Bug ID
int64 961
1.91M
| Comment ID
int64 3.98k
17.1M
| Author
stringlengths 8
48
| Comment Text
stringlengths 1
64.3k
⌀ |
---|---|---|---|
1,515,026 | 13,820,507 |
Created attachment 9032119
rec of the issue.gif
[Affected versions]:
- Firefox 65.0b4 and above
[Affected Platforms]:
- All Windows
- All Linux
- All Mac
[Prerequisites]:
- Have the latest Firefox Nightly build installed.
- Have the "Browser Console" opened.
- Have a Firefox profile with the following prefs in the "about:config" page:
- "browser.newtabpage.activity-stream.asrouterExperimentEnabled" with "true" value;
- "browser.ping-centre.log" set to "true".
[Steps to reproduce]:
1. Open the browser with the profile from prerequisites.
2. Navigate to "about:config#asrouter" page.
3. Scroll down to the "NEWSLETTER_TEST_1" section and click the "Show" button.
4. Focus the "Browser Console" and clear all the output from it.
5. Go back to the "AS Router" page and click the snippet's "Continue" button.
6. Focus the "Browser Console" and observe the displayed pings.
[Expected result]:
- A specific ping is displayed in the "Browser Console".
[Actual result]:
- No pings are displayed.
[Additional Notes]:
- This issue is also reproducible with the "FXA_SNIPPET_TEST_1" and the "SNIPPETS_SEND_TO_DEVICE_TEST" snippets.
- According to the "QA plan for ASR Snippets" doc (https://goo.gl/KCLbkM), a specific ping should be displayed in the "Browser Console".
- Attached a screen recording of the issue.
|
|
1,515,030 | 13,820,551 |
Created attachment 9032122
Screen Shot 2018-12-18 at 2.23.03 PM.png
Build: 15.0(13375)
Device: iPhone 7
iOS: 12.1
Steps to reproduce:
1. Clean install Firefox
2. Log in to FxA
Actual results:
- Top Sites are incorrectly displayed.
|
|
1,515,088 | 13,820,946 |
From Bug 1481518 comment 17.
The problem here appears to be that it does some part of the DLL loading on a new thread.
The chromium sandbox sets an impersonation token on the main thread of the child process with more rights, so that it can do general start-up things like load DLLs. This is reverted early in the process when we call TargetServicesBase::LowerToken.
I can see the child process spinning up a new thread and calling NtQueryAttributesFile on mozglue.dll, which fails because that thread has the more restricted token.
The brokering won't work either because we haven't called TargetServicesBase::Init and it's possibly too early in the process start-up anyway.
|
|
1,515,129 | 13,821,336 |
Created attachment 9032215
Screenshot of message telling me to get Chrome.
User Agent: Mozilla/5.0 (X11; Fedora; Linux x86_64) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Safari/605.1.15 Epiphany/605.1.15
Steps to reproduce:
Load your Facebook wall.
Select "Live Video".
Instead of working, Facebook pops up a message that says that Live Video now requires the latest version of Google Chrome, and it refuses to let you use it in Firefox.
Actual results:
Firefox is blocked from using Live Video.
Expected results:
Live Video should have opened my webcam and allowed me to go live after granting permissions.
In fact, Live Video does work in Firefox. When I overrode my user agent for Facebook websites with an extension and told it I was using Chrome 71 on Linux, Live Video popped up and worked fine.
|
|
1,515,153 | 13,821,472 |
Based on bug 1511104 comment 10, it is unlikely we can get utm params passed through our web properties, but we could strip the "utm" part of the param name and make it work that way. However, the attribution code needs to accept either to make that work.
|
|
1,515,379 | 13,823,386 |
This is causing us to report a wildly high. This field used to be a type that had a default initializer.
|
|
1,446,762 | 13,136,377 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0
Build ID: 20180317220121
Steps to reproduce:
Once opened Nightly window on 1080p monitor, and moved into 1440p monitor, Skin doesn't adjust, and just have this greenish spot.
https://i.imgur.com/vovfekq.png
Actual results:
https://i.imgur.com/vovfekq.png
Expected results:
Adjust skin width correctly.
did not have this problem with Firefox quantum.
|
|
1,446,913 | 13,138,999 |
On Google Chrome and Firefox 59, middle-click on a link opens a tab next to the current tab and notifies only a "tabs.onCreated" event with correct "index". On the other hand, Firefox 60 beta and Nightly 61 notify "tabs.onCreated" with wrong "index" and extra "tabs.onMoved" event is also notified.
Steps to reproduce:
1. Start Firefox.
2. Go to "about:config" and set "browser.tabs.insertRelatedAfterCurrent"
to "true".
3. Install any addon which has "tabs" permission.
Assume that you install Tab Center Redux:
https://addons.mozilla.org/ja/firefox/addon/tab-center-redux/.
4. Open remote debugger for the addon.
5. Choose "Console" tab and run following script:
------------
chrome.tabs.onCreated.addListener(tab=>
console.log(`tabs.onCreated, index=${tab.index}`));
chrome.tabs.onMoved.addListener((id, info)=>
console.log(`tabs.onMoved, from ${info.fromIndex} to ${info.toIndex}`));
------------
6. Prepare two tabs A(index=0) and B(index=1) with something webpage.
Assume that you open "https://www.mozilla.org/en-US/firefox/".
7. Select the tab A and middle-click on any link in the page.
Assume that you click the link "Get Involved".
Actual result:
The console says:
> tabs.onCreated, index=2
> tabs.onMoved, from 2 to 1
Expected result:
The console says:
> tabs.onCreated, index=1
|
|
1,446,948 | 13,139,300 |
[Affected versions]:
- Firefox 61.0a1 (20180318220108)
- Firefox 60.0b4 (20180315232954)
[Affected platforms]:
- Win 7 64-bit
- Mac OS X 10.13.2
[Steps to reproduce]:
1.Set extensions.langpacks.signatures.required to false.
2.Install some unsigned langpacks.
3.Observe “Languages” from about:addons.
[Expected results]:
- The langpacks are displayed.
[Actual results]:
- The langpacks are not displayed but you can see in the extensions folder from the profile, that they are installed.
|
|
1,446,963 | 13,139,416 |
Created attachment 8960145
Screen Shot 2018-03-19 at 15.30.35.png
Build: 11.0 (9713)
Device: iPad Air 2
iOS: 11.2.5
Steps to reproduce:
1. Open a new tab
2. Go to google.com
3. Tap on the "Back" button to go to homepage
Actual results:
- Google.com title and favicon are displayed.
|
|
1,447,052 | 13,140,112 |
Created attachment 8960235
Flashing.mov
Nightly 61.0a1 (2018-03-19) (64-Bit)
macOS 10.12.6
1.) Use a the official Dark Theme or a darker Theme
2.) Create a new Window via CMD-N
Actual: The whole Toolbar+Tabstrip flickers white
Expected: No flicker.
This is a regression: Works fine with Firefox Stable.
|
|
1,447,056 | 13,140,124 |
Created attachment 8960238
Preferences.png
I was trying to view the internal meeting today and it wouldn't work. I suspected that maybe this was related to bad cookie, so in nightly I went into the cookie manager, attempt to delete the air.mozilla.org cookie, and then upon saving that change, I got into a weird unrecoverable state.
Symptoms:
1.) UI prompt with no ability to accept the change
2.) Cannot close the existing tab
3.) Cannot draw focus of any other other tab
To fix the issue, I needed to quite nightly and restart it.
|
|
1,447,080 | 13,140,383 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
Steps to reproduce:
Download and run these files:
Known malware: https://demo.smartscreen.msft.net/download/known/knownmalicious.exe
Unknown program: https://demo.smartscreen.msft.net/download/unknown/freevideo.exe
Offline: Any of the above with internet on the machine off
More details about the issue:
In the next Windows Release (Redstone 4), Windows Defender SmartScreen will honor the SEE_MASK_FLAG_NO_UI flag. This flag is passed through shellexecute when a user runs an executable, or other supported file, through the firefox download manager. Edge/Windows Explorer do not pass this flag and are unaffected.
There are three problematic scenarios
1. Known malware - Blocked silently: We will not show any SmartScreen UI for these types of files, but the user will have no opportunity to override the block through firefox. The user will not have any indication that executing the file did anything.
2. Unknowns - The file is unknown to our service. This is a large number of files and all will be allowed. There is a chance for polymorphic malware to be bucketed here.
3. Offline - User is unable to contact smartscreen. Always allowed.
When SEE_MASK_FLAG_NO_UI is not set, all 3 cases will result in a block experience for the user.
Actual results:
Files are not run. They are silently blocked
Expected results:
Files are not run. They are blocked by SmartScreen.
|
|
1,447,193 | 13,141,538 |
Created attachment 8960415
table.html
Build ID : 20180319100039
User Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0
It happens from time to time.
When Scroll down or up, the new visible area would not be drawn.
Mouse hover over the area do NOT help.
Mouse clicking on the page will paint correctly.
Once happened the problem, it is somewhat easier to reproduce on the problematic tab.
Reproducible: It happens from time to time
Steps To Reproduce(not 100%):
1. Bookmark the following page in the folder
about:home
the attached page
the attached page
the attached page
the attached page
the attached page
the attached page
2. Restart browser and maximize
3. Middle click on the folder
Now, you can see
[tab1] about:home
[tab2] about:home
[tab3] the attached page
[tab4] the attached page
[tab5] the attached page
[tab6] the attached page
[tab7] the attached page
[tab8] the attached page
4. For each tab, scroll up / down with mouse wheel or autoscroll
5. Close a tab and try Step4
6. Undo close and try Step4
I think it is difficult to find a regression window...
[NOTE]
* Setting layout.display-list.retain = false does NOT fix.
* Disabled HWA also does NOT fix.
|
|
1,447,226 | 13,141,743 |
Created attachment 8960455
OhNoes.png
User Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:52.0) Gecko/20100101 Firefox/52.0
Build ID: 20100101
Steps to reproduce:
This may be related to bug 1430391
STR (UI)
- In Developer (60, tested) or Nightly (not tested), go to Options>Privacy & Security>Firefox* Data Collection and Use
- There are two checkboxes (labeled 1 and 1b in the attached image). These are collect data (1) and shield studies (1b)
- In the UI, if you check or uncheck send technical data (1), it auto checks or unchecks studies (1b)
- Note: **from the UI**, you can allow data collected and disallow studies, but NOT vice versa
[1 - data] governs datareporting.healthreport.uploadEnabled
[1b - studdies] governs app.shield.optoutstudies.enabled
STR (about:config)
- in about: config set datareporting.healthreport.uploadEnabled=>false and app.shield.optoutstudies.enabled=>true
- look at the UI, it has achieved a state that contradicts itself?
Note: I do not know if this is just cosmetic or affects the sending of shield data
Actual results:
See attachment
Expected results:
When datareporting.healthreport.uploadEnabled=false then app.shield.optoutstudies.enabled needs to also be toggled to false
|
|
1,447,679 | 13,145,622 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
Build ID: 20180315233128
Steps to reproduce:
1. Open dev tool
2. Go to network monitor
3. Go to any sites
4. Select any row and details panel will be displayed
5. Click the "Raw headers" button
6. Compare the ordering of the raw and processed response headers
Actual results:
The raw headers field sorts the response headers in alphabetical order just like the processed headers. This doesn't happen in Firefox 58.
Example:
HTTP/2.0 200 OK
content-encoding: gzip
content-security-policy: frame-ancestors 'none'
content-type: text/html; charset=utf-8
date: Wed, 21 Mar 2018 14:38:16 GMT
referrer-policy: strict-origin-when-cross-origin
server: nginx
strict-transport-security: max-age=63072000; includeSubDomains
X-Firefox-Spdy: h2
Expected results:
The raw headers field preserve the original ordering of the response headers
Example:
HTTP/2.0 200 OK
server: nginx
date: Wed, 21 Mar 2018 14:37:36 GMT
content-encoding: gzip
content-type: text/html; charset=utf-8
content-security-policy: frame-ancestors 'none'
referrer-policy: strict-origin-when-cross-origin
strict-transport-security: max-age=63072000; includeSubDomains
X-Firefox-Spdy: h2
|
|
1,447,723 | 13,146,113 |
Page action command fails in an extension that uses page action pattern matching and a key command with _execute_page_action.
manifest:
"page_action": {
"default_popup": "page.html",
"show_matches": ["<all_urls>"],
"browser_style": true
},
"commands": {
"_execute_page_action": {
"suggested_key": { "default": "Alt+Shift+3" }
}
}
This is a regression starting in fx59 from bug 1437178.
|
|
1,447,752 | 13,146,309 |
Created attachment 8961057
Screen Shot 2018-03-20 at 17.16.09.png
The fill colour for the search bar should be #FFFFFF. Right now it's the same colour as the New Tab background colour (#f9f9fa) so it looks disabled.
|
|
1,447,796 | 13,146,856 |
Page action command fails to close the page action panel when run twice. With the below, the first key command should open the panel, the second should close it. The pageaction code uses its own panel, so the browserPageAction stuff cannot control this. ext-pageAction simply always assumes it needs to be opened.
manifest:
"page_action": {
"default_popup": "page.html",
"show_matches": ["<all_urls>"],
"browser_style": true
},
"commands": {
"_execute_page_action": {
"suggested_key": { "default": "Alt+Shift+3" }
}
}
I initially thought this might be a regression from bug 1395387, but it is not, and there are no tests built around this. It may have simply always been.
Patch is on top of bug 1447723.
|
|
1,447,871 | 13,147,401 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0
Build ID: 20180319175655
Steps to reproduce:
Load various youtube videos in the same tab. The more videos the worse the ram usage is and more severe the delays. May need to load around 5-15 videos before the issue is clear.
I recorded a video showing how to create the problem from scratch using new profile:
https://youtu.be/a_mzc5DDUz0
I also recorded a performance profile in that same video, here it is:
https://perfht.ml/2GNizma
Actual results:
Eventually you will notice any webpage within that tab will have intermittent moments of unresponsiveness. Actions such as hovering over the video seek bar, highlighting text, typing into text fields or trying to adjust the volume using the volume slider can be delayed for a few seconds. Scrolling the page seems smooth and unaffected. Firefox UI also does not seem affected so typing and highlighting text in the address bar is smooth. Also new tabs and windows are not affected and closing the problem tab seems to fix/reset the problem.
