure-heap-use-after-free-4.txt
When launching Firefox with `--disable-e10s` and fillMemory code, then when contacting with URL, at rare time Firefox able to crash with `AddressSanitizer: heap-use-after-free` on `PR_GetIdentitiesLayer`.
It happen when allocation failure on `SSL_SetURL` malloc at [`ss->url = (const char *)PORT_Strdup(url);`](https://searchfox.org/mozilla-central/source/security/nss/lib/ssl/sslsecur.c#1157)
|
|
1,840,273 | 16,469,408 |
Created attachment 9340861
InvalidFunPointer_wgpu_hal_PoC.html
VULNERABILITY DETAILS
Specifically crafted HTML file can trigger Invalid function pointer read in wgpu_hal in D3D backend. This bug has the potential to be exploited to execute arbitrary code in the GPU process.
Open the PoC (InvalidFunPointer_wgpu_hal_PoC.html) in Firefox.
The PoC can cause faulty interactions between Gecko and D3D libraries, and ultimately lead to Invalid function pointer read in xul!wgpu_hal::dx12::instance::impl$1::enumerate_adapters::closure.
The crash happens at the following instruction which tries to read from meomry address rax and assign it back to rax.
D3D12Core!CLayeredObject<CDevice>::CContainedObject::QueryInterface+0x18:
00007ff9`f1257d98 488b00 mov rax,qword ptr [rax] ds:00007ffa`3fe75000=????????????????
The next instruction is a virtual function call:
0:096> u
D3D12Core!CLayeredObject<CDevice>::CContainedObject::QueryInterface+0x18:
00007ff9`f1257d98 488b00 mov rax,qword ptr [rax]
00007ff9`f1257d9b ff15b73c1400 call qword ptr [D3D12Core!_guard_xfg_dispatch_icall_fptr (00007ff9`f139ba58)]
The RAX registers would store the address to jump to. So the invalid memory access happens when it tries to read a function pointer from an invalid memory location.
From this point of view, this bug has the potential of being exploited to execute arbitrary code in the GPU process.
VERSION
Firefox 116.0a1 (2023-06-24) (64-bit)
OS Windows 11 Home 22H2 (Build 22621.1848)
REPRODUCTION CASE (InvalidFunPointer_wgpu_hal_PoC.html. if it does not repro after running it for 10 seconds or so, try opening it in a new tab.)
<script>
navigator.gpu.requestAdapter().then((adapter)=>{adapter.requestDevice().then((val)=>{ setTimeout(function(){location.reload();},200); });});
</script>
Type of crash: gpu process
Crash State:
(1144.38ec): Access violation - code c0000005 (!!! second chance !!!)
D3D12Core!CLayeredObject<CDevice>::CContainedObject::QueryInterface+0x18:
00007ff9`f1257d98 488b00 mov rax,qword ptr [rax] ds:00007ffa`3fe75000=????????????????
0:096> r
rax=00007ffa3fe75000 rbx=000000000000f914 rcx=0000020fcdac62b0
rdx=000000209180cf30 rsi=0000020fcdac6880 rdi=0000000000000000
rip=00007ff9f1257d98 rsp=000000209180cb60 rbp=000000209180ce10
r8=000000209180d0d0 r9=0000000000000018 r10=dee01e7974d59970
r11=8882222222220020 r12=0000000000000001 r13=00007ffa4f8b5108
r14=000000209180d0d0 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010204
D3D12Core!CLayeredObject<CDevice>::CContainedObject::QueryInterface+0x18:
00007ff9`f1257d98 488b00 mov rax,qword ptr [rax] ds:00007ffa`3fe75000=????????????????
0:096> dv
Unable to enumerate locals, Win32 error 0n87
Private symbols (symbols.pri) are required for locals.
Type ".hh dbgerr005" for details.
0:096> k
# Child-SP RetAddr Call Site
00 00000020`9180cb60 00007ff9`f1260d80 D3D12Core!CLayeredObject<CDevice>::CContainedObject::QueryInterface+0x18
01 00000020`9180cb90 00007ff9`f12623d6 D3D12Core!D3D12CoreCreateDevice+0x30c
02 00000020`9180cdb0 00007ffa`4f8a6a4d D3D12Core!D3D12ValidateAndCreateDevice+0x146
03 00000020`9180ce30 00007ffa`4f8a668e d3d12!D3D12CreateDeviceImpl+0x5d
04 00000020`9180ce80 00007ff9`e86d3ee9 d3d12!D3D12CreateDevice+0xae
05 (Inline Function) --------`-------- xul!wgpu_hal::dx12::instance::impl$1::enumerate_adapters::closure$0+0x218 [/builds/worker/checkouts/gecko/third_party/rust/wgpu-hal/src/dx12/instance.rs @ 113]
06 (Inline Function) --------`-------- xul!core::ops::function::impls::impl$3::call_mut+0x218 [/rustc/84c898d65adf2f39a5a98507f1fe0ce10a2b8dbc\library\core\src\ops\function.rs @ 298]
07 (Inline Function) --------`-------- xul!core::iter::traits::iterator::Iterator::find_map::check::closure$0+0x218 [/rustc/84c898d65adf2f39a5a98507f1fe0ce10a2b8dbc\library\core\src\iter\traits\iterator.rs @ 2795]
08 (Inline Function) --------`-------- xul!core::iter::traits::iterator::Iterator::try_fold+0x250 [/rustc/84c898d65adf2f39a5a98507f1fe0ce10a2b8dbc\library\core\src\iter\traits\iterator.rs @ 2299]
09 (Inline Function) --------`-------- xul!core::iter::traits::iterator::Iterator::find_map+0x250 [/rustc/84c898d65adf2f39a5a98507f1fe0ce10a2b8dbc\library\core\src\iter\traits\iterator.rs @ 2801]
0a 00000020`9180cf00 00007ff9`e87087c0 xul!core::iter::adapters::filter_map::impl$2::next<wgpu_hal::ExposedAdapter<wgpu_hal::dx12::Api>,alloc::vec::into_iter::IntoIter<enum2$<d3d12::dxgi::DxgiAdapter>,alloc::alloc::Global>,wgpu_hal::dx12::instance::impl$1::enumerate_adapters::closure_env$0>+0x279 [/rustc/84c898d65adf2f39a5a98507f1fe0ce10a2b8dbc\library\core\src\iter\adapters\filter_map.rs @ 61]
0b (Inline Function) --------`-------- xul!alloc::vec::spec_from_iter_nested::impl$0::from_iter+0x8 [/rustc/84c898d65adf2f39a5a98507f1fe0ce10a2b8dbc\library\alloc\src\vec\spec_from_iter_nested.rs @ 26]
0c (Inline Function) --------`-------- xul!alloc::vec::in_place_collect::impl$1::from_iter+0x1f [/rustc/84c898d65adf2f39a5a98507f1fe0ce10a2b8dbc\library\alloc\src\vec\in_place_collect.rs @ 167]
0d (Inline Function) --------`-------- xul!alloc::vec::impl$15::from_iter+0x1f [/rustc/84c898d65adf2f39a5a98507f1fe0ce10a2b8dbc\library\alloc\src\vec\mod.rs @ 2724]
0e (Inline Function) --------`-------- xul!core::iter::traits::iterator::Iterator::collect+0x1f [/rustc/84c898d65adf2f39a5a98507f1fe0ce10a2b8dbc\library\core\src\iter\traits\iterator.rs @ 1891]
0f 00000020`9180d290 00007ff9`e8094ec3 xul!wgpu_hal::dx12::instance::impl$1::enumerate_adapters+0x70 [/builds/worker/checkouts/gecko/third_party/rust/wgpu-hal/src/dx12/instance.rs @ 115]
10 00000020`9180d510 00007ff9`e667c064 xul!wgpu_bindings::server::wgpu_server_instance_request_adapter+0x383 [/builds/worker/checkouts/gecko/gfx/wgpu_bindings/src/server.rs @ 158]
11 00000020`9180ecc0 00007ff9`e6686d8a xul!mozilla::webgpu::WebGPUParent::RecvInstanceRequestAdapter+0xb4 [/builds/worker/checkouts/gecko/dom/webgpu/ipc/WebGPUParent.cpp @ 295]
12 00000020`9180efb0 00007ff9`e5bece92 xul!mozilla::webgpu::PWebGPUParent::OnMessageReceived+0x394a [/builds/worker/workspace/obj-build/ipc/ipdl/PWebGPUParent.cpp @ 662]
13 00000020`9180f170 00007ff9`e4d9a200 xul!mozilla::gfx::PCanvasManagerParent::OnMessageReceived+0x172 [/builds/worker/workspace/obj-build/ipc/ipdl/PCanvasManagerParent.cpp @ 214]
14 (Inline Function) --------`-------- xul!mozilla::ipc::MessageChannel::DispatchAsyncMessage+0x71 [/builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp @ 1811]
15 (Inline Function) --------`-------- xul!mozilla::ipc::MessageChannel::DispatchMessage+0x33c [/builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp @ 1736]
16 00000020`9180f220 00007ff9`e4b68b35 xul!mozilla::ipc::MessageChannel::RunMessage+0x440 [/builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp @ 1536]
17 00000020`9180f590 00007ff9`e4ae5186 xul!mozilla::ipc::MessageChannel::MessageTask::Run+0x95 [/builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp @ 1643]
18 00000020`9180f5e0 00007ff9`e4ae3d31 xul!nsThread::ProcessNextEvent+0x1096 [/builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp @ 1194]
19 (Inline Function) --------`-------- xul!NS_ProcessNextEvent+0x29 [/builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp @ 479]
1a 00000020`9180f980 00007ff9`e3c1e27f xul!mozilla::ipc::MessagePumpForNonMainThreads::Run+0x111 [/builds/worker/checkouts/gecko/ipc/glue/MessagePump.cpp @ 300]
1b (Inline Function) --------`-------- xul!MessageLoop::RunInternal+0x16 [/builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc @ 370]
1c 00000020`9180fa30 00007ff9`e325f6fe xul!MessageLoop::RunHandler+0x2f [/builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc @ 364]
1d 00000020`9180fa80 00007ff9`e3a67562 xul!MessageLoop::Run+0x4e [/builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc @ 346]
1e 00000020`9180fae0 00007ffa`3c4e739d xul!nsThread::ThreadFunc+0xe2 [/builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp @ 393]
1f 00000020`9180fcb0 00007ffa`3c569b31 nss3!_PR_NativeRunThread+0x13d [/builds/worker/checkouts/gecko/nsprpub/pr/src/threads/combined/pruthr.c @ 421]
20 00000020`9180fd20 00007ffa`6b599363 nss3!pr_root+0x11 [/builds/worker/checkouts/gecko/nsprpub/pr/src/md/windows/w95thred.c @ 140]
21 00000020`9180fd50 00007ffa`6b6a26ad ucrtbase!thread_start<unsigned int (__cdecl*)(void *),1>+0x93
22 00000020`9180fd80 00007ffa`3c7b3bf8 KERNEL32!BaseThreadInitThunk+0x1d
23 (Inline Function) --------`-------- mozglue!mozilla::interceptor::FuncHook<mozilla::interceptor::WindowsDllInterceptor<mozilla::interceptor::VMSharingPolicyShared>,void (*)(int, void *, void *)>::operator()+0x15 [/builds/worker/checkouts/gecko/toolkit/xre/dllservices/mozglue/nsWindowsDllInterceptor.h @ 150]
24 00000020`9180fdb0 00007ffa`6d90a9f8 mozglue!patched_BaseThreadInitThunk+0x28 [/builds/worker/checkouts/gecko/toolkit/xre/dllservices/mozglue/WindowsDllBlocklist.cpp @ 617]
25 00000020`9180fe20 00000000`00000000 ntdll!RtlUserThreadStart+0x28
CREDIT INFORMATION
Reporter credit: Looben Yang
|
|
1,840,842 | 16,475,111 |
Created attachment 9341514
Video of the issue.mp4
**[Affected versions]:**
- Firefox 115.0 - Build ID: 20230626153624
**[Affected Platforms]:**
- Windows 10 x64
- macOS 13.0.1
- Ubuntu 20.04 x64
**[Prerequisites]:**
- Have a new Firefox profile
- Firefox is not set as the default browser
- Save the [“user.js”]( https://drive.google.com/file/d/1OPnEeNt8k8WOw3mOf3feyBywtdOzJgDA/view?usp=sharing) file to disk
- Save the [“times.json”]( https://drive.google.com/file/d/1F6rxE2FaE8UbByMqQ2GOsz2pF0xcUHli/view?usp=sharing) file to disk
**[Steps to reproduce]:**
1. Open the browser with the profile from the prerequisites.
2. Navigate to the profile folder and paste the “user.js” file from prerequisites
3. Restart the browser
4. Click “Set as a default browser” from the “Make Firefox your default browser” prompt
5. Navigate to the profile folder and paste the “times.json” file from prerequisites
6. Restart the browser
7. Wait 1 minute then open a new tab
8. Observe the behavior
**[Expected result]:**
- The Fox Doodle Set to Default spotlight is not shown
**[Actual result]:**
- The Fox Doodle Set to Default spotlight is shown, despite the browser already being the default one
**[Notes]:**
- This issue is reproducible with “Treatment A”, “B” and “C”
- Attached is a video of the issue:
|
|
1,840,853 | 16,475,181 |
Created attachment 9341538
rec of the issue.gif
**[Affected versions]:**
- Firefox RC 115.0 - Build ID: 20230626153624
**[Affected Platforms]:**
- Windows 10 x64
- macOS 13.0.1
**[Prerequisites]:**
- Firefox is not pinned to the taskbar/dock.
