Bug ID
int64 961
1.91M
| Comment ID
int64 3.98k
17.1M
| Author
stringlengths 8
48
| Comment Text
stringlengths 1
64.3k
⌀ |
---|---|---|---|
1,641,510 | 14,849,001 |
Created attachment 9152356
about_support.js
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:77.0) Gecko/20100101 Firefox/77.0
Steps to reproduce:
I use two 24" 4K screens with a nVidia GeForce 1030 GT.
Before Firefox 77 WebRender was working well and is fast. With Firefox 77 WebRender is incorrectly blacklisted and Direct3D 11 is used and Firefox is sluggish.
Actual results:
WebRender is blacklisted since Firefox 77 for obscure reason : "blocked by env: Monitor refresh rate too high".
The monitors are both 60 Hz.
Expected results:
WebRender should be enable by default in this setup, as it has been since Firefox 68.
|
|
1,641,533 | 14,849,135 |
**Affected versions**
* 78.0a1 (2020-05-28)
**Affected platforms**
* Ubuntu 18.04 LTS
**Steps to reproduce**
1. Engage in a videoconference call.
2. Observe the Global Sharing Overlay.
3. Click on the minimize button from the Global Sharing Overlay.
**Expected result**
* Global Sharing Overlay is minimized.
**Actual Result**
* The minimize button from the Global Sharing Overlay doesn't work as expected.
**Regression range**
* This is a recent regression introduced when the Global Sharing Overlay title bar was fixed.
**Additional notes**
* The minimize button worked before the title bar of the Global Sharing Overlay was fixed.
|
|
1,641,715 | 14,850,600 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Firefox/78.0
Steps to reproduce:
For about a month in Fenix, opening a PWA or custom tab sometimes gets a white screen rather than the webpage loading. This also occurs in Sample Browser in Android Components. If you remove the main app from memory by clearing recent apps, PWAs will not load.
I checkout out lots of old Android Components versions from late April and early May to track down where the bug appeared. (See https://github.com/mozilla-mobile/fenix/issues/10689.) I narrowed down one line: changing the nighly GeckoView version from "77.0.20200428100141" to "77.0.20200429095105".
There are not many behaviour changes between PWAs and the main browser app, so we're not sure why this issue has sprung up.
This is a high priority bug and needs to be fixed before Fenix's feature freeze.
Actual results:
White screen loads after GV version change
Expected results:
Webpage should load, just like before the change.
|
|
1,642,141 | 14,853,268 |
This bug is for crash report bp-f28e079c-53f2-4544-bfd1-a4e5e0200530.
```
Top 10 frames of crashing thread:
0 accessiblehandler.dll mozilla::a11y::AccessibleHandlerControl::CacheAccessible accessible/ipc/win/handler/AccessibleHandlerControl.cpp:178
1 accessiblehandler.dll mozilla::a11y::AccessibleHandler::ReadHandlerPayload accessible/ipc/win/handler/AccessibleHandler.cpp:507
2 accessiblehandler.dll mozilla::mscom::Handler::UnmarshalInterface ipc/mscom/oop/Handler.cpp:255
3 combase.dll CoUnmarshalInterface onecore\com\combase\dcomrem\coapi.cxx:1951
4 combase.dll Ndr64ExtInterfacePointerUnmarshall onecore\com\combase\ndr\ndrole64\oleaux64.cxx:463
5 rpcrt4.dll void Ndr64pPointerUnmarshallInternal
6 rpcrt4.dll void Ndr64pPointerUnmarshallInternal
7 rpcrt4.dll Ndr64pClientUnMarshal
8 rpcrt4.dll NdrpClientCall3
9 combase.dll ObjectStublessClient onecore\com\combase\ndr\ndrole\amd64\stblsclt.cxx:292
```
STR, with the NVDA screen reader:
1. I was on [this page](https://www.netlify.com/careers/).
2. Navigated to the first table on the page.
3. Used CTRL+Alt+DownArrow to walk down the first column.
* Result: At row 3 or so, I got this crash.
Looks like the new caching code in the handler to me.
|
|
1,656,261 | 14,964,024 |
This bug is for crash report bp-0c00bee1-3fce-4e97-a43b-1a8a80200730.
Top 10 frames of crashing thread:
```
0 xul.dll mozilla::ErrorLoadingSheet layout/style/GlobalStyleSheetCache.cpp:529
1 xul.dll mozilla::GlobalStyleSheetCache::LoadSheet layout/style/GlobalStyleSheetCache.cpp:564
2 xul.dll mozilla::GlobalStyleSheetCache::LoadSheetURL layout/style/GlobalStyleSheetCache.cpp:509
3 xul.dll mozilla::GlobalStyleSheetCache::XULSheet layout/style/UserAgentStyleSheetList.h:37
4 xul.dll mozilla::GlobalStyleSheetCache::GlobalStyleSheetCache layout/style/GlobalStyleSheetCache.cpp:239
5 xul.dll static mozilla::GlobalStyleSheetCache::Singleton layout/style/GlobalStyleSheetCache.cpp:459
6 xul.dll mozilla::dom::Document::FillStyleSetUserAndUASheets dom/base/Document.cpp:2797
7 xul.dll mozilla::dom::Document::CreatePresShell dom/base/Document.cpp:6192
8 xul.dll nsDocumentViewer::InitPresentationStuff layout/base/nsDocumentViewer.cpp:712
9 xul.dll nsDocumentViewer::InitInternal layout/base/nsDocumentViewer.cpp:918
```
Seeing a number of crashes in 80.0b1 with crash reason "LoadSheetSync failed with error 80520012 loading built-in stylesheet 'chrome://global/content/xul.css'"
|
|
1,657,459 | 14,974,257 |
Created attachment 9168255
Screen Shot 2020-08-05 at 3.19.48 PM.png
When I right click on the preview pane in the print preview modal, the context menu shows up in a different location (on the very right of the screen). It appears that the context menu is also based on the HTML element being clicked on (for example, clicking on a link will show menu items to follow the link, etc.)
In the screenshot attached, I right clicked on the red "COVID-19" image in the preview pane.
Expected behaviour: I expected not to be able to right click in the preview pane.
Using 81.0a1 (2020-08-05) (64-bit) on macOS Catalina 10.15.5.
|
|
1,657,653 | 14,975,924 |
The current implementation for getting a string for a range requires us to traverse the text tree in the parent process and make a handful of synchronous calls into content for each node. The larger the subtree, the more calls. This means that if a user selects a very large chunk of text with VoiceOver running, or OSX's speak selection feature - Firefox will hang.
I think we need to back out this API until a more efficient implementation is available.
|
|
1,650,162 | 14,915,158 |
User Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 13_5_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/13.1.1 Mobile/15E148 Safari/604.1
Steps to reproduce:
Upgrade from FF 68.9.0ESR to 78.0.1ESR.
Actual results:
MS Teams links (received by mail and opened by FF) aren’t opened on Teams Application since we do the upgrade.
Expected results:
Worked fine on previous version.
And impossible to rollback to FF 68.9.0 without create a new user FF profile.
|
|
1,642,630 | 14,857,974 |
Hi,
As of last week, the French Nightly build stopped including [the French Hunspell spellchecker](https://hg.mozilla.org/l10n-central/fr/file/tip/extensions/spellcheck/hunspell).
Axel thinks it might be due to some l10n merge changes
|
|
1,643,228 | 14,862,049 |
Created attachment 9154072
squid_log_sample
User Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:76.0) Gecko/20100101 Firefox/76.0
Steps to reproduce:
This morning, a Windows PC running Firefox 77.0.1 effectively launched a DOS attack against my proxy. Direct HTTP(S) requests are explicitly rejected (not merely dropped) by my firewall.
Actual results:
Firefox desperately tried all day (250 times per second!) to use DNS over HTTPS (even though it was disabled in the GUI -- that's a separate issue), trying both cloudflare and nextdns addresses. After millions of attempts, my proxy logs ran out of disk space...
Expected results:
Even if DNS over HTTPS is enabled by the user, Firefox should be a bit less aggressive about trying to use it, esp. since it gave the user no idea that it was happening.
|
|
1,643,411 | 14,863,396 |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0
Steps to reproduce:
On Firefox Nightly, videos on Netflix or YouTube don't work well.
Actual results:
I've got the sound but the image is frozen on the first sample.
Like for instance, if you change the progress bar, you'll get the first image and after it's frozen.
Expected results:
Working correctly
|
|
1,644,076 | 14,868,934 |
Commonly, websites use a response header like `X-Frame-Options: DENY` or CSP's `frame-ancestors` directive to disallow being embedded across origins.
It seems that this restriction can be easily bypassed with embeds like `<object data=url>` or `<embed src=url>`.
STR:
1. Find a website that disallows framing (i.e., `X-Frame-Options` set to `DENY` or `SAMEORIGIN` or has a CSP directive that does the same). This example will use https://accounts.google.com
2. Embed on a different origin using embed or object elements. Example:
`data:text/html,embed:<embed src="https://accounts.google.com"><hr>object:<object data="https://accounts.google.com">`
3. Observe how both frames are loading successfully.
Expected results: Frames should not load and show an error page.
|
|
1,653,638 | 14,942,959 |
### Steps to reproduce
1. Load https://www.oldguardgame.com/ in Fx80 Nightly.
### Expected result
The page loads and rendered the content.
### Actual result
The page is black/blank except for a blue wheelchair icon in the lower right corner of the page.
|
|
1,655,363 | 14,956,802 |
Created attachment 9166175
The outcome of typing "w" in the awesome bar in a new tab
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
Steps to reproduce:
Open a new tab and begin entering `www` (or anything beginning with a `w`.)
Actual results:
Shortly after I enter the first `w`, it autocompletes `oogle.com`.
The dropdown displays "http://**www**.google.com". As I add more `w`s, it overstrikes `oogle.com` and I'll end up with `wwwgle.com`. See attached screenshots.
If I type too fast (as in `wnc`, `web`), it will destroy `nc` and `eb` and also replace them with `gle.com`.
Expected results:
It should not do that.
|
|
1,686,708 | 15,215,746 |
Created attachment 9197062
Update browser console.txt
**Affected versions**
* Latest Nightly 86.0a1
**Affected platforms**
* Windows 10 64bit
* Windows 7 64bit
**Unaffected platforms**
* MacOS 11
* Ubuntu 18.04
**Steps to reproduce**
1. Install old Nightly form a few days or yesterday (I tried with 08.01.2021 or 13.01.2021)
2. Access about nightly so an update is triggered
3. Restart Nightly
**Expected result**
* Nightly restarts after updates are applied
**Actual result**
* Nightly does not restart and can't be opened anymore
**Regression range**
* I also restarted nightly yesterday after update and it worked just fine so it must be something that broke since yesterday
|
|
1,674,521 | 15,109,174 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36 Edg/86.0.622.56
Steps to reproduce:
Upgraded to Thunderbird 78.3.3 which uses the new native OpenPGP mechanism.
I was just reading emails when I got a message that there was no matching key.
I restored my keys from a backup but then the problem recurred twice.
Actual results:
Three times in the passed three weeks all my keys vanished. When I checked "OpenPGP Key Manager" it was empty..
Expected results:
The PGP keys should have remained
|
|
1,682,834 | 15,179,032 |
Created attachment 9193494
Firefox85YouTubeError.png
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:85.0) Gecko/20100101 Firefox/85.0
Steps to reproduce:
Click on a video on YouTube
Actual results:
Black screen. No playback.
Expected results:
Video plays.
|
|
1,683,936 | 15,192,730 |
From github: https://github.com/mozilla-mobile/fenix/issues/17181.
> Firefox does not show(render) any website. No google search, nothing. You just got a white or black pane where content should be shown, no matter which URL. Looks like others have this problem too: https://www.reddit.com/r/firefox/comments/kfg3zb/8411_stable_any_url_only_shows_a_blank_background/.
> It looks like you can still click on unvisible links on this blank screen and the url changes, so it must be the rendering .
>
> I am using firefox for a long time on this device and never got a ( serious ;-) )problem before. Just V 84.1.1 is completly broken for me.
> I have no plugins installed and already restarted the device and so on...
>
>
> ## Steps to reproduce
> I got an update from playstore and now firefox does not show any more webites. You either get a white or a black screen.
> Just install firefox 84.1.1 and you get the trouble. ( on this device )
> ### Expected behavior
> firefox should show websites
>
> ### Actual behavior
> firefox just shows white or black blank screen as content.