Expected results:
There should not have been any performance impact.
|
|
1,447,977 | 13,148,194 |
Created attachment 8961346
geckodriver.log
User Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Steps to reproduce:
Execute this sample using Selenium Java binding:
driver.get("http://todomvc.com/examples/scalajs-react/#/");
driver.executeScript("return document.getElementsByTagName('input')");
Actual results:
JavascriptException: TypeError: cyclic object value
See attached trace level log for more details.
|
|
1,447,982 | 13,148,236 |
STR
1 Go to https://jsfiddle.net/jib1/n7bmkjnf/
2 Accept the permission prompt
3 Uncheck the "echoCancellation" checkbox
Expected:
Checkbox remains unchecked
Actual:
Checkbox immediately re-checked
Looks like a regression from bug 1440040 when I replaced SetLastPrefs() with ApplySettings().
|
|
1,448,132 | 13,149,606 |
Created attachment 8961519
PermissionPromptOff.png
STRs:
1. Open browser.
2. Open https://jsfiddle.net/jib1/r60bzmrs/ in a new (second) tab.
3. Don't answer the prompt.
4. Instead, drag this tab into its own window.
Expected result:
Permission prompt remains open, hanging off the camera icon in the url bar.
Actual result:
Permission prompt remains open, but severely misplaced, to the right and down.
See attached image.
Regression range:
3:07.35 INFO: Narrowed inbound regression window from [7cc75e6d, 84ea4220] (4 builds) to [c842abb7, 84ea4220] (2 builds) (~1 steps left)
3:07.35 INFO: No more inbound revisions, bisection finished.
3:07.35 INFO: Last good revision: c842abb7cfbf39e0c1cfb9a1f3a1d6415cd10744
3:07.35 INFO: First bad revision: 84ea422093dd615bd191a3e579ed299d96c802f1
3:07.35 INFO: Pushlog:
https://hg.mozilla.org/integration/mozilla-inbound/pushloghtml?fromchange=c842abb7cfbf39e0c1cfb9a1f3a1d6415cd10744&tochange=84ea422093dd615bd191a3e579ed299d96c802f1
My guess is bug 1193394.
|
|
1,448,146 | 13,149,742 |
This is annoying.
Reproducible : always
Steps To Reproduce:
1. Disable HWA
2. Close browser
3. Launch Nightly
Actual Results:
black window without UI is opened at start up. And then switch to normal color.
Expected Results:
No black window at start up.
Regression window:
https://hg.mozilla.org/integration/mozilla-inbound/pushloghtml?fromchange=e21a2a57d05dfe3c5ff8ba71131127fa781ffdd0&tochange=f026ead5dbfce9d6530429ac568ecc5544cc9b3b
Regressed by: f026ead5dbfc Florian Quèze — Bug 1447719 - Set browser.startup.blankWindow to true on Windows and Linux, r=mconley.
And I confirmed that setting browser.startup.blankWindow = false fixed the problem
@:florian,
Your patch seems to cause the regression. Can you look into this?
|
|
1,448,200 | 13,150,357 |
If I run Firefox Nightly in a completely clean environment on one of my Fedora 27 64-bit x86 machines, go to a web page with a multi-line textarea (one where spelling checking is or would be active), hover my mouse over the textarea without clicking on it, and then right-click to bring up the context menu, the first time I do this the context menu does not come up and the browser console will report:
TypeError: realSpellChecker is null
(In the current Firefox Nightly this is reported as being from InlineSpellCheckerContent.jsm line '54:5'.)
If I right click a second time, the context menu appears. If I click in the textarea to select it before I right click to bring up the context menu, everything is fine; this includes clicking in it and starting to type text. In all cases spell checking appears to be active if I actually enter text.
My clean environment for this test is created with:
export HOME=/tmp/randombit
mkdir $HOME
cd $HOME
[run appropriate firefox version]
Now that I do more testing, this doesn't seem exclusive to Nightly. I can make it happen in the current Firefox Beta (60.0b5), and also in the current release version (Firefox 59.0.1). Some Internet searches for this specific message suggests that it was happening to some people at least as far back as last summer.
|
|
1,448,288 | 13,151,111 |
This is a follow up for bug 1311177
See also this comment:
https://bugzilla.mozilla.org/show_bug.cgi?id=1311177#c38
In Chrome, the object returned from getHAR is a HAR "log" (http://www.softwareishard.com/blog/har-12-spec/#log), so you could do something like:
function gotHar(har) {
document.querySelector("#har").textContent = `Har: ${har.version}`;
console.log(har);
}
document.querySelector("#gethar").addEventListener("click", () => {
chrome.devtools.network.getHAR(gotHar);
});
Firefox should behave the same.
Honza
|
|
1,448,374 | 13,151,803 |
Created attachment 8961823
test-extension.zip (WRONG VERSION, USE THE UPDATED VERSION)
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:59.0) Gecko/20100101 Firefox/59.0
Build ID: 20180315233128
Steps to reproduce:
It may sound strange, but I swear this is all true.
I've created a GitHub Gist for this issue here: https://gist.github.com/AlexanderOMara/6a9a5ac610078a70b49353b41b2dbda2
I've also created a video of the issue here: https://www.youtube.com/watch?v=VNKD40UspzM
----
Loading a `.javascript` file from a WebExtension's [web_accessible_resources](https://developer.mozilla.org/en-US/Add-ons/WebExtensions/manifest.json/web_accessible_resources) somehow causes problems with the macOS file associations, most notable so with TextMate 2.
Tested On:
- macOS 10.13.3 (native and in a clean VM)
- Firefox 59.0.1 (Stable)
- Firefox 60.0b5 (Developer Edition)
- Several previous Firefox versions
Reproduce Instructions:
1. Download this Gist if you have not already.
2. Install [TextMate 2 RC 8](https://github.com/textmate/textmate/releases/download/v2.0-rc.8/TextMate_2.0-rc.8.tbz) (exact version probably does not matter).
3. In Finder navigate to the Gist, select `file.js` and `file.txt`, click File > Get Info, and set all of them to open with TextMate, making sure to click "Change All" for each one.
4. Make sure TextMate is not running, then open Firefox 59.0.1 (exact version probably does not matter), ideally with a new profile.
5. Go to `about:debugging`, click "Load Temporary Add-On" and open the `manifest.json` file in this Gist.
6. Verify in Finder that TextMate is still the default editor for `.js`, and `.txt` files.
7. Go to a page that loads `google-analytics.com/analytics.js`, like [this minimal one](https://cdn.rawgit.com/AlexanderOMara/485d4a794eb861dc36745a85503edea2/raw/523fe64b31abb33fb844bd39b771dd51b7f7d3f8/index.html).
8. In Finder, select `file.js`, and `file.txt` again and click File > Get Info and see that it has changed (you can also try opening them to confirm it has changed).
9. Open TextMate.
10. Repeat step 8 to see it has actually changed back.
11. Reload the page from step 7 to see it change again.
Notes:
- You can simply refresh the page to see the issue repeat.
- You can edit `background.js` to load `war-test.js` instead of `war-test.javascript` and see the issue no longer happens.
- Other extensions do not seem to cause the problem, it seems something is special about the `.javascript` extension.
- If the `moz-extension://` URL is known and added to the DOM, it is possible to trigger the issue without a `onBeforeRequest` redirect.
- Requests to `.javascript` files outside of `web_accessible_resources` does not cause an issue.
- Current versions of uBlock Origin (1.15.12+, since [this commit](https://github.com/gorhill/uBlock/commit/17930cc778c20e11fd4c760d710e8ba619aab666)) also causes this issue.
Actual results:
When the `war-test.javascript` file is loaded, Firefox somehow changes the file associations on some files. This specifically happens on `.javascript` files, and not `.js` files or any other extension I've tried.
Expected results:
Nothing should have happened, Firefox should not have touched the users file associations.
|
|
1,448,473 | 13,152,599 |
Bug 1408121 made that the dark theme also applies to the menus in Firefox. But there is an usability regression, at least on macOS: the hover style is missing on menu items. It still works for the default theme and for the light theme.
|
|
1,448,599 | 13,153,614 |
User Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:59.0) Gecko/20100101 Firefox/59.0
Build ID: 20180316021353
Steps to reproduce:
1) Create a basic WebExtension with the following permission in "manifest.json":
"permissions": [ "webRequest", "<all_urls>" ]
and in the Javascript some basic logging on various webrequest events:
function makeLogger(label) {
return function (evt) {
console.log(label + " : " + evt.url + " - " + evt.statusCode)
}
}
browser.webRequest.onHeadersReceived.addListener(
makeLogger("Header"),
{urls: ["<all_urls>"]}
)
browser.webRequest.onResponseStarted.addListener(makeLogger("RespStart"),
{urls: ["<all_urls>"]}
)
browser.webRequest.onCompleted.addListener(makeLogger("RespCompl"),
{urls: ["<all_urls>"]}
)
2) Open a URL that performs a redirection. In my case, if I open "google.com", I get a redirection to an URL starting with https://www.google.co.jp/
Actual results:
The HTTP request for original request (ex: google.com) is logged (with code 302), but the target URL of the redirection (ex: google.co.jp) is not logged at all. The images referenced by the target of the redirection are properly logged.
Note that if the final URL is manually requested, then it is properly logged.
Expected results:
According to the documentation [1], an event should be generated at each stage of the diagram. The "onHeadersReceived" callback should be called for the 302, then again for the target page, then the "onResponseStarted" callback should be invoke, and at last the one for "onCompleted".
[1] https://developer.mozilla.org/en-US/Add-ons/WebExtensions/API/webRequest
|
|
1,448,674 | 13,154,111 |
User Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:56.0) Gecko/20100101 Firefox/56.0
Build ID: 20171024165158
Steps to reproduce:
A WebExtension contains an option page which communicates with the background script as below :
- option page script call browser.runtime.connect
- background script listen to browser.runtime.onConnect
1. Open the option page of extension.
2. Detach the tab containing option page from main window.
3. Attach the tab to the main window.
Actual results:
When the option page is attached to the window i.e. when the event tabs.onAttached is fired, the event Port.onDisconnect is fired too and it is not possible to communicate with the background script anymore.
Until Firefox 59 : Port.onDisconnect was not fired with tabs.onAttached.
Firefox Beta 60 : UNCONFIRMED.
Firefox Nightly 61 : Port.onDisconnect is fired with tabs.onAttached.
Expected results:
Port.onDisconnect should not fire with tabs.onAttached such as in previous version of Firefox.
|
|
1,448,817 | 13,155,367 |
Created attachment 8962286
testcase.html
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:61.0) Gecko/20100101 Firefox/61.0
Build ID: 20180325220121
Steps to reproduce:
With WebRender enabled in Firefox Nightly, elements with certain combinations of the rotate()-transform and border-radius render incorrectly. I have extracted the attached testcase based on code that I am currently working on.
Actual results:
When the elements have been rotated beyond a certain degree, their colours render slightly brighter than intended and surrounding box-shadows seem to leak through them. The issue does not appear when border-radius is removed.
|
|
1,448,830 | 13,155,485 |
[Affected versions]:
- Esr 52.7.3
- Firefox 59.0.1
- Beta 60.0b6
- Nightly 61.0a1
[Affected platforms]:
- Windows 10 x64
- macOS 10.12, macOS 10.13
- Ubuntu 16.04
[Steps to reproduce]:
1. https://www.bing.com/images/
2. Perform a search
3. Click on an image
4. Hover over the image and click on the magnifying glass / "Search within this image" button
5. Scroll through the results.
[Expected result]:
- The scroll goes at a normal speed.
[Actual result]:
- The scroll has a slower speed. It doesn't seem to lag. The action is performed smoothly, it's just that it seems to navigate a short distance.
[Regression range]:
- I don't think this is a regression. I can reproduce the issue even on Nightly 20.0a1.
|
|
1,448,867 | 13,155,735 |
SSIA
Str
1. Enable dark theme
2. Open Hamburger Menu
3. Mouse hover over menu item
|
|
1,448,896 | 13,155,968 |
Created attachment 8962369
aboutsupport.txt
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0
Build ID: 20180325220121
Steps to reproduce:
1. Create new profile on nightly win10x64 intel iGPU
2. enable WR. Restart
3. Go to https://lab.hakim.se/linjer/#diagonal
Actual results:
page flicker
Expected results:
not so
|
|
1,443,850 | 13,111,566 |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Steps to reproduce:
Test page:
https://fetch-progress.anthum.com/test/sw-response-with-url-fragments/
URLs containing hash/fragment values (e.g. "image.png#value") prevent Service Workers from responding correctly when new Response() constructor is used. This bug does not occur in FF 58 and was introduced in FF 59.
History of bug discovery:
https://github.com/AnthumChris/fetch-progress-indicators/issues/9
Actual results:
Images with URL fragment values do not display when intercepted by Service Worker
Expected results:
Images with URL fragment values should display.
|
|
1,443,937 | 13,112,385 |
User Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
Build ID: 20100101
Actual results:
There's no easy way to stop autoscrolling in the latest nightly, left click interacts with the content below the cursor, middle click repositions the autoscroller at the place that was clicked, right clicking creates a context menu and interacts with the page.