- Firefox is not set as the default browser.
- Have a Firefox profile between 1 and 28 days old.
- Have the "[user.js](https://drive.google.com/file/d/1uptj_A_hYDlCXPk5yUNF83-O7ntEXJcB/view?usp=drive_link)" filed saved to your PC.
**[Steps to reproduce]:**
1. Open the browser with the profile from the prerequisites.
2. Navigate to the profile folder and paste the "user.js" file from the prerequisites.
3. Restart the browser.
4. Click the "Make primary browser" button from the "Make Firefox your primary browser" prompt.
5. Wait ~1 minute and open a new tab.
6. Observe the behavior.
**[Expected result]:**
- The "Fox Doodle - Pin to Taskbar" spotlight is NOT displayed.
**[Actual result]:**
- The "Fox Doodle - Pin to Taskbar" spotlight is triggered even if Firefox is pinned to that taskbar/dock.
**[Notes]:**
- This issue is reproducible on all the "Treatment" branches of the experiment.
- This issue is also reproducible if Firefox is pinned to the taskbar via the context menu from the taskbar icon.
- Attached is a screen recording of the issue:
|
|
1,841,050 | 16,476,380 |
Created attachment 9341705
blit.html
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36
Steps to reproduce:
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/116.0
When accessing the POC file from the browser, an out-of-bounds error occurs, leading to the termination of the GPU process.
In a typical environment, it works well, but in a VM, it may need the "webgl.force-enabled" option set to true to be triggered.
Actual results:
An out-of-bound bug occurs when calculating the sourcePixel in the BlitD24S8ToD32F function.
This function is as follows.
```javascript
for (int row = 0; row < destArea.height; ++row)
{
for (int column = 0; column < destArea.width; ++column)
{
ptrdiff_t offset = row * sourceRowPitch + column * srcPixelStride;
const float *sourcePixel = reinterpret_cast<const float *>(sourceData + offset);
float *destPixel =
reinterpret_cast<float *>(destData + row * destRowPitch + column * destPixelStride);
Depth32FStencil8ToDepth32F(sourcePixel, destPixel);
}
}
```
When calculating the sourcePixel, the offset can be larger than the size of the sourceData, resulting in an out-of-bound bug.
```javascript
sourceData = width*height*srcPixelStride
```
- width and height are values that can be set in the renderbufferStorage API.
- srcPixelStride is set to 8 when using DEPTH32F_STENCIL8 foramt in the renderbufferStorage API.
```javascript
offset = row*sourceRowPitch+column+srcPixelStride
```
- row = dstY0-dstY1
- dstY0 and dstY1 are values that can be set in the blitFramebuffer API.
- sourceRowPitch = width*srcPixelStride
- width is value that can be set in the renderbufferStorage API.
- srcPixelStride is set to 8 when using DEPTH32F_STENCIL8 foramt in the renderbufferStorage API.
- column = dstX0-dstX1
- dstX0 and dstX1 are values that can be set in the blitFramebuffer API.
The size of the sourceData is affected by the width and height values set by the renderbufferStorage API.
If there is no validation for row or column values when calculating offset, an out-of-bound bug will occur.
In fact, there is a check of values for row and column. But this check is wrong.
Row must be verified to be less than width and column less than height. At this time, width and height must be values set by the renderbufferStorage API.
However, row is compared to the width of the canvas object and column is compared to the height of the canvas object.
Therefore, if you set the width and height of the canvas object large, the offset increases a lot.
Expected results:
This bug allows for inserting values obtained through an out-of-bound read into the destPixel. Therefore, this results in information leak.
|
|
1,841,481 | 16,480,734 |
Created attachment 9342081
rec of the issue.gif
**[Notes]:**
- This issue affects the "Pin to Taskbar/Set to default -Fox Doodle - Early day users" experiments because the message targeting is set to `source == 'startup'` and `profileRestartCount > 0`. Due to this, the "Fox Doodle" spotlights will not be triggered because, at each browser startup, the value of the "profileRestartCount" parameter will be set to `0` for ~1 minute.
**[Affected versions]:**
- Firefox Release 113.0.2 - Build ID: 20230522134052
- Firefox Release 114.0.2 - Build ID: 20230619081400
- Firefox RC 115.0 - Build ID: 20230629134642
**[Affected Platforms]:**
- Windows 10 x64
- macOS 13.0.1
- Ubuntu 20.04 x64
**[Prerequisites]:**
- Firefox is not set as the default browser.
- Have a Firefox profile older than 1 day.
- Have the following prefs in the "about:config" page:
- `nimbus.debug` pref set to `true`;
- `browser.newtabpage.activity-stream.asrouter.devtoolsEnabled` pref set to `true`;
**[Steps to reproduce]:**
1. Open the browser with the profile from the prerequisites.
2. Navigate to "about:studies?optin_slug=fox-doodle-set-to-default-early-day-graphics&optin_branch=treatment-c&optin_collection=nimbus-preview".
3. Restart the browser.
4. Observe the behavior.
5. Navigate to "about:newtab#asrouter" and select the "Targeting" option from the left part of the page.
6. Observe the value of the `profileRestartCount` parameter.
**[Expected result]:**
- Step 4: The Fox Doodle spotlight is displayed.
- Step 6. The value of the `profileRestartCount` parameter is set to at least `1`.
**[Actual result]:**
- Step 4: The Fox Doodle spotlight is not triggered.
- Step 6. The value of the `profileRestartCount` parameter is set to `0`.
**[Additional Notes]:**
- The correct value of the `profileRestartCount` parameter is set after ~1 minute of waiting time.
- This issue is reproducible on all the "Treatment" branches of the experiment.
- This issue is also reproducible with the "Fox Doodle Pin to taskbar: Early day - Graphics" experiment.
- Attached is a screen recording of the issue:
|
|
1,841,682 | 16,482,130 |
The following testcase crashes on mozilla-central revision 20230629-c93a9e0ad90d (debug build, run with --fuzzing-safe --cpu-count=2 --ion-offthread-compile=off --ion-warmup-threshold=0 --fast-warmup --blinterp-warmup-threshold=1):
gczeal(12,9);
function clone_object_check(b, desc) {
function ownProperties(obj) {
return Object.getOwnPropertyNames(obj).
map(function (p) { return [p, Object.getOwnPropertyDescriptor(obj, p)]; });
}
function isArrayLength(obj, pair) {
return Array.isArray(obj) && pair[0] == "length";
}
function isCloneable(obj, pair) {
return isArrayLength(obj, pair) || (typeof pair[0] === 'string' && pair[1].enumerable);
}
function assertIsCloneOf(a, b, path) {
var pb = ownProperties(b).filter(function(element) {
return isCloneable(b, element);
});
var pa = ownProperties(a);
for (var i = 0; i < pa.length; i++) {
var da = pa[i][1];
var va = da.value;
var vb = b[pb[i][0]];
queue.push([va, vb]);
}
}
var a = deserialize(serialize(b));
var queue = [[a, b]];
while (queue.length) {
var triple = queue.shift();
assertIsCloneOf(triple[0], triple[1], triple[2]);
}
}
gczeal(19, 5);
var allTypedArraySamples = [
{ value: new Int8Array(1), expected: true },
{ value: new Uint8ClampedArray(1), expected: true }
];
clone_object_check(allTypedArraySamples);
Backtrace:
received signal SIGSEGV, Segmentation fault.
#0 0x00005555577bed3d in CheckForCompartmentMismatch(JSObject*, JSObject*) ()
#1 0x00005555577a48e7 in bool js::GCMarker::processMarkStackTop<4u>(js::SliceBudget&) ()
#2 0x000055555779ee02 in bool js::GCMarker::doMarking<4u>(js::SliceBudget&, js::gc::ShouldReportMarkTime) ()
#3 0x000055555779ec8a in js::GCMarker::markUntilBudgetExhausted(js::SliceBudget&, js::gc::ShouldReportMarkTime) ()
#4 0x0000555557757d4a in js::gc::GCRuntime::markUntilBudgetExhausted(js::SliceBudget&, js::gc::GCRuntime::ParallelMarking, js::gc::ShouldReportMarkTime) ()
#5 0x000055555775c1b4 in js::gc::GCRuntime::incrementalSlice(js::SliceBudget&, JS::GCReason, bool) ()
#6 0x000055555775faae in js::gc::GCRuntime::gcCycle(bool, js::SliceBudget const&, JS::GCReason) ()
#7 0x0000555557761434 in js::gc::GCRuntime::collect(bool, js::SliceBudget const&, JS::GCReason) ()
#8 0x0000555557729e16 in js::gc::GCRuntime::runDebugGC() ()
#9 0x000055555772848c in bool js::gc::CellAllocator::PreAllocChecks<(js::AllowGC)1>(JS::RootingContext*, js::gc::AllocKind) ()
#10 0x00005555577293a5 in void* js::gc::CellAllocator::AllocTenuredCell<(js::AllowGC)1>(JS::RootingContext*, js::gc::AllocKind, unsigned long) ()
#11 0x00005555571bf6e8 in js::SharedShape::getInitialShape(JSContext*, JSClass const*, JS::Realm*, js::TaggedProto, unsigned long, js::EnumFlags<js::ObjectFlag>) ()
#12 0x0000555556fff4b9 in NewObject(JSContext*, JSClass const*, JS::Handle<js::TaggedProto>, js::gc::AllocKind, js::NewObjectKind) ()
#13 0x0000555556fff836 in js::NewObjectWithClassProto(JSContext*, JSClass const*, JS::Handle<JSObject*>, js::gc::AllocKind, js::NewObjectKind) ()
#14 0x0000555556e427e7 in js::BooleanObject::create(JSContext*, bool, JS::Handle<JSObject*>) ()
#15 0x0000555556ea630c in obj_getOwnPropertyNames(JSContext*, unsigned int, JS::Value*) ()
#16 0x000001ffb972374e in ?? ()
#17 0x0000000000000000 in ?? ()
rax 0x5555557edf6f 93824994959215
rbx 0x3ed9ec000198 69105688248728
rcx 0x5555585b1378 93825042944888
rdx 0x0 0
rsi 0x7ffff7105770 140737338431344
rdi 0x7ffff7104540 140737338426688
rbp 0x7fffffffbe40 140737488338496
rsp 0x7fffffffbe20 140737488338464
r8 0x7ffff7105770 140737338431344
r9 0x7ffff7f9a840 140737353721920
r10 0x2 2
r11 0x0 0
r12 0x1 1
r13 0x7ffff3e3b080 140737285173376
r14 0x2 2
r15 0x7ffff39c5f20 140737280499488
rip 0x5555577bed3d <CheckForCompartmentMismatch(JSObject*, JSObject*)+237>
=> 0x5555577bed3d <_ZL27CheckForCompartmentMismatchP8JSObjectS0_+237>: movl $0x340,0x0
0x5555577bed48 <_ZL27CheckForCompartmentMismatchP8JSObjectS0_+248>: callq 0x555556cac07f <abort>
Marking s-s due to GC assert.
|
|
1,842,162 | 16,485,732 |
Created attachment 9342695
rec of the issue.gif
**[Affected versions]:**
- Firefox Release 115.0 - Build ID: 20230629134642
**[Affected Platforms]:**
- Windows 10 x64
**[Prerequisites]:**
- Firefox is pinned to the taskbar.
- Firefox is not set as the default browser.
- Have the "[user.js](https://drive.google.com/file/d/1ltJbz-AERrVlfWQPgDlpjyBuVK85gCX4/view?usp=sharing)" filed saved to your PC.
- Have the latest Firefox Release 115 de locale installed.
- Have the OS language different than the Firefox build's one.
**[Steps to reproduce]:**
1. Create a new Firefox profile using `--first-startup` flag but do not open it.
2. Navigate to the recently created profile and paste the "user.js" file from the prerequisites.
3. Open the browser using the previously created profile.
4. Observe the first Onboarding screen.
**[Expected result]:**
- The "Easy Setup" onboarding screen is displayed.
**[Actual result]:**
- The "Language Switcher" screen is displayed instead.