> ### Device information
> * Android device: Xiaomi redmi note 3 global
> Android 6.0.1 MMB29M ( MIUMI Global 10.2 Stable 10.2.1.0(MHRMIXXM))
>
> * Fenix version: 84.1.1 (Build #2015781795)
>
>
Change performed by the [Move to Bugzilla add-on](https://addons.mozilla.org/en-US/firefox/addon/move-to-bugzilla/).
|
|
1,683,964 | 15,192,918 |
I don't know if this applies to Firefox or not, but Project Zero just opened up a bug containing a use-after-free in SCTP: https://bugs.chromium.org/p/project-zero/issues/detail?id=2094
The commit said to fix it is here: https://github.com/sctplab/usrsctp/commit/d844a690d30ace22de75e8b80d9bb08ae7283795
I didn't check the whole patch, but our code in netwerk/sctp/src/netinet/sctp_input.c at least appears to match the pre-patch state, and neither that file nor netwerk/sctp/src/netinet/sctp_pcb.c have changed since July.
|
|
1,677,399 | 15,131,751 |
Created attachment 9187941
Screenshot 2020-11-15 000358.png
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:84.0) Gecko/20100101 Firefox/84.0
Steps to reproduce:
I was just using Firefox Nightly as usual. Last build, Windows 10 x64.
I noticed strange periodical CPU usage.
Actual results:
Once per minute Firefox was using 25% CPU for some time (see attached screenshot). I checked what it was doing. There was some I/O using, \AppData\Roaming\Mozilla\Firefox\Profiles\<profile>\security_state\crlite.stash file in particular.
All is OK with new test profile.
Firefox Profiler results: https://share.firefox.dev/3f697LF
Expected results:
There should not be this unusual CPU usage.
|
|
1,677,516 | 15,133,997 |
This currently represents more than 6% of the total hang time reported through BHR for the nightly user base, making it one of the top five hangs (http://queze.net/bhr/test/#row=1&filter=cert_storage).
The main thread seems to be blocked trying to get a lock (`RtlAcquireSRWLockExclusive`).
The two most common stacks look like this:
```
RtlAcquireSRWLockExclusive ntdll
cert_storage::{{impl}}::done<tuple<>,closure-0>(cert_storage::SecurityStateTask<tuple<>, closure-0>*) xul
moz_task::{{impl}}::allocate::Run(xpcom::interfaces::idl::nsIRunnable*) xul
mozilla::TaskController::DoExecuteNextTaskOnlyMainThreadInternal(mozilla::detail::BaseAutoLock<mozilla::Mutex &> const&) xul
mozilla::detail::RunnableFunction<`lambda at /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:120:7'>::Run() xul
nsThread::ProcessNextEvent(bool, bool*) xul
```
and
```
RtlAcquireSRWLockExclusive ntdll
cert_storage::{{impl}}::allocate::AddCRLiteStash(xpcom::interfaces::idl::nsICertStorage*, thin_vec::ThinVec<u8>*, xpcom::interfaces::idl::nsICertStorageCallback*) xul
XPTC__InvokebyIndex xul
static XPCWrappedNative::CallMethod(XPCCallContext&, XPCWrappedNative::CallMode) xul
XPC_WN_CallMethod(JSContext*, unsigned int, JS::Value*) xul
(unresolved)
gre/modules/psm/RemoteSecuritySettings.jsm:797
```
I was on PTO last week, and when I looked at BHR data about a week ago, I don't remember seeing hangs involving cert_storage in the top hangs. Has something related to this code changed recently that would either have introduced these hangs, or significantly increased their frequency?
The `certList.addCRLiteStash` call at https://searchfox.org/mozilla-central/rev/c37038c592a352eda0f5e77dfb58c4929bf8bcd3/security/manager/ssl/RemoteSecuritySettings.jsm#797 seems to have been added in May 2020. Was it there but somehow disabled until last week?
|
|
1,677,590 | 15,134,571 |
Created attachment 9188151
clusterfuzz-testcase-minimized-SdpParser-4737518792343552
This was found via the SdpParser fuzzer in oss-fuzz.
```
==1==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffd0befe390 at pc 0x55cc4f7da2d4 bp 0x7ffd0befd6b0 sp 0x7ffd0befce38
READ of size 257 at 0x7ffd0befe390 thread T0
#0 0x55cc4f7da2d3 in firefox
#1 0x7f2f167028dd in flex_string_vsprintf mozilla-central/third_party/sipcc/cpr_string.c:198:22
#2 0x7f2f1674de80 in sdp_parse_error mozilla-central/third_party/sipcc/sdp_main.c:1361:5
#3 0x7f2f16723f04 in sdp_parse_attr_cpar mozilla-central/third_party/sipcc/sdp_attr.c:2915:9
#4 0x7f2f1670c47b in sdp_parse_attribute mozilla-central/third_party/sipcc/sdp_attr.c:185:14
#5 0x7f2f1674e812 in sdp_parse mozilla-central/third_party/sipcc/sdp_main.c:1164:18
#6 0x7f2f1f06128e in mozilla::SipccSdpParser::Parse(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) mozilla-central/dom/media/webrtc/sdp/SipccSdpParser.cpp:67:25
#7 0x7f2f15d1a702 in RunSdpParserFuzzing(unsigned char const*, unsigned long) mozilla-central/dom/media/webrtc/tests/fuzztests/sdp_parser_libfuzz.cpp:25:20
#1 0x55cc4f9ed4ae in firefox
#2 0x55cc4f9dc3e4 in firefox
#3 0x55cc4f9e0ac1 in firefox
#11 0x7f2f24420770 in mozilla::FuzzerRunner::Run(int*, char***) mozilla-central/tools/fuzzing/interface/harness/FuzzerRunner.cpp:75:13
#12 0x7f2f24354872 in XREMain::XRE_mainStartup(bool*) mozilla-central/toolkit/xre/nsAppRunner.cpp:4190:35
#13 0x7f2f24365fea in XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&) mozilla-central/toolkit/xre/nsAppRunner.cpp:5262:12
#14 0x7f2f24366e40 in XRE_main(int, char**, mozilla::BootstrapConfig const&) mozilla-central/toolkit/xre/nsAppRunner.cpp:5331:21
#15 0x7f2f243808b0 in mozilla::BootstrapImpl::XRE_main(int, char**, mozilla::BootstrapConfig const&) mozilla-central/toolkit/xre/Bootstrap.cpp:45:12
#4 0x55cc4f868daa in firefox
#17 0x7f2f3e78783f in __libc_start_main (/mnt/scratch0/clusterfuzz/bot/builds/clusterfuzz-builds_firefox_6180546f5e5f1d75138bf6cea3784693af7a2aa9/revisions/lib/libc.so.6+0x2083f)
#18 0x55cc4f7bbef8 in _start (/mnt/scratch0/clusterfuzz/bot/builds/clusterfuzz-builds_firefox_6180546f5e5f1d75138bf6cea3784693af7a2aa9/revisions/firefox/firefox+0xb9ef8)
DEDUP_TOKEN: flex_string_vsprintf--sdp_parse_error
Address 0x7ffd0befe390 is located in stack of thread T0 at offset 304 in frame
#0 0x7f2f1672393f in sdp_parse_attr_cpar mozilla-central/third_party/sipcc/sdp_attr.c:2853
DEDUP_TOKEN: sdp_parse_attr_cpar
This frame has 2 object(s):
[32, 36) 'result' (line 2855)
[48, 304) 'tmp' (line 2859) <== Memory access at offset 304 overflows this variable
```
|
|
1,677,723 | 15,135,485 |
[Affected versions]
Firefox 84.0b1
[Affected platforms]
ALL
[Preconditions]
Have the following prefs in the "about:config" page:
Have the "browser.ping-centre.log" set to "true"
Have the "browser.newtabpage.activity-stream.asrouter.devtoolsEnabled" pref set to "true" in the "about:config" page.
[Steps to reproduce]
1. Open the Firefox browser and reach about:newtab#devtools
2. Open Browser Console.
3. From the "about:newtab#devtools" page scroll to the "SIMPLE_TEST_1" snippet.
4. Click the "Show" button.
5. From the Displayed Snippet at the bottom of the page Click the "X" Close button.
[Expected result]
A Telemetry ping should be displayed in Browser console for both actions : "Show" as well as "Close"
[Actual result]
There are no Telemetry pings displayed for either action. The Telemetry ping is only displayed when the user clicks the Link from the Snippet.
|
|
1,677,817 | 15,136,271 |
GMPParent::Init() calls Preferences::GetBool() call off main thread which causes the assertion failure below and is likely to be causing _pthread_join crashes: https://crash-stats.mozilla.org/report/index/ee5b5933-e37e-4ccb-971e-1d0d60201117
```
Assertion failure: sInServoTraversal || NS_IsMainThread(), at /Users/haftandilian/r/mc/obj-db.noindex/dist/include/mozilla/ServoUtils.h:33
#01: mozilla::IsInServoTraversal() (.cold.1)[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x83740e0]
#02: AddAccessCount(nsTSubstring<char> const&)[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x272a40]
#03: mozilla::ServoStyleSet::IsInServoTraversal()[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x21d698]
#04: mozilla::Preferences::InitStaticMembers()[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x224fd8]
#05: nsresult mozilla::Internals::GetPrefValue<bool*>(char const*, bool*&&, mozilla::PrefValueKind)[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x27e9f0]
#06: bool mozilla::Internals::GetPref<bool>(char const*, bool, mozilla::PrefValueKind)[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x26a264]
#07: mozilla::Preferences::GetBool(char const*, bool, mozilla::PrefValueKind)[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x26a22c]
#08: mozilla::gmp::GMPParent::Init(mozilla::gmp::GeckoMediaPluginServiceParent*, nsIFile*)[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x2f32238]
#09: mozilla::gmp::GeckoMediaPluginServiceParent::AddOnGMPThread(nsTString<char16_t>)[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x2f6b28c]
#10: decltype(*(fp).*fp0(Get<0ul>(fp1).PassAsParameter())) mozilla::detail::RunnableMethodArguments<StoreCopyPassByRRef<nsTString<char16_t> > >::applyImpl<mozilla::gmp::GeckoMediaPluginServiceParent, RefPtr<mozilla::MozPromise<bool, nsresult, true> > (mozilla:[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x2f8e86c]
#11: _ZN7mozilla6detail23RunnableMethodArgumentsIJ19StoreCopyPassByRRefI9nsTStringIDsEEEE5applyINS_3gmp29GeckoMediaPluginServiceParentEMS9_F6RefPtrINS_10MozPromiseIb8nsresultLb1EEEES4_EEEDTcl9applyImplfp_fp0_dtdefpT10mArgumentstlNSt3__116integer_sequenceImJLm0[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x2f8e800]
#12: mozilla::detail::MethodCall<mozilla::MozPromise<bool, nsresult, true>, RefPtr<mozilla::MozPromise<bool, nsresult, true> > (mozilla::gmp::GeckoMediaPluginServiceParent::*)(nsTString<char16_t>), mozilla::gmp::GeckoMediaPluginServiceParent, StoreCopyPassByRR[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x2f8e778]
#13: mozilla::detail::ProxyRunnable<mozilla::MozPromise<bool, nsresult, true>, RefPtr<mozilla::MozPromise<bool, nsresult, true> > (mozilla::gmp::GeckoMediaPluginServiceParent::*)(nsTString<char16_t>), mozilla::gmp::GeckoMediaPluginServiceParent, StoreCopyPassB[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x2f8e584]
#14: nsThread::ProcessNextEvent(bool, bool*)[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x1c59cc]
#15: NS_ProcessNextEvent(nsIThread*, bool)[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x1ca3b0]
#16: mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*)[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0xa229b0]
#17: MessageLoop::RunInternal()[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x9a9464]
#18: MessageLoop::RunHandler()[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x9a93e0]
#19: MessageLoop::Run()[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x9a938c]
#20: nsThread::ThreadFunc(void*)[/Users/haftandilian/r/mc/obj-db.noindex/toolkit/library/build/XUL +0x1c31b4]
#21: _pt_root[/Users/haftandilian/r/mc/obj-db.noindex/dist/NightlyDebug.app/Contents/MacOS/libnss3.dylib +0xd70f4]
#22: _pthread_start[/usr/lib/system/libsystem_pthread.dylib +0x706c]
[RDD 57523, Main Thread] WARNING: Shutting down RDD process early due to a crash!: file /Users/haftandilian/r/mc/dom/media/ipc/RDDParent.cpp:236
Exiting due to channel error.
Exiting due to channel error.
Exiting due to channel error.
Crash Annotation GraphicsCriticalError: |[C0][GFX1-]: Receive IPC close with reason=AbnormalShutdown (t=101.531) [Socket 57512, Main Thread] WARNING: Shutting down Socket process early due to a crash!: file /Users/haftandilian/r/mc/netwerk/ipc/SocketProcessChild.cpp:158
Crash Annotation GraphicsCriticalError: |[C0][GFX1-]: Receive IPC close with reason=AbnormalShutdown (t=104.026) [GFX1-]: Receive IPC close with reason=AbnormalShutdown
Exiting due to channel error.
```
|
|
1,678,226 | 15,138,904 |
I got this crash while running the JetStream2 benchmark on browserbench.org. It is reproducible and I've seen other similar crashes on crash-stats, all on arm64.