Expected results:
Middle clicking anywhere while the autoscroller is showing should stop autoscrolling, not reposition and continue autoscrolling.
|
|
1,444,086 | 13,114,033 |
Created attachment 8957159
crash.html (minimised testcase)
The following testcase crashes the latest ASAN build of Firefox 60.0a1 (SourceStamp=a6a32fb286fa9e5d5f6d5b3b77423ab6b96c9502).
crash.html:
<script>
o935=document.createElementNS('http://www.w3.org/1999/xhtml','canvas');
o935.getContext('webgl2',{depth: true,stencil: true,antialias: true,premultipliedAlpha: false,preserveDrawingBuffer: true,failIfMajorPerformanceCaveat: false,});
o935.setAttribute('height','3');
o2819=o935.getContext('webgl2',{stencil: false,preserveDrawingBuffer: true,failIfMajorPerformanceCaveat: true,});
o3250=o2819.createBuffer();
o2819.bindBuffer(o2819.PIXEL_UNPACK_BUFFER,o3250);
o3623=o2819.createTexture();
o2819.bindTexture(o2819.TEXTURE_2D,o3623);
o2819.copyTexImage2D(o2819.TEXTURE_2D,2,o2819.RGBA,1,4,8,7,0);
o935.setAttribute('height','9');
o2819.drawElements(o2819.LINE_STRIP,0,o2819.UNSIGNED_BYTE,10);
</script>
ASAN output:
=================================================================
==21389==ERROR: AddressSanitizer: heap-use-after-free on address 0x61e0000504a9 at pc 0x7fc1d0dec464 bp 0x7fff6f759b50 sp 0x7fff6f759b48
WRITE of size 1 at 0x61e0000504a9 thread T0 (file:// Content)
#0 0x7fc1d0dec463 in ~TlsScope /builds/worker/workspace/build/src/gfx/gl/GLContext.h:216:35
#1 0x7fc1d0dec463 in mozilla::WebGLContext::DrawElementsInstanced(unsigned int, int, unsigned int, long, int, char const*) /builds/worker/workspace/build/src/dom/canvas/WebGLContextDraw.cpp:721
#2 0x7fc1cfccc036 in DrawElements /builds/worker/workspace/build/src/dom/canvas/WebGLContext.h:1329:9
#3 0x7fc1cfccc036 in mozilla::dom::WebGL2RenderingContextBinding::drawElements(JSContext*, JS::Handle<JSObject*>, mozilla::WebGL2Context*, JSJitMethodCallArgs const&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/WebGL2RenderingContextBinding.cpp:10939
#4 0x7fc1d0bf92b1 in mozilla::dom::GenericBindingMethod(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:3031:13
#5 0x7fc1d76e46c8 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/JSContext-inl.h:290:15
#6 0x7fc1d76e46c8 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:467
#7 0x7fc1d76ca2f9 in CallFromStack /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:522:12
#8 0x7fc1d76ca2f9 in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3085
#9 0x7fc1d76b638a in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:417:12
#10 0x7fc1d76e76c4 in js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value const&, js::AbstractFramePtr, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:700:15
#11 0x7fc1d76e7e4f in js::Execute(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:732:12
#12 0x7fc1d81d7129 in ExecuteScript(JSContext*, JS::AutoVector<JSObject*>&, JS::Handle<JSScript*>, JS::Value*) /builds/worker/workspace/build/src/js/src/jsapi.cpp:4748:12
#13 0x7fc1ce4b6836 in nsJSUtils::ExecutionContext::CompileAndExec(JS::CompileOptions&, JS::SourceBufferHolder&, JS::MutableHandle<JSScript*>) /builds/worker/workspace/build/src/dom/base/nsJSUtils.cpp:266:8
#14 0x7fc1d2d14a74 in mozilla::dom::ScriptLoader::EvaluateScript(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:2321:25
#15 0x7fc1d2d0e4b9 in mozilla::dom::ScriptLoader::ProcessRequest(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1950:10
#16 0x7fc1d2d0b8e7 in mozilla::dom::ScriptLoader::ProcessInlineScript(nsIScriptElement*, mozilla::dom::ScriptKind) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1591:10
#17 0x7fc1d2ceea7e in mozilla::dom::ScriptLoader::ProcessScriptElement(nsIScriptElement*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1310:10
#18 0x7fc1d2cedb99 in mozilla::dom::ScriptElement::MaybeProcessScript() /builds/worker/workspace/build/src/dom/script/ScriptElement.cpp:141:18
#19 0x7fc1cd26a87b in AttemptToExecute /builds/worker/workspace/build/src/obj-firefox/dist/include/nsIScriptElement.h:247:18
#20 0x7fc1cd26a87b in nsHtml5TreeOpExecutor::RunScript(nsIContent*) /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:736
#21 0x7fc1cd263d74 in nsHtml5TreeOpExecutor::RunFlushLoop() /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:540:7
#22 0x7fc1cd26fc6b in nsHtml5ExecutorFlusher::Run() /builds/worker/workspace/build/src/parser/html/nsHtml5StreamParser.cpp:131:20
#23 0x7fc1cb2fd320 in mozilla::SchedulerGroup::Runnable::Run() /builds/worker/workspace/build/src/xpcom/threads/SchedulerGroup.cpp:413:25
#24 0x7fc1cb326ae6 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1040:14
#25 0x7fc1cb342080 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:517:10
#26 0x7fc1cc1f552a in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:97:21
#27 0x7fc1cc147389 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:326:10
#28 0x7fc1cc147389 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:319
#29 0x7fc1cc147389 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:299
#30 0x7fc1d2f5811a in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:157:27
#31 0x7fc1d7415bfb in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:892:22
#32 0x7fc1cc147389 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:326:10
#33 0x7fc1cc147389 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:319
#34 0x7fc1cc147389 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:299
#35 0x7fc1d74155da in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:718:34
#36 0x4f1875 in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:50:30
#37 0x4f1875 in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:280
#38 0x7fc1ea9c182f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#39 0x420f48 in _start (/fuzzer3/firefox/firefox+0x420f48)
0x61e0000504a9 is located 41 bytes inside of 2744-byte region [0x61e000050480,0x61e000050f38)
freed by thread T0 (file:// Content) here:
#0 0x4c1952 in __interceptor_free /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:68:3
#1 0x7fc1d0dcf5f9 in ForceLoseContext /builds/worker/workspace/build/src/dom/canvas/WebGLContext.cpp:1883:5
#2 0x7fc1d0dcf5f9 in mozilla::WebGLContext::EnsureDefaultFB(char const*) /builds/worker/workspace/build/src/dom/canvas/WebGLContext.cpp:785
#3 0x7fc1d0daed2e in ValidateAndInitFB /builds/worker/workspace/build/src/dom/canvas/WebGLContext.cpp:1983:10
#4 0x7fc1d0daed2e in mozilla::WebGLContext::BindCurFBForDraw(char const*) /builds/worker/workspace/build/src/dom/canvas/WebGLContext.cpp:2009
#5 0x7fc1d0de939b in mozilla::ScopedDrawHelper::ScopedDrawHelper(mozilla::WebGLContext*, char const*, unsigned int, mozilla::Maybe<unsigned int> const&, unsigned int, bool*) /builds/worker/workspace/build/src/dom/canvas/WebGLContextDraw.cpp:246:22
#6 0x7fc1d0deb960 in mozilla::WebGLContext::DrawElementsInstanced(unsigned int, int, unsigned int, long, int, char const*) /builds/worker/workspace/build/src/dom/canvas/WebGLContextDraw.cpp:683:28
#7 0x7fc1cfccc036 in DrawElements /builds/worker/workspace/build/src/dom/canvas/WebGLContext.h:1329:9
#8 0x7fc1cfccc036 in mozilla::dom::WebGL2RenderingContextBinding::drawElements(JSContext*, JS::Handle<JSObject*>, mozilla::WebGL2Context*, JSJitMethodCallArgs const&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/WebGL2RenderingContextBinding.cpp:10939
#9 0x7fc1d0bf92b1 in mozilla::dom::GenericBindingMethod(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:3031:13
#10 0x7fc1d76e46c8 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/JSContext-inl.h:290:15
#11 0x7fc1d76e46c8 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:467
#12 0x7fc1d76ca2f9 in CallFromStack /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:522:12
#13 0x7fc1d76ca2f9 in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3085
#14 0x7fc1d76b638a in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:417:12
#15 0x7fc1d76e76c4 in js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value const&, js::AbstractFramePtr, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:700:15
#16 0x7fc1d76e7e4f in js::Execute(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:732:12
#17 0x7fc1d81d7129 in ExecuteScript(JSContext*, JS::AutoVector<JSObject*>&, JS::Handle<JSScript*>, JS::Value*) /builds/worker/workspace/build/src/js/src/jsapi.cpp:4748:12
#18 0x7fc1ce4b6836 in nsJSUtils::ExecutionContext::CompileAndExec(JS::CompileOptions&, JS::SourceBufferHolder&, JS::MutableHandle<JSScript*>) /builds/worker/workspace/build/src/dom/base/nsJSUtils.cpp:266:8
#19 0x7fc1d2d14a74 in mozilla::dom::ScriptLoader::EvaluateScript(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:2321:25
#20 0x7fc1d2d0e4b9 in mozilla::dom::ScriptLoader::ProcessRequest(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1950:10
#21 0x7fc1d2d0b8e7 in mozilla::dom::ScriptLoader::ProcessInlineScript(nsIScriptElement*, mozilla::dom::ScriptKind) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1591:10
#22 0x7fc1d2ceea7e in mozilla::dom::ScriptLoader::ProcessScriptElement(nsIScriptElement*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1310:10
#23 0x7fc1d2cedb99 in mozilla::dom::ScriptElement::MaybeProcessScript() /builds/worker/workspace/build/src/dom/script/ScriptElement.cpp:141:18
#24 0x7fc1cd26a87b in AttemptToExecute /builds/worker/workspace/build/src/obj-firefox/dist/include/nsIScriptElement.h:247:18
#25 0x7fc1cd26a87b in nsHtml5TreeOpExecutor::RunScript(nsIContent*) /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:736
#26 0x7fc1cd263d74 in nsHtml5TreeOpExecutor::RunFlushLoop() /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:540:7
#27 0x7fc1cd26fc6b in nsHtml5ExecutorFlusher::Run() /builds/worker/workspace/build/src/parser/html/nsHtml5StreamParser.cpp:131:20
#28 0x7fc1cb2fd320 in mozilla::SchedulerGroup::Runnable::Run() /builds/worker/workspace/build/src/xpcom/threads/SchedulerGroup.cpp:413:25
#29 0x7fc1cb326ae6 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1040:14
#30 0x7fc1cb342080 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:517:10
#31 0x7fc1cc1f552a in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:97:21
#32 0x7fc1cc147389 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:326:10
#33 0x7fc1cc147389 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:319
#34 0x7fc1cc147389 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:299
#35 0x7fc1d2f5811a in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:157:27
#36 0x7fc1d7415bfb in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:892:22
#37 0x7fc1cc147389 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:326:10
#38 0x7fc1cc147389 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:319
#39 0x7fc1cc147389 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:299
previously allocated by thread T0 (file:// Content) here:
#0 0x4c1c93 in malloc /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:88:3
#1 0x4f26fd in moz_xmalloc /builds/worker/workspace/build/src/memory/mozalloc/mozalloc.cpp:70:17
#2 0x7fc1cd4e0ca0 in operator new /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/mozalloc.h:156:12
#3 0x7fc1cd4e0ca0 in mozilla::gl::GLContextGLX::CreateGLContext(mozilla::gl::CreateContextFlags, mozilla::gl::SurfaceCaps const&, bool, _XDisplay*, unsigned long, __GLXFBConfigRec*, bool, gfxXlibSurface*) /builds/worker/workspace/build/src/gfx/gl/GLContextProviderGLX.cpp:546
#4 0x7fc1cd4e3732 in mozilla::gl::CreateOffscreenPixmapContext(mozilla::gl::CreateContextFlags, mozilla::gfx::IntSizeTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gl::SurfaceCaps const&, nsTSubstring<char>*) /builds/worker/workspace/build/src/gfx/gl/GLContextProviderGLX.cpp:1007:12
#5 0x7fc1cd4e3abd in mozilla::gl::GLContextProviderGLX::CreateOffscreen(mozilla::gfx::IntSizeTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gl::SurfaceCaps const&, mozilla::gl::CreateContextFlags, nsTSubstring<char>*) /builds/worker/workspace/build/src/gfx/gl/GLContextProviderGLX.cpp:1034:10
#6 0x7fc1d0dce6d5 in mozilla::CreateGLWithDefault(mozilla::gl::SurfaceCaps const&, mozilla::gl::CreateContextFlags, mozilla::WebGLContext*, std::vector<mozilla::WebGLContext::FailureReason, std::allocator<mozilla::WebGLContext::FailureReason> >*) /builds/worker/workspace/build/src/dom/canvas/WebGLContext.cpp:565:28
#7 0x7fc1d0dcac7f in mozilla::WebGLContext::CreateAndInitGLWith(already_AddRefed<mozilla::gl::GLContext> (*)(mozilla::gl::SurfaceCaps const&, mozilla::gl::CreateContextFlags, mozilla::WebGLContext*, std::vector<mozilla::WebGLContext::FailureReason, std::allocator<mozilla::WebGLContext::FailureReason> >*), mozilla::gl::SurfaceCaps const&, mozilla::gl::CreateContextFlags, std::vector<mozilla::WebGLContext::FailureReason, std::allocator<mozilla::WebGLContext::FailureReason> >*) /builds/worker/workspace/build/src/dom/canvas/WebGLContext.cpp:597:23
#8 0x7fc1d0dcced4 in mozilla::WebGLContext::CreateAndInitGL(bool, std::vector<mozilla::WebGLContext::FailureReason, std::allocator<mozilla::WebGLContext::FailureReason> >*) /builds/worker/workspace/build/src/dom/canvas/WebGLContext.cpp:724:13
#9 0x7fc1d0dd0d32 in mozilla::WebGLContext::SetDimensions(int, int) /builds/worker/workspace/build/src/dom/canvas/WebGLContext.cpp:961:10
#10 0x7fc1d0d1aa0e in mozilla::dom::CanvasRenderingContextHelper::UpdateContext(JSContext*, JS::Handle<JS::Value>, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/canvas/CanvasRenderingContextHelper.cpp:243:24
#11 0x7fc1d0d1a4ba in mozilla::dom::CanvasRenderingContextHelper::GetContext(JSContext*, nsTSubstring<char16_t> const&, JS::Handle<JS::Value>, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/canvas/CanvasRenderingContextHelper.cpp:197:19
#12 0x7fc1d15241d0 in mozilla::dom::HTMLCanvasElement::GetContext(JSContext*, nsTSubstring<char16_t> const&, JS::Handle<JS::Value>, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/html/HTMLCanvasElement.cpp:1016:40
#13 0x7fc1d0646a50 in mozilla::dom::HTMLCanvasElementBinding::getContext(JSContext*, JS::Handle<JSObject*>, mozilla::dom::HTMLCanvasElement*, JSJitMethodCallArgs const&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/HTMLCanvasElementBinding.cpp:275:49
#14 0x7fc1d0bf92b1 in mozilla::dom::GenericBindingMethod(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:3031:13
#15 0x7fc1d76e46c8 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/JSContext-inl.h:290:15
#16 0x7fc1d76e46c8 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:467
#17 0x7fc1d76ca2f9 in CallFromStack /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:522:12
#18 0x7fc1d76ca2f9 in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3085
#19 0x7fc1d76b638a in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:417:12
#20 0x7fc1d76e76c4 in js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value const&, js::AbstractFramePtr, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:700:15
#21 0x7fc1d76e7e4f in js::Execute(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:732:12
#22 0x7fc1d81d7129 in ExecuteScript(JSContext*, JS::AutoVector<JSObject*>&, JS::Handle<JSScript*>, JS::Value*) /builds/worker/workspace/build/src/js/src/jsapi.cpp:4748:12
#23 0x7fc1ce4b6836 in nsJSUtils::ExecutionContext::CompileAndExec(JS::CompileOptions&, JS::SourceBufferHolder&, JS::MutableHandle<JSScript*>) /builds/worker/workspace/build/src/dom/base/nsJSUtils.cpp:266:8
#24 0x7fc1d2d14a74 in mozilla::dom::ScriptLoader::EvaluateScript(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:2321:25
#25 0x7fc1d2d0e4b9 in mozilla::dom::ScriptLoader::ProcessRequest(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1950:10
#26 0x7fc1d2d0b8e7 in mozilla::dom::ScriptLoader::ProcessInlineScript(nsIScriptElement*, mozilla::dom::ScriptKind) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1591:10
#27 0x7fc1d2ceea7e in mozilla::dom::ScriptLoader::ProcessScriptElement(nsIScriptElement*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1310:10
#28 0x7fc1d2cedb99 in mozilla::dom::ScriptElement::MaybeProcessScript() /builds/worker/workspace/build/src/dom/script/ScriptElement.cpp:141:18
#29 0x7fc1cd26a87b in AttemptToExecute /builds/worker/workspace/build/src/obj-firefox/dist/include/nsIScriptElement.h:247:18
#30 0x7fc1cd26a87b in nsHtml5TreeOpExecutor::RunScript(nsIContent*) /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:736
#31 0x7fc1cd263d74 in nsHtml5TreeOpExecutor::RunFlushLoop() /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:540:7
#32 0x7fc1cd26fc6b in nsHtml5ExecutorFlusher::Run() /builds/worker/workspace/build/src/parser/html/nsHtml5StreamParser.cpp:131:20
#33 0x7fc1cb2fd320 in mozilla::SchedulerGroup::Runnable::Run() /builds/worker/workspace/build/src/xpcom/threads/SchedulerGroup.cpp:413:25
SUMMARY: AddressSanitizer: heap-use-after-free /builds/worker/workspace/build/src/gfx/gl/GLContext.h:216:35 in ~TlsScope
Shadow bytes around the buggy address:
0x0c3c80002040: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c3c80002050: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c3c80002060: fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa fa
0x0c3c80002070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c3c80002080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x0c3c80002090: fd fd fd fd fd[fd]fd fd fd fd fd fd fd fd fd fd
0x0c3c800020a0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c3c800020b0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c3c800020c0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c3c800020d0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c3c800020e0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==21389==ABORTING
|
|
1,444,185 | 13,115,076 |
Created attachment 8957289
prompt.png
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:57.0) Gecko/20100101 Firefox/57.0
Build ID: 20180308100121
Steps to reproduce:
Enable WebRender by flipping `gfx.webrender.all` to true in about:config.