**[Additional Notes]:**
- Attached is a screen recording of the issue:
|
|
1,842,188 | 16,486,186 |
**[Affected versions]:**
- Firefox Release 110, BuildID 20230214051806
- Firefox Release 112, BuildID 20230406114409
- Firefox Release 113, BuildID 20230504192738
**[Affected Platforms]:**
- Windows 10
- Windows 11
**[Prerequisites]:**
- Have a clean new Firefox Release 110 en-US profile.
- Have the following prefs set to the following values:
- `messaging-system.rsexperimentloader.collection_id` set to `nimbus-preview`
- `app.normandy.user_id` set to `eae822e4-f368-4377-af07-2702b4a129ec`
- `messaging-system.log` set to `all`
- `browser.search.region` set to `US`
- `browser.ping-centre.log` set to `true`
- Edit the times.json file from the profile disk location and replace its contents with `{"created":1686181882000,"firstUse":1686181882000}`
**[Steps to reproduce]:**
1. Open the Browser with the profile from prerequisites.
2. Open the Browser console.
3. Observe the console logs after the `vpn-moments-page-july-release` was evaluated.
**[Expected result]:**
- The client is successfully enrolled in the experiment.
**[Actual result]:**
- An error stating that the `Experiment vpn-moments-page-july-release has unknown featureId: fxms-message-8`.
**[Notes]:**
- The issue is not reproducible using forced enrollment as that ignores recipe validation, but the Moments Page still isn't displayed.
|
|
1,842,368 | 16,487,180 |
When we send an untrusted modules ping, we sometimes crash with the following call stack:
```
00 xul!mozilla::nt::PEHeaders::FindResourceEntry+0x4 [/builds/worker/workspace/obj-build/dist/include/mozilla/NativeNt.h @ 972]
01 xul!mozilla::nt::PEHeaders::FindResourceLeaf+0x35 [/builds/worker/workspace/obj-build/dist/include/mozilla/NativeNt.h @ 824]
02 xul!mozilla::nt::PEHeaders::GetVersionInfo+0x35 [/builds/worker/workspace/obj-build/dist/include/mozilla/NativeNt.h @ 705]
03 xul!AddSharedLibraryFromModuleInfo+0x415 [/builds/worker/checkouts/gecko/tools/profiler/core/shared-libraries-win32.cc @ 129]
04 xul!SharedLibraryInfo::GetInfoFromPath+0x33 [/builds/worker/checkouts/gecko/tools/profiler/core/shared-libraries-win32.cc @ 162]
05 xul!mozilla::Telemetry::SerializeModule+0x535 [/builds/worker/checkouts/gecko/toolkit/components/telemetry/other/UntrustedModulesDataSerializer.cpp @ 177]
06 xul!mozilla::Telemetry::UntrustedModulesDataSerializer::AddSingleData::<lambda_1>::operator()+0x55c [/builds/worker/checkouts/gecko/toolkit/components/telemetry/other/UntrustedModulesDataSerializer.cpp @ 452]
07 xul!nsBaseHashtable<nsStringHashKey,unsigned int,unsigned int,nsDefaultConverter<unsigned int,unsigned int> >::WithEntryHandle<`lambda at /builds/worker/checkouts/gecko/toolkit/components/telemetry/other/UntrustedModulesDataSerializer.cpp:447:52'>::<lambda_1>::operator()+0x577 [/builds/worker/workspace/obj-build/dist/include/nsBaseHashtable.h @ 836]
08 xul!nsTHashtable<nsBaseHashtableET<nsStringHashKey,unsigned int> >::WithEntryHandle<`lambda at /builds/worker/workspace/obj-build/dist/include/nsBaseHashtable.h:835:15'>::<lambda_1>::operator()+0x58a [/builds/worker/workspace/obj-build/dist/include/nsTHashtable.h @ 437]
09 xul!PLDHashTable::WithEntryHandle+0x598 [/builds/worker/workspace/obj-build/dist/include/PLDHashTable.h @ 605]
0a xul!nsTHashtable<nsBaseHashtableET<nsStringHashKey,unsigned int> >::WithEntryHandle+0x598 [/builds/worker/workspace/obj-build/dist/include/nsTHashtable.h @ 434]
0b xul!nsBaseHashtable<nsStringHashKey,unsigned int,unsigned int,nsDefaultConverter<unsigned int,unsigned int> >::WithEntryHandle+0x598 [/builds/worker/workspace/obj-build/dist/include/nsBaseHashtable.h @ 834]
0c xul!mozilla::Telemetry::UntrustedModulesDataSerializer::AddSingleData+0x675 [/builds/worker/checkouts/gecko/toolkit/components/telemetry/other/UntrustedModulesDataSerializer.cpp @ 447]
0d xul!mozilla::Telemetry::UntrustedModulesDataSerializer::Add+0xa8 [/builds/worker/checkouts/gecko/toolkit/components/telemetry/other/UntrustedModulesDataSerializer.cpp @ 577]
0e xul!mozilla::Telemetry::MultiGetUntrustedModulesData::Serialize+0xa3 [/builds/worker/checkouts/gecko/toolkit/components/telemetry/other/UntrustedModules.cpp @ 228]
0f xul!mozilla::Telemetry::GetUntrustedModuleLoadEvents::<lambda_1>::operator()+0x9 [/builds/worker/checkouts/gecko/toolkit/components/telemetry/other/UntrustedModules.cpp @ 285]
10 xul!mozilla::MozPromise<bool,nsresult,1>::InvokeMethod+0x9 [/builds/worker/workspace/obj-build/dist/include/mozilla/MozPromise.h @ 654]
11 xul!mozilla::MozPromise<bool,nsresult,1>::InvokeCallbackMethod+0x9 [/builds/worker/workspace/obj-build/dist/include/mozilla/MozPromise.h @ 685]
12 xul!mozilla::MozPromise<bool,nsresult,1>::ThenValue<`lambda at /builds/worker/checkouts/gecko/toolkit/components/telemetry/other/UntrustedModules.cpp:285:7',`lambda at /builds/worker/checkouts/gecko/toolkit/components/telemetry/other/UntrustedModules.cpp:286:7'>::DoResolveOrRejectInternal+0x33 [/builds/worker/workspace/obj-build/dist/include/mozilla/MozPromise.h @ 870]
13 xul!mozilla::MozPromise<bool,nsresult,1>::ThenValueBase::DoResolveOrReject+0x22 [/builds/worker/workspace/obj-build/dist/include/mozilla/MozPromise.h @ 623]
14 xul!mozilla::MozPromise<bool,nsresult,1>::ThenValueBase::ResolveOrRejectRunnable::Run+0x54 [/builds/worker/workspace/obj-build/dist/include/mozilla/MozPromise.h @ 491]
15 xul!mozilla::RunnableTask::Run+0x11 [/builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp @ 555]
16 xul!mozilla::TaskController::DoExecuteNextTaskOnlyMainThreadInternal+0x7a5 [/builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp @ 879]
17 xul!mozilla::TaskController::ExecuteNextTaskOnlyMainThreadInternal+0xb [/builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp @ 702]
18 xul!mozilla::TaskController::ProcessPendingMTTask+0x17 [/builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp @ 491]
19 xul!mozilla::TaskController::TaskController::<lambda_4>::operator()+0x23 [/builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp @ 218]
1a xul!mozilla::detail::RunnableFunction<`lambda at /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:218:7'>::Run+0x4a [/builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.h @ 548]
1b xul!nsThread::ProcessNextEvent+0xb53 [/builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp @ 1240]
1c xul!NS_ProcessNextEvent+0xbab [/builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp @ 479]
1d xul!mozilla::ipc::MessagePump::Run+0x25f [/builds/worker/checkouts/gecko/ipc/glue/MessagePump.cpp @ 85]
1e xul!MessageLoop::RunInternal+0x16 [/builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc @ 368]
1f xul!MessageLoop::RunHandler+0x2f [/builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc @ 362]
20 xul!MessageLoop::Run+0x4e [/builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc @ 344]
21 xul!nsBaseAppShell::Run+0x28 [/builds/worker/checkouts/gecko/widget/nsBaseAppShell.cpp @ 150]
22 xul!nsAppShell::Run+0x3a [/builds/worker/checkouts/gecko/widget/windows/nsAppShell.cpp @ 615]
23 xul!nsAppStartup::Run+0x41 [/builds/worker/checkouts/gecko/toolkit/components/startup/nsAppStartup.cpp @ 296]
24 xul!XREMain::XRE_mainRun+0xc12 [/builds/worker/checkouts/gecko/toolkit/xre/nsAppRunner.cpp @ 5659]
25 xul!XREMain::XRE_main+0x323 [/builds/worker/checkouts/gecko/toolkit/xre/nsAppRunner.cpp @ 5859]
26 xul!XRE_main+0x6b [/builds/worker/checkouts/gecko/toolkit/xre/nsAppRunner.cpp @ 5915]
27 firefox!do_main+0xc6 [/builds/worker/checkouts/gecko/browser/app/nsBrowserApp.cpp @ 227]
28 firefox!NS_internal_main+0x497 [/builds/worker/checkouts/gecko/browser/app/nsBrowserApp.cpp @ 445]
29 firefox!wmain+0x729 [/builds/worker/checkouts/gecko/toolkit/xre/nsWindowsWMain.cpp @ 167]
2a firefox!invoke_main+0x22 [D:\a\_work\1\s\src\vctools\crt\vcstartup\src\startup\exe_common.inl @ 90]
2b firefox!__scrt_common_main_seh+0x10c [D:\a\_work\1\s\src\vctools\crt\vcstartup\src\startup\exe_common.inl @ 288]
2c kernel32!BaseThreadInitThunk+0xd
2d ntdll!RtlUserThreadStart+0x1d
```
If I am correct, this is especially likely to occur when sending pings for a module that is **blocked in the main process but not in other processes**. So, this crash could become dangerously high volume after bug 1837242, where this is exactly what we did.
The technical reason for the crash would be that [when we map the module](https://searchfox.org/mozilla-central/source/mozglue/baseprofiler/core/shared-libraries-win32.cc#119-129) to send the ping, we use `LOAD_LIBRARY_AS_DATAFILE | LOAD_LIBRARY_AS_IMAGE_RESOURCE` instead of just `LOAD_LIBRARY_AS_IMAGE_RESOURCE`. We thus let Windows decide between the two options: loading as a data file (RVA computations will not work), or as an image file (RVA computations will work). In fact our code is designed in a way that will only work if the module is loaded as an image file because we do RVA computations, e.g. in [GetImageDirectoryEntry](https://searchfox.org/mozilla-central/source/mozglue/misc/NativeNt.h#935).
When a module is already loaded in the main process, it is expected that Windows will choose to recycle the existing mapping and thus map it as an image file, and we will not experience a crash. However, if a module is blocked in the main process but not in child processes, Windows is likely to choose to map it as a data file since it is not already loaded as an image file. This would make our RVA computations wrong and can likely result in this crash.
|
|
1,830,304 | 16,388,778 |
**[Affected versions]:**
- Firefox Beta 113.0b8 (Build #2015946947), e80fa83ad8+, GV: 113.0-20230425192707, AS: 97.4.1
**[Affected Platforms]:**
- Android 13 - Samsung Galaxy A32.
- Android 10 - Samsung Galaxy S9
**[Prerequisites]:**
- Have latest Firefox Beta app freshly installed on the device but left unopened.
- Firefox is not set as the default browser.
- Have a link in a 3rd party app that would be opened in the default Browser.
**[Steps to reproduce]:**
1. Open the Firefox app from the prerequisites and ensure you see the New Onboarding.
2. Set Firefox as the default browser.
3. Switch to the 3rd party app and tap the link.
4. Tap the home button from the bottom left side of the screen.
5. Observe the screen.
6. Close and reopen the app.
**[Expected result]:**
- Step 5: The homepage is displayed and the web surfing is possible.
- Step 6: The new onboarding is displayed.
**[Actual result]:**
- Step 5: The **old** onboarding is displayed.
- Step 6: The new onboarding is displayed.
**[Notes]:**
- The old onboarding is also displayed if you try to navigate to a different website or try to open a new tab at step 4.
- If the app is closed and reoped, the new onboarding is displayed again.