Crash report: https://crash-stats.mozilla.org/report/index/5ba6e3af-aae8-4b7f-b31e-158320201119
Reason: ```EXC_BAD_ACCESS / KERN_INVALID_ADDRESS```
Top 10 frames of crashing thread:
```
0 libsystem_pthread.dylib _pthread_join
1 libnss3.dylib PR_JoinThread nsprpub/pr/src/pthreads/ptthread.c:586
2 XUL nsThreadShutdownAckEvent::Run xpcom/threads/nsThread.cpp:252
3 XUL mozilla::SchedulerGroup::Runnable::Run xpcom/threads/SchedulerGroup.cpp:146
4 XUL mozilla::RunnableTask::Run xpcom/threads/TaskController.cpp:450
5 XUL mozilla::TaskController::DoExecuteNextTaskOnlyMainThreadInternal xpcom/threads/TaskController.cpp:720
6 XUL mozilla::TaskController::ExecuteNextTaskOnlyMainThreadInternal xpcom/threads/TaskController.cpp:579
7 XUL mozilla::TaskController::ProcessPendingMTTask xpcom/threads/TaskController.cpp:373
8 XUL mozilla::detail::RunnableFunction<mozilla::TaskController::InitializeInternal xpcom/threads/nsThreadUtils.h:577
9 XUL nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1197
```
|
|
1,678,762 | 15,142,308 |
Currently, when `RemoteSecuritySettings` downloads multiple new stashes, it will add the first one, and reconstruct the in-memory representation of the issuer/serial hashmaps/sets, and then it will add the second one, and reconstruct the entire in-memory representation of the issuer/serial hashmaps/sets, and so on, re-doing all of the work each time. This is essentially O(n^2) work, whereas it should only require O(n).
|
|
1,679,003 | 15,145,113 |
Test case:
```js
for (let i = 0, j = 0; i < 1_000_000; ++i) {
let x = (-0xffffffffffffffff_ffffffffffffffffn >> 0x40n);
if (x != -0x10000000000000000n) {
print(x.toString(16));
if (++j == 10) break;
}
}
```
Prints `-2f2f2f2f2f2f2f300000000000000000` ten times. `0x2f` is the `JS_FRESH_NURSERY_PATTERN`. The last byte is `0x30` because `+1` is added to `0x2f`. With `JSGC_DISABLE_POISONING=1` uninitialised memory can be observed.
The fix is relatively simple, in the `if (!bitsShift) {...}` block in <https://searchfox.org/mozilla-central/rev/48151c3619b0b5b4b92d5f14eaa839e619605d2d/js/src/vm/BigIntType.cpp#2265>, add:
```c++
if (!bitsShift) {
// We must manually initialize the overflow space, if it was allocated.
result->setDigit(resultLength - 1, 0);
...
```
----
The same BigInt implementation is also used in JSC and V8, so the bug can be reproduced there, too, which makes this a cross-browser issue. That means for example, releasing a regression test could easily be used to discover the same issue in the other browsers.
|
|
1,679,741 | 15,151,187 |
Crash report: https://crash-stats.mozilla.org/report/index/a99fa469-bb31-4bc6-bb81-5cdc60201129
Reason: ```EXCEPTION_ACCESS_VIOLATION_EXEC```
Top 10 frames of crashing thread:
```
0 @0x246
1 kernelbase.dll ReadFile
2 kernelbase.dll WriteFile
3 kisfdpro64.dll kisfdpro64.dll@0x1b00ce
4 kernel32.dll ReadFileImplementation
5 kisfdpro64.dll kisfdpro64.dll@0x13eb3
6 kisfdpro64.dll kisfdpro64.dll@0x13b74
7 kisfdpro64.dll kisfdpro64.dll@0x13fab
8 kisfdpro64.dll kisfdpro64.dll@0x1b00ce
9 kisfdpro64.dll kisfdpro64.dll@0x1b00ce
```
We've seen this dll before, e.g. bug 1499194.
|
|
1,679,933 | 15,153,061 |
## Environment
- macOS Big Sur 11.0.1
- I reproduced this bug on macOS Caralina 10.15.7 too.
- https://hg.mozilla.org/mozilla-central/rev/b0865ea584621ce9e7f68833565e3d8ae117ce32
## Steps to reproduce
1. Launch Firefox.
2. Try to open a new window from the context menu on the icon in Dock
## Actual Result
- Firefox is not responsible with rainbow cursor.
- Firefox does not comeback and I need to quit Firefox forcely.
- I reproduce this bug a few days ago.
- I does not face this bug rarely on a new profile
|
|
1,687,342 | 15,221,962 |
Created attachment 9197786
oauth-leak.png
Tested on: Firefox 84.0.2 (64 bits) (Windows)
In Firefox, Content Security Policy (CSP) violation reports triggered by a redirect did not remove path information as required by the CSP specification: https://www.w3.org/TR/CSP/#security-violation-reports
This potentially reveals information about the redirect that would not otherwise be known to the original site. This could be used by a malicious site to obtain sensitive information such as usernames or single-sign-on tokens encoded within the target URLs.
It looks like this is a recurring problem:
https://bugzilla.mozilla.org/show_bug.cgi?id=1208946
https://bugzilla.mozilla.org/show_bug.cgi?id=1069762
Steps to reproduce:
In a scenario where https://example-01.com performs a code 302 redirect to https://example-02.com/?secret=mysecret
1. The page https://attacker.com is served with the header "Content-Security-Policy: frame-src https://example-01.com; report-uri /report"
2. The page https://attacker.com attempts to iframe https://example-01.com
3. The full path of the redirect ( https://example-02.com/?secret=mysecret ) is leaked to the attacker through the violation report.
It's possible to leak the full path of chained redirects by iframing each leaked URL in a new page with a CSP frame-src directive that matches the domain of the leaked URL.
Through this bug it's possible to leak OAuth authorization codes and access tokens (image attached from a real case), thus getting access to the victim's resources.
|
|
1,688,248 | 15,228,700 |
Created attachment 9198702
Screenshot from 2021-01-22 18-18-23.png
User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.96 Safari/537.36
Steps to reproduce:
Print does not work
Select any mail and "print" the mail
Actual results:
PRINT:
Normally one window with a printer list would be displayed.
With the printing subsystem as it MULTIPLE windows of the same printer list are displayed. See the attached screen shot.
A (random?) number of linux processes are started, one for each printer list displayed.
Eventually the total system grinds to a halt with too many processes.
Even though TB is being started with "-jsconsole" option, cannot switch to the jsconsole so can't tell what happened at the TB JS level.
Expected results:
A single printer list window should be displayed where I can select the printer to be used.
Prining has been broken in daily 86 for some time, however, the changes to 86.0a1 between Monday 18 Jan and Friday 22 Jan seem to have caused this change.
|
|
1,688,924 | 15,234,513 |
When we moved to python3, `sign_app.py` had some issues that weren't addressed. The input files for `test_signed_apps.js` also need to be regenerated because the issuing certificates will expire soon.
|
|
1,689,032 | 15,235,378 |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.0.2 Safari/605.1.15
Steps to reproduce:
Firefox updated today to version 85.0. After quitting Firefox normally, and starting later it now freezes every time. Activity monitor lists Firefox process as unresponsive.
This is happening on two different machines.
Actual results:
Firefox freezes. Process is marked as unresponsive.
|
|
1,689,553 | 15,239,158 |
Created attachment 9199997
Screenshot 2021-01-29 08.49.32.png
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:86.0) Gecko/20100101 Firefox/86.0
Steps to reproduce:
My Thunderbird beta 85 updated to 86 and failed to start correctly.
Restarting in Safe mode helped but disabling addons didn't helped.
After I saw the error logs I've noticed error in the "toggleCompactMode" so I've changed folder view and then it works again.
|
|
1,666,836 | 15,050,472 |
When I moved to the new preferences model, I put in code for handling legacy preferences, but I missed the fact that we were using the explicit schema type (boolean) to allow 0/1 to be converted to a boolean before it was passed to the preferences APIs.
As a result, we are now trying to get the prefs with a 0/1 value which isn't working.
|
|
1,666,923 | 15,051,089 |
Created attachment 9177500
fission-history-pip-2020-09-23_17.18.04.mkv
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:83.0) Gecko/20100101 Firefox/83.0
Steps to reproduce:
0. Set `fission.sessionHistoryInParent` to `true`
1. Restart the browser
2. Go to youtube (e.g https://www.youtube.com/watch?v=JDUnSsx62j8)
3. Toggle Picture-in-Picture (either with the button or the keyboard shortcut)
Actual results:
Picture-in-Picture shows an empty window. Also, trying to close the Picture-in-Picture window doesn't work with the keyboard shortcut. The flickering of the window happens when you trigger the shortcut. You have to click on the close button of the PiP window.
Expected results:
The video should be moved to the PiP window and you should still be able to close the PiP window with the keyboard shortcut.
|
|
1,667,613 | 15,055,504 |
During the past week, there were 4 crashes with this signature on 4 different devices. They hit in the first 3 minutes after the application got launched.
Crash report: https://crash-stats.mozilla.org/report/index/629e45c6-0fad-4f1e-9936-ba27b0200924
Top 10 frames of crashing thread:
```
0 xul.dll mozilla::intl::LocaleService::GetAppLocalesAsLangTags intl/locale/LocaleService.cpp:400
1 xul.dll mozilla::intl::LocaleService::GetAppLocaleAsLangTag intl/locale/LocaleService.cpp:427
2 xul.dll nsChromeRegistryChrome::GetBaseURIFromPackage chrome/nsChromeRegistryChrome.cpp:330
3 xul.dll nsChromeRegistry::ConvertChromeURL chrome/nsChromeRegistry.cpp:253
4 xul.dll nsChromeProtocolHandler::NewChannel chrome/nsChromeProtocolHandler.cpp:127
5 xul.dll mozilla::net::nsIOService::NewChannelFromURIWithProxyFlagsInternal netwerk/base/nsIOService.cpp:1134
6 xul.dll mozilla::net::nsIOService::NewChannelFromURIWithClientAndController netwerk/base/nsIOService.cpp:1076
7 xul.dll NS_NewChannelInternal netwerk/base/nsNetUtil.cpp:404
8 xul.dll NS_NewChannel netwerk/base/nsNetUtil.cpp:345
9 xul.dll nsStringBundleBase::ParseProperties intl/strres/nsStringBundle.cpp:446
```
Zibi, any idea what started this?
|
|
1,668,100 | 15,060,027 |
It seems that VoiceOver expects search predicate calls to be bound by the target element they are called on. If they are not, VO goes into an endless loop because it expects the results of the search to be descendants of the target.
|
|
1,668,374 | 15,061,725 |
Because macOS converts all booleans to 0/1, the new Preferences policy doesn't work there.
|
|
1,658,999 | 14,988,310 |
+++ This bug was initially created as a clone of Bug #1658156 +++
+++ This bug was initially created as a clone of Bug #1655279 +++
+++ This bug was initially created as a clone of Bug #1653545 +++
+++ This bug was initially created as a clone of Bug #1622231 +++
In the current TB 78.1.x pre-release where 1655279 was included, compose a message with fixed width setting. Then I "select all" and chose variable width from the menu.
Expected: Text is turned into variable width.
Actual: Nothing happens.
This is similar to bug 1658156 - take 4.
Magnus and Khushil: As far as I can see, composing involving variable and fixed width "font" is rather broken in TB 78. Is there any plan to restore this area to working order?
Have you considered backing out bug 1582410? All you need to do then is fix bug 1625218 with the "strange" but working patch.
|
|
1,659,241 | 14,989,988 |
Steps to reproduce:
1. Have at least one account set up
2. Navigate to account settings
3. click "account actions" button menu
4. select "add mail account"
What happens:
Nothing.
Expected result:
Add mail account UI window appears.
--
2020-08-15T02:25:30.783000: DEBUG : Found commit message:
Bug 1655289 - Fix UI issues with tooltips and opening dialogs in new Account Central. r=Paenglab
2020-08-15T02:25:30.783000: DEBUG : Did not find a branch, checking all integration branches
2020-08-15T02:25:30.783000: INFO : The bisection is done.
2020-08-15T02:25:30.798000: INFO : Stopped
|
|
1,659,395 | 14,992,219 |
**Affected versions**
* 81.0a1(20200816214203)
**Affected platforms**
* macOS 10.15.6
* Ubuntu 18.04
**Steps to reproduce**
1. Launch FF.
2. Trigger the new modal UI.
3. In the drop-down , select Print to PDF.
4. Print.
**Expected result**
* Page is successfully printed to PDF.
**Actual result**
* A blank .txt file is generated and at the same time, an actual print is performed on the printer.
**Suggested Severity**
* I would consider this issue an S1 seeing as how no PDF is generated and actual papers are being printed.
**Regression range**
* Not a regression
**Other notes**
* Screen cast of the issue: https://drive.google.com/file/d/1nG2DuXzFeuqmUoqJTseeFeRGt7u2un5z/view?usp=sharing
|
|
1,659,626 | 14,993,756 |
## STR
1. Enable the new tab modal print UI via `print.tab_modal.enabled`.
2. Print any page. From the new print UI, select "Save as PDF."
3. Click "Print using system dialog."
## Actual
The file chooser for saving the PDF opens.