Actual results:
Text input field in master password prompt was cut off.
Expected results:
Master password field should look similar to how it looks like without WebRender enabled --> not be cut off.
|
|
1,444,288 | 13,116,003 |
Created attachment 8957429
Screen Shot 2018-03-08 at 11.53.06 PM.png
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:59.0) Gecko/20100101 Firefox/59.0
Build ID: 20180307211018
Steps to reproduce:
Open a new tab
Actual results:
The Firefox logo appears from the x...
Expected results:
It seems odd that the Firefox logo appears from the X. It looks like a flaw. Image attached.
Sorry, OCD.
|
|
1,444,384 | 13,116,739 |
Created attachment 8957538
Screen Shot 2018-03-09 at 16.08.04.png
Build: 11.0 (9520)
Device: iPhone 8
iOS: 11.0
Pre-requisites:
- Bookmark "youtube.com"
- Play a video on youtube (to appear in search results)
Steps to reproduce:
1. Tap on the URL bar
2. Type "y"
Actual results:
- Bookmarked and history search results are not aligned.
Note:
- Possible regression from Bug 1442838
|
|
1,444,440 | 13,117,226 |
Bug 1441223 added MOZILLA_PKIX_ERROR_ADDITIONAL_POLICY_CONSTRAINT_FAILED to be emitted when we hit certificates affected by the Symantec distrust.
Some sites are still emitting SEC_ERROR_UNKNOWN_ISSUER if they have multiple certificate trust paths possible, but one is unknown. This error really should be fatal -- perhaps like Bug 1437214.
This affects 60, and is confusing for writing documentation (Bug 1444427). If it's a reasonable patch, we might want to uplift this into 60.
[1] https://tlscanary.mozilla.org/runs/2018-03-08-10-41-46/index.htm
|
|
1,444,473 | 13,117,488 |
This is a follow-up from Bug 1438886, to support ICs calls too, by adding fences after returning from the call with a potentially speculated value.
(see Bug 1438886 comment 13)
|
|
1,444,487 | 13,117,576 |
For now this preference can be manually toggled and will default to false. After other dependencies of the parent bug are addressed and QA has had a chance to test, we can lock this down further.
|
|
1,444,579 | 13,118,580 |
Bug 1433133 removed the `NewTabUtils.placesProvider` reference to the provider, now `browser.topSites.get({providers: ['places']})` returns nothing.
|
|
1,444,599 | 13,118,793 |
we have received a report about this regression in the sumo forum at https://support.mozilla.org/questions/1208595
this behaviour is reproducible and was introduced by bug 517719.
|
|
1,444,668 | 13,119,200 |
The WASM assembler can generate an out-of-range value for |ModuleGenerator::callFarJumps_.jump.offset_|. If it does, it causes SetInt32() (Patching-x86-shared.h) to attempt to write beyond bounds. When this occurs, SetInt32() is called via the following chain:
SetInt32()
^--- SetRel32() (Patching-x86-shared.h)
^--- patchFarJump() (Assembler-x86-shared.h)
^--- ModuleGenerator::finishCode() (WasmGenerator.cpp)
Attached is a POC that causes this write.
The out-of-range value for |offset_| (0xffffffff820206cb in the attached POC) appears to occur because the POC's WASM program is large enough to caused js::jit::X86Encoding::BaseAssembler::m_formatter.m_buffer to contain more than 0x7fffffff bytes.
When ModuleGenerator::finishCode() attempts to link the code, it eventually calls X86Encoding::BaseAssembler::X86InstructionFormatter::immediateRel32(), which contains this code:
5093: m_buffer.putIntUnchecked(0);
5094: return JmpSrc(m_buffer.size());
However, m_buffer.size() returns a |size_t| (64 bits on 64 bit builds) while JmpSrc() takes an |int32_t|. The code here should (but does not) catch this out-of-range value. (Probably some other code should catch it earlier, but I don't understand the assembler well enough to identify that code).
In any case, the bad value propagates back to the caller farJumpWithPatch() (Assembler_x86_shared.h), which calls CodeOffset() (Assembler_shared.h), which puts it, along with the relevant function index, into |callFarJumps_.jump.offset_| (seer ModuleGenerator::linkCallSites()).
Later, when ModuleGenerator::finishCode() calls masm_.patchFarJump(), pathFarJump() computes
code + farJump.offset()
which points well before the start of |code| because offset() is negative.
The result is an attempt to write beyond bounds. This crashes FF 58.0.1 and 58.0.2 x64 release. On at least the debug version of 58.0.2, however, it successfully overwrites something else on the heap.
I found this bug while attempting to force an overflow elsewhere in the WASM assembler. I will report that bug separately.
Use the PoC by starting FF 58.0.1/.2 x64, attaching a debugger to it, and setting a BP in ModuleGenerator::finishCode() where it processes |callFarJumps_|. Put the POC files on a webserver. Load test40.html in FF (you might need to attach the debugger again if a new content process appears), and wait for the BP to fire. When it does, examine |callFarJumps_| and notice that at least one entry contains a negative offset. Trace the code until you hit the
mov dword ptr [r10-4], edx
and watch it either write far beyond bounds or crash with an access violation.
|
|
1,445,028 | 13,123,198 |
From bug 1444564 comment 0,
> 'Firefox Developer Edition Updates' section doesn't work. 'Check for updates'
> button causes error
> > TypeError: gAppUpdater is undefined preferences:1:1
> It is because of bug 1434706.
> https://hg.mozilla.org/mozilla-central/diff/109cd0a34ffe/browser/components/preferences/in-content/main.js#l1.14
|
|
1,445,131 | 13,124,177 |
Double-clicking in the top 10-20 pixels of content area minimizes the whole window on macOS in a new profile. I encountered this while double-clicking in a text field to select all text near the top of a page. I'm not sure what the exact conditions to reproduce are… it seems like some areas don't exhibit the problem e.g. in the BMO search box.
STR:
1) Load any page (AFAICT)
2) Double-click near the top 10-20 pixels in a blank area.
Last good revision: 93b6538bc167b53884d1a8590f0e2f67f124c358
First bad revision: 5e9db9c66ccdbe20d8ebb8c498a4385c4dc54ea0
Pushlog:
https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=93b6538bc167b53884d1a8590f0e2f67f124c358&tochange=5e9db9c66ccdbe20d8ebb8c498a4385c4dc54ea0
which only contains bug 1401195 which is definitely relevant.
[Tracking Requested - why for this release]: New regression
|
|
1,445,167 | 13,124,423 |
This is blocked by the change to make USER_NON_ADMIN a blacklist in bug 1321724.
USER_NON_ADMIN is only now used by default for the file content process and in bug 1344453 we added a rule to allow read access to all files, so the change to USER_NON_ADMIN should no longer be required.
Try push with everything passing on Linux and some Windows failures due to the USER_NON_ADMIN change:
https://treeherder.mozilla.org/#/jobs?repo=try&revision=0dd5ad56e120d8417cec7883c2d237ace5138e0d
Try push with the USER_NON_ADMIN change backed out:
https://treeherder.mozilla.org/#/jobs?repo=try&revision=bea3a99bb6d43eabb6dafa576ade44dda6abcff1
|
|
1,445,308 | 13,125,442 |
Clear Private Data Crashes the application. Report via email.
|
|
1,445,519 | 13,126,917 |
Created attachment 8958666
testcase
This only seems to happen on macOS with bug 1439875 applied.
Steps to reproduce:
1. open the testcase
2. click the button to open the new window
3. click the button in the new window to open another new window
repeat 3.
Expected result:
All windows should have the same size.
Actual result:
New windows keep shrinking by a titlebar height.
This may be the same issue as bug 1444045, and it doesn't seem to be fixed by current patches in bug 1444525 so it's probably worth separate investigating.
And this is the reason of wpt failure when landing bug 1439875.
|
|
1,445,614 | 13,127,665 |
Currently failure to create an alternate desktop will crash the browser.
It looks like there are cases where this can legitimately fail and certainly chrome only warns.
|
|
1,445,645 | 13,127,906 |
Build: 11.0 (9593)
Device: iPad Air 2
iOS: 11.2.5
Pre-requisits:
- open 3 tabs in this order:
1. google.com
2. mozilla.org
3. bbc.com
- make sure the 1st tab(google.com) is selected
Steps to reproduce:
1. Open Tabs Tray
2. Long tab on the 1st tab(google.com) and move it in the 2nd position
3. Tap on the 3rd tab(bbc.com)
Actual results:
- The tabs will be incorrectly displayed in Top Tabs.
See video here:
- https://www.youtube.com/watch?v=P8gXoSgUmEU
|
|
1,445,943 | 13,130,690 |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
Steps to reproduce:
Currently the only way to manage policies in the Firefox engine on macOS is to utilize CCK2. Since there was a recent implementation for GPO support on the Policy Engine in Firefox (Bug #1433136), I would like to request similar support for macOS which utilizes Configuration Profiles to manage application preferences. The way to do this is to add support for Firefox to make use of Core Foundation so that when a configuration profile is installed, the application can read the preference values that should be getting enforced. More on Core Foundation here: https://developer.apple.com/documentation/corefoundation/preferences_utilities
Commonly, preferences are written to a plist in macOS which contain the preference values that Core Foundation will read from and then set. This is not required but is the common way in which applications tend to write preferences out which could then be managed by a configuration profile.
Ideally, all the current settings that are manageable with CCK2 would be manageable with a Configuration Profile. However, even just having feature parity with GPO support on Firefox on Windows would be great.
Actual results:
Firefox currently does not store preferences in a plist and does not support Configuration Profiles to enforce preferences.
Expected results:
Firefox currently does not store preferences in a plist and does not support Configuration Profiles to enforce preferences.
|
|
1,445,991 | 13,130,985 |
User Agent: Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1
Steps to reproduce:
Upgrade to version 59.0
Navigate to Options:Network Proxy Connection Settings
Reload button next to Auotomatic proxy configuration URL is grayed out even though it’s radio button is selected and the field contains an address
Actual results:
Button is grayed out
Expected results:
Button should be selectable to reload the proxy settings from the URL specfied
|
|
1,446,276 | 13,132,862 |
User Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:59.0) Gecko/20100101 Firefox/59.0
Build ID: 20180313132747
Steps to reproduce:
Allowed distro (Xubuntu 16.04 LTS) package manager to upgrade Firefox to 59.0. Restarted Firefox, opened new tab. This has happened on previous upgrades as well, though I don't have the version numbers.
about:config settings previously modified to try to fix this:
- extensions.pocket.api;localhost
- extensions.pocket.enabled;false
- extensions.pocket.site;localhost
Actual results:
"Recommended by Pocket" items present, and clicking gear icon shows "Recommended by Pocket" checkbox is checked. Before upgrade, checkbox was clear and new tabs were empty.
Expected results:
New tab settings from previous version should be maintained. "Recommended by Pocket" should have remained disabled, and checkbox should not have set itself.
|
|
1,446,551 | 13,135,034 |
Sometimes I click the location bar and press enter, but the page does not reload.
Sorry I don't have more precise steps to reproduce.