- Attaching a screen recording of the issue [here](https://drive.google.com/file/d/1prw05AnqE45gtmHCwFVDneiS78VD3CWK/view?usp=share_link).
|
|
1,830,945 | 16,394,263 |
10 crashes from 10 different installations of Firefox 114.0a1 on Windows, 9 of them build ID 20230427095144 or newer. The other one is 20230414090930
Crash report: https://crash-stats.mozilla.org/report/index/2bd488fe-8a5f-425b-8500-3f3c20230502
MOZ_CRASH Reason: ```[Parent 21612, Main Thread] ###!!! ABORT: file /builds/worker/checkouts/gecko/dom/media/systemservices/CamerasParent.cpp:1144```
Top 10 frames of crashing thread:
```
0 xul.dll NS_DebugBreak xpcom/base/nsDebugImpl.cpp:496
1 xul.dll nsDebugImpl::Abort xpcom/base/nsDebugImpl.cpp:129
2 xul.dll XPTC__InvokebyIndex
3 xul.dll NS_InvokeByIndex xpcom/reflect/xptcall/md/win32/xptcinvoke_x86_64.cpp:57
3 xul.dll CallMethodHelper::Invoke js/xpconnect/src/XPCWrappedNative.cpp:1627
3 xul.dll CallMethodHelper::Call js/xpconnect/src/XPCWrappedNative.cpp:1180
3 xul.dll XPCWrappedNative::CallMethod js/xpconnect/src/XPCWrappedNative.cpp:1126
4 xul.dll XPC_WN_CallMethod js/xpconnect/src/XPCWrappedNativeJSOps.cpp:965
5 xul.dll CallJSNative js/src/vm/Interpreter.cpp:486
5 xul.dll js::InternalCallOrConstruct js/src/vm/Interpreter.cpp:580
```
|
|
1,831,223 | 16,396,083 |
Created attachment 9331505
multi-print.html
Window.Print() on Android calls the Android Print Spooler to print.
This bug creates a trap where users cannot easily navigate away and can even lead to OOM.
To replicate, attach to a debugger on Android and call `window.print()` many times from the `about:debugging` content console or use the sample file.
The sample file calls `window.print()` ten times. Calling it 1000+ times by making the loop larger can lead to an out of memory condition in the print spooler and crash. (Tested using mozemulator and GeckoView Example.)
```
--------- beginning of crash
2101 2101 E AndroidRuntime: FATAL EXCEPTION: main
2101 2101 E AndroidRuntime: Process: com.android.printspooler, PID: 2101
2101 2101 E AndroidRuntime: java.lang.OutOfMemoryError: Failed to allocate a 2134020 byte allocation with 1888304 free bytes and 1844KB until OOM
2101 2101 E AndroidRuntime: at dalvik.system.VMRuntime.newNonMovableArray(Native Method)
2101 2101 E AndroidRuntime: at android.graphics.Bitmap.nativeCreate(Native Method)
...
```
A similar bug is this [one](https://bugzilla.mozilla.org/show_bug.cgi?id=1789439). A [condition](https://searchfox.org/mozilla-central/rev/e6cb503ac22402421186e7488d4250cc1c5fecab/mobile/android/chrome/geckoview/geckoview.js#137-140) to prevent continually adding static clones was added to prevent using the `beforeprint` to call for another print. However, this bug is occurring after window.print() releases the static clone, but while the dialog is still open and another window.print() call is made. A possible solution is to not [release](https://searchfox.org/mozilla-central/rev/e6cb503ac22402421186e7488d4250cc1c5fecab/mobile/android/geckoview/src/main/java/org/mozilla/geckoview/GeckoSession.java#755) the [static clone](https://searchfox.org/mozilla-central/rev/e6cb503ac22402421186e7488d4250cc1c5fecab/mobile/android/modules/geckoview/GeckoViewNavigation.sys.mjs#283) until the Android [PrintJob](https://developer.android.com/reference/android/print/PrintJob) resolves as [completed](https://searchfox.org/mozilla-central/rev/e6cb503ac22402421186e7488d4250cc1c5fecab/mobile/android/geckoview/src/main/java/org/mozilla/geckoview/GeckoView.java#1217) by the [PrintManager](https://developer.android.com/reference/android/print/PrintManager#print(java.lang.String,%20android.print.PrintDocumentAdapter,%20android.print.PrintAttributes)).
Users may also be trapped on Desktop (can't navigate back and previews appear until finished), but do not experience OOM as on Android.
|
|
1,831,833 | 16,401,356 |
Perfherder has detected a browsertime performance regression from push [ca8b14caf6218ea583414dc768e186af73591886](https://hg.mozilla.org/integration/autoland/pushloghtml?changeset=ca8b14caf6218ea583414dc768e186af73591886). As author of one of the patches included in that push, we need your help to address this regression.
### Regressions:
| **Ratio** | **Test** | **Platform** | **Options** | **Absolute values (old vs new)** |
|--|--|--|--|--|
| [14%](https://treeherder.mozilla.org/perfherder/graphs?timerange=1209600&series=autoland,4366735,1,13) | [bing](https://firefox-source-docs.mozilla.org/testing/perfdocs/raptor.html#bing-m) fcp | android-hw-a51-11-0-aarch64-shippable-qr | cold webrender | 376.90 -> 430.21 |
| [13%](https://treeherder.mozilla.org/perfherder/graphs?timerange=1209600&series=autoland,4366737,1,13) | [bing](https://firefox-source-docs.mozilla.org/testing/perfdocs/raptor.html#bing-m) loadtime | android-hw-a51-11-0-aarch64-shippable-qr | cold webrender | 404.71 -> 457.38 |
| [11%](https://treeherder.mozilla.org/perfherder/graphs?timerange=1209600&series=autoland,4366730,1,13) | [bing](https://firefox-source-docs.mozilla.org/testing/perfdocs/raptor.html#bing-m) FirstVisualChange | android-hw-a51-11-0-aarch64-shippable-qr | cold webrender | 487.12 -> 541.08 |
| [10%](https://treeherder.mozilla.org/perfherder/graphs?timerange=1209600&series=autoland,4366729,1,13) | [bing](https://firefox-source-docs.mozilla.org/testing/perfdocs/raptor.html#bing-m) ContentfulSpeedIndex | android-hw-a51-11-0-aarch64-shippable-qr | cold webrender | [760.08](https://firefox-ci-tc.services.mozilla.com/api/queue/v1/task/GP5rirGRSIOcIgO_oo7y5Q/runs/0/artifacts/public/test_info/browsertime-results.tgz) -> [837.92](https://firefox-ci-tc.services.mozilla.com/api/queue/v1/task/dhv3TKRyTxqFlgXQKlY6sA/runs/0/artifacts/public/test_info/browsertime-results.tgz) |
| [7%](https://treeherder.mozilla.org/perfherder/graphs?timerange=1209600&series=autoland,4366729,1,13) | [bing](https://firefox-source-docs.mozilla.org/testing/perfdocs/raptor.html#bing-m) ContentfulSpeedIndex | android-hw-a51-11-0-aarch64-shippable-qr | cold webrender | 780.38 -> 834.92 |
Details of the alert can be found in the [alert summary](https://treeherder.mozilla.org/perfherder/alerts?id=38295), including links to graphs and comparisons for each of the affected tests. Please follow our [guide to handling regression bugs](https://wiki.mozilla.org/TestEngineering/Performance/Handling_regression_bugs) and **let us know your plans within 3 business days, or the offending patch(es) may be backed out** in accordance with our [regression policy](https://www.mozilla.org/en-US/about/governance/policies/regressions/).
If you need the profiling jobs you can trigger them yourself from treeherder job view or ask a sheriff to do that for you.
For more information on performance sheriffing please see our [FAQ](https://wiki.mozilla.org/TestEngineering/Performance/FAQ).
|
|
1,832,215 | 16,404,057 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0
Steps to reproduce:
Updated to latest version, 113.0
Actual results:
Color management is broken.
Expected results:
Color management should not have been broken. This happened before with another update.
|
|
1,832,300 | 16,404,670 |
**Notes**
* Please note: if `browser.urlbar.bestMatch.enabled` is set to` false` the option is not available in about:preferences#privacy.
**Found in**
* Beta 114.0b2;
**Affected versions**
* Beta 114.0b2;
* Nightly 115.0a1;
**Tested platforms**
* macOS 12;
* Windows 10;
* Ubuntu 22;
**Affected platforms**
* macOS 12;
* Ubuntu 22;
* Windows 10;
**Unaffected platforms**
* N/A;
**Preconditions**
Have a new profile with the following prefs set:
* `browser.search.region` to` US`.
* `browser.urlbar.quicksuggest.dataCollection.enabled` to `true`
* `browser.urlbar.merino.providers` to `adm,top_picks`
* `browser.urlbar.bestMatch.enabled` to `true`
**Steps to reproduce**
1. Launch Firefox with the profile from the preconditions.
2. Navigate to `about:preferences#privacy` and uncheck the ‘Top pick’ checkbox.
3. Open a new tab and type a keyword that would trigger a Top Pick suggestion( eg. facebook, pinterest, disney, imdb)
**Expected result**
* Top Picks are NOT displayed in the address bar.
**Actual result**
* Top Picks are still displayed in the address bar.
**Regression range**
* last good: 2023-05-07
* first bad: 2023-05-08
* Pushlog: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=ef5ba1cfbad74f9394cc2cfcc939bf0c44584502&tochange=25209607dc0b253635ead03eff51fdc10a62e659
Potentially regressed by: Bug 1829081
|
|
1,823,159 | 16,331,104 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/111.0
Steps to reproduce:
After windows updates with KB5023706
Start firefox after the above windows update
Actual results:
When firefox starts it is just a blank window (not a blank web page) with just the Windows min,max,close buttons.
If I close the window is says it's not responding and sends a bug report to Microsoft
I start firefox again and now works.
If I close firefox and start again it is just a blank window again. Stop and start firefox and it works.
If I start firefox in safe mode it always starts. I then disabled all addon and restarted firefox in normal mode it starts however if I close the window and start I get the blank window
Expected results:
Firefox should start
|
|
1,823,296 | 16,331,582 |
Created attachment 9323835
A PDF as seen in Adobe Acrobat Pro showing it is untagged.
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/111.0
Steps to reproduce:
When I opened Firefox 111 it prompted me to try editing a PDF. I did so using a PDF that I had tagged (a PDF/UA-conformant accessible PDF).
1. Open a tagged PDF in Firefox;
2. Make any edit (text box, drawing);
3. Save PDF;
4. Open the newly-saved PDF in Adobe Acrobat.
Actual results:
All pre-existing tags are gone.
Expected results:
No tags should have been removed.
Possibly related (for background on PDF/UA if nothing else): https://bugzilla.mozilla.org/show_bug.cgi?id=861157
The attached image shows how a PDF that had been tagged has had all its tags removed after adding a drawing and text comment on the first page.
|
|
1,823,379 | 16,333,770 |
Created attachment 9323912
poc.js
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36
Steps to reproduce:
The vulnerability exists in the Javascript engine under the ARM64 architecture, so it needs to be reproduced in the gecko in ARM64. The configuration for building is as follows:
ac_add_options --enable-fuzzing
ac_add_options --enable-gczeal
ac_add_options --enable-project=js
ac_add_options --enable-optimize
ac_add_options --enable-debug
Commit: 8ed22fcd56968c95a73a6c82b42f732f01a4bdae
Actual results:
This is the full crash log of the debug build:
```
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==15739==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x000000000024 (pc 0x000103a5abbc bp 0x00016db0ead0 sp 0x00016db0ea70 T644387)
==15739==The signal is caused by a READ memory access.
==15739==Hint: address points to the zero page.