## Expected
Given the name of the link, I would expect to still be able to open the system dialog and select a printer, change settings, etc. If my default or last used printer was "Save to PDF" and then I go straight to "Print using system dialog" this feels like unexpected behavior.
|
|
1,659,697 | 14,994,150 |
Created attachment 9170643
preview_resize.gif
**Affected versions**
* 81.0a1 (20200816214203)
**Affected platforms**
* Ubuntu 18.04
* macOS 10.15.6
* Windows 10x64
* Windows 10aarch64
**Steps to reproduce**
1. Launch FF.
2. Open any webpage and trigger the new Print UI modal.
3. Close the modal.
**Expected result**
* New printing modal is correctly opened and closed.
**Actual result**
* There is a glitch when the new modal is opened/closed. A resize/shrink can be spotted (see attached).
**Suggested Severity**
* I'd suggest marking this as an S3 since it's only seen for a fraction of a second and it does not affect the functionality.
**Regression range**
This seems to be a recent regression.
* Pushlog: https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=626c0384ddb82f690f173af5730a5e07b0d28f53&tochange=b1d9164521d9ab722167399bfdda3b3c6753ce62
|
|
1,673,164 | 15,098,173 |
**Filed by:** mkmelin+mozilla [at] iki.fi
**Parsed log:** https://treeherder.mozilla.org/logviewer.html#?job_id=319597138&repo=comm-central
**Full log:** https://firefox-ci-tc.services.mozilla.com/api/queue/v1/task/Ve3GCgwoQOa_2JvSHYmWvQ/runs/0/artifacts/public/logs/live_backing.log
---
```
[task 2020-10-23T23:03:06.987Z] 23:03:06 INFO - xpcshell-icaljs.ini:comm/calendar/test/unit/test_ltninvitationutils.js | Starting createInvitationOverlay_test
[task 2020-10-23T23:03:06.987Z] 23:03:06 INFO - (xpcshell/head.js) | test createInvitationOverlay_test pending (2)
[task 2020-10-23T23:03:06.988Z] 23:03:06 INFO - PID 23054 | [23054, Main Thread] WARNING: EnsureInit: No screen: file /builds/worker/checkouts/gecko/widget/gtk/nsLookAndFeel.cpp:1036
[task 2020-10-23T23:03:06.988Z] 23:03:06 INFO - PID 23054 | [23054, Main Thread] WARNING: EnsureInit: No screen: file /builds/worker/checkouts/gecko/widget/gtk/nsLookAndFeel.cpp:1036
[task 2020-10-23T23:03:06.988Z] 23:03:06 INFO - PID 23054 | [23054, Main Thread] WARNING: EnsureInit: No screen: file /builds/worker/checkouts/gecko/widget/gtk/nsLookAndFeel.cpp:1036
[task 2020-10-23T23:03:06.989Z] 23:03:06 INFO - PID 23054 | [23054, Main Thread] WARNING: EnsureInit: No screen: file /builds/worker/checkouts/gecko/widget/gtk/nsLookAndFeel.cpp:1036
[task 2020-10-23T23:03:06.989Z] 23:03:06 INFO - PID 23054 | [23054, Main Thread] WARNING: EnsureInit: No screen: file /builds/worker/checkouts/gecko/widget/gtk/nsLookAndFeel.cpp:1036
[task 2020-10-23T23:03:06.990Z] 23:03:06 INFO - PID 23054 | [23054, Main Thread] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005 (NS_ERROR_FAILURE): file /builds/worker/checkouts/gecko/dom/base/ThirdPartyUtil.cpp:402
[task 2020-10-23T23:03:06.990Z] 23:03:06 INFO - PID 23054 | [23054, Main Thread] WARNING: NS_ENSURE_TRUE(sgo || !hasHad) failed: file /builds/worker/checkouts/gecko/dom/base/nsContentUtils.cpp:5037
[task 2020-10-23T23:03:06.991Z] 23:03:06 INFO - (xpcshell/head.js) | test run_next_test 1 finished (2)
[task 2020-10-23T23:03:06.991Z] 23:03:06 INFO - Unexpected exception NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsIParserUtils.parseFragment]
[task 2020-10-23T23:03:06.991Z] 23:03:06 INFO - textToHtmlDocumentFragment@resource:///modules/calendar/utils/calViewUtils.jsm:394:36
[task 2020-10-23T23:03:06.992Z] 23:03:06 INFO - field@resource:///modules/calendar/ltnInvitationUtils.jsm:92:38
[task 2020-10-23T23:03:06.992Z] 23:03:06 INFO - createInvitationOverlay@resource:///modules/calendar/ltnInvitationUtils.jsm:106:10
[task 2020-10-23T23:03:06.992Z] 23:03:06 INFO - createInvitationOverlay_test@/builds/worker/workspace/build/tests/xpcshell/tests/comm/calendar/test/unit/test_ltninvitationutils.js:419:30
[task 2020-10-23T23:03:06.993Z] 23:03:06 INFO - _run_next_test/<@/builds/worker/workspace/build/tests/xpcshell/head.js:1630:22
[task 2020-10-23T23:03:06.993Z] 23:03:06 INFO - _run_next_test@/builds/worker/workspace/build/tests/xpcshell/head.js:1630:38
[task 2020-10-23T23:03:06.993Z] 23:03:06 INFO - run@/builds/worker/workspace/build/tests/xpcshell/head.js:777:9
[task 2020-10-23T23:03:06.993Z] 23:03:06 INFO - _do_main@/builds/worker/workspace/build/tests/xpcshell/head.js:250:6
[task 2020-10-23T23:03:06.993Z] 23:03:06 INFO - _execute_test@/builds/worker/workspace/build/tests/xpcshell/head.js:577:5
[task 2020-10-23T23:03:06.993Z] 23:03:06 INFO - @-e:1:1
[task 2020-10-23T23:03:06.993Z] 23:03:06 INFO - exiting test
Caused by something from https://hg.mozilla.org/mozilla-central/pushloghtml?changeset=1980f87855fc557e7ef6bb24b66c4d2df5606afa - bug 1666300 would be my first guess```
|
|
1,664,172 | 15,029,489 |
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:80.0) Gecko/20100101 Firefox/80.0
Steps to reproduce:
Selected File->Print
Actual results:
Firefox crashed
Expected results:
Print dialog should have come up
|
|
1,664,502 | 15,031,648 |
##### [Sugested Severity:]
In this case, it seems that this might be an intended behaviour and not recent from what I can tell. Fx 75 works this way as well.
Based on the above and on the impact on the TopSites migration to Remote settings, I'm suggesting an S2 as a proposed severity.
##### [Description:]
Accessing a https://www.amazon.de/ logs amazon.com as a recent/frecvent topsite.
This causes that in the case of which amazon.de is set as a topsite from RemoteSettings controlled collection, at the next restart, the default amazon.de to be owerwritten by amazon.com
##### [Environment:]
Windows 10, Mac 10.15, Ubuntu 20.
81.0b9
80
could reproduce as far as 75
##### [Steps:]
1. Download, install Firefox and create a new profile.
2. In address bar, input https://www.amazon.de
3. Open browser console with console enabled and run:
Cu.import("resource://gre/modules/NewTabUtils.jsm");
(await NewTabUtils.activityStreamProvider.getTopFrecentSites({numItems: 25})).map(s => `${s.url} [${s.frecency}]`).join("\n")
4. Restart Firefox.
##### [Actual Result:]
The step 3 snippet will return amazon.com
For the modern top-sites Remote Settings feature, if topsite was direct link amazon.de after restart it is replaced by amazon.com
##### [Expected Result:]
I would assume that when amazon.de is default topsite, it would remain default topsite, especially since no actual amazon.com has been accessed, but there might be context that I'm not aware of.
|
|
1,664,542 | 15,031,931 |
Crash report: https://crash-stats.mozilla.org/report/index/95076142-2ffd-4b49-bac7-9e99b0200911
Top 10 frames of crashing thread:
```
0 xul.dll mozilla::dom::`anonymous namespace'::WebProgressListener::OnStateChange dom/clients/manager/ClientOpenWindowUtils.cpp:77
1 xul.dll std::_Func_impl_no_alloc<`lambda at /builds/worker/checkouts/gecko/docshell/base/BrowsingContextWebProgress.cpp:109:7', void, nsIWebProgressListener*>::_Do_call
2 xul.dll mozilla::dom::BrowsingContextWebProgress::UpdateAndNotifyListeners docshell/base/BrowsingContextWebProgress.cpp:93
3 xul.dll mozilla::dom::BrowsingContextWebProgress::OnStateChange docshell/base/BrowsingContextWebProgress.cpp:107
4 xul.dll mozilla::dom::BrowserParent::RecvOnStateChange dom/ipc/BrowserParent.cpp:2609
5 xul.dll mozilla::dom::PBrowserParent::OnMessageReceived ipc/ipdl/PBrowserParent.cpp:4914
6 xul.dll mozilla::dom::PContentParent::OnMessageReceived ipc/ipdl/PContentParent.cpp:6456
7 xul.dll mozilla::ipc::MessageChannel::DispatchMessage ipc/glue/MessageChannel.cpp:2074
8 xul.dll mozilla::ipc::MessageChannel::MessageTask::Run ipc/glue/MessageChannel.cpp:1953
9 xul.dll mozilla::TaskController::DoExecuteNextTaskOnlyMainThreadInternal xpcom/threads/TaskController.cpp:512
```
crash reports with this signature seem to have started in firefox 79 (most of the top frames of the stack got touched by bug 1644943).
the volume of this crash is starting to spike up today though, many comments involve push notifications from twitter, so perhaps a change by them is triggering it more frequently now.
* bp-553da54c-cdf3-46c4-b3a6-a8ade0200911: "Notification from Twitter (in a container) appeared, clicked on it, tab started to open, Firefox... Disappeared. Well, okay."
* bp-6bd06c28-5cde-4cda-a002-6123b0200911: "I clicked a toast that was supposed to take me to twitter then boom"
* bp-30573543-813e-48da-8a63-759400200911: "When I clicked on the webpush notification and tried to open twitter, my firefox suddenly went down. Why in the world?"
* bp-3eb290ca-91fd-4410-96ef-65aec0200911: "twitter notification pop up"
|
|
1,666,140 | 15,044,198 |
The following testcase crashes on mozilla-central revision 20200918-ab7d302fd318 (debug build, run with --fuzzing-safe --cpu-count=2 --ion-offthread-compile=off --more-compartments --warp):
evalInWorker(`
newGlobal();
newGlobal();
newGlobal();
newGlobal();
newGlobal();
i59 = wasmEvalText(
\`(module
(func (export "foo") (param i64) (result i64)
local.get 0
)
)\`,
).exports;
newGlobal();
function wasmEvalText(str, imports) {
let binary = wasmTextToBinary(str);
m = new WebAssembly.Module(binary);
return new WebAssembly.Instance(m, imports);
}
newGlobal();
function caller(n34) {
return i59.foo(42n);
}
for (let i59 = 0x10F000; i59-- > 0; )
caller(i59);
`);
Backtrace:
received signal SIGSEGV, Segmentation fault.
#0 0x00001093a012c38f in ?? ()
#1 0xaaaaaaaaaaaaaaaa in ?? ()
#2 0xaaaaaaaaaaaaaaaa in ?? ()
#3 0x00001093a015e850 in ?? ()
[...]
#21 0x0000000000000000 in ?? ()
rax 0x0 0
rbx 0x342315a00430 57325291308080
rcx 0x2 2
rdx 0x7ffff5996e58 140737313861208
rsi 0x0 0
rdi 0x7ffff5996e58 140737313861208
rbp 0x7ffff6965ad0 140737330436816
rsp 0x7ffff69659a0 140737330436512
r8 0x0 0
r9 0x7ffff69658e0 140737330436320
r10 0x1093a015e850 18226232027216
r11 0x1fff9 131065
r12 0x0 0
r13 0x0 0
r14 0x998a705040b94858 -7382965149134927784
r15 0x0 0
rip 0x1093a012c38f 18226231821199
=> 0x1093a012c38f: mov 0x20(%r14),%r10
0x1093a012c393: mov 0x1e0(%r10),%r10
|
|
1,660,861 | 15,003,491 |
As noted in bug 1660527 comment 6:
```
nsPrintSettingsX::nsPrintSettingsX(const nsPrintSettingsX& src) { *this = src; }
```
is broken since `nsPrintSettingsX::operator=(const nsPrintSettingsX& rhs)` can't be called on an uninitialized object since it calls `[mPrintInfo release]`.
|
|
1,661,495 | 15,008,902 |
[Tracking Requested - why for this release]:
As discovered while working on bug 1493108 and later by users on Github we have a major regression in Marionette. Several commands operate on a different window than the expected one and as such cause invalid data to be returned. The patch from bug 1654628 as landed cannot be backed out given that a certain amount of other dependent patches already landed. So this needs to block the 81 release.