When it happens, in the browser console I get this stack trace each time I press enter.
too much recursion
next self-hosted:562:9
from self-hosted:597:9
get_children chrome://global/content/bindings/richlistbox.xml:325:28
getIndexOfItem chrome://global/content/bindings/richlistbox.xml:181:13
get_selectedIndex chrome://global/content/bindings/listbox.xml:100:20
get_selectedIndex chrome://global/content/bindings/autocomplete.xml:747:1
handleEnter chrome://browser/content/urlbarBindings.xml:1505:1
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
replayAllDeferredKeyEvents chrome://browser/content/urlbarBindings.xml:474:11
_deferKeyEvent chrome://browser/content/urlbarBindings.xml:424:15
handleEnter chrome://browser/content/urlbarBindings.xml:1526:11
_replayKeyEventInstance chrome://browser/content/urlbarBindings.xml:486:13
|
|
1,446,626 | 13,135,633 |
Created attachment 8959789
background_repaint.zip
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:61.0) Gecko/20100101 Firefox/61.0
Build ID: 20180316220124
Steps to reproduce:
opened the page contained in the archive with Webrender active.
System: AMD Kaveri 7650k, Linux 4.15.9, Mesa-17.3.6, radeonsi, amdgpu
Actual results:
only when scrolling with the mouse, drawing the page in question sometimes takes a long time. however as soon as I click at a not-yet-painted area it is drawn immediatly: https://youtu.be/re5Rkk0LOoY
Looks like some flush operation is missing somewhere.
When scrolled with the keyboard, it works as expected.
Expected results:
WebRender should behave like the OpenGL compositor, and simply redraw previously obscured areas when scrolling.
|
|
1,454,914 | 13,215,121 |
Created attachment 8968859
Screenshots - Edit button.gif
[Affected versions]:
- Nightly 61.0a1, Build ID: 20180417225505
[Affected Platforms]:
- All Windows
- All Mac
- All Linux
[Steps to reproduce]:
1. Open the Firefox browser and navigate to any website.
2. Click the "Page actions" menu and select "Take a Screenshot" option.
3. Skip the onboarding tour.
4. Click the "Save visible" button and select the "Save" button.
5. Observe the "Edit" (Pencil) button.
[Expected result]:
- The button has a blue circle that has a star in it.
[Actual result]:
- The button has no badge.
[Regression]:
- It seems that this is a Nightly regression. Using mozregression tools I have found a regression window. Here are the results:
Last good revision: ae45e56c3c71ae23084e9ef549c3d58880add8a1
First bad revision: 87b552f9c09b68a255eeb84c5c554384b0c1231a
Pushlog: https://goo.gl/pYTBYX
From the pushlog it seems that bug 1452496 has caused this issue.
[Notes]:
- This issue is also reproducible on an older Nightly 61.0a1 build ID 20180108220132 with latest Firefox Screenshots v32.0.0dev installed from here( https://screenshots.dev.mozaws.net/homepage/install-test-local.html ) and on the latest Beta 60.0b13 with latest Firefox Screenshots v30.1.0.
- This issue is not reproducible on the latest Firefox Beta 60.0b12 with Firefox Screenshots v30.1.0.
- This issue is not reproducible on the latest Firefox Release 59.0.2 with Firefox Screenshots v25.0.0.
- Attached is a screen recording with this issue.
|
|
1,455,013 | 13,215,862 |
For more information, see this issue with readability.js:
https://github.com/mozilla/readability/issues/436
|
|
1,455,645 | 13,221,628 |
Created attachment 8969680
console-weird-wrapping.png
**Steps to reproduce**
1. Open the console
2. Evaluate `console.error("fuuu".repeat(100))`
**Actual results**
An horizontal scrollbar is shown on the console, and the arrow icon is shrunk (see attachment)
|
|
1,455,681 | 13,221,961 |
[Affected versions]:
Nightly 60.0a1
[Affected platforms]:
Platforms: Windows 10 x 64, Mac OS X 10.12 and Ubuntu 16.04 x64.
[Steps to reproduce]:
1. Go to "about:preferences" and click on the "Search" field.
2. Start typing to search for something that doesn't have search results in preferences (e.g "SoftVision").
3. Click on "Nightly Support" link.
[Expected result]:
"https://support.mozilla.org/en-US/kb/firefox-options-preferences-and-settings?as=u&utm_source=inproduct"
[Actual result]:
"Nightly Support" link on "Search Results" page isn't working
|
|
1,455,686 | 13,221,977 |
[Affected versions]:
Nightly 61.0a1
[Affected platforms]:
Platforms: Windows 10 x 64, Mac OS X 10.13 and Ubuntu 16.04 x64.
[Steps to reproduce]:
1. Go to "about:preferences#privacy"
2. Under Tracking Protection section, click on "Learn more about Tracking Protection and your privacy" link
3. Observe
[Expected result]:
"https://support.mozilla.org/en-US/kb/tracking-protection?as=u&utm_source=inproduct"
[Actual result]:
"Learn more about Tracking Protection and your privacy" link is not working
|
|
1,455,705 | 13,222,109 |
We passed urls into prefs where hostnames are required. non-socks settings fail due to this.
|
|
1,455,796 | 13,223,044 |
Filed by: dluca [at] mozilla.com
https://treeherder.mozilla.org/logviewer.html#?job_id=174858803&repo=autoland
https://queue.taskcluster.net/v1/task/T4ZjhAO-RUGZoaqtEPe-9A/runs/0/artifacts/public/logs/live_backing.log
|
|
1,455,839 | 13,223,371 |
Created attachment 8969886
Screenshot
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0
Build ID: 20180420220029
Steps to reproduce:
-Opened http://www.faz.net/aktuell/wissen/erde-klima/der-planet-steht-das-system-wankt-der-klimawandel-zeigt-sich-radikaler-denn-je-15545724.html
-Scrolled down
Actual results:
The picture on the top of the article gets sometimes painted on the Chrome.
|
|
1,455,842 | 13,223,399 |
Created attachment 8969891
Recording FPS drops.mp4
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0
Build ID: 20180421100143
Steps to reproduce:
Unfortunately this can only be reproduced while being logged in.
Viewed a topic on https://www.ip-phone-forum.de/forums/
Scrolled down to the bottom of the page.
Actual results:
When you scroll over the quick answer box FPS drop heavily. If you scroll very fast, you can produce single digit FPS . There's just one "scroll step" when using mouse wheel scroll where this happens, both when scrolling up and down. All other steps are fine.
I can only reproduce this on a Radeon R9 390, not on an Intel HD Graphics on Windows 10.
Expected results:
FPS stay at 60 like on the rest of the page while scrolling.
|
|
1,455,898 | 13,223,667 |
Created attachment 8969935
attack.html - example exploit
VULNERABILITY DETAILS
An attacker can combine complicated CSS effects and the :visited selector to
reliably determine the visited status of arbitrary URLs, by forcing the browser
to complete expensive repaint operations if a test URL is visited, and comparing
performance measurements with those taken for a known-unvisited "control" URL.
(1) The attacker constructs an element that is complicated to render using CSS
effects.
In the attached exploit, we use the following inline style (crafted through
manual trial and error) to produce a link element that is costly to paint:
display: inline-block;
width: 5px; font-size: 2px; text-align: center;
outline-width: 24px; text-shadow: 16px 16px 10px #fefffe;
filter: contrast(200%) drop-shadow(16px 16px 10px #fefefe) saturate(200%);
transform: perspective(100px) rotateY(37deg);
To further increase the burden placed on the browser's rendering engine, the
element is filled with a long string of Chinese characters. The exact
configuration is less important than the overall idea that the element is made
costly to draw by stacking on these challenges.
(2) The attacker forces the browser to repeatedly repaint the element if the
test URL is visited.
We use the CSS :visited selector to apply different color styles to the link
element if it points to a visited URL. For example:
a { color: white; background-color: white; outline-color: white; }
a:visited { color: #feffff; background-color: #fffeff;
outline-color: #fffffe; }
In the attached attack, we use the DOM to oscillate the link element's href
attribute between the test URL and a randomly-generated known-unvisited URL,
forcing a repaint with each oscillation if the test URL is visited.
An attacker could alternatively point the link to the test URL, then rotate the
colors of the CSS rules under :visited through a set of different values. This
similarly forces the browser to repeatedly repaint the element if the test uRL
is visited.
(3) The attacker measures paint performance during the process in step (2) and
compares it with measurements taken for a known-unvisited control URL.
We measure the frequency of `requestAnimationFrame` callback executions over
time. The forced repaints cause a drop in this measurement if the test URL is
visited, relative to one collected for the control URL; thus we can make
a visited vs unvisited determination.
Experimentally, 70-80% fewer `requestAnimationFrame` callbacks fire in the case
of a visited test URL vs the control URL, with the effect observable down to
100ms measurement periods (producing measurements on the order of 4 vs 15). An
attacker using an intelligent search strategy could rapidly extract
visited/unvisited status for each of a set of test URLs.
VERSION (tested on 2 systems)
Firefox Version: 59.0.2 (64-bit) stable
Operating System: Windows 10 Pro Version 1709 (OS Build 16299.371)
Firefox Version: 59.0.2 (64-bit) stable
Operating System: macOS 10.10.5
REPRODUCTION CASE
`attack.html` demonstrates inferring visited status of arbitrary URLs through
the technique described above. If it does not seem to work, ensure that your
Firefox installation can properly display Chinese characters.
|
|
1,455,908 | 13,223,712 |
Created attachment 8969943
screenshot
Reproducible: not always
Steps To reproduce:
1. Open Youtube video
2. Move the seek bar to the uncached part
Actual Results:
Sometimes, Graphical glitch on loading spinner.
See attached screenshot.
|
|
1,456,082 | 13,226,229 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0
Build ID: 20180419200216
Steps to reproduce:
Open a new tab. (not the one that appears at the start.)
Actual results:
It shows a completely white screen with the title : New Tab
See this : https://i.imgur.com/J4bTUYL.png
Expected results:
It should have showed the normal new tab, which it shows when Firefox starts for the first time. (or while opening a new tab)
Like this : https://i.imgur.com/0kj1utf.png
|
|
1,456,445 | 13,229,259 |
Created attachment 8970508
go to download page doesnt work.gif
[Affected versions]:
- Nightly 61.0a1, Build ID 20180422223305
[Affected Platforms]:
- All Windows
- All Linux
[Prerequisites]:
- Have a clean new Firefox profile.
- Have a download card in the Highlights section.
[Steps to reproduce]:
1. Start the browser with the profile from prerequisites.
2. Open a new tab and click the "..." button for the Download card.
3. Click the "Go to download page" option and observe the behavior.
[Expected result]:
- A new tab is opened with the site the donwload was made.
[Actual results]:
- Nothing happens.
[Notes]:
- The issue is not reproducible on Mac OS.
- Attached a screen recording of the issue.
|
|
1,456,485 | 13,229,572 |
Created attachment 8970546
pdf pages.gif
[Affected versions]:
- Nightly 61.0a1 (Build ID: 20180424013604)
- Beta 60.0b14 (Build ID: 20180419200216)
[Affected Platforms]:
- All Windows
- All Mac
- All Linux
[Prerequisites]:
- Have a clean Firefox profile.
- Screenshots onboarding tour was already visited.
[Steps to reproduce]:
1. Open the latest Nightly build with the profile from prerequisites.
2. Navigate to a PDF page (eg: http://www.pdf995.com/samples/pdf.pdf).
3. Click the "Take a Screenshot" button from "Page Actions" menu.
4. Observe the behavior.
[Expected result]:
- The Screenshots overlay is displayed and you can make a selection.
[Actual results]:
- "We can't screenshot this page" error is displayed.
[Regression]:
- The issue is not reproducible on latest Firefox 59.0.2 release. Considering this I have found the regression window using the mozregression tools. Here are the results:
- Last good revision: c8514e653b71479ba22a307f58f79f563ed80e9d
- First bad revision: 07ab807639ee42a407a9bdb0d374206c0f17678d
- Pushlog: https://goo.gl/aLWFGg
Looks like Bug 1436482 introduced this issue, but I am not sure if this should be fixed on the Screenshots or Nightly side.
[Notes]:
- Attached a screen recording with the issue.
|
|
1,456,522 | 13,229,864 |
I believe bug 1439834 broke this.
|
|
1,456,652 | 13,231,210 |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36
Steps to reproduce:
1. Go to https://test.shhnjk.com/read_bypass.html
2. Click reader view icon
3. Click on "Click ME" link
4. Exit Reader view in new tab
Actual results:
SameSite cookie not sent.
Expected results:
SameSite cookie is sent when exiting Reader view at the end.
Firefox doesn't fully track "Site for cookie" when exiting Reader view. Using various tricks in Reader view (target blank with # and meta refresh), attacker can start Reader view from attacker site and navigate to victim site without exiting Reader view. Which makes it possible to end in a state where Reader view holds CSRF payload within Reader view, and it is triggered when exiting Reader view.
|
|
1,456,923 | 13,233,121 |
Nightly 61.0a1 (2018-04-25) (64-bit) seems to break switching to dev-tools panels that are loaded temporarily. Mozregression leads me to Bug 1441070 from the following results:
26:07.02 INFO: Last good revision: be5ba8b6dea2d025e0e1f7268336e1d1f0c32399
26:07.02 INFO: First bad revision: 3577a6b9b1a13a0dfd93073f4ef9209c08764eb4
Steps to reproduce:
- Download https://github.com/karolien/media-devtools-panel-react
- Navigate to about:debugging
- Click load temporary add-on, navigate to {location-of-download}/media-devtools-panel-react/extension/ and select any file to load the add-on.
- Open the Developer Tools, and attempt to show the "Media" tab.
Expected results:
- See the media panel
Actual results:
- Does not switch away from current panel
This worked as of 4/24, but stopped working this morning, 4/25.
|
|
1,456,975 | 13,233,545 |
Created attachment 8971011
minimized-from-67447ff63f6161ff7b3a7220157c2bebec80051f
The bug is triggered here https://searchfox.org/mozilla-central/source/image/decoders/icon/nsIconURI.cpp#103 because there exists some path in the IPC that sets mIconSize without validating it.
If you want access to bug 1451859 so you can reproduce, let me know and I can CC you.
osboxes@osboxes:~/mozilla-central$ (cd obj-x86_64-pc-linux-gnu/dist/bin/; MOZ_RUN_GTEST=1 LIBFUZZER=1 FUZZER=ContentParentIPC ./firefox -artifact_prefix=/home/osboxes/content-parent-artifacts/ /home/osboxes/content-parent-artifacts/minimized-from-67447ff63f6161ff7b3a7220157c2bebec80051f -len_control=0 -max_len=384 -rss_limit_mb=0 -close_fd_mask=2)
Running Fuzzer tests...