#0 0x103a5abbc in (anonymous namespace)::FunctionCompiler::checkOffsetAndAlignmentAndBounds(js::wasm::MemoryAccessDesc*, js::jit::MDefinition**)+0xd0 (js:arm64+0x10176ebbc) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#1 0x103a5c2d8 in (anonymous namespace)::FunctionCompiler::store(js::jit::MDefinition*, js::wasm::MemoryAccessDesc*, js::jit::MDefinition*)+0x134 (js:arm64+0x1017702d8) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#2 0x103a173e0 in EmitStore((anonymous namespace)::FunctionCompiler&, js::wasm::PackedType<js::wasm::ValTypeTraits>, JS::Scalar::Type)+0x2a0 (js:arm64+0x10172b3e0) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#3 0x1039c2700 in EmitBodyExprs((anonymous namespace)::FunctionCompiler&)+0x9cc (js:arm64+0x1016d6700) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#4 0x1039c08fc in js::wasm::IonCompileFunctions(js::wasm::ModuleEnvironment const&, js::wasm::CompilerEnvironment const&, js::LifoAlloc&, mozilla::Vector<js::wasm::FuncCompileInput, 8ul, js::SystemAllocPolicy> const&, js::wasm::CompiledCode*, mozilla::UniquePtr<char [], JS::FreePolicy>*)+0xdb4 (js:arm64+0x1016d48fc) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#5 0x10396e914 in ExecuteCompileTask(js::wasm::CompileTask*, mozilla::UniquePtr<char [], JS::FreePolicy>*)+0x19c (js:arm64+0x101682914) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#6 0x103970870 in js::wasm::ModuleGenerator::finishFuncDefs()+0x40 (js:arm64+0x101684870) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#7 0x10393d138 in bool DecodeCodeSection<js::wasm::Decoder>(js::wasm::ModuleEnvironment const&, js::wasm::Decoder&, js::wasm::ModuleGenerator&)+0x44c (js:arm64+0x101651138) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#8 0x10393cbd4 in js::wasm::CompileBuffer(js::wasm::CompileArgs const&, js::wasm::ShareableBytes const&, mozilla::UniquePtr<char [], JS::FreePolicy>*, mozilla::Vector<mozilla::UniquePtr<char [], JS::FreePolicy>, 0ul, js::SystemAllocPolicy>*, JS::OptimizedEncodingListener*)+0x300 (js:arm64+0x101650bd4) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#9 0x1039d8f60 in js::WasmModuleObject::construct(JSContext*, unsigned int, JS::Value*)+0x21c (js:arm64+0x1016ecf60) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#10 0x1023cee90 in CallJSNative(JSContext*, bool (*)(JSContext*, unsigned int, JS::Value*), js::CallReason, JS::CallArgs const&)+0x1a4 (js:arm64+0x1000e2e90) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#11 0x1023ddf00 in CallJSNativeConstructor(JSContext*, bool (*)(JSContext*, unsigned int, JS::Value*), JS::CallArgs const&)+0xa4 (js:arm64+0x1000f1f00) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#12 0x1023d0400 in InternalConstruct(JSContext*, js::AnyConstructArgs const&, js::CallReason)+0x368 (js:arm64+0x1000e4400) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#13 0x1023c5c74 in Interpret(JSContext*, js::RunState&)+0x6830 (js:arm64+0x1000d9c74) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#14 0x1023bf030 in js::RunScript(JSContext*, js::RunState&)+0x1e8 (js:arm64+0x1000d3030) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#15 0x1023d111c in js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JS::Handle<JSObject*>, js::AbstractFramePtr, JS::MutableHandle<JS::Value>)+0x288 (js:arm64+0x1000e511c) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#16 0x1023d1624 in js::Execute(JSContext*, JS::Handle<JSScript*>, JS::Handle<JSObject*>, JS::MutableHandle<JS::Value>)+0x200 (js:arm64+0x1000e5624) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#17 0x10251df58 in ExecuteScript(JSContext*, JS::Handle<JSObject*>, JS::Handle<JSScript*>, JS::MutableHandle<JS::Value>)+0x100 (js:arm64+0x100231f58) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#18 0x10251e160 in JS_ExecuteScript(JSContext*, JS::Handle<JSScript*>)+0xd8 (js:arm64+0x100232160) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#19 0x102358d30 in RunFile(JSContext*, char const*, __sFILE*, CompileUtf8, bool, bool)+0x450 (js:arm64+0x10006cd30) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#20 0x1023582ac in Process(JSContext*, char const*, bool, FileKind)+0x8a4 (js:arm64+0x10006c2ac) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#21 0x1022fc88c in Shell(JSContext*, js::cli::OptionParser*)+0x115c (js:arm64+0x10001088c) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#22 0x1022f6d48 in main+0x690 (js:arm64+0x10000ad48) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00)
#23 0x195867e4c (<unknown module>)
#24 0xda46fffffffffffc (<unknown module>)
==15739==Register values:
x[0] = 0x0000000000000001 x[1] = 0x0000000000000001 x[2] = 0x000000016db0eae0 x[3] = 0x0000000000000000
x[4] = 0x0000000105413d3c x[5] = 0x00000001039c26f4 x[6] = 0x000000010409ad00 x[7] = 0x000000016db0ea18
x[8] = 0x00000001054173e7 x[9] = 0x0000000000000001 x[10] = 0x00000001054173e7 x[11] = 0x0000000002000000
x[12] = 0xf8000000ffffffff x[13] = 0x0000000000000001 x[14] = 0x0000000000000001 x[15] = 0x000000010409b8c4
x[16] = 0x0000000103a8d188 x[17] = 0x00000000000002a1 x[18] = 0x0000000000000000 x[19] = 0x000000016db0eae0
x[20] = 0x000000016db0f020 x[21] = 0x000000016db0eb38 x[22] = 0x0000000000000000 x[23] = 0x0000000002000000
x[24] = 0xaaaaaaaaaaaa0039 x[25] = 0x0000000000000039 x[26] = 0x000000016db0f954 x[27] = 0xaaaaaaaaaaaaaaaa
x[28] = 0x0000000105413d3c fp = 0x000000016db0ead0 lr = 0x0000000103a5ab78 sp = 0x000000016db0ea70
UndefinedBehaviorSanitizer can not provide additional info.
SUMMARY: UndefinedBehaviorSanitizer: SEGV (js:arm64+0x10176ebbc) (BuildId: 4c4c44b255553144a1deaf01cdd3b98d32000000200000000100000000000b00) in (anonymous namespace)::FunctionCompiler::checkOffsetAndAlignmentAndBounds(js::wasm::MemoryAccessDesc*, js::jit::MDefinition**)+0xd0
==15739==ABORTING
```
|
|
1,823,608 | 16,335,297 |
Created attachment 9324131
top pick is not dismissed
**Found in**
* Fx 112.0b4
**Affected versions**
* Fx 113.0a1
* Fx 112.0b4
**Affected platforms**
* Windows 10
* macOS
* Ubuntu 22
**Preconditions**
* browser.urlbar.resultMenu set to true
* browser.urlbar.quicksuggest.blockingEnabled set to true
* browser.urlbar.merino.endpointURL to https://merinopy.services.mozilla.com/api/v1/suggest
* browser.urlbar.merino.providers to adm,top_picks
* browser.urlbar.bestMatch.enabled to true
* browser.search.region to US
* browser.urlbar.quicksuggest.dataCollection.enabled to true
* browser.urlbar.bestMatch.blockingEnabled to true
**Steps to reproduce**
1. Launch Firefox.
2. Type 'dell' in the address bar.
3. Using the result menu, choose the dismiss option.
**Expected result**
* Top pick for dell is dismissed and not shown again.
**Actual result**
* The top pick is not dismissed.
**Regression range**
* Pushlog: https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=651dadff8b4864650922a5beaa0c458cfda0028d&tochange=11e6330ee0087beaec68da00bc61c30dbd4d16df
* Potentially regressed by: Bug 1822338 seems to be the regressor.
**Additional notes**
* Firefox suggestions dismiss does not work (sponsored or non-sponsored suggestions are not dismissed).
|
|
1,824,811 | 16,345,268 |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/112.0
Steps to reproduce:
Start Firefox 111.0.1 and Firefox 112 on MacOS, both with clean profiles
1. navigate to https://demo.yubico.com/webauthn
2. register a new temporary account with some generated credentials
3. attempt to add a YubiKey 4 key (a FIDO/U2F device that does _not_ support FIDO2)
Actual results:
On Firefox 111.x and earlier this works fine and the YubiKey 4 Series can be registered and used. Attempting to use Firefox 112 this doesn't succeed. Tested again after restarting Firefox with both `security.webauth.u2f: true` or `security.webauth.u2f: false` (just to rule that out as a cause) in about:config — neither succeeds.
The same behaviour is seen on various other websites where the YubKey has been registered as a MFA device.
Expected results:
The YubiKey 4 Series should continue to be able to function as an authenticator in Firefox 112 onwards.
|
|
1,824,998 | 16,346,383 |
Created attachment 9325458
TCP_CFR.mp4
### Steps to reproduce
1. Install and launch Firefox Nightly 113.0a1 from 03/27-28.
2. Visit a webpage.
3. Observe if the Total Cookie Protection CFR is displayed.
4. Once the CFR is displayed, tap the "Learn about Total Cookie Protection" link.
5. Observe the SUMO page opened and the URL.
### Expected behavior
In Step 3, the Total Cookie Protection CFR is displayed right after accessing a webpage the first time.
In Step 5, the https://support.mozilla.org/en-US/kb/enhanced-tracking-protection-firefox-android page is opened.
### Actual behavior
In Step 3, the Total Cookie Protection CFR is only displayed after repeatedly accessing the webpage or performing at least 2 searches.
In Step 5, a "page not found" error page is opened, with the following URL: https://support.mozilla.org/1/mobile/113.0a1/Android/en-US/enhanced-tracking-protection-firefox-android
### Device information
* Firefox version: latest Nightly 113.0a1 from 03/27 and 03/28
* Android device model: Google Pixel 6 (reproducible with other devices)
* Android OS version: Android 13
### Any additional information?
The behavior was observed while testing https://bugzilla.mozilla.org/show_bug.cgi?id=1819473 .
|
|
1,817,336 | 16,284,174 |
Crash report: https://crash-stats.mozilla.org/report/index/65b272d8-e521-4366-9cce-b71a20230215
Reason: ```SIGSEGV / SI_KERNEL```
Top 10 frames of crashing thread:
```
0 libgallium_dri.so nouveau_fence_trigger_work src/gallium/drivers/nouveau/nouveau_fence.c:53
1 libgallium_dri.so nouveau_fence_update src/gallium/drivers/nouveau/nouveau_fence.c:128
2 libgallium_dri.so nouveau_fence_wait src/gallium/drivers/nouveau/nouveau_fence.c:219
3 libgallium_dri.so st_finish src/mesa/state_tracker/st_cb_flush.c:76
4 libgallium_dri.so st_glFinish src/mesa/state_tracker/st_cb_flush.c:115
5 libgallium_dri.so _mesa_get_fallback_texture src/mesa/main/texobj.c:1070
6 libgallium_dri.so _mesa_update_texture_state src/mesa/main/texstate.c:910
7 libgallium_dri.so _mesa_update_state_locked src/mesa/main/state.c:476
8 libgallium_dri.so _mesa_update_state src/mesa/main/state.c:504
9 libgallium_dri.so _mesa_ClearBufferfv src/mesa/main/clear.c:663
```
The above crash looks like it is in canvas WebGL.
In this one, there's some CanvasRenderingContext2D stuff on the main thread:
bp-a6af659d-5054-4d66-9c3e-203f20230215
Lots of these crashes are on the jemalloc poison value. These stacks look pretty deep inside the graphics drivers so I'm not sure if we can do anything.
|
|
1,817,458 | 16,285,114 |
Google recently switched from using the legacy U2F API for registering security keys for Firefox users to using WebAuthn (Bug 1814983). It appears that their WebAuthn implementation strictly enforces CTAP2 canonical CBOR encoding and our CTAP2 implementation produces `AttestationObject`s that are not conformant. As a result, Firefox users cannot register security keys with Google Accounts when `security.webauthn.ctap2` is true.
We have a patch ready here: https://github.com/mozilla/authenticator-rs/pull/226. We'll need to vendor in a new version of authenticator-rs. We'll also need to uplift to beta as we flipped the ctap2 pref there (Bug 1816500).
|
|
1,817,604 | 16,286,219 |
Created attachment 9318587
screenshot
str on windows 10:
- let a video file play in the browser, e.g. https://rodlzdf-a.akamaihd.net/none/zdf/22/05/220506_landung_hli/3/220506_landung_hli_3360k_p36v15.mp4
- right-click the video and select "watch picture in picture"
- from now on the time slider on the main video is no longer updating and stuck at the wrong position half-way, whereas it's showing up correctly in the PiP overlay. this won't correct either once PiP mode is closed.
|
|
1,817,767 | 16,288,957 |
The following testcase crashes on mozilla-central revision 20230220-dd93eb14eeca (debug build, run with --fuzzing-safe --ion-offthread-compile=off):
function a(b) {
arguments[b]
}
c = "aaaaaaaaaaaaaaaaaa111aaaa";
d = "foo" + c;
e = "bar" + d;
f = "\u1200" + d;
f.lastIndexOf();
a(e);
Backtrace:
received signal SIGSEGV, Segmentation fault.
#0 0x0000555556f09712 in js::AtomizeString(JSContext*, JSString*) ()
#1 0x0000555556d43123 in js::GetObjectElementOperation(JSContext*, JSOp, JS::Handle<JSObject*>, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::MutableHandle<JS::Value>) ()
#2 0x0000555556d249c3 in Interpret(JSContext*, js::RunState&) ()
#3 0x0000555556d1daca in js::RunScript(JSContext*, js::RunState&) ()
#4 0x0000555556d32cee in js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JS::Handle<JSObject*>, js::AbstractFramePtr, JS::MutableHandle<JS::Value>) ()
#5 0x0000555556d33231 in js::Execute(JSContext*, JS::Handle<JSScript*>, JS::Handle<JSObject*>, JS::MutableHandle<JS::Value>) ()
#6 0x0000555556e5c1df in ExecuteScript(JSContext*, JS::Handle<JSObject*>, JS::Handle<JSScript*>, JS::MutableHandle<JS::Value>) ()
#7 0x0000555556e5c41c in JS_ExecuteScript(JSContext*, JS::Handle<JSScript*>) ()
#8 0x0000555556bf4c2d in RunFile(JSContext*, char const*, _IO_FILE*, CompileUtf8, bool, bool) ()
#9 0x0000555556bf3f67 in Process(JSContext*, char const*, bool, FileKind) ()
#10 0x0000555556b9290b in Shell(JSContext*, js::cli::OptionParser*) ()
#11 0x0000555556b8afe0 in main ()
rax 0x555555808958 93824995068248
rbx 0x3 3
rcx 0x5555582d9b98 93825039965080
rdx 0x0 0
rsi 0x7ffff6abd770 140737331844976
rdi 0x7ffff6abc540 140737331840320
rbp 0x7fffffffc120 140737488339232
rsp 0x7fffffffbd80 140737488338304
r8 0x7ffff6abd770 140737331844976
r9 0x7ffff7fe3840 140737354020928
r10 0x0 0
r11 0x0 0
r12 0x3 3
r13 0x1f 31
r14 0x2aac41400638 46919317456440
r15 0x7ffff572f100 140737311338752
rip 0x555556f09712 <js::AtomizeString(JSContext*, JSString*)+1938>
=> 0x555556f09712 <_ZN2js13AtomizeStringEP9JSContextP8JSString+1938>: movl $0x75d,0x0
0x555556f0971d <_ZN2js13AtomizeStringEP9JSContextP8JSString+1949>: callq 0x555556c1ef34 <abort>
Marking s-s as this assertion is known to be security-sensitive in some contexts.
|
|
1,818,233 | 16,294,425 |
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/112.0
Steps to reproduce:
1. Select a tab so the close button is visible.
2. Hover over the tab.
Actual results:
The size of the close button changes when the pointer is over the tab.