Here a try push for the required changes:
https://treeherder.mozilla.org/#/jobs?repo=try&revision=07f34218f3ecfbb2a3316f558e8eef0d85c3a747
|
|
1,661,645 | 15,010,215 |
STR;
1) Open print preview
2) Change color mode to "Black and white" somehow (e.g. changing the destination to a printer which is able to print out in color)
3) Switch the destination to "Save to PDF"
|
|
1,661,867 | 15,011,723 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
Steps to reproduce:
1. Navigate to https://www.instrupix.com/wprm_print/recipe/5935
2. Click "Print"
Actual results:
The tab crashed and displayed a crash notification
Expected results:
The print preview dialogue should have displayed
|
|
1,662,426 | 15,016,292 |
Created attachment 9173349
Kapture 2020-09-01 at 15.03.22.mp4
Unfortunately, the steps to reproduce are not 100% reliable. As you can see in the attached video, it's a bit of a trial and error.
STR:
1. visit https://www.uscis.gov/sites/default/files/document/forms/i-9-paper-version.pdf (the same can be reproduced with other PDF documents. This one was just the first result on google when searching for "pdf document")
2. open the print dialog (I alternate between cmd+p and clicking the UI button)
3. scroll the preview
ER: All pages should have content
AR: sometimes, the second page is blank
The produced PDF and printouts reflect the preview. If the preview is complete I get a complete result. If the preview is showing a blank page, I'll get a blank page in the printed PDF.
|
|
1,663,053 | 15,020,701 |
Opening https://www.irs.gov/pub/irs-pdf/f1040.pdf in our new print preview UI and changing Landscape <-> Portrate rapidly crashes. Using macOS.
|
|
1,663,283 | 15,022,005 |
Created attachment 9174071
t.html
|
|
1,663,639 | 15,025,441 |
Created attachment 9174377
New Text Document.txt
**Affected versions**
* 81.0b7 (20200906164749)
* 82.0a1
**Affected platforms**
* Windows 10x64
* Windows 7x64
**Steps to reproduce**
1. Launch FF.
2. Go to any random page.
3. Trigger the new Print Modal.
4. Print.
**Expected result**
* Printed page is the same as the page displayed in Print Preview.
**Actual result**
* Printed page is blank.
**Suggested Severity**
* Seeing as how this blocks testing as well as a vital functionality part for an important OS, I would suggest an S1 for this.
**Regression range**
* I did not manage to reproduce this issue on an earlier build from when the feature was implemented, nor was I able to reproduce this issue with 81.0b6 using the exact STR so this seems like a very recent regression.
* This issue does not occur while searching for a regression using mozreg.
**Additional notes**
* This issue does not occur for macOS or Ubuntu
* This issue does not reproduce on the latest nightly 82.0a1 (2020-09-07)
* Attached there is a Raw Browser Data.
* This issue appears to only occur with a clean profile.
* ` Uncaught (in promise) undefined `
` TypeError: tab is undefinedLinkHandlerParent.jsm:46:15
receiveMessage resource:///actors/LinkHandlerParent.jsm:46 ` are caught in browser console.
|
|
1,670,452 | 15,077,936 |
Created attachment 9180882
screenshot
Reproducible: always
Steps to reproduce:
1. Open about:preferences
2. Click "Default font" and Font in Advanced dialog select dropdown / Click "Select a language to add..." drop down
Actual Results:
The size of the dropdown is changed and scrollbar disappears immediate after the popup is shown.
The doropdown would not scroll.
Expected Results:
Scrollbar should always display if needed
Regression window:
https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=c8ec11711bb0981f6eb3fe8b95d1d49a41931efd&tochange=98c09e82b3e9728fbfa9204a8b5e3cef676dce76
|
|
1,570,868 | 14,275,634 |
Created attachment 9082530
Crash Dump.png
I found a specific patter which always leads to Crash or High CPU Usage
File and Vedio URL : https://drive.google.com/open?id=1L2pHSaAA5-5D6EdJ-YtrYWa0CFxJHSxS
|
|
1,571,037 | 14,276,781 |
Created attachment 9082669
test.zip
STR:
1) unpack test.zip
2) using a fuzzing build, a clean profile and the included prefs.js launch the browser
3) open launcher.html
4) wait 30 - 45 seconds
I can consistently reproduce the issue with a fuzzing ASan build.
Reproduced with m-c:
BuildID=20190731215544
SourceStamp=b0124f06562982dce60b820d95aad23afd5cec90
```
==30998==ERROR: AddressSanitizer: heap-use-after-free on address 0x6030006a0780 at pc 0x7fe298c69f91 bp 0x7ffd8f4de5f0 sp 0x7ffd8f4de5e8
READ of size 8 at 0x6030006a0780 thread T0 (file:// Content)
#0 0x7fe298c69f90 in CanonicalizeXPCOMParticipant /src/xpcom/base/nsCycleCollector.cpp:848:8
#1 0x7fe298c69f90 in CCGraphBuilder::NoteXPCOMChild(nsISupports*) /src/xpcom/base/nsCycleCollector.cpp:2155
#2 0x7fe298c2c374 in mozilla::CycleCollectedJSRuntime::TraverseGCThing(mozilla::CycleCollectedJSRuntime::TraverseSelect, JS::GCCellPtr, nsCycleCollectionTraversalCallback&) /src/xpcom/base/CycleCollectedJSRuntime.cpp:707:5
#3 0x7fe298c2bee7 in mozilla::JSGCThingParticipant::TraverseNative(void*, nsCycleCollectionTraversalCallback&) /src/xpcom/base/CycleCollectedJSRuntime.cpp:364:12
#4 0x7fe298c6795a in TraverseNativeAndJS /src/xpcom/base/nsCycleCollectionParticipant.h:126:19
#5 0x7fe298c6795a in CCGraphBuilder::BuildGraph(js::SliceBudget&) /src/xpcom/base/nsCycleCollector.cpp:2061
#6 0x7fe298c70154 in nsCycleCollector::MarkRoots(js::SliceBudget&) /src/xpcom/base/nsCycleCollector.cpp:2672:33
#7 0x7fe298c7706c in nsCycleCollector::Collect(ccType, js::SliceBudget&, nsICycleCollectorListener*, bool) /src/xpcom/base/nsCycleCollector.cpp:3417:9
#8 0x7fe298c7af04 in nsCycleCollector_collectSlice(js::SliceBudget&, bool) /src/xpcom/base/nsCycleCollector.cpp:3962:21
#9 0x7fe29d18d851 in nsJSContext::RunCycleCollectorSlice(mozilla::TimeStamp) /src/dom/base/nsJSEnvironment.cpp:1479:3
#10 0x7fe29d19255c in CCRunnerFired(mozilla::TimeStamp) /src/dom/base/nsJSEnvironment.cpp:1869:7
#11 0x7fe298df2b60 in operator() /src/clang/bin/../lib/gcc/x86_64-unknown-linux-gnu/6.4.0/../../../../include/c++/6.4.0/functional:2127:14
#12 0x7fe298df2b60 in mozilla::IdleTaskRunner::Run() /src/xpcom/threads/IdleTaskRunner.cpp:58
#13 0x7fe298e31dc0 in nsThread::ProcessNextEvent(bool, bool*) /src/xpcom/threads/nsThread.cpp:1224:14
#14 0x7fe298e381d8 in NS_ProcessNextEvent(nsIThread*, bool) /src/xpcom/threads/nsThreadUtils.cpp:486:10
#15 0x7fe29a025baf in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /src/ipc/glue/MessagePump.cpp:88:21
#16 0x7fe299f22c52 in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10
#17 0x7fe299f22c52 in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308
#18 0x7fe299f22c52 in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290
#19 0x7fe2a216df89 in nsBaseAppShell::Run() /src/widget/nsBaseAppShell.cpp:137:27
#20 0x7fe2a603b55f in XRE_RunAppShell() /src/toolkit/xre/nsEmbedFunctions.cpp:919:20
#21 0x7fe299f22c52 in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10
#22 0x7fe299f22c52 in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308
#23 0x7fe299f22c52 in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290
#24 0x7fe2a603ae06 in XRE_InitChildProcess(int, char**, XREChildData const*) /src/toolkit/xre/nsEmbedFunctions.cpp:754:34
#25 0x55fcea761173 in content_process_main /src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28
#26 0x55fcea761173 in main /src/browser/app/nsBrowserApp.cpp:267
#27 0x7fe2ba61cb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
#28 0x55fcea6826ac in _start (/home/worker/builds/m-c-20190802094835-fuzzing-asan-opt/firefox+0x456ac)
0x6030006a0780 is located 0 bytes inside of 32-byte region [0x6030006a0780,0x6030006a07a0)
freed by thread T0 (file:// Content) here:
#0 0x55fcea72dd42 in __interceptor_free /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:124:3
#1 0x7fe298c90bc2 in MaybeKillObject /src/xpcom/base/nsCycleCollector.cpp:2429:29
#2 0x7fe298c90bc2 in SnowWhiteKiller::Visit(nsPurpleBuffer&, nsPurpleBufferEntry*) /src/xpcom/base/nsCycleCollector.cpp:2459
#3 0x7fe298c6e812 in void nsPurpleBuffer::VisitEntries<SnowWhiteKiller>(SnowWhiteKiller&) /src/xpcom/base/nsCycleCollector.cpp:941:23
#4 0x7fe298c6fa59 in nsCycleCollector::FreeSnowWhiteWithBudget(js::SliceBudget&) /src/xpcom/base/nsCycleCollector.cpp:2624:14
#5 0x7fe29b139c18 in AsyncFreeSnowWhite::Run() /src/js/xpconnect/src/XPCJSRuntime.cpp:146:9
#6 0x7fe298e4ca3c in Run /src/xpcom/threads/nsThreadUtils.cpp:331:22
#7 0x7fe298e4ca3c in IdleRunnableWrapper::TimedOut(nsITimer*, void*) /src/xpcom/threads/nsThreadUtils.cpp:337
#8 0x7fe298e1f16b in nsTimerImpl::Fire(int) /src/xpcom/threads/nsTimerImpl.cpp:561:7
#9 0x7fe298e1e9e9 in nsTimerEvent::Run() /src/xpcom/threads/TimerThread.cpp:260:11
#10 0x7fe298e31dc0 in nsThread::ProcessNextEvent(bool, bool*) /src/xpcom/threads/nsThread.cpp:1224:14
#11 0x7fe298e381d8 in NS_ProcessNextEvent(nsIThread*, bool) /src/xpcom/threads/nsThreadUtils.cpp:486:10
#12 0x7fe29a025baf in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /src/ipc/glue/MessagePump.cpp:88:21
#13 0x7fe299f22c52 in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10
#14 0x7fe299f22c52 in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308
#15 0x7fe299f22c52 in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290
#16 0x7fe2a216df89 in nsBaseAppShell::Run() /src/widget/nsBaseAppShell.cpp:137:27
#17 0x7fe2a603b55f in XRE_RunAppShell() /src/toolkit/xre/nsEmbedFunctions.cpp:919:20
#18 0x7fe299f22c52 in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10
#19 0x7fe299f22c52 in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308
#20 0x7fe299f22c52 in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290
#21 0x7fe2a603ae06 in XRE_InitChildProcess(int, char**, XREChildData const*) /src/toolkit/xre/nsEmbedFunctions.cpp:754:34
#22 0x55fcea761173 in content_process_main /src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28
#23 0x55fcea761173 in main /src/browser/app/nsBrowserApp.cpp:267
#24 0x7fe2ba61cb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
previously allocated by thread T0 (file:// Content) here:
#0 0x55fcea72e0c3 in __interceptor_malloc /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:146:3
#1 0x55fcea762e2d in moz_xmalloc /src/memory/mozalloc/mozalloc.cpp:52:15
#2 0x7fe2a0031301 in operator new /src/obj-firefox/dist/include/mozilla/cxxalloc.h:33:10
#3 0x7fe2a0031301 in mozilla::dom::Blob::Stream(JSContext*, JS::MutableHandle<JSObject*>, mozilla::ErrorResult&) /src/dom/file/Blob.cpp:362
#4 0x7fe29d42b951 in mozilla::dom::Blob_Binding::stream(JSContext*, JS::Handle<JSObject*>, mozilla::dom::Blob*, JSJitMethodCallArgs const&) /src/obj-firefox/dom/bindings/BlobBinding.cpp:745:24
#5 0x7fe29f7bcf2d in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*) /src/dom/bindings/BindingUtils.cpp:3163:13
#6 0x7fe2a62f3857 in CallJSNative /src/js/src/vm/Interpreter.cpp:448:13
#7 0x7fe2a62f3857 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:540
#8 0x7fe2a62f6582 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /src/js/src/vm/Interpreter.cpp:611:8
#9 0x7fe2a6ee477f in js::ForwardingProxyHandler::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) const /src/js/src/proxy/Wrapper.cpp:162:10
#10 0x7fe2a6e734e1 in js::CrossCompartmentWrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) const /src/js/src/proxy/CrossCompartmentWrapper.cpp:237:19
#11 0x7fe2a6ec3f6d in js::Proxy::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) /src/js/src/proxy/Proxy.cpp:504:19
#12 0x7fe2a62f4a25 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:514:14
#13 0x7fe2a62dc113 in CallFromStack /src/js/src/vm/Interpreter.cpp:599:10
#14 0x7fe2a62dc113 in Interpret(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:3084
#15 0x7fe2a62bdd7f in js::RunScript(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:425:10
#16 0x7fe2a62fa11f in js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value const&, js::AbstractFramePtr, JS::Value*) /src/js/src/vm/Interpreter.cpp:787:13
#17 0x7fe2a63e4789 in EvalKernel(JSContext*, JS::Handle<JS::Value>, EvalType, js::AbstractFramePtr, JS::Handle<JSObject*>, unsigned char*, JS::MutableHandle<JS::Value>) /src/js/src/builtin/Eval.cpp:335:10
#18 0x7fe2a63e68eb in js::DirectEval(JSContext*, JS::Handle<JS::Value>, JS::MutableHandle<JS::Value>) /src/js/src/builtin/Eval.cpp:449:10
#19 0x7fe2a75a8d28 in js::jit::DoCallFallback(JSContext*, js::jit::BaselineFrame*, js::jit::ICCall_Fallback*, unsigned int, JS::Value*, JS::MutableHandle<JS::Value>) /src/js/src/jit/BaselineIC.cpp:3196:10
#20 0x201f0bca0797 (<unknown module>)
#21 0x6250005328cf (<unknown module>)
#22 0x201f0bcb7bf6 (<unknown module>)
SUMMARY: AddressSanitizer: heap-use-after-free /src/xpcom/base/nsCycleCollector.cpp:848:8 in CanonicalizeXPCOMParticipant
Shadow bytes around the buggy address:
0x0c06800cc0a0: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd
0x0c06800cc0b0: fd fa fa fa fd fd fd fd fa fa fd fd fd fa fa fa
0x0c06800cc0c0: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fa
0x0c06800cc0d0: fa fa fd fd fd fa fa fa fd fd fd fd fa fa fd fd
0x0c06800cc0e0: fd fa fa fa fd fd fd fa fa fa fd fd fd fa fa fa
=>0x0c06800cc0f0:[fd]fd fd fd fa fa 00 00 05 fa fa fa fd fd fd fa
0x0c06800cc100: fa fa fd fd fd fa fa fa fd fd fd fd fa fa fd fd
0x0c06800cc110: fd fa fa fa fd fd fd fa fa fa fd fd fd fd fa fa
0x0c06800cc120: fd fd fd fa fa fa fd fd fd fa fa fa fd fd fd fd
0x0c06800cc130: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd
0x0c06800cc140: fd fd fa fa fd fd fd fa fa fa fd fd fd fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==30998==ABORTING
```
|
|
1,571,441 | 14,281,023 |
Created attachment 9083009
special monitor snipper not resized correctly 2.gif
**[Affected versions]:**
- Firefox Nightly 70.0a1, Build ID 20190805095413
**[Affected Platforms]:**
- All Windows
- All Mac
- All Linux
**[Prerequisites]:**
- Have the `browser.newtabpage.activity-stream.asrouter.devtoolsEnabled` pref set to `true`.