INFO: Seed: 3613430132
INFO: Loaded 1 modules (1636978 guards): 1636978 [0x7fbca02a7d80, 0x7fbca08e6748),
./firefox: Running 1 inputs 1 time(s) each.
Running: /home/osboxes/content-parent-artifacts/minimized-from-67447ff63f6161ff7b3a7220157c2bebec80051f
=================================================================
==29686==ERROR: AddressSanitizer: SEGV on unknown address 0x7fc039beeec8 (pc 0x7fbc8b0bab23 bp 0x7ffd3e64fed0 sp 0x7ffd3e64fd40 T0)
==29686==The signal is caused by a READ memory access.
#0 0x7fbc8b0bab22 in nsTSubstring<char>::Append(char const*, unsigned int) /home/osboxes/mozilla-central/obj-x86_64-pc-linux-gnu/dist/include/nsTSubstring.h:368:31
#1 0x7fbc8b0bab22 in nsTSubstring<char>::operator+=(char const*) /home/osboxes/mozilla-central/obj-x86_64-pc-linux-gnu/dist/include/nsTSubstring.h:503
#2 0x7fbc8b0bab22 in nsMozIconURI::GetSpec(nsTSubstring<char>&) /home/osboxes/mozilla-central/image/decoders/icon/nsIconURI.cpp:103
#3 0x7fbc95ffa6c0 in nsNavHistory::CanAddURI(nsIURI*, bool*) /home/osboxes/mozilla-central/toolkit/components/places/nsNavHistory.cpp:923:23
#4 0x7fbc95ffefc8 in mozilla::places::History::SetURITitle(nsIURI*, nsTSubstring<char16_t> const&) /home/osboxes/mozilla-central/toolkit/components/places/History.cpp:3017:29
#5 0x7fbc90989f6a in mozilla::dom::ContentParent::RecvSetURITitle(mozilla::ipc::URIParams const&, nsTString<char16_t> const&) /home/osboxes/mozilla-central/dom/ipc/ContentParent.cpp:3625:14
#6 0x7fbc889eb514 in mozilla::dom::PContentParent::OnMessageReceived(IPC::Message const&) /home/osboxes/mozilla-central/obj-x86_64-pc-linux-gnu/ipc/ipdl/PContentParent.cpp:4458:20
#7 0x7fbc9813bc18 in void mozilla::ipc::FuzzProtocol<mozilla::dom::ContentParent>(mozilla::dom::ContentParent*, unsigned char const*, unsigned long, std::unordered_set<unsigned int, std::hash<unsigned int>, std::equal_to<unsigned int>, std::allocator<unsigned int> >&) /home/osboxes/mozilla-central/obj-x86_64-pc-linux-gnu/dist/include/ProtocolFuzzer.h:48:18
#8 0x7fbc9813ae26 in RunContentParentIPCFuzzing(unsigned char const*, unsigned long) /home/osboxes/mozilla-central/dom/ipc/fuzztest/content_parent_ipc_libfuzz.cpp:67:3
#9 0x5ee47d in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/osboxes/mozilla-central/tools/fuzzing/libfuzzer/FuzzerLoop.cpp:517:13
#10 0x5c65ef in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /home/osboxes/mozilla-central/tools/fuzzing/libfuzzer/FuzzerDriver.cpp:280:6
#11 0x5d2a21 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/osboxes/mozilla-central/tools/fuzzing/libfuzzer/FuzzerDriver.cpp:703:9
#12 0x7fbc967101e1 in mozilla::FuzzerRunner::Run(int*, char***) /home/osboxes/mozilla-central/tools/fuzzing/interface/harness/FuzzerRunner.cpp:60:10
#13 0x7fbc96621528 in XREMain::XRE_mainStartup(bool*) /home/osboxes/mozilla-central/toolkit/xre/nsAppRunner.cpp:4021:35
#14 0x7fbc96636196 in XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&) /home/osboxes/mozilla-central/toolkit/xre/nsAppRunner.cpp:4957:12
#15 0x7fbc96637e6d in XRE_main(int, char**, mozilla::BootstrapConfig const&) /home/osboxes/mozilla-central/toolkit/xre/nsAppRunner.cpp:5064:21
#16 0x51ea9c in do_main(int, char**, char**) /home/osboxes/mozilla-central/browser/app/nsBrowserApp.cpp:231:22
#17 0x51ea9c in main /home/osboxes/mozilla-central/browser/app/nsBrowserApp.cpp:304
#18 0x7fbcad9eb1c0 in __libc_start_main /build/glibc-itYbWN/glibc-2.26/csu/../csu/libc-start.c:308
#19 0x421bc9 in _start (/home/osboxes/mozilla-central/obj-x86_64-pc-linux-gnu/dist/bin/firefox+0x421bc9)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/osboxes/mozilla-central/obj-x86_64-pc-linux-gnu/dist/include/nsTSubstring.h:368:31 in nsTSubstring<char>::Append(char const*, unsigned int)
==29686==ABORTING
MS: 0 ; base unit: 0000000000000000000000000000000000000000
0x28,0x0,0x0,0x0,0xff,0xff,0xff,0x7f,0x97,0x0,0x2d,0x0,0x45,0x6e,0x76,0x50,0x6c,0x69,0x67,0x6e,0x75,0x7b,0x6c,0x75,0x67,0x6e,0x73,0x0,0x0,0x0,0x0,0x0,0x4,0x0,0x0,0x0,0x1,0x0,0x0,0x0,0x9b,0x9a,0x9a,0xba,0x73,0x0,0x0,0x0,0x0,0x78,0x69,0x74,0x63,0x6f,0x64,0x65,0x65,0x72,0x5f,0x73,0x6d,0x78,0x69,0x74,0x63,0x0,0x0,0x72,0x5f,0x73,0x6d,0x61,
(\x00\x00\x00\xff\xff\xff\x7f\x97\x00-\x00EnvPlignu{lugns\x00\x00\x00\x00\x00\x04\x00\x00\x00\x01\x00\x00\x00\x9b\x9a\x9a\xbas\x00\x00\x00\x00xitcodeer_smxitc\x00\x00r_sma
|
|
1,457,252 | 13,236,374 |
Created attachment 8971353
Applications section sub-dialog does not display buttons properly.JPG
[Affected versions]:
Nightly 60.0a1
[Affected platforms]:
Platforms: Windows 10 x 64, Mac OS X 10.12 and Ubuntu 16.04 x64.
[Steps to reproduce]:
1. Go to "about:preferences" using Italian locale
2. Under "Application" press the irc (action section drop-down) => Always ask => Application Details
3. Observe the dialog
AR: Application details sub-dialog does not display the buttons properly
ER: Application details sub-dialog should be displayed properly
|
|
1,457,284 | 13,236,561 |
Created attachment 8971370
add Skia m66 cherry-picks
[Tracking Requested - why for this release]:
Skia's m66 branch (https://skia.googlesource.com/skia/+/chrome/m66) has included some new cherry-picks to deal with various security bugs, so we should take these before 60 beta hits release.
These are just changes that have already been rolled into their branch since weeks ago, so they should be safe for us to take.
|
|
1,457,499 | 13,238,575 |
Created attachment 8971623
Eastward - Bande-annonce 2018.png
Since a few days when playing some videos I have a green band on top.
For example : https://www.dailymotion.com/video/x6ign45
With 720p quality only gives me gives me *see attachment.
|
|
1,457,927 | 13,243,440 |
Created attachment 8972017
rec of the issue.gif
[Notes]:
- If there are no "Bookmarks" or "Pocket" saves in the "Highlights" area, the most recent download is correctly displayed on the first position.
[Affected versions]:
- Nightly 61.0a1, Build ID 20180430100522
[Affected Platforms]:
- All Windows
- All Mac
- All Linux
[Prerequisites]:
- Have a clean new Firefox profile.
- Have the "Highlights" section populated with "Bookmarks" and "Pocket" cards.
[Steps to reproduce]:
1. Start the browser with the profile from prerequisites.
2. Navigate to any website (eg. https://www.thinkbroadband.com/download) and download any file.
3. Open a new tab and observe the "Highlights" area.
[Expected result]:
- The most recent download is displayed first in the "Highlights" area.
[Actual results]:
- The most recent download is displayed last in the "Highlights" area.
[Additional Notes]:
- The issue is still reproducible after browser restart.
- Attached a screen recording of the issue.
|
|
1,458,048 | 13,244,698 |
sctp_load_addresses_from_init() (netwerk\sctp\src\netinet\sctp_pcb.c) is likely to write beyond bounds if the INIT argument it parses does not include an |SCTP_RANDOM| parameter. The argument comes from a (presumably untrusted) network source.
The bug is in the calculation of |keylen|. Lines 7740-44 calculate |keylen| and allocate |sizeof (sctp_key_t) + keylen| bytes. But if there is no |SCTP_RANDOM| parameter in the INIT, control skips lines 7562-82, and |p_random| is NULL (its initial value, set by line 7120) when control reaches line 7739:
7100: int
7101: sctp_load_addresses_from_init(struct sctp_tcb *stcb, struct mbuf *m,
7102: int offset, int limit,
7103: struct sockaddr *src, struct sockaddr *dst,
7104: struct sockaddr *altsa, uint16_t port)
7105: {
7106: /*
7107: * grub through the INIT pulling addresses and loading them to the
7108: * nets structure in the asoc. The from address in the mbuf should
7109: * also be loaded (if it is not already). This routine can be called
7110: * with either INIT or INIT-ACK's as long as the m points to the IP
7111: * packet and the offset points to the beginning of the parameters.
7112: */
...
7120: struct sctp_auth_random *p_random = NULL;
7121: uint16_t random_len = 0;
...
7131: uint32_t keylen;
7132: int got_random = 0, got_hmacs = 0, got_chklist = 0;
...
7237: /* now we must go through each of the params. */
7238: phdr = sctp_get_next_param(m, offset, ¶m_buf, sizeof(param_buf));
7239: while (phdr) {
7240: ptype = ntohs(phdr->param_type);
7241: plen = ntohs(phdr->param_length);
...
7562: } else if (ptype == SCTP_RANDOM) {
7563: if (plen > sizeof(random_store))
7564: break;
7565: if (got_random) {
7566: /* already processed a RANDOM */
7567: goto next_param;
7568: }
7569: phdr = sctp_get_next_param(m, offset,
7570: (struct sctp_paramhdr *)random_store,
7571: plen);
7572: if (phdr == NULL)
7573: return (-26);
7574: p_random = (struct sctp_auth_random *)phdr;
7575: random_len = plen - sizeof(*p_random);
7576: /* enforce the random length */
7577: if (random_len != SCTP_AUTH_RANDOM_SIZE_REQUIRED) {
7578: SCTPDBG(SCTP_DEBUG_AUTH1, "SCTP: invalid RANDOM len\n");
7579: return (-27);
7580: }
7581: got_random = 1;
7582: } ...
...
7668: next_param:
7669: offset += SCTP_SIZE32(plen);
7670: if (offset >= limit) {
7671: break;
7672: }
7673: phdr = sctp_get_next_param(m, offset, ¶m_buf,
7674: sizeof(param_buf));
7675: }
...
...This, in turn, means that line 7748...
7739: /* concatenate the full random key */
7740: keylen = sizeof(*p_random) + random_len + sizeof(*hmacs) + hmacs_len;
7741: if (chunks != NULL) {
7742: keylen += sizeof(*chunks) + num_chunks;
7743: }
7744: new_key = sctp_alloc_key(keylen);
7745: if (new_key != NULL) {
7746: /* copy in the RANDOM */
7747: if (p_random != NULL) {
...which resets |keylen| to properly index into |new_key->key|, will not be executed...
7748: keylen = sizeof(*p_random) + random_len;
7749: memcpy(new_key->key, p_random, keylen);
7750: }
And that means that lines 7752-61 use the old value of |keylen| for addressing the destinations of the memcpy()s on lines 7753-54 and 7759-60. But this value is actually the length, in bytes, of |new_key->key|, so both memcpy()s will write beyond bounds:
7751: /* append in the AUTH chunks */
7752: if (chunks != NULL) {
7753: memcpy(new_key->key + keylen, chunks,
7754: sizeof(*chunks) + num_chunks);
7755: keylen += sizeof(*chunks) + num_chunks;
7756: }
7757: /* append in the HMACs */
7758: if (hmacs != NULL) {
7759: memcpy(new_key->key + keylen, hmacs,
7760: sizeof(*hmacs) + hmacs_len);
7761: }
7762: } else {
7763: /* failed to get memory for the key */
7764: return (-34);
7765: }
...
7772: return (0);
7773: }
Nothing in the function prevents control from reaching lines 7740 et seq if a |SCTP_RANDOM| parameter is not present.
I'll try to produce a POC.
|
|
1,458,246 | 13,246,165 |
STEPS TO REPRODUCE:
1) Start today's Mac nightly (official nightly, built from rev d2a4720d1c33).
2) Install Gecko profiler addon from https://perf-html.io/
3) Set the profiler to sample every 0.2ms with a 630MB buffer.
4) Start the profiler.
5) Load https://1yzzl25mwj.codesandbox.io/
6) Once the frame counter thing gets to 100/100 and shows per/frame times,
hit Ctrl+Shift+2.
EXPECTED RESULTS: I get a profile of that page.
ACTUAL RESULTS: Page crashes. I do not actually get a profile for the PID the page was loaded in. An example crash is at https://crash-stats.mozilla.com/report/index/0323f22b-1a5f-48cd-b609-9be8b0180501 and as mstange noted on IRC the "MOZ_CRASH(IPC message size is too large)" bit is likely the cause...
|
|
1,458,373 | 13,247,247 |
Created attachment 8972456
Screen Shot 2018-05-01 at 17.33.01.png
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:61.0) Gecko/20100101 Firefox/61.0
Build ID: 20180427102245
Steps to reproduce:
Visit http://diana-adrianne.com/purecss-francine/ and scroll down until the head intersects the top of the window.
Actual results:
Parts of the hair were rendered as colored rectangles in the URL / tab bar.