Expected results:
This is a regression from Bug 1710910.
|
|
1,818,357 | 16,295,008 |
Found while fuzzing m-c 20230215-7b385abd39b4 (--enable-address-sanitizer --enable-fuzzing)
A reduced/reliable test case is not available. I will create a Pernosco session and attach the link shortly.
```
==325993==ERROR: AddressSanitizer: heap-use-after-free on address 0x6210018ca500 at pc 0x7f307886f935 bp 0x7f2fc2f777f0 sp 0x7f2fc2f777e8
READ of size 16 at 0x6210018ca500 thread T46 (StreamTrans #4)
#0 0x7f307886f934 in new_<const char &> /builds/worker/workspace/obj-build/dist/include/mozilla/Vector.h:251:12
#1 0x7f307886f934 in copyConstruct<char> /builds/worker/workspace/obj-build/dist/include/mozilla/Vector.h:284:7
#2 0x7f307886f934 in internalAppend<char> /builds/worker/workspace/obj-build/dist/include/mozilla/Vector.h:1441:3
#3 0x7f307886f934 in append<char> /builds/worker/workspace/obj-build/dist/include/mozilla/Vector.h:1431:3
#4 0x7f307886f934 in append<char> /builds/worker/workspace/obj-build/dist/include/mozilla/Vector.h:1514:10
#5 0x7f307886f934 in mozilla::net::nsStreamLoader::WriteSegmentFun(nsIInputStream*, void*, char const*, unsigned int, unsigned int, unsigned int*) /builds/worker/checkouts/gecko/netwerk/base/nsStreamLoader.cpp:112:20
#6 0x7f30787678cd in nsBufferedInputStream::ReadSegments(nsresult (*)(nsIInputStream*, void*, char const*, unsigned int, unsigned int, unsigned int*), void*, unsigned int, unsigned int*) /builds/worker/checkouts/gecko/netwerk/base/nsBufferedStreams.cpp:439:12
#7 0x7f307e446056 in mozilla::RemoteLazyInputStream::ReadSegments(nsresult (*)(nsIInputStream*, void*, char const*, unsigned int, unsigned int, unsigned int*), void*, unsigned int, unsigned int*) /builds/worker/checkouts/gecko/dom/file/ipc/RemoteLazyInputStream.cpp:414:25
#8 0x7f307886fa64 in mozilla::net::nsStreamLoader::OnDataAvailable(nsIRequest*, nsIInputStream*, unsigned long, unsigned int) /builds/worker/checkouts/gecko/netwerk/base/nsStreamLoader.cpp:125:24
#9 0x7f307879d3ca in nsInputStreamPump::OnStateTransfer() /builds/worker/checkouts/gecko/netwerk/base/nsInputStreamPump.cpp:584:22
#10 0x7f307879c15e in nsInputStreamPump::OnInputStreamReady(nsIAsyncInputStream*) /builds/worker/checkouts/gecko/netwerk/base/nsInputStreamPump.cpp:411:21
#11 0x7f307e4648da in mozilla::(anonymous namespace)::InputStreamCallbackRunnable::Run() /builds/worker/checkouts/gecko/dom/file/ipc/RemoteLazyInputStream.cpp:58:16
#12 0x7f307841f9cb in nsThreadPool::Run() /builds/worker/checkouts/gecko/xpcom/threads/nsThreadPool.cpp:343:14
#13 0x7f30784120d4 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:1219:16
#14 0x7f307841bd84 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:477:10
#15 0x7f3079c23374 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/checkouts/gecko/ipc/glue/MessagePump.cpp:300:20
#16 0x7f3079aa0c97 in RunInternal /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:381:10
#17 0x7f3079aa0c97 in RunHandler /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:374:3
#18 0x7f3079aa0c97 in MessageLoop::Run() /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:356:3
#19 0x7f3078409a25 in nsThread::ThreadFunc(void*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:384:10
#20 0x7f309a9db628 in _pt_root /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:201:5
#21 0x7f309b61a608 in start_thread /build/glibc-SzIz7B/glibc-2.31/nptl/pthread_create.c:477:8
#22 0x7f309b1c5132 in __clone /build/glibc-SzIz7B/glibc-2.31/misc/../sysdeps/unix/sysv/linux/x86_64/clone.S:95
0x6210018ca500 is located 0 bytes inside of 4096-byte region [0x6210018ca500,0x6210018cb500)
freed by thread T45 (StreamTrans #3) here:
#0 0x55d2f99499d2 in free /builds/worker/fetches/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:52:3
#1 0x7f3078763cd9 in operator delete[] /builds/worker/workspace/obj-build/dist/include/mozilla/cxxalloc.h:60:10
#2 0x7f3078763cd9 in nsBufferedStream::Close() /builds/worker/checkouts/gecko/netwerk/base/nsBufferedStreams.cpp:82:5
#3 0x7f3078769232 in Close /builds/worker/checkouts/gecko/netwerk/base/nsBufferedStreams.cpp:377:21
#4 0x7f3078769232 in CloseWithStatus /builds/worker/checkouts/gecko/netwerk/base/nsBufferedStreams.cpp:648:67
#5 0x7f3078769232 in non-virtual thunk to nsBufferedInputStream::CloseWithStatus(nsresult) /builds/worker/checkouts/gecko/netwerk/base/nsBufferedStreams.cpp
#6 0x7f307e443a9c in mozilla::RemoteLazyInputStream::Close() /builds/worker/checkouts/gecko/dom/file/ipc/RemoteLazyInputStream.cpp:494:23
#7 0x7f307e4487ef in mozilla::RemoteLazyInputStream::CloseWithStatus(nsresult) /builds/worker/checkouts/gecko/dom/file/ipc/RemoteLazyInputStream.cpp:665:67
#8 0x7f30787dc6d1 in operator() /builds/worker/checkouts/gecko/netwerk/base/nsInputStreamPump.cpp:215:33
#9 0x7f30787dc6d1 in mozilla::detail::RunnableFunction<nsInputStreamPump::Cancel(nsresult)::$_4>::Run() /builds/worker/workspace/obj-build/dist/include/nsThreadUtils.h:546:5
#10 0x7f307841f9cb in nsThreadPool::Run() /builds/worker/checkouts/gecko/xpcom/threads/nsThreadPool.cpp:343:14
#11 0x7f30784120d4 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:1219:16
#12 0x7f307841bd84 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:477:10
#13 0x7f3079c23374 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/checkouts/gecko/ipc/glue/MessagePump.cpp:300:20
#14 0x7f3079aa0c97 in RunInternal /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:381:10
#15 0x7f3079aa0c97 in RunHandler /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:374:3
#16 0x7f3079aa0c97 in MessageLoop::Run() /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:356:3
#17 0x7f3078409a25 in nsThread::ThreadFunc(void*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:384:10
#18 0x7f309a9db628 in _pt_root /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:201:5
#19 0x7f309b61a608 in start_thread /build/glibc-SzIz7B/glibc-2.31/nptl/pthread_create.c:477:8
previously allocated by thread T53 (RemoteLzyStream) here:
#0 0x55d2f9949c7e in malloc /builds/worker/fetches/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:69:3
#1 0x7f30787641d5 in operator new[] /builds/worker/workspace/obj-build/dist/include/mozilla/cxxalloc.h:47:10
#2 0x7f30787641d5 in nsBufferedStream::Init(nsISupports*, unsigned int) /builds/worker/checkouts/gecko/netwerk/base/nsBufferedStreams.cpp:71:13
#3 0x7f30787665f7 in nsBufferedInputStream::Init(nsIInputStream*, unsigned int) /builds/worker/checkouts/gecko/netwerk/base/nsBufferedStreams.cpp:321:35
#4 0x7f307879e633 in NS_NewBufferedInputStream(nsIInputStream**, already_AddRefed<nsIInputStream>, unsigned int) /builds/worker/checkouts/gecko/netwerk/base/nsNetUtil.cpp:1354:14
#5 0x7f307e4449fe in mozilla::RemoteLazyInputStream::EnsureAsyncRemoteStream() /builds/worker/checkouts/gecko/dom/file/ipc/RemoteLazyInputStream.cpp:1056:19
#6 0x7f307e4686b3 in operator() /builds/worker/checkouts/gecko/dom/file/ipc/RemoteLazyInputStream.cpp:824:23
#7 0x7f307e4686b3 in std::_Function_handler<void (mozilla::Maybe<mozilla::ipc::IPCStream>&&), mozilla::RemoteLazyInputStream::StreamNeeded()::$_2::operator()() const::'lambda'(mozilla::Maybe<mozilla::ipc::IPCStream> const&)>::_M_invoke(std::_Any_data const&, mozilla::Maybe<mozilla::ipc::IPCStream>&&) /builds/worker/fetches/sysroot-x86_64-linux-gnu/usr/lib/gcc/x86_64-linux-gnu/7.5.0/../../../../include/c++/7.5.0/bits/std_function.h:316:2
#8 0x7f307e462798 in mozilla::PRemoteLazyInputStreamChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/obj-build/ipc/ipdl/PRemoteLazyInputStreamChild.cpp:263:27
#9 0x7f3079c1a129 in mozilla::ipc::MessageChannel::DispatchAsyncMessage(mozilla::ipc::ActorLifecycleProxy*, IPC::Message const&) /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1800:25
#10 0x7f3079c1713d in mozilla::ipc::MessageChannel::DispatchMessage(mozilla::ipc::ActorLifecycleProxy*, mozilla::UniquePtr<IPC::Message, mozilla::DefaultDelete<IPC::Message>>) /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1725:9
#11 0x7f3079c17d0e in mozilla::ipc::MessageChannel::RunMessage(mozilla::ipc::ActorLifecycleProxy*, mozilla::ipc::MessageChannel::MessageTask&) /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1525:3
#12 0x7f3079c18f3e in mozilla::ipc::MessageChannel::MessageTask::Run() /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1623:14
#13 0x7f30784120d4 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:1219:16
#14 0x7f307841bd84 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:477:10
#15 0x7f3079c235c0 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/checkouts/gecko/ipc/glue/MessagePump.cpp:330:5
#16 0x7f3079aa0c97 in RunInternal /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:381:10
#17 0x7f3079aa0c97 in RunHandler /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:374:3
#18 0x7f3079aa0c97 in MessageLoop::Run() /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:356:3
#19 0x7f3078409a25 in nsThread::ThreadFunc(void*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:384:10
#20 0x7f309a9db628 in _pt_root /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:201:5
#21 0x7f309b61a608 in start_thread /build/glibc-SzIz7B/glibc-2.31/nptl/pthread_create.c:477:8
Thread T46 (StreamTrans #4) created by T6 (Backgro~Pool #1) here:
#0 0x55d2f9932b6c in pthread_create /builds/worker/fetches/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp:208:3
#1 0x7f309a9cb6f9 in _PR_CreateThread /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:458:14
#2 0x7f309a9bcb6e in PR_CreateThread /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:533:12
#3 0x7f307840cecb in nsThread::Init(nsTSubstring<char> const&) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:619:18
#4 0x7f3078419ad0 in nsThreadManager::NewNamedThread(nsTSubstring<char> const&, nsIThreadManager::ThreadCreationOptions, nsIThread**) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadManager.cpp:548:12
#5 0x7f307842641c in NS_NewNamedThread(nsTSubstring<char> const&, nsIThread**, already_AddRefed<nsIRunnable>, nsIThreadManager::ThreadCreationOptions) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:173:57
#6 0x7f307841e1c3 in NS_NewNamedThread /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:165:10
#7 0x7f307841e1c3 in nsThreadPool::PutEvent(already_AddRefed<nsIRunnable>, unsigned int) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadPool.cpp:126:17
#8 0x7f3078420acd in nsThreadPool::Dispatch(already_AddRefed<nsIRunnable>, unsigned int) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadPool.cpp:395:5
#9 0x7f30788718ed in mozilla::net::nsStreamTransportService::Dispatch(already_AddRefed<nsIRunnable>, unsigned int) /builds/worker/checkouts/gecko/netwerk/base/nsStreamTransportService.cpp:293:16
#10 0x7f307836137f in Dispatch /builds/worker/workspace/obj-build/dist/include/nsIEventTarget.h:38:14
#11 0x7f307836137f in nsAStreamCopier::PostContinuationEvent_Locked() /builds/worker/checkouts/gecko/xpcom/io/nsStreamUtils.cpp:463:21