**[Steps to reproduce]:**
1. Start the browser with a new clean profile.
2. Open a new tab and trigger the Special Monitor snippet.
3. Resize the Browser window to half screen and observe the snippet.
4. Resize the Browser to the minimum width and observe the snippet.
**[Expected results]:**
- Step 3: The "x" button is displayed outside of the snippet area.
- Step 4: Most of the message is displayed outside of the snippet area.
**[Actual results]:**
- Step 3 & 4: The snippet is resized accordingly.
**[Notes]:**
- The issue is also reproducible with Discovery Stream on. But in this case the Snippet should not be resized as the whole page does not support any other browser size.
- Attached a screen recording of the issue.
|
|
1,571,648 | 14,282,873 |
This bug is for crash report bp-db0a46e1-8000-4227-a819-a883d0190806.
```
Top 10 frames of crashing thread:
0 xul.dll NS_ABORT_OOM xpcom/base/nsDebugImpl.cpp:604
1 xul.dll static void mozilla::AppendToFormatsList dom/media/doctor/DecoderDoctorDiagnostics.cpp
2 xul.dll void mozilla::DecoderDoctorDocumentWatcher::SynthesizeAnalysis dom/media/doctor/DecoderDoctorDiagnostics.cpp
3 xul.dll nsresult mozilla::DecoderDoctorDocumentWatcher::Notify dom/media/doctor/DecoderDoctorDiagnostics.cpp:787
4 xul.dll nsTimerImpl::Fire xpcom/threads/nsTimerImpl.cpp:564
5 xul.dll nsTimerEvent::Run xpcom/threads/TimerThread.cpp:260
6 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225
7 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
8 xul.dll mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:88
9 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:308
```
crash reports with this out-of-memory signature are regressing in volume during the firefox 69 beta cycle.
|
|
1,571,682 | 14,283,111 |
This bug is for crash report bp-0faef739-7a79-4bca-928c-1d7970190806.
Similar signature was found and fixed in the 48 timeframe (bug 1260785), but this crash is very visible in 69 beta: https://mzl.la/2MGREgD. Crash volume also seems higher in 68 (#14 overall top crash) release than it was in 67.
```
Top 10 frames of crashing thread:
0 xul.dll js::AutoEnterOOMUnsafeRegion::crash js/src/vm/JSContext.cpp:1477
1 xul.dll js::MovableCellHasher<JSScript*>::hash js/src/gc/Barrier.cpp:132
2 xul.dll JS::WeakCache<JS::GCHashMap<js::ObjectGroupRealm::AllocationSiteKey, js::WeakHeapPtr<js::ObjectGroup*>, js::ObjectGroupRealm::AllocationSiteKey, js::SystemAllocPolicy, JS::DefaultMapSweepPolicy<js::ObjectGroupRealm::AllocationSiteKey, js::WeakHeapPtr<js::ObjectGroup*> > > >::lookupForAdd js/public/GCHashTable.h:451
3 xul.dll js::ObjectGroup::allocationSiteGroup js/src/vm/ObjectGroup.cpp:1434
4 xul.dll js::NewObjectOperation js/src/vm/Interpreter.cpp:5146
5 xul.dll static bool Interpret js/src/vm/Interpreter.cpp
6 xul.dll js::RunScript js/src/vm/Interpreter.cpp:423
7 xul.dll js::InternalCallOrConstruct js/src/vm/Interpreter.cpp:563
8 xul.dll static bool InternalCall js/src/vm/Interpreter.cpp:590
9 xul.dll js::Call js/src/vm/Interpreter.cpp:606
```
|
|
1,564,899 | 14,226,598 |
This bug is for crash report bp-0721c735-81ee-42b4-b6a8-f4c0c0190710.
```
Top 10 frames of crashing thread:
0 firefox.exe logging::LogMessage::~LogMessage security/sandbox/chromium-shim/base/logging.cpp:111
1 firefox.exe base::win::internal::CloseHandleWrapper security/sandbox/chromium/base/win/scoped_handle_verifier.cc:73
2 firefox.exe base::win::internal::ScopedHandleVerifier::CloseHandle security/sandbox/chromium/base/win/scoped_handle_verifier.cc:136
3 firefox.exe base::win::GenericScopedHandle<base::win::HandleTraits, base::win::VerifierTraits>::Close security/sandbox/chromium/base/win/scoped_handle.h:104
4 firefox.exe base::win::ScopedProcessInformation::~ScopedProcessInformation security/sandbox/chromium/base/win/scoped_process_information.cc:46
5 firefox.exe sandbox::PolicyBase::OnJobEmpty security/sandbox/chromium/sandbox/win/src/sandbox_policy_base.cc:555
6 firefox.exe static unsigned long sandbox::BrokerServicesBase::TargetEventsThread security/sandbox/chromium/sandbox/win/src/broker_services.cc:224
7 kernel32.dll BaseThreadInitThunk
8 mozglue.dll static void patched_BaseThreadInitThunk mozglue/build/WindowsDllBlocklist.cpp:613
9 ntdll.dll __RtlUserThreadStart
```
browser crash reports with this stack are starting to show up in firefox 69 - they're all coming from 32bit versions on windows 7/8 and may be related to the sandbox update from bug 1552160.
|
|
1,565,231 | 14,229,188 |
This bug is for crash report bp-6bc39f98-901a-4645-93b0-7e1020190711.
```
Top 10 frames of crashing thread:
0 libxul.so GeckoCrash toolkit/xre/nsAppRunner.cpp:5154
1 libxul.so gkrust_shared::panic_hook toolkit/library/rust/shared/lib.rs:246
2 libxul.so core::ops::function::Fn::call src/libcore/ops/function.rs:69
3 libxul.so std::panicking::rust_panic_with_hook src/libstd/panicking.rs:478
4 libxul.so std::panicking::continue_panic_fmt src/libstd/panicking.rs:381
5 libxul.so std::panicking::begin_panic_fmt src/libstd/panicking.rs:336
6 libxul.so <webrender_bindings::moz2d_renderer::Moz2dBlobImageHandler as webrender_api::image::BlobImageHandler>::update gfx/webrender_bindings/src/moz2d_renderer.rs
7 libxul.so webrender::resource_cache::ResourceCache::pre_scene_building_update gfx/wr/webrender/src/resource_cache.rs:955
8 libxul.so <core::iter::adapters::Map<I, F> as core::iter::traits::iterator::Iterator>::next src/libcore/iter/adapters/mod.rs:570
9 libxul.so webrender::render_backend::RenderBackend::process_api_msg src/liballoc/vec.rs:1819
```
```
assertion failed: `(left == right)`
left: `TypedRect(98×16 at (0,0))`,
right: `TypedRect(98×98 at (0,0))`
```
I can reproduce this pretty consistently tab-switching from a youtube tab to a whatsapp web tab a couple times using the keyboard. Both tabs are pinned fwiw.
I'll try to find some repro steps on a clean profile.
Jeff mentioned this is likely regressed by bug 1563775,
|
|
1,565,466 | 14,230,886 |
**Filed by:** rgurzau [at] mozilla.com
**Parsed log:** https://treeherder.mozilla.org/logviewer.html#?job_id=256100975&repo=autoland
**Full log:** https://queue.taskcluster.net/v1/task/cBEjOXmqRS-Gbp39HetG8Q/runs/0/artifacts/public/logs/live_backing.log
---
[task 2019-07-12T03:47:50.948Z] 03:47:50 INFO - SUITE-END | took 134s
[task 2019-07-12T03:47:51.670Z] 03:47:51 INFO - mozcrash Downloading symbols from: https://queue.taskcluster.net/v1/task/d8nbFgnGQ7KYopF3eLVMZw/artifacts/public/build/target.crashreporter-symbols.zip
[task 2019-07-12T03:47:55.113Z] 03:47:55 INFO - mozcrash Copy/paste: /builds/worker/workspace/build/linux64-minidump_stackwalk /tmp/tmpybsaSk/6be80166-8999-523a-e97c-e345a059a10e.dmp /tmp/tmpsEqydW
[task 2019-07-12T03:47:59.317Z] 03:47:59 INFO - mozcrash Saved minidump as /builds/worker/workspace/build/blobber_upload_dir/6be80166-8999-523a-e97c-e345a059a10e.dmp
[task 2019-07-12T03:47:59.318Z] 03:47:59 INFO - mozcrash Saved app info as /builds/worker/workspace/build/blobber_upload_dir/6be80166-8999-523a-e97c-e345a059a10e.extra
[task 2019-07-12T03:47:59.325Z] 03:47:59 WARNING - PROCESS-CRASH | org.mozilla.geckoview.test.SelectionActionDelegateTest.paste[#text] | application crashed [@ mozilla::detail::RunnableFunction<nsWindow::LayerViewSupport::OnDetach(already_AddRefed<mozilla::Runnable>)::{lambda()#1}>::Run()]
[task 2019-07-12T03:47:59.325Z] 03:47:59 INFO - Crash dump filename: /tmp/tmpybsaSk/6be80166-8999-523a-e97c-e345a059a10e.dmp
[task 2019-07-12T03:47:59.326Z] 03:47:59 INFO - Operating system: Android
[task 2019-07-12T03:47:59.326Z] 03:47:59 INFO - 0.0.0 Linux 3.10.0+ #260 SMP PREEMPT Fri May 19 12:48:14 PDT 2017 x86_64
[task 2019-07-12T03:47:59.326Z] 03:47:59 INFO - CPU: amd64
[task 2019-07-12T03:47:59.326Z] 03:47:59 INFO - family 6 model 6 stepping 3
[task 2019-07-12T03:47:59.326Z] 03:47:59 INFO - 4 CPUs
[task 2019-07-12T03:47:59.326Z] 03:47:59 INFO - GPU: UNKNOWN
[task 2019-07-12T03:47:59.326Z] 03:47:59 INFO - Crash reason: SIGSEGV /0x00000080
[task 2019-07-12T03:47:59.326Z] 03:47:59 INFO - Crash address: 0x0
[task 2019-07-12T03:47:59.326Z] 03:47:59 INFO - Process uptime: not available
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - Thread 0 (crashed)
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - 0 libxul.so!mozilla::detail::RunnableFunction<nsWindow::LayerViewSupport::OnDetach(already_AddRefed<mozilla::Runnable>)::{lambda()#1}>::Run() [nsThreadUtils.h:d7a0f54d4db28226aa2c457c4867603b74b920e5 : 564 + 0x29]
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - rax = 0x0072f2f2f2f2f2f2 rdx = 0x0000000000000002
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - rcx = 0xe5e5e5e5e5e5e5e5 rbx = 0xe5e5e5e5e5e5e5e5
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - rsi = 0x0000000000000000 rdi = 0x00007fc2fd577400
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - rbp = 0x00007fffd839a650 rsp = 0x00007fffd839a5c0
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - r8 = 0x0000000000000000 r9 = 0x0000000000000000
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - r10 = 0x00007fc3332e7f70 r11 = 0x0000000000000246
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - r12 = 0x00007fffd839a610 r13 = 0x00007fc2fd577400
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - r14 = 0x00000000132d9d00 r15 = 0x00007fffd839a5c8
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - rip = 0x00007fc3161fa91a
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - Found by: given as instruction pointer in context
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - 1 libxul.so!long mozilla::jni::NativeStub<mozilla::java::GeckoThread::RunUiThreadCallback_t, GeckoThreadSupport, mozilla::jni::Args<> >::Wrap<&GeckoThreadSupport::RunUiThreadCallback>(_JNIEnv*, _jclass*) [Natives.h:d7a0f54d4db28226aa2c457c4867603b74b920e5 : 695 + 0xac]
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - rbx = 0x00007fc310746580 rbp = 0x00007fffd839a6a0
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - rsp = 0x00007fffd839a660 r12 = 0x00007fc310746580
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - r13 = 0x00007fc2fd577400 r14 = 0x00000000132d9d00
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - r15 = 0x00007fffd839a668 rip = 0x00007fc3161ef012
[task 2019-07-12T03:47:59.332Z] 03:47:59 INFO - Found by: call frame info
|
|
1,565,744 | 14,233,151 |
`MemMapSnapshot`, from bug 1463587, creates an unsecured (and, on [older Windows versions][versions], unsecurable due to being unnamed) object for its shared memory, so a process receiving a read-only handle to it can use `DuplicateHandle` to gain write access and attack other processes.