Expected results:
The image should be confined to the boundaries of the page.
|
|
1,458,449 | 13,247,768 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0
Build ID: 20180430220108
Steps to reproduce:
Opened ftp://ftp.fu-berlin.de/doc/rfc/authors/rfc7430.xml from Google
Actual results:
I was slapped in the face by a wall of text, no for real:
Firefox blocked the stylesheet (xslt file) from loading.
console log:
"Loading FTP subresource within http(s) page not allowed (Blocked loading of: “ftp://ftp.fu-berlin.de/doc/rfc/authors/rfc2629.xslt”)"
My problem: it's within an ftp page/document and not an http page
Is this a bug or desired?
If it's desired, then the error needs to be adjusted.
Expected results:
I'm not sure if it makes sense, to block stylesheets, if the xml or even html is located on the same ftp server already.
If you don't want this, then you should block html/xml from ftp all together instead of showing the user incomplete documents.
Also: Downloading the xml file (whole website), doesn't download the xslt file, so opening it locally doesn't work without downloading the files one by one (taking a look at the source file to get required URLs)
Which means: you cannot read those documents unless you get a real FTP client or learn xml.
Another bug:
Firefox tries to render the xslt file for some reason, thereby complicating the download, since I have to click "view source" in the context menu first, to be able to save the page.
STRG+S on the open xslt file doesn't select the correct file name and tries to save it as html.
I could open another bug report for this, if you think it's different enough.
|
|
1,458,553 | 13,248,733 |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:60.0) Gecko/20100101 Firefox/60.0
Build ID: 20180426170554
Steps to reproduce:
This issue is very similar to bug 1422027
I have a Macbook Pro 11,3 with Intel Iris Pro 5200 and Nvidia GeForce GT 750M and am using the updated Nvidia Web Driver.
With the Nvidia Web Driver installed, navigate to Google Maps.
Actual results:
When I go to Google Maps, the map navigation is very slow and the map is occasionally all black or blinks black especially while trying to zoom in or out. It is unusable.
Expected results:
Google Maps should work normally.
mozregression:
https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=4536fd333b16bfa86eb1fdf94616d2d067bfc41f&tochange=a678eec13c6e6bf1662cc4db5719bbb413c63f65
|
|
1,458,720 | 13,250,776 |
(In reply to :Ehsan Akhgari from bug 1450630 comment #14)
...
> (In reply to David Keeler [:keeler] (use needinfo) from bug 1450630 comment #13)
> > I'm confused - DataStorage was written with the intent that it be safe to
> > access from multiple threads (the documentation even says so at the top of
> > DataStorage.h). From what I can tell from the code, the static
> > DataStorage::Get* meta-APIs that operate on the different types of
> > DataStorage we have are main-thread-only, but are the Get/Set/Remove APIs
> > that operate on actual data restricted as well? If so, we've strayed from
> > the original design requirements (e.g. nsSiteSecurityService is
> > fundamentally broken if we can't access its backing DataStorage off the main
> > thread).
>
> Hmm... I'm not sure what the API requirements here are, I'm basing my
> judgement on what the code is actually doing. All calls to
> RunOnAllContentParents() require to be on the main thread (in general, our
> IPC interfaces are not thread safe so if the caller requires thread safety
> it is its own responsibility to take care of that at layers higher than IPC.)
>
> This code is currently called from Put(), Remove() and Clear() so per above
> I think you're suggesting that this has all been broken since bug 1215723
> (Firefox 45)? If yes, then the right fix isn't to fix the Necko consumers,
> but to rework the fix to bug 1215723 to make it not have a main-thread
> dependency. I think doing so is actually relatively easy, all that should
> be required is to rewrite RunOnAllContentParents() to make it dispatch a
> runnable to the main thread if we aren't there currently, and make sure its
> callers capture their closure with a copy rather than by reference.
|
|
1,458,856 | 13,251,771 |
[Description:]
The following reproduces only on a FF client when using a new non-existent preference added manually from about:config.
[Prerequisites:]
You need access to New Admin interface (https://normandy-admin.stage.mozaws.net/control-new)
1. Set the app.normandy.dev_mode preference to true to run recipes immediately on startup.
2. Set the app.normandy.logging.level preference to 0 to enable more logging.
3. Set the security.content.signature.root_hash preference to DB:74:CE:58:E4:F9:D0:9E:E0:42:36:BE:6C:C5:C4:F6:6A:E7:74:7D:C0:21:42:7A:03:BC:2F:57:0C:8B:9B:90.
4. Set the preference value for app.normandy.api_url set to https://normandy.stage.mozaws.net/api/v1
[Steps:]
1. Open Firefox client with a new profile.
2. Open about:config in a new tab and right click and add a new preferences: e.g. non_existent_preference, int, with value 10.
3. Open Admin center and create a new rollout type recipe, targeting the step2 preference, changing the value to something else, e.g. 12.
4. Publish step 3 recipe.
5. On the profile from step 1, set prerequisites and restart.
6. Open browser console and check the results.
[Actual Result:]
1525337683826 app.normandy.recipe-runner INFO Executing recipe "pref-r-2" (action=preference-rollout)
[Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIPrefBranch.getIntPref]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: resource://normandy/lib/PrefUtils.jsm :: getPref :: line 34" data: no]
getPref resource://normandy/lib/PrefUtils.jsm:34:16 _run/newRollout.preferences< resource://normandy/actions/PreferenceRolloutAction.jsm:41:24 map self-hosted:292:17 _run resource://normandy/actions/PreferenceRolloutAction.jsm:38:20 InterpretGeneratorResume self-hosted:1264:8
[Expected Result:]
The preference rollout should be executed successfully with no browser console error.
|
|
1,458,906 | 13,252,208 |
Created attachment 8972884
rec of the issue.gif
[Affected versions]:
- Firefox Beta 60.0b16
- Nightly 61.0a1
[Affected Platforms]:
- All Windows
- All Mac
- All Linux
[Prerequisites]:
- Have a clean new Firefox profile.
- Have the set-up for the "Title 1" variant configured (https://goo.gl/cL4Ue3).
[Steps to reproduce]:
1. Start the browser with the profile from prerequisites.
2. Open two new tabs and click the "Customize your New Tab page" button from the top right part of the page.
3. Uncheck the "Sponsored Stories" option.
4. Open a new tab and observe the "Recommended by Pocket" area.
[Expected result]:
- Only the "Pocket" recommendations cards are displayed.
[Actual results]:
- A "Sponsored content" card is also displayed.
[Additional Notes]:
- The issue is reproducible for all the variants except "Control".
- This issue is no longer reproducible for the next new tabs opened.
- Attached a screen recording of the issue.
|
|
1,458,956 | 13,252,665 | null |
|
1,458,997 | 13,252,983 |
Created attachment 8972981
Dark Theme Toolbar Flicker.mov
Nightly 61.0a1 (2018-05-03) (64-Bit)
macOS 10.12.6
STR:
1.) Use the official Dark Theme
2.) Start Nightly
3.) Take a look at the Toolbar, when Nightly starts
Actual: The Toolbar flickers for a short moment.
Expected: No flicker.
This is a regression in latest Nightly.
A screencast is attached.
Thanks,
Mehmet
|
|
1,459,195 | 13,254,592 |
Created attachment 8973201
screenshot
Steps To Reproduce:
1. Open https://cyanharlow.github.io/purecss-francine/
2. Wait for render the page
3. Try scroll down
Actual Results:
See attached screenshot
|
|
1,459,295 | 13,255,490 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0
Build ID: 20180504100129
Steps to reproduce:
1. go to bestbuy.com
2. Login will fail despite verified credentials
Actual results:
Cannot login to the website.
Expected results:
Login should have suceeded as on MS-Edge browser
|
|
1,459,383 | 13,256,243 |
Created attachment 8973400
FireFox_IndexDB_UAF.html
User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
Steps to reproduce:
run firefox with attached html
Actual results:
https://searchfox.org/mozilla-central/source/dom/indexedDB/KeyPath.cpp#323
nsresult
KeyPath::ExtractKey(JSContext* aCx, const JS::Value& aValue, Key& aKey) const
{
uint32_t len = mStrings.Length();
JS::Rooted<JS::Value> value(aCx);
aKey.Unset();
for (uint32_t i = 0; i < len; ++i) {
nsresult rv = GetJSValFromKeyPathString(aCx, aValue, mStrings[i],
value.address(),
DoNotCreateProperties, nullptr,
nullptr);
if (NS_FAILED(rv)) {
return rv;
}
if (NS_FAILED(aKey.AppendItem(aCx, IsArray() && i == 0, value))) {
NS_ASSERTION(aKey.IsUnset(), "Encoding error should unset");
return NS_ERROR_DOM_INDEXEDDB_DATA_ERR;
}
}
aKey.FinishArray();
return NS_OK;
}
GetJSValFromKeyPathString can execute js callback by setting a getter. In the callback, one can call deleteIndex free the KeyPath now using, which make mStrings invalid.
|
|
1,459,404 | 13,256,428 |
Created attachment 8973441
leakjsonSandbox.zip
When calling browser.storage.sync.get (and set?), then the jsonSandbox (created via [1], [2] and [3]) is leaked when the page is closed:
chrome.storage.sync.get({booleanValue: true}, function(items) {});
If a temporary add-on ID is used (i.e. manifest.json does not have applications.gecko.id), then the content script sandbox is leaked too, but only if a property of the resolved storage object is accessed:
chrome.storage.sync.get({booleanValue: true}, function(items) { void items.booleanValue; });
chrome.storage.sync.get({booleanValue: true}, function(items) {});
// ^ The last does not leak the content script sandbox, the first does.
STR.
1. Put page.html (in leakjsonSandbox.zip) on a server, e.g. at localhost
2. Load the extension (leakjsonSandbox.zip).
3. Open about:memory
4. Open page.html
5. Follow the instructions at page.html (basically create 10 frames, then remove those frames).
In about:memory, the leaked sandboxes can be found by searching for "leaky, moz".
To reproduce the content script sandbox leakage, unzip the extension, edit manifest.json and remove the "applications" section.
Reproduced in Firefox 59.0.2 and Firefox Nightly 20180504220115
[1]: https://searchfox.org/mozilla-central/rev/c0d81882c7941c4ff13a50603e37095cdab0d1ea/toolkit/components/extensions/ExtensionCommon.jsm#259-268
[2]: https://searchfox.org/mozilla-central/rev/53afcfdbabed96883126d0ebbcac499b358e32f2/toolkit/components/extensions/child/ext-storage.js#66-81
[3]: https://searchfox.org/mozilla-central/rev/53afcfdbabed96883126d0ebbcac499b358e32f2/toolkit/components/extensions/child/ext-storage.js#119-121
|
|
1,459,697 | 13,260,284 |
Created attachment 8973771
testcase.html
Found with m-c:
BuildID=20180507140941
SourceStamp=93443d36d4bd53dba004f7b73430879f96daa681
==25250==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000056d5d8 bp 0x7ffe1fbede30 sp 0x7ffe1fbedcc0 T0)
==25250==The signal is caused by a WRITE memory access.
==25250==Hint: address points to the zero page.