#12 0x7f307835c291 in PostContinuationEvent /builds/worker/checkouts/gecko/xpcom/io/nsStreamUtils.cpp:455:12
#13 0x7f307835c291 in OnOutputStreamReady /builds/worker/checkouts/gecko/xpcom/io/nsStreamUtils.cpp:425:5
#14 0x7f307835c291 in non-virtual thunk to nsAStreamCopier::OnOutputStreamReady(nsIAsyncOutputStream*) /builds/worker/checkouts/gecko/xpcom/io/nsStreamUtils.cpp
#15 0x7f3079be4a75 in operator() /builds/worker/checkouts/gecko/ipc/glue/DataPipe.cpp:579:35
#16 0x7f3079be4a75 in already_AddRefed<mozilla::CancelableRunnable> NS_NewCancelableRunnableFunction<mozilla::ipc::DataPipeSender::AsyncWait(nsIOutputStreamCallback*, unsigned int, unsigned int, nsIEventTarget*)::$_6>(char const*, mozilla::ipc::DataPipeSender::AsyncWait(nsIOutputStreamCallback*, unsigned int, unsigned int, nsIEventTarget*)::$_6&&)::FuncCancelableRunnable::Run() /builds/worker/workspace/obj-build/dist/include/nsThreadUtils.h:665:9
#17 0x7f307841f9cb in nsThreadPool::Run() /builds/worker/checkouts/gecko/xpcom/threads/nsThreadPool.cpp:343:14
#18 0x7f30784120d4 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:1219:16
#19 0x7f307841bd84 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:477:10
#20 0x7f3079c23374 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/checkouts/gecko/ipc/glue/MessagePump.cpp:300:20
#21 0x7f3079aa0c97 in RunInternal /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:381:10
#22 0x7f3079aa0c97 in RunHandler /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:374:3
#23 0x7f3079aa0c97 in MessageLoop::Run() /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:356:3
#24 0x7f3078409a25 in nsThread::ThreadFunc(void*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:384:10
#25 0x7f309a9db628 in _pt_root /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:201:5
#26 0x7f309b61a608 in start_thread /build/glibc-SzIz7B/glibc-2.31/nptl/pthread_create.c:477:8
Thread T6 (Backgro~Pool #1) created by T0 (Isolated Web Co) here:
#0 0x55d2f9932b6c in pthread_create /builds/worker/fetches/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp:208:3
#1 0x7f309a9cb6f9 in _PR_CreateThread /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:458:14
#2 0x7f309a9bcb6e in PR_CreateThread /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:533:12
#3 0x7f307840cecb in nsThread::Init(nsTSubstring<char> const&) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:619:18
#4 0x7f3078419ad0 in nsThreadManager::NewNamedThread(nsTSubstring<char> const&, nsIThreadManager::ThreadCreationOptions, nsIThread**) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadManager.cpp:548:12
#5 0x7f307842641c in NS_NewNamedThread(nsTSubstring<char> const&, nsIThread**, already_AddRefed<nsIRunnable>, nsIThreadManager::ThreadCreationOptions) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:173:57
#6 0x7f307841e1c3 in NS_NewNamedThread /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:165:10
#7 0x7f307841e1c3 in nsThreadPool::PutEvent(already_AddRefed<nsIRunnable>, unsigned int) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadPool.cpp:126:17
#8 0x7f3078420acd in nsThreadPool::Dispatch(already_AddRefed<nsIRunnable>, unsigned int) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadPool.cpp:395:5
#9 0x7f30783f0361 in mozilla::TaskQueue::DispatchLocked(nsCOMPtr<nsIRunnable>&, unsigned int, mozilla::AbstractThread::DispatchReason) /builds/worker/checkouts/gecko/xpcom/threads/TaskQueue.cpp:122:26
#10 0x7f30784305fe in mozilla::TaskQueue::Dispatch(already_AddRefed<nsIRunnable>, unsigned int) /builds/worker/workspace/obj-build/dist/include/mozilla/TaskQueue.h:73:14
#11 0x7f3079bd7639 in (anonymous namespace)::ChildImpl::ThreadInfoWrapper::InitStarter(mozilla::ipc::Endpoint<mozilla::ipc::PBackgroundStarterChild>&&) /builds/worker/checkouts/gecko/ipc/glue/BackgroundImpl.cpp:365:18
#12 0x7f3079b91802 in InitStarter<mozilla::dom::ContentChild> /builds/worker/checkouts/gecko/ipc/glue/BackgroundImpl.cpp:350:7
#13 0x7f3079b91802 in InitContentStarter /builds/worker/checkouts/gecko/ipc/glue/BackgroundImpl.cpp:1254:38
#14 0x7f3079b91802 in mozilla::ipc::BackgroundChild::InitContentStarter(mozilla::dom::ContentChild*) /builds/worker/checkouts/gecko/ipc/glue/BackgroundImpl.cpp:724:3
#15 0x7f30803f6d8c in mozilla::dom::ContentProcess::Init(int, char**) /builds/worker/checkouts/gecko/dom/ipc/ContentProcess.cpp:237:3
#16 0x7f308629e095 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/checkouts/gecko/toolkit/xre/nsEmbedFunctions.cpp:641:21
#17 0x55d2f9986824 in content_process_main(mozilla::Bootstrap*, int, char**) /builds/worker/checkouts/gecko/browser/app/../../ipc/contentproc/plugin-container.cpp:57:28
#18 0x55d2f9986ce7 in main /builds/worker/checkouts/gecko/browser/app/nsBrowserApp.cpp:353:18
#19 0x7f309b0ca082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
Thread T45 (StreamTrans #3) created by T6 (Backgro~Pool #1) here:
#0 0x55d2f9932b6c in pthread_create /builds/worker/fetches/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp:208:3
#1 0x7f309a9cb6f9 in _PR_CreateThread /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:458:14
#2 0x7f309a9bcb6e in PR_CreateThread /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:533:12
#3 0x7f307840cecb in nsThread::Init(nsTSubstring<char> const&) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:619:18
#4 0x7f3078419ad0 in nsThreadManager::NewNamedThread(nsTSubstring<char> const&, nsIThreadManager::ThreadCreationOptions, nsIThread**) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadManager.cpp:548:12
#5 0x7f307842641c in NS_NewNamedThread(nsTSubstring<char> const&, nsIThread**, already_AddRefed<nsIRunnable>, nsIThreadManager::ThreadCreationOptions) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:173:57
#6 0x7f307841e1c3 in NS_NewNamedThread /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:165:10
#7 0x7f307841e1c3 in nsThreadPool::PutEvent(already_AddRefed<nsIRunnable>, unsigned int) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadPool.cpp:126:17
#8 0x7f3078420acd in nsThreadPool::Dispatch(already_AddRefed<nsIRunnable>, unsigned int) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadPool.cpp:395:5
#9 0x7f30788718ed in mozilla::net::nsStreamTransportService::Dispatch(already_AddRefed<nsIRunnable>, unsigned int) /builds/worker/checkouts/gecko/netwerk/base/nsStreamTransportService.cpp:293:16
#10 0x7f307836137f in Dispatch /builds/worker/workspace/obj-build/dist/include/nsIEventTarget.h:38:14
#11 0x7f307836137f in nsAStreamCopier::PostContinuationEvent_Locked() /builds/worker/checkouts/gecko/xpcom/io/nsStreamUtils.cpp:463:21
#12 0x7f307835c291 in PostContinuationEvent /builds/worker/checkouts/gecko/xpcom/io/nsStreamUtils.cpp:455:12
#13 0x7f307835c291 in OnOutputStreamReady /builds/worker/checkouts/gecko/xpcom/io/nsStreamUtils.cpp:425:5
#14 0x7f307835c291 in non-virtual thunk to nsAStreamCopier::OnOutputStreamReady(nsIAsyncOutputStream*) /builds/worker/checkouts/gecko/xpcom/io/nsStreamUtils.cpp
#15 0x7f3079be4a75 in operator() /builds/worker/checkouts/gecko/ipc/glue/DataPipe.cpp:579:35
#16 0x7f3079be4a75 in already_AddRefed<mozilla::CancelableRunnable> NS_NewCancelableRunnableFunction<mozilla::ipc::DataPipeSender::AsyncWait(nsIOutputStreamCallback*, unsigned int, unsigned int, nsIEventTarget*)::$_6>(char const*, mozilla::ipc::DataPipeSender::AsyncWait(nsIOutputStreamCallback*, unsigned int, unsigned int, nsIEventTarget*)::$_6&&)::FuncCancelableRunnable::Run() /builds/worker/workspace/obj-build/dist/include/nsThreadUtils.h:665:9
#17 0x7f307841f9cb in nsThreadPool::Run() /builds/worker/checkouts/gecko/xpcom/threads/nsThreadPool.cpp:343:14
#18 0x7f30784120d4 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:1219:16
#19 0x7f307841bd84 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:477:10
#20 0x7f3079c23374 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/checkouts/gecko/ipc/glue/MessagePump.cpp:300:20
#21 0x7f3079aa0c97 in RunInternal /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:381:10
#22 0x7f3079aa0c97 in RunHandler /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:374:3
#23 0x7f3079aa0c97 in MessageLoop::Run() /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:356:3
#24 0x7f3078409a25 in nsThread::ThreadFunc(void*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:384:10
#25 0x7f309a9db628 in _pt_root /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:201:5
#26 0x7f309b61a608 in start_thread /build/glibc-SzIz7B/glibc-2.31/nptl/pthread_create.c:477:8
Thread T53 (RemoteLzyStream) created by T48 (DOM Worker) here:
#0 0x55d2f9932b6c in pthread_create /builds/worker/fetches/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp:208:3
#1 0x7f309a9cb6f9 in _PR_CreateThread /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:458:14
#2 0x7f309a9bcb6e in PR_CreateThread /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:533:12
#3 0x7f307840cecb in nsThread::Init(nsTSubstring<char> const&) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:619:18
#4 0x7f3078419ad0 in nsThreadManager::NewNamedThread(nsTSubstring<char> const&, nsIThreadManager::ThreadCreationOptions, nsIThread**) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadManager.cpp:548:12
#5 0x7f307842641c in NS_NewNamedThread(nsTSubstring<char> const&, nsIThread**, already_AddRefed<nsIRunnable>, nsIThreadManager::ThreadCreationOptions) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:173:57
#6 0x7f307e4531a5 in NS_NewNamedThread<16UL> /builds/worker/workspace/obj-build/dist/include/nsThreadUtils.h:85:10
#7 0x7f307e4531a5 in mozilla::RemoteLazyInputStreamThread::Initialize() /builds/worker/checkouts/gecko/dom/file/ipc/RemoteLazyInputStreamThread.cpp:90:17
#8 0x7f307e448694 in mozilla::RemoteLazyInputStreamThread::GetOrCreate() /builds/worker/checkouts/gecko/dom/file/ipc/RemoteLazyInputStreamThread.cpp:80:29
#9 0x7f307e4422e4 in mozilla::BindChildActor(nsID, mozilla::ipc::Endpoint<mozilla::PRemoteLazyInputStreamChild>) /builds/worker/checkouts/gecko/dom/file/ipc/RemoteLazyInputStream.cpp:160:18
#10 0x7f307e44e3fa in mozilla::RemoteLazyInputStream::IPCRead(IPC::MessageReader*) /builds/worker/checkouts/gecko/dom/file/ipc/RemoteLazyInputStream.cpp:1389:7
#11 0x7f307e44eb2e in IPC::ParamTraits<mozilla::RemoteLazyInputStream*>::Read(IPC::MessageReader*, RefPtr<mozilla::RemoteLazyInputStream>*) /builds/worker/checkouts/gecko/dom/file/ipc/RemoteLazyInputStream.cpp:1422:14
#12 0x7f307e4577c7 in Read /builds/worker/checkouts/gecko/ipc/chromium/src/chrome/common/ipc_message_utils.h:866:12
#13 0x7f307e4577c7 in ReadParam<RefPtr<mozilla::RemoteLazyInputStream> > /builds/worker/checkouts/gecko/ipc/chromium/src/chrome/common/ipc_message_utils.h:331:10
#14 0x7f307e4577c7 in IPC::ParamTraits<mozilla::RemoteLazyStream>::Read(IPC::MessageReader*) /builds/worker/workspace/obj-build/ipc/ipdl/IPCBlob.cpp:292:23
#15 0x7f307e459448 in ReadParam<mozilla::RemoteLazyStream> /builds/worker/checkouts/gecko/ipc/chromium/src/chrome/common/ipc_message_utils.h:328:12