[versions]: https://chromium.googlesource.com/chromium/src.git/+/b7d66e95ebb94b7359488b1f2976ac4915bd6103%5E!
The patches currently posted to bug 1479960, which move this functionality into `base::SharedMemory`, have the same problem.
Specifically, `SharedStringMap` is used with `MemMapSnapshot` to store prefs, so it's possible that this bug could be used to escalate from a compromised Web content process to a more privileged child process, possibly including the unsandboxed GPU process. (It's also easily usable for out-of-bounds reads.)
Chrome's version of this bug is CVE-2014-3196 and [their bug 338538](https://crbug.com/338538); our exposure to it was reported as part of bug 1564979.
|
|
1,565,780 | 14,233,393 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:68.0) Gecko/20100101 Firefox/68.0
Steps to reproduce:
You must have some passwords saved in Firefox default credentials manager with a master password.
Start Firefox and enter your master password when prompted.
Then open the credentials dialog from the menu. You should see your credentials list.
Rich-click on one of the credentials, and try to copy the password in your clipboard.
Actual results:
You are prompted for your master password again. Close it without entering your master password, but the password is copied in your clipboard anyway.
Expected results:
Password should not have been copied in your clipboard since you did not enter the master password.
|
|
1,565,848 | 14,233,735 |
This bug is for crash report bp-6295a50d-656d-404f-ba09-76cc90190713.
```
Top 10 frames of crashing thread:
0 xul.dll mozilla::net::HttpChannelChild::OnStartRequest netwerk/protocol/http/HttpChannelChild.cpp:564
1 xul.dll mozilla::net::StartRequestEvent::Run netwerk/protocol/http/HttpChannelChild.cpp:427
2 xul.dll mozilla::net::ChannelEventQueue::RunOrEnqueue netwerk/ipc/ChannelEventQueue.h:210
3 xul.dll class mozilla::ipc::IPCResult mozilla::net::HttpChannelChild::RecvOnStartRequest netwerk/protocol/http/HttpChannelChild.cpp:489
4 xul.dll mozilla::net::PHttpChannelChild::OnMessageReceived ipc/ipdl/PHttpChannelChild.cpp:859
5 xul.dll mozilla::dom::PContentChild::OnMessageReceived ipc/ipdl/PContentChild.cpp:7197
6 xul.dll mozilla::ipc::MessageChannel::DispatchMessage ipc/glue/MessageChannel.cpp:2082
7 xul.dll mozilla::SchedulerGroup::Runnable::Run xpcom/threads/SchedulerGroup.cpp:295
8 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225
9 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
```
Reproducible: always
Steps To reproduce:
1. Install Nightly to folder. The folder path includes includes Unicode Character 'STRING TERMINATOR' (U+009C)
2. Launch Nightly
3. Try to load any web page
Actual Results:
Tab crashes
Expected Results:
No crash
|
|
1,566,540 | 14,240,187 |
This bug is for crash report bp-81c9333d-4860-4800-a8cb-6f58a0190716. All of the crashes are 10.15 users running 10.15.0 19A501i .
Seen while looking at nightly crash stats: https://bit.ly/2GgJOpY. Crashes started in 20190715214335.
Not sure if this is something we regressed or whether this was around the time the third beta came out.
Possible regression range based on Build ID: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=30b8d57cb72a2f955532a0e670c599881a110f17&tochange=c0bcda96a954fe7a3700466bda256aea58189ac9
```
Top 9 frames of crashing thread:
0 XUL CrashReporter::TerminateHandler toolkit/crashreporter/nsExceptionHandler.cpp:1380
1 @0x7fff69db6da6
2 @0x7fff69db6b54
3 @0x7fff69da834e
4 @0x7fff68ad42af
5 @0x7fff68adb6de
6 @0x7fff68adcb35
7 @0x7fff6cdd3da9
8 @0x7fff6cdd06ae
```
|
|
1,561,912 | 14,201,728 |
This bug is for crash report bp-ca131877-1b9f-4d9d-b637-e6c5e0190627.
Seen while looking at FX for Android crash stats, but this affects Fenix MVP (20190612114833) and Focus from what I can tell in crash stats: https://bit.ly/2Xf86ez. All of the signatures appear to be possible UAF addresses, plus a high percentage in Fennec are startup crashes. The Fennec crashes are seen in the most recent Fennec betas.
(100.0% in signature vs 00.34% overall) address = 0xe5e5e5e5e5e5e5e5
(100.0% in signature vs 19.86% overall) Module "libvixl-arm64.so" = true
(87.50% in signature vs 02.80% overall) startup_crash = 1
```
Top 10 frames of crashing thread:
0 libxul.so mozilla::FilePreferences::IsAllowedPath xpcom/ds/nsTArray.h:344
1 libxul.so nsLocalFile::GetDiskSpaceAvailable xpcom/io/nsLocalFileUnix.cpp:1327
2 libxul.so mozilla::net::CacheFileIOManager::OverLimitEvictionInternal netwerk/cache2/CacheFileIOManager.cpp:2779
3 libxul.so mozilla::detail::RunnableMethodImpl<RefPtr<mozilla::dom::WorkerListener>, void xpcom/threads/nsThreadUtils.h:1128
4 libxul.so mozilla::net::CacheIOThread::ThreadFunc netwerk/cache2/CacheIOThread.cpp:545
5 libnss3.so _pt_root nsprpub/pr/src/pthreads/ptthread.c:201
6 libc.so libc.so@0x63679
7 libc.so libc.so@0x63661
8 libc.so libc.so@0x1dff9
9 [email protected] [email protected]@0x1976
```
|
|
1,562,102 | 14,203,326 |
The following testcase crashes on mozilla-central revision 7ffabb358c42 (build with --enable-debug --enable-more-deterministic, run with --fuzzing-safe --no-threads --baseline-eager --no-ion):
// Adapted from randomly chosen test: js/src/tests/test262/language/statements/class/elements/after-same-line-static-async-gen-rs-field-identifier.js
oomTest(
new Function(`
evaluate(\`
class C {
c;
_;
2;
u;
J;
_;
}
t(C);
function s() {
e;
if (r) {
0;
}
c1 = 1;
t.e(
c
.a2,
1
);
s
.s(
c8,
1
);
a
(
c
.J
, 1
);
u
(
c
._
, 1
);
}
e.r;
\`, {
compileAndGo: true
})
`)
)
Backtrace:
```
#0 JS::Rooted<JSAtom*>::~Rooted (this=0x7f6e13c19040) at /home/ubuntu/shell-cache/js-dbg-64-dm-linux-x86_64-7ffabb358c42/objdir-js/dist/include/js/RootingAPI.h:1061
#1 js::frontend::BytecodeEmitter::emitClass (this=<optimized out>, classNode=<optimized out>, nameKind=js::frontend::BytecodeEmitter::ClassNameKind::BindingName, nameForAnonymousClass=...) at js/src/frontend/BytecodeEmitter.cpp:8850
#2 0x0000558d18a6077b in js::frontend::BytecodeEmitter::emitTree (this=0x7ffe1a198340, pn=0x7f6e13cde998, valueUsage=js::frontend::ValueUsage::WantValue, emitLineNote=js::frontend::BytecodeEmitter::EMIT_LINENOTE) at js/src/frontend/BytecodeEmitter.cpp:9393
#3 0x0000558d18a610a9 in js::frontend::BytecodeEmitter::emitStatementList (this=<optimized out>, stmtList=<optimized out>) at js/src/frontend/BytecodeEmitter.cpp:6726
#4 js::frontend::BytecodeEmitter::emitTree (this=0x7ffe1a198340, pn=0x7f6e13cdd020, valueUsage=js::frontend::ValueUsage::WantValue, emitLineNote=<optimized out>) at js/src/frontend/BytecodeEmitter.cpp:9030
#5 0x0000558d18a55722 in js::frontend::BytecodeEmitter::emitScript (this=0x7ffe1a198340, body=0x7f6e13cdd020) at js/src/frontend/BytecodeEmitter.cpp:2455
/snip
```
For detailed crash information, see attachment.
Setting s-s as a start as this seems like a Rooting / GC assertion failure.
|
|
1,562,298 | 14,204,911 |
+++ This bug was initially created as a clone of Bug #1562102 +++
The following testcase crashes on mozilla-central revision 7ffabb358c42 (build with --enable-debug --enable-more-deterministic, run with --fuzzing-safe --no-threads --no-baseline --no-ion):
// Adapted from randomly chosen test: js/src/tests/test262/language/statements/class/elements/after-same-line-static-async-gen-rs-field-identifier.js
oomTest(
new Function(`
evaluate(\`
class C {
c;
_;
2;
u;
J;
_;
}
t(C);
function s() {
e;
if (r) {
0;
}
c1 = 1;
t.e(
c
.a2,
1
);
s
.s(
c8,
1
);
a
(
c
.J
, 1
);
u
(
c
._
, 1
);
}
e.r;
\`, {
compileAndGo: true
})
`)
)
Backtrace:
```
#0 js::frontend::FullParseHandler::addClassMemberDefinition (this=0x7fffffffac30, memberList=0x7ffff5de7060, member=0x0)
at /home/ubuntu/trees/mozilla-central/js/src/frontend/FullParseHandler.h:470
#1 0x0000555556e25cfd in js::frontend::GeneralParser<js::frontend::FullParseHandler, char16_t>::finishClassConstructor (this=0x7fffffffa798,
classStmt=..., className=..., hasHeritage=<optimized out>, classStartOffset=4294945840, classEndOffset=150, numFields=6,
classMembers=@0x7fffffff9970: 0x7ffff5de7060) at /home/ubuntu/trees/mozilla-central/js/src/frontend/Parser.cpp:6997
#2 0x0000555556e13189 in js::frontend::GeneralParser<js::frontend::FullParseHandler, char16_t>::classDefinition (this=<optimized out>,
yieldHandling=<optimized out>, classContext=js::frontend::GeneralParser<js::frontend::FullParseHandler, char16_t>::ClassStatement,
defaultHandling=js::frontend::NameRequired) at /home/ubuntu/trees/mozilla-central/js/src/frontend/Parser.cpp:7134
#3 0x0000555556e0d81b in js::frontend::GeneralParser<js::frontend::FullParseHandler, char16_t>::statementListItem (this=<optimized out>,
yieldHandling=<optimized out>, canHaveDirectives=<optimized out>) at /home/ubuntu/trees/mozilla-central/js/src/frontend/Parser.cpp:7998
#4 0x0000555556e0bb95 in js::frontend::GeneralParser<js::frontend::FullParseHandler, char16_t>::statementList (this=<optimized out>,
yieldHandling=js::frontend::YieldIsName) at /home/ubuntu/trees/mozilla-central/js/src/frontend/Parser.cpp:3475
#5 0x0000555556e4642d in js::frontend::Parser<js::frontend::FullParseHandler, char16_t>::globalBody (this=0x7fffffffa798, globalsc=0x7fffffffadf8)
at /home/ubuntu/trees/mozilla-central/js/src/frontend/Parser.cpp:1446
#6 0x0000555556e7b583 in js::frontend::ScriptCompiler<char16_t>::compileScript (this=0x7fffffffa240, info=..., environment=..., sc=<optimized out>)
at /home/ubuntu/trees/mozilla-central/js/src/frontend/BytecodeCompiler.cpp:531
#7 0x0000555556e4a96b in CreateGlobalScript<char16_t> (info=..., srcBuf=..., sourceObjectOut=<optimized out>)
at /home/ubuntu/trees/mozilla-central/js/src/frontend/BytecodeCompiler.cpp:208
/snip
```
Ashley mentioned in bug 1562102 comment 7 that this is an unrelated bug, so cloning it here. Still s-s because that bug is still s-s.
|
|
1,562,616 | 14,208,659 |
This bug is for crash report bp-8688e7fb-c841-4264-99c8-ea8e60190629.