#0 0x56d5d7 in MOZ_CrashPrintf src/mfbt/Assertions.cpp:63:3
#1 0x7f3dbab4cc6b in InvalidArrayIndex_CRASH(unsigned long, unsigned long) src/xpcom/ds/nsTArray.cpp:26:3
#2 0x7f3dc2dc4b6a in ElementAt src/obj-firefox/dist/include/nsTArray.h:1041:7
#3 0x7f3dc2dc4b6a in operator[] src/obj-firefox/dist/include/nsTArray.h:1070
#4 0x7f3dc2dc4b6a in nsFloatManager::EllipseShapeInfo::LineEdge(int, int, bool) const src/layout/generic/nsFloatManager.cpp:1007
#5 0x7f3dc2dc2104 in LineLeft src/layout/generic/nsFloatManager.cpp:2348:43
#6 0x7f3dc2dc2104 in nsFloatManager::GetFlowArea(mozilla::WritingMode, int, int, nsFloatManager::BandInfoType, nsFloatManager::ShapeType, mozilla::LogicalRect, nsFloatManager::SavedState*, nsSize const&) const src/layout/generic/nsFloatManager.cpp:225
#7 0x7f3dc2cbef1e in GetFloatAvailableSpaceWithState src/layout/generic/BlockReflowInput.cpp:345:21
#8 0x7f3dc2cbef1e in GetFloatAvailableSpace src/layout/generic/BlockReflowInput.h:134
#9 0x7f3dc2cbef1e in mozilla::BlockReflowInput::AddFloat(nsLineLayout*, nsIFrame*, int) src/layout/generic/BlockReflowInput.cpp:636
#10 0x7f3dc2f1f061 in AddFloat src/layout/generic/nsLineLayout.h:182:22
#11 0x7f3dc2f1f061 in nsLineLayout::ReflowFrame(nsIFrame*, nsReflowStatus&, mozilla::ReflowOutput*, bool&) src/layout/generic/nsLineLayout.cpp:966
#12 0x7f3dc2d5073d in nsBlockFrame::ReflowInlineFrame(mozilla::BlockReflowInput&, nsLineLayout&, nsLineList_iterator, nsIFrame*, LineReflowStatus*) src/layout/generic/nsBlockFrame.cpp:4158:15
#13 0x7f3dc2d4f0e7 in nsBlockFrame::DoReflowInlineFrames(mozilla::BlockReflowInput&, nsLineLayout&, nsLineList_iterator, nsFlowAreaRect&, int&, nsFloatManager::SavedState*, bool*, LineReflowStatus*, bool) src/layout/generic/nsBlockFrame.cpp:3958:5
#14 0x7f3dc2d45e09 in nsBlockFrame::ReflowInlineFrames(mozilla::BlockReflowInput&, nsLineList_iterator, bool*) src/layout/generic/nsBlockFrame.cpp:3832:9
#15 0x7f3dc2d3e360 in nsBlockFrame::ReflowLine(mozilla::BlockReflowInput&, nsLineList_iterator, bool*) src/layout/generic/nsBlockFrame.cpp:2816:5
#16 0x7f3dc2d33be0 in nsBlockFrame::ReflowDirtyLines(mozilla::BlockReflowInput&) src/layout/generic/nsBlockFrame.cpp:2352:7
#17 0x7f3dc2d2b3f4 in nsBlockFrame::Reflow(nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, nsReflowStatus&) src/layout/generic/nsBlockFrame.cpp:1225:3
#18 0x7f3dc2d8b8b6 in nsContainerFrame::ReflowChild(nsIFrame*, nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, mozilla::WritingMode const&, mozilla::LogicalPoint const&, nsSize const&, unsigned int, nsReflowStatus&, nsOverflowContinuationTracker*) src/layout/generic/nsContainerFrame.cpp:951:14
#19 0x7f3dc303f55b in nsHTMLButtonControlFrame::ReflowButtonContents(nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, nsIFrame*) src/layout/forms/nsHTMLButtonControlFrame.cpp:252:3
#20 0x7f3dc303ecb0 in nsHTMLButtonControlFrame::Reflow(nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, nsReflowStatus&) src/layout/forms/nsHTMLButtonControlFrame.cpp:204:3
#21 0x7f3dc2f1ec6f in nsLineLayout::ReflowFrame(nsIFrame*, nsReflowStatus&, mozilla::ReflowOutput*, bool&) src/layout/generic/nsLineLayout.cpp:924:13
#22 0x7f3dc2d5073d in nsBlockFrame::ReflowInlineFrame(mozilla::BlockReflowInput&, nsLineLayout&, nsLineList_iterator, nsIFrame*, LineReflowStatus*) src/layout/generic/nsBlockFrame.cpp:4158:15
#23 0x7f3dc2d4f0e7 in nsBlockFrame::DoReflowInlineFrames(mozilla::BlockReflowInput&, nsLineLayout&, nsLineList_iterator, nsFlowAreaRect&, int&, nsFloatManager::SavedState*, bool*, LineReflowStatus*, bool) src/layout/generic/nsBlockFrame.cpp:3958:5
#24 0x7f3dc2d45e09 in nsBlockFrame::ReflowInlineFrames(mozilla::BlockReflowInput&, nsLineList_iterator, bool*) src/layout/generic/nsBlockFrame.cpp:3832:9
#25 0x7f3dc2d3e360 in nsBlockFrame::ReflowLine(mozilla::BlockReflowInput&, nsLineList_iterator, bool*) src/layout/generic/nsBlockFrame.cpp:2816:5
#26 0x7f3dc2d33be0 in nsBlockFrame::ReflowDirtyLines(mozilla::BlockReflowInput&) src/layout/generic/nsBlockFrame.cpp:2352:7
#27 0x7f3dc2d2b3f4 in nsBlockFrame::Reflow(nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, nsReflowStatus&) src/layout/generic/nsBlockFrame.cpp:1225:3
#28 0x7f3dc2d4c667 in nsBlockReflowContext::ReflowBlock(mozilla::LogicalRect const&, bool, nsCollapsingMargin&, int, bool, nsLineBox*, mozilla::ReflowInput&, nsReflowStatus&, mozilla::BlockReflowInput&) src/layout/generic/nsBlockReflowContext.cpp:306:11
#29 0x7f3dc2d406e3 in nsBlockFrame::ReflowBlockFrame(mozilla::BlockReflowInput&, nsLineList_iterator, bool*) src/layout/generic/nsBlockFrame.cpp:3463:11
#30 0x7f3dc2d3e4b5 in nsBlockFrame::ReflowLine(mozilla::BlockReflowInput&, nsLineList_iterator, bool*) src/layout/generic/nsBlockFrame.cpp:2813:5
#31 0x7f3dc2d33be0 in nsBlockFrame::ReflowDirtyLines(mozilla::BlockReflowInput&) src/layout/generic/nsBlockFrame.cpp:2352:7
#32 0x7f3dc2d2b3f4 in nsBlockFrame::Reflow(nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, nsReflowStatus&) src/layout/generic/nsBlockFrame.cpp:1225:3
#33 0x7f3dc2d8b8b6 in nsContainerFrame::ReflowChild(nsIFrame*, nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, mozilla::WritingMode const&, mozilla::LogicalPoint const&, nsSize const&, unsigned int, nsReflowStatus&, nsOverflowContinuationTracker*) src/layout/generic/nsContainerFrame.cpp:951:14
#34 0x7f3dc2d8a102 in nsCanvasFrame::Reflow(nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, nsReflowStatus&) src/layout/generic/nsCanvasFrame.cpp:713:5
#35 0x7f3dc2d8b8b6 in nsContainerFrame::ReflowChild(nsIFrame*, nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, mozilla::WritingMode const&, mozilla::LogicalPoint const&, nsSize const&, unsigned int, nsReflowStatus&, nsOverflowContinuationTracker*) src/layout/generic/nsContainerFrame.cpp:951:14
#36 0x7f3dc2e76658 in nsHTMLScrollFrame::ReflowScrolledFrame(mozilla::ScrollReflowInput*, bool, bool, mozilla::ReflowOutput*, bool) src/layout/generic/nsGfxScrollFrame.cpp:555:3
#37 0x7f3dc2e77a79 in nsHTMLScrollFrame::ReflowContents(mozilla::ScrollReflowInput*, mozilla::ReflowOutput const&) src/layout/generic/nsGfxScrollFrame.cpp:678:3
#38 0x7f3dc2e7ba58 in nsHTMLScrollFrame::Reflow(nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, nsReflowStatus&) src/layout/generic/nsGfxScrollFrame.cpp:1055:3
#39 0x7f3dc2d0f74e in nsContainerFrame::ReflowChild(nsIFrame*, nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, int, int, unsigned int, nsReflowStatus&, nsOverflowContinuationTracker*) src/layout/generic/nsContainerFrame.cpp:995:14
#40 0x7f3dc2d0e2ce in mozilla::ViewportFrame::Reflow(nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, nsReflowStatus&) src/layout/generic/ViewportFrame.cpp:335:7
#41 0x7f3dc2af3c10 in mozilla::PresShell::DoReflow(nsIFrame*, bool) src/layout/base/PresShell.cpp:8983:11
#42 0x7f3dc2b09b20 in mozilla::PresShell::ProcessReflowCommands(bool) src/layout/base/PresShell.cpp:9156:24
#43 0x7f3dc2b07f29 in mozilla::PresShell::DoFlushPendingNotifications(mozilla::ChangesToFlush) src/layout/base/PresShell.cpp:4366:11
#44 0x7f3dc2be5030 in FlushPendingNotifications src/obj-firefox/dist/include/nsIPresShell.h:583:5
#45 0x7f3dc2be5030 in nsDocumentViewer::LoadComplete(nsresult) src/layout/base/nsDocumentViewer.cpp:982
#46 0x7f3dc5d3f8a2 in nsDocShell::EndPageLoad(nsIWebProgress*, nsIChannel*, nsresult) src/docshell/base/nsDocShell.cpp:7236:21
#47 0x7f3dc5d3bcc9 in nsDocShell::OnStateChange(nsIWebProgress*, nsIRequest*, unsigned int, nsresult) src/docshell/base/nsDocShell.cpp:7029:7
#48 0x7f3dc5d434cf in non-virtual thunk to nsDocShell::OnStateChange(nsIWebProgress*, nsIRequest*, unsigned int, nsresult) src/docshell/base/nsDocShell.cpp
#49 0x7f3dbc9ecef7 in nsDocLoader::DoFireOnStateChange(nsIWebProgress*, nsIRequest*, int&, nsresult) src/uriloader/base/nsDocLoader.cpp:1315:3
#50 0x7f3dbc9ebf7a in nsDocLoader::doStopDocumentLoad(nsIRequest*, nsresult) src/uriloader/base/nsDocLoader.cpp:858:14
#51 0x7f3dbc9e8b55 in nsDocLoader::DocLoaderIsEmpty(bool) src/uriloader/base/nsDocLoader.cpp:747:9
#52 0x7f3dbc9eab1c in nsDocLoader::OnStopRequest(nsIRequest*, nsISupports*, nsresult) src/uriloader/base/nsDocLoader.cpp:632:5
#53 0x7f3dbc9ebb3c in non-virtual thunk to nsDocLoader::OnStopRequest(nsIRequest*, nsISupports*, nsresult) src/uriloader/base/nsDocLoader.cpp
#54 0x7f3dbae1fd1a in mozilla::net::nsLoadGroup::RemoveRequest(nsIRequest*, nsISupports*, nsresult) src/netwerk/base/nsLoadGroup.cpp:629:28
#55 0x7f3dbdda526a in DoUnblockOnload src/dom/base/nsDocument.cpp:8419:18
#56 0x7f3dbdda526a in nsDocument::UnblockOnload(bool) src/dom/base/nsDocument.cpp:8341
#57 0x7f3dbdd85bd4 in nsIDocument::DispatchContentLoadedEvents() src/dom/base/nsDocument.cpp:5321:3
#58 0x7f3dbde9cde4 in applyImpl<nsIDocument, void (nsIDocument::*)()> src/obj-firefox/dist/include/nsThreadUtils.h:1165:12
#59 0x7f3dbde9cde4 in apply<nsIDocument, void (nsIDocument::*)()> src/obj-firefox/dist/include/nsThreadUtils.h:1171
#60 0x7f3dbde9cde4 in mozilla::detail::RunnableMethodImpl<nsIDocument*, void (nsIDocument::*)(), true, (mozilla::RunnableKind)0>::Run() src/obj-firefox/dist/include/nsThreadUtils.h:1216
#61 0x7f3dbac180d1 in mozilla::SchedulerGroup::Runnable::Run() src/xpcom/threads/SchedulerGroup.cpp:337:32
#62 0x7f3dbac36ec9 in nsThread::ProcessNextEvent(bool, bool*) src/xpcom/threads/nsThread.cpp:1090:14
#63 0x7f3dbac52900 in NS_ProcessNextEvent(nsIThread*, bool) src/xpcom/threads/nsThreadUtils.cpp:519:10
#64 0x7f3dbbb306da in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) src/ipc/glue/MessagePump.cpp:97:21
#65 0x7f3dbba84f89 in RunInternal src/ipc/chromium/src/base/message_loop.cc:326:10
#66 0x7f3dbba84f89 in RunHandler src/ipc/chromium/src/base/message_loop.cc:319
#67 0x7f3dbba84f89 in MessageLoop::Run() src/ipc/chromium/src/base/message_loop.cc:299
#68 0x7f3dc253e57a in nsBaseAppShell::Run() src/widget/nsBaseAppShell.cpp:157:27
#69 0x7f3dc67b2f7b in XRE_RunAppShell() src/toolkit/xre/nsEmbedFunctions.cpp:893:22
#70 0x7f3dbba84f89 in RunInternal src/ipc/chromium/src/base/message_loop.cc:326:10
#71 0x7f3dbba84f89 in RunHandler src/ipc/chromium/src/base/message_loop.cc:319
#72 0x7f3dbba84f89 in MessageLoop::Run() src/ipc/chromium/src/base/message_loop.cc:299
#73 0x7f3dc67b2940 in XRE_InitChildProcess(int, char**, XREChildData const*) src/toolkit/xre/nsEmbedFunctions.cpp:719:34
#74 0x4f1875 in content_process_main src/browser/app/../../ipc/contentproc/plugin-container.cpp:50:30
#75 0x4f1875 in main src/browser/app/nsBrowserApp.cpp:280
#76 0x7f3dda3bc82f in __libc_start_main /build/glibc-Cl5G7W/glibc-2.23/csu/../csu/libc-start.c:291
#77 0x420f48 in _start (firefox+0x420f48)
|
|
1,459,760 | 13,260,978 |
Steps to reproduce:
1. Enable gfx.webrender.all
2. Go to a website that you don't have bookmarked.
3. Click the star icon at the end of the URL button.
Expected results:
The animation should look good.
Actual results:
The star flickers during the animation.
|
|
1,459,899 | 13,262,128 |
[Environment:]
Windows 8.1 x64
62.0a1 20180507222648
[Prerequisites:]
1. Set the app.normandy.dev_mode preference to true to run recipes immediately on startup.
2. Set the app.normandy.logging.level preference to 0 to enable more logging.
3. Set the security.content.signature.root_hash preference to DB:74:CE:58:E4:F9:D0:9E:E0:42:36:BE:6C:C5:C4:F6:6A:E7:74:7D:C0:21:42:7A:03:BC:2F:57:0C:8B:9B:90.
4. Set the preference value for app.normandy.api_url set to https://normandy.stage.mozaws.net/api/v1
[Steps:]
1. Open Control Center (https://normandy-admin.stage.mozaws.net/)
2. Create a rollout recipe with the blob:
{
"preferences": [
{
"preferenceName": "test.int.1",
"value": 1
}
],
"slug": "rollout-pref"
}
3. Save, Approve, Publish the recipe.
4. Set prerequisites and open a Firefox client which supports rollouts (Fx61+)
5. Open Browser Console and notice the logs.
6. Restart Firefox.
7. Look again at browser console.
[Actual Result:]
5.
app.normandy.recipe-runner INFO Executing recipe "Rollout exp" (action=preference-rollout)
app.normandy.action.PreferenceRolloutAction DEBUG Enrolled in preference rollout rollout-pref
7.
app.normandy.recipe-runner INFO Executing recipe "rollout-pref" (action=preference-rollout)
app.normandy.action.PreferenceRolloutAction DEBUG updating rollout-graduation1: test.int.1 previous value changed from null to 1
app.normandy.action.PreferenceRolloutAction DEBUG Updated preference rollout rollout-pref
in about:telemtry -> normandy update preference_rollout rollout-pref {"previousState": "active"}
[Expected Result:]
No update should be performed upon restart, no telemetry event should be logged either.
[Note:]
Repeating step 6 produces the same AR.
|
|
1,460,082 | 13,263,901 |
We are looking into removing the `app.update.enabled` pref, and replacing that functionality with the DisableAppUpdate and DisableSystemAddonUpdate policies. This would make it necessary to enable these policies outside of ESR builds.
|
|
1,460,119 | 13,264,220 |
See https://github.com/mozmeao/snippets-service/pull/395#issuecomment-385320405
|
|
1,460,202 | 13,264,582 |
Created attachment 8974281
FF-no-zoom.PNG
User Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:59.0) Gecko/20100101 Firefox/59.0
Build ID: 20180404120016
Steps to reproduce:
Open the link: https://www.gsmarena.com/android_p_beta_is_out_today_for_pixels-news-30932.php
Actual results:
Unlike Safari, unable to zoom into the webpage. Check attachments.
Expected results:
The webpage should be zoomable.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.