#16 0x7f307e459448 in IPC::ParamTraits<mozilla::dom::IPCBlob>::Read(IPC::MessageReader*) /builds/worker/workspace/obj-build/ipc/ipdl/IPCBlob.cpp:498:20
#17 0x7f307e43f8dd in bool IPC::ReadParam<mozilla::dom::IPCBlob>(IPC::MessageReader*, mozilla::dom::IPCBlob*) /builds/worker/checkouts/gecko/ipc/chromium/src/chrome/common/ipc_message_utils.h:314:18
#18 0x7f30804d8787 in std::enable_if<std::is_same_v<mozilla::dom::IPCBlob*, std::remove_reference<decltype(fp0(std::add_rvalue_reference<unsigned int>::type std::declval<unsigned int>()()))>::type>, bool>::type IPC::ReadSequenceParam<IPC::ParamTraits<nsTArray<mozilla::dom::IPCBlob>>::Read(IPC::MessageReader*, nsTArray<mozilla::dom::IPCBlob>*)::'lambda'(unsigned int), mozilla::dom::IPCBlob>(IPC::MessageReader*, unsigned int&&) /builds/worker/checkouts/gecko/ipc/chromium/src/chrome/common/ipc_message_utils.h:500:12
#19 0x7f3080488f5f in Read /builds/worker/workspace/obj-build/dist/include/ipc/IPCMessageUtilsSpecializations.h:172:12
#20 0x7f3080488f5f in ReadParam<nsTArray<mozilla::dom::IPCBlob> > /builds/worker/checkouts/gecko/ipc/chromium/src/chrome/common/ipc_message_utils.h:331:10
#21 0x7f3080488f5f in IPC::ParamTraits<mozilla::dom::ClonedMessageData>::Read(IPC::MessageReader*) /builds/worker/workspace/obj-build/ipc/ipdl/DOMTypes.cpp:156:20
#22 0x7f308048bf05 in ReadParam<mozilla::dom::ClonedMessageData> /builds/worker/checkouts/gecko/ipc/chromium/src/chrome/common/ipc_message_utils.h:328:12
#23 0x7f308048bf05 in IPC::ParamTraits<mozilla::dom::MessageDataType>::Read(IPC::MessageReader*) /builds/worker/workspace/obj-build/ipc/ipdl/DOMTypes.cpp:705:23
#24 0x7f308048c773 in ReadParam<mozilla::dom::MessageDataType> /builds/worker/checkouts/gecko/ipc/chromium/src/chrome/common/ipc_message_utils.h:328:12
#25 0x7f308048c773 in IPC::ParamTraits<mozilla::dom::MessageData>::Read(IPC::MessageReader*) /builds/worker/workspace/obj-build/ipc/ipdl/DOMTypes.cpp:783:20
#26 0x7f3080a0d648 in ReadParam<mozilla::dom::MessageData> /builds/worker/checkouts/gecko/ipc/chromium/src/chrome/common/ipc_message_utils.h:314:18
#27 0x7f3080a0d648 in std::enable_if<std::is_same_v<mozilla::dom::MessageData*, std::remove_reference<decltype(fp0(std::add_rvalue_reference<unsigned int>::type std::declval<unsigned int>()()))>::type>, bool>::type IPC::ReadSequenceParam<IPC::ParamTraits<nsTArray<mozilla::dom::MessageData>>::Read(IPC::MessageReader*, nsTArray<mozilla::dom::MessageData>*)::'lambda'(unsigned int), mozilla::dom::MessageData>(IPC::MessageReader*, unsigned int&&) /builds/worker/checkouts/gecko/ipc/chromium/src/chrome/common/ipc_message_utils.h:500:12
#28 0x7f3080a04987 in Read /builds/worker/workspace/obj-build/dist/include/ipc/IPCMessageUtilsSpecializations.h:172:12
#29 0x7f3080a04987 in ReadParam<nsTArray<mozilla::dom::MessageData> > /builds/worker/checkouts/gecko/ipc/chromium/src/chrome/common/ipc_message_utils.h:331:10
#30 0x7f3080a04987 in mozilla::dom::PMessagePortChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/obj-build/ipc/ipdl/PMessagePortChild.cpp:250:28
#31 0x7f3079cc7d41 in mozilla::ipc::PBackgroundChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/obj-build/ipc/ipdl/PBackgroundChild.cpp:6306:32
#32 0x7f3079c1a129 in mozilla::ipc::MessageChannel::DispatchAsyncMessage(mozilla::ipc::ActorLifecycleProxy*, IPC::Message const&) /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1800:25
#33 0x7f3079c1713d in mozilla::ipc::MessageChannel::DispatchMessage(mozilla::ipc::ActorLifecycleProxy*, mozilla::UniquePtr<IPC::Message, mozilla::DefaultDelete<IPC::Message>>) /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1725:9
#34 0x7f3079c17d0e in mozilla::ipc::MessageChannel::RunMessage(mozilla::ipc::ActorLifecycleProxy*, mozilla::ipc::MessageChannel::MessageTask&) /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1525:3
#35 0x7f3079c18f3e in mozilla::ipc::MessageChannel::MessageTask::Run() /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1623:14
#36 0x7f30784120d4 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:1219:16
#37 0x7f307841bd84 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:477:10
#38 0x7f308091ebdc in mozilla::dom::WorkerPrivate::DoRunLoop(JSContext*) /builds/worker/checkouts/gecko/dom/workers/WorkerPrivate.cpp:3275:7
#39 0x7f30808f5422 in mozilla::dom::workerinternals::(anonymous namespace)::WorkerThreadPrimaryRunnable::Run() /builds/worker/checkouts/gecko/dom/workers/RuntimeService.cpp:2044:42
#40 0x7f30784120d4 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:1219:16
#41 0x7f307841bd84 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:477:10
#42 0x7f3079c23374 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/checkouts/gecko/ipc/glue/MessagePump.cpp:300:20
#43 0x7f3079aa0c97 in RunInternal /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:381:10
#44 0x7f3079aa0c97 in RunHandler /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:374:3
#45 0x7f3079aa0c97 in MessageLoop::Run() /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:356:3
#46 0x7f3078409a25 in nsThread::ThreadFunc(void*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:384:10
#47 0x7f309a9db628 in _pt_root /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:201:5
#48 0x7f309b61a608 in start_thread /build/glibc-SzIz7B/glibc-2.31/nptl/pthread_create.c:477:8
Thread T48 (DOM Worker) created by T0 (Isolated Web Co) here:
#0 0x55d2f9932b6c in pthread_create /builds/worker/fetches/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp:208:3
#1 0x7f309a9cb6f9 in _PR_CreateThread /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:458:14
#2 0x7f309a9bcb6e in PR_CreateThread /builds/worker/checkouts/gecko/nsprpub/pr/src/pthreads/ptthread.c:533:12
#3 0x7f307840cecb in nsThread::Init(nsTSubstring<char> const&) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:619:18
#4 0x7f308094634a in mozilla::dom::WorkerThread::Create(mozilla::dom::WorkerThreadFriendKey const&) /builds/worker/checkouts/gecko/dom/workers/WorkerThread.cpp:102:7
#5 0x7f30808cb607 in mozilla::dom::workerinternals::RuntimeService::ScheduleWorker(mozilla::dom::WorkerPrivate&) /builds/worker/checkouts/gecko/dom/workers/RuntimeService.cpp:1325:37
#6 0x7f30808ca6f8 in mozilla::dom::workerinternals::RuntimeService::RegisterWorker(mozilla::dom::WorkerPrivate&) /builds/worker/checkouts/gecko/dom/workers/RuntimeService.cpp:1207:19
#7 0x7f3080918eae in mozilla::dom::WorkerPrivate::Constructor(JSContext*, nsTSubstring<char16_t> const&, bool, mozilla::dom::WorkerKind, mozilla::dom::RequestCredentials, mozilla::dom::WorkerType, nsTSubstring<char16_t> const&, nsTSubstring<char> const&, mozilla::dom::WorkerLoadInfo*, mozilla::ErrorResult&, nsTString<char16_t>) /builds/worker/checkouts/gecko/dom/workers/WorkerPrivate.cpp:2648:24
#8 0x7f3080959118 in mozilla::dom::RemoteWorkerChild::ExecWorkerOnMainThread(mozilla::dom::RemoteWorkerData&&) /builds/worker/checkouts/gecko/dom/workers/remoteworkers/RemoteWorkerChild.cpp:452:41
#9 0x7f308098f18a in operator() /builds/worker/checkouts/gecko/dom/workers/remoteworkers/RemoteWorkerChild.cpp:307:29
#10 0x7f308098f18a in mozilla::detail::RunnableFunction<mozilla::dom::RemoteWorkerChild::ExecWorker(mozilla::dom::RemoteWorkerData const&)::$_3>::Run() /builds/worker/workspace/obj-build/dist/include/nsThreadUtils.h:546:5
#11 0x7f30783d286f in mozilla::SchedulerGroup::Runnable::Run() /builds/worker/checkouts/gecko/xpcom/threads/SchedulerGroup.cpp:114:20
#12 0x7f30783e6ae9 in mozilla::RunnableTask::Run() /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:541:16
#13 0x7f30783dce7c in mozilla::TaskController::DoExecuteNextTaskOnlyMainThreadInternal(mozilla::detail::BaseAutoLock<mozilla::Mutex&> const&) /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:855:26
#14 0x7f30783da0f8 in mozilla::TaskController::ExecuteNextTaskOnlyMainThreadInternal(mozilla::detail::BaseAutoLock<mozilla::Mutex&> const&) /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:686:15
#15 0x7f30783da820 in mozilla::TaskController::ProcessPendingMTTask(bool) /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:464:36
#16 0x7f30783ecfc1 in operator() /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:188:37
#17 0x7f30783ecfc1 in mozilla::detail::RunnableFunction<mozilla::TaskController::InitializeInternal()::$_2>::Run() /builds/worker/workspace/obj-build/dist/include/nsThreadUtils.h:546:5
#18 0x7f307841180e in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:1225:16
#19 0x7f307841bd84 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:477:10
#20 0x7f3079c21d2e in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/checkouts/gecko/ipc/glue/MessagePump.cpp:85:21
#21 0x7f3079aa0c97 in RunInternal /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:381:10
#22 0x7f3079aa0c97 in RunHandler /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:374:3
#23 0x7f3079aa0c97 in MessageLoop::Run() /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:356:3
#24 0x7f3081276ca9 in nsBaseAppShell::Run() /builds/worker/checkouts/gecko/widget/nsBaseAppShell.cpp:148:27
#25 0x7f308629e928 in XRE_RunAppShell() /builds/worker/checkouts/gecko/toolkit/xre/nsEmbedFunctions.cpp:742:20
#26 0x7f3079aa0c97 in RunInternal /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:381:10
#27 0x7f3079aa0c97 in RunHandler /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:374:3
#28 0x7f3079aa0c97 in MessageLoop::Run() /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:356:3
#29 0x7f308629e0bf in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/checkouts/gecko/toolkit/xre/nsEmbedFunctions.cpp:675:34
#30 0x55d2f9986824 in content_process_main(mozilla::Bootstrap*, int, char**) /builds/worker/checkouts/gecko/browser/app/../../ipc/contentproc/plugin-container.cpp:57:28
#31 0x55d2f9986ce7 in main /builds/worker/checkouts/gecko/browser/app/nsBrowserApp.cpp:353:18
#32 0x7f309b0ca082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
```
|
|
1,818,616 | 16,296,846 |
[Tracking Requested - why for this release]:
434 crashes from 418 installations of Firefox 110.0 or 110 late beta beta versions: 110.0b7+, but only single digit number of crashes for b7 and b8; b9 and rc1 have more because they ship over a longer timeframe. There have been no reports for v111 betas.
Only Windows 10 and 11 are reported, 7 and 8.1 are absent.
Regression from bug 1808667?
Crash report: https://crash-stats.mozilla.org/report/index/d81277ea-dca2-4dc7-9223-651b00230223
Reason: ```EXCEPTION_ACCESS_VIOLATION_READ```
Top 10 frames of crashing thread:
```
0 msvcrt.dll memcpy
1 Magnification.dll CMilMagnifier::FilterTextureD3D9
2 Magnification.dll CMilMagnifier::UpdateContentSurfaces
3 Magnification.dll CMilMagnifier::ProcessGdiDesktopBits
4 Magnification.dll CMilMagnifier::SetSource
5 Magnification.dll Magnifier_WndProc
6 user32.dll UserCallWinProcCheckWow
7 user32.dll SendMessageWorker
8 user32.dll SendMessageW
9 Magnification.dll MagSetWindowSource
```
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.