Seen while reviewing nightly crashes. These crashes started in 20190628161248: https://bit.ly/302JP8m. Many of the URLS are youtube.com, but there are some others.
Possible regression range based on build id: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=9ee669c657c79b26a6ec0df246cc5bfe2b1d9a9a&tochange=8537d24d8aa8c0c2189c308d5835def2feec313c
Bug 1547218 touched some code in this area when it landed, ni on nika
```
Top 10 frames of crashing thread:
0 XUL mozilla::ipc::FatalError ipc/glue/ProtocolUtils.cpp:259
1 XUL mozilla::ipc::IProtocol::HandleFatalError const ipc/glue/ProtocolUtils.cpp:495
2 XUL bool mozilla::ipc::ReadIPDLParam<mozilla::layers::TimedTexture> ipc/glue/IPDLParamTraits.h:61
3 XUL bool mozilla::ipc::ReadIPDLParam<nsTArray<mozilla::layers::TimedTexture> > ipc/glue/IPDLParamTraits.h:61
4 XUL bool mozilla::ipc::ReadIPDLParam<mozilla::layers::OpUseTexture> ipc/glue/IPDLParamTraits.h:61
5 XUL bool mozilla::ipc::ReadIPDLParam<mozilla::layers::CompositableOperationDetail> ipc/glue/IPDLParamTraits.h:61
6 XUL mozilla::ipc::IPDLParamTraits<mozilla::layers::CompositableOperation>::Read ipc/ipdl/LayersMessages.cpp:10713
7 XUL mozilla::ipc::IPDLParamTraits<nsTArray<mozilla::layers::CompositableOperation> >::Read ipc/glue/IPDLParamTraits.h:182
8 XUL mozilla::layers::PImageBridgeParent::OnMessageReceived ipc/ipdl/PImageBridgeParent.cpp:349
9 XUL mozilla::ipc::MessageChannel::DispatchMessage ipc/glue/MessageChannel.cpp:2158
```
|
|
1,563,133 | 14,212,156 |
Created attachment 9075555
testcase.html
Reduced with m-c 20190702-109ccdeb9634
This crash has only been seen on Android.
```
eip = 0xca2318e6 esp = 0xd1af9d20 ebp = 0xd1af9d38 ebx = 0xd0edfdc8
esi = 0x0277a556 edi = 0xd1af9fa8 eax = 0x1d9bbffc ecx = 0xd1af9e00
edx = 0x8d200000 efl = 0x00210206
OS|Android|0.0.0 Linux 4.4.124+ #1 SMP PREEMPT Wed Jan 30 07:13:09 UTC 2019 i686
CPU|x86|GenuineIntel family 6 model 6 stepping 3|4
GPU|||
Crash|SIGSEGV|0xaabbc000|13
13|0|libxul.so|GlyphBufferAzure::OutputGlyph(unsigned int, mozilla::gfx::PointTyped<mozilla::gfx::UnknownUnits, float> const&)|hg:hg.mozilla.org/mozilla-central:gfx/thebes/gfxFont.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|1607|0x4
13|1|libxul.so|void gfxFont::DrawOneGlyph<(gfxFont::FontComplexityT)1>(unsigned int, mozilla::gfx::PointTyped<mozilla::gfx::UnknownUnits, float> const&, GlyphBufferAzure&, bool*) const|hg:hg.mozilla.org/mozilla-central:gfx/thebes/gfxFont.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|1935|0x19
13|2|libxul.so|bool gfxFont::DrawGlyphs<(gfxFont::FontComplexityT)1, (gfxFont::SpacingT)1>(gfxShapedText const*, unsigned int, unsigned int, mozilla::gfx::PointTyped<mozilla::gfx::UnknownUnits, float>*, GlyphBufferAzure&)|hg:hg.mozilla.org/mozilla-central:gfx/thebes/gfxFont.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|1821|0x19
13|3|libxul.so|gfxFont::Draw(gfxTextRun const*, unsigned int, unsigned int, mozilla::gfx::PointTyped<mozilla::gfx::UnknownUnits, float>*, TextRunDrawParams const&, mozilla::gfx::ShapedTextFlags)|hg:hg.mozilla.org/mozilla-central:gfx/thebes/gfxFont.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|2254|0x14
13|4|libxul.so|gfxTextRun::DrawGlyphs(gfxFont*, gfxTextRun::Range, mozilla::gfx::PointTyped<mozilla::gfx::UnknownUnits, float>*, gfxTextRun::PropertyProvider*, gfxTextRun::Range, TextRunDrawParams&, mozilla::gfx::ShapedTextFlags) const|hg:hg.mozilla.org/mozilla-central:gfx/thebes/gfxTextRun.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|408|0x1c
13|5|libxul.so|gfxTextRun::Draw(gfxTextRun::Range, mozilla::gfx::PointTyped<mozilla::gfx::UnknownUnits, float>, gfxTextRun::DrawParams const&) const|hg:hg.mozilla.org/mozilla-central:gfx/thebes/gfxTextRun.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|640|0x41
13|6|libxul.so|DrawTextRun(gfxTextRun const*, mozilla::gfx::PointTyped<mozilla::gfx::UnknownUnits, float> const&, gfxTextRun::Range, nsTextFrame::DrawTextRunParams const&, nsTextFrame*)|hg:hg.mozilla.org/mozilla-central:layout/generic/nsTextFrame.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|0|0x5
13|7|libxul.so|nsTextFrame::DrawTextRun(gfxTextRun::Range, mozilla::gfx::PointTyped<mozilla::gfx::UnknownUnits, float> const&, nsTextFrame::DrawTextRunParams const&)|hg:hg.mozilla.org/mozilla-central:layout/generic/nsTextFrame.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|6780|0x2b
13|8|libxul.so|nsTextFrame::DrawText(gfxTextRun::Range, mozilla::gfx::PointTyped<mozilla::gfx::UnknownUnits, float> const&, nsTextFrame::DrawTextParams const&)|hg:hg.mozilla.org/mozilla-central:layout/generic/nsTextFrame.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|7018|0x30
13|9|libxul.so|nsTextFrame::PaintText(nsTextFrame::PaintTextParams const&, int, int, nsPoint const&, bool, float)|hg:hg.mozilla.org/mozilla-central:layout/generic/nsTextFrame.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|6708|0x39
13|10|libxul.so|nsDisplayText::RenderToContext(gfxContext*, nsDisplayListBuilder*, bool)|hg:hg.mozilla.org/mozilla-central:layout/painting/nsDisplayList.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|9503|0x3d
13|11|libxul.so|nsDisplayText::Paint(nsDisplayListBuilder*, gfxContext*)|hg:hg.mozilla.org/mozilla-central:layout/painting/nsDisplayList.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|9398|0x10
13|12|libxul.so|mozilla::FrameLayerBuilder::PaintItems(std::__ndk1::vector<mozilla::AssignedDisplayItem, std::__ndk1::allocator<mozilla::AssignedDisplayItem> >&, mozilla::gfx::IntRectTyped<mozilla::gfx::UnknownUnits> const&, gfxContext*, nsDisplayListBuilder*, nsPresContext*, mozilla::gfx::IntPointTyped<mozilla::gfx::UnknownUnits> const&, float, float)|hg:hg.mozilla.org/mozilla-central:layout/painting/FrameLayerBuilder.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|7140|0x19
13|13|libxul.so|mozilla::FrameLayerBuilder::DrawPaintedLayer(mozilla::layers::PaintedLayer*, gfxContext*, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::DrawRegionClip, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, void*)|hg:hg.mozilla.org/mozilla-central:layout/painting/FrameLayerBuilder.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|7300|0x41
13|14|libxul.so|mozilla::layers::ClientMultiTiledLayerBuffer::Update(mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::TilePaintFlags)|hg:hg.mozilla.org/mozilla-central:gfx/layers/client/MultiTiledContentClient.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|264|0x40
13|15|libxul.so|mozilla::layers::ClientMultiTiledLayerBuffer::PaintThebes(mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, void (*)(mozilla::layers::PaintedLayer*, gfxContext*, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::DrawRegionClip, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, void*), void*, mozilla::layers::TilePaintFlags)|hg:hg.mozilla.org/mozilla-central:gfx/layers/client/MultiTiledContentClient.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|118|0x13
13|16|libxul.so|mozilla::layers::ClientTiledPaintedLayer::RenderHighPrecision(mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, void (*)(mozilla::layers::PaintedLayer*, gfxContext*, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::DrawRegionClip, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, void*), void*)|hg:hg.mozilla.org/mozilla-central:gfx/layers/client/ClientTiledPaintedLayer.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|370|0x2b
13|17|libxul.so|mozilla::layers::ClientTiledPaintedLayer::RenderLayer()|hg:hg.mozilla.org/mozilla-central:gfx/layers/client/ClientTiledPaintedLayer.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|592|0x24
13|18|libxul.so|non-virtual thunk to mozilla::layers::ClientTiledPaintedLayer::RenderLayer()|hg:hg.mozilla.org/mozilla-central:gfx/layers/client/ClientTiledPaintedLayer.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|0|0x21
13|19|libxul.so|<name omitted>|||0x1c
13|20|libxul.so|mozilla::layers::ClientContainerLayer::RenderLayer()|hg:hg.mozilla.org/mozilla-central:gfx/layers/client/ClientContainerLayer.h:109ccdeb96342a315b86ef0c7ebe76738308673b|53|0xf
13|21|libxul.so|non-virtual thunk to mozilla::layers::ClientContainerLayer::RenderLayer()|hg:hg.mozilla.org/mozilla-central:gfx/layers/client/ClientContainerLayer.h:109ccdeb96342a315b86ef0c7ebe76738308673b|0|0x21
13|22|libxul.so|<name omitted>|||0x1c
13|23|libxul.so|mozilla::layers::ClientContainerLayer::RenderLayer()|hg:hg.mozilla.org/mozilla-central:gfx/layers/client/ClientContainerLayer.h:109ccdeb96342a315b86ef0c7ebe76738308673b|53|0xf
13|24|libxul.so|non-virtual thunk to mozilla::layers::ClientContainerLayer::RenderLayer()|hg:hg.mozilla.org/mozilla-central:gfx/layers/client/ClientContainerLayer.h:109ccdeb96342a315b86ef0c7ebe76738308673b|0|0x21
13|25|libxul.so|<name omitted>|||0x1c
13|26|libxul.so|mozilla::layers::ClientContainerLayer::RenderLayer()|hg:hg.mozilla.org/mozilla-central:gfx/layers/client/ClientContainerLayer.h:109ccdeb96342a315b86ef0c7ebe76738308673b|53|0xf
13|27|libxul.so|non-virtual thunk to mozilla::layers::ClientContainerLayer::RenderLayer()|hg:hg.mozilla.org/mozilla-central:gfx/layers/client/ClientContainerLayer.h:109ccdeb96342a315b86ef0c7ebe76738308673b|0|0x21
13|28|libxul.so|mozilla::layers::ClientLayerManager::EndTransactionInternal(void (*)(mozilla::layers::PaintedLayer*, gfxContext*, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::DrawRegionClip, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, void*), void*, mozilla::layers::LayerManager::EndTransactionFlags)|hg:hg.mozilla.org/mozilla-central:gfx/layers/client/ClientLayerManager.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|320|0x8
13|29|libxul.so|mozilla::layers::ClientLayerManager::EndTransaction(void (*)(mozilla::layers::PaintedLayer*, gfxContext*, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, mozilla::layers::DrawRegionClip, mozilla::gfx::IntRegionTyped<mozilla::gfx::UnknownUnits> const&, void*), void*, mozilla::layers::LayerManager::EndTransactionFlags)|hg:hg.mozilla.org/mozilla-central:gfx/layers/client/ClientLayerManager.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|383|0x16
13|30|libxul.so|nsDisplayList::PaintRoot(nsDisplayListBuilder*, gfxContext*, unsigned int)|hg:hg.mozilla.org/mozilla-central:layout/painting/nsDisplayList.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|3133|0x28
13|31|libxul.so|nsLayoutUtils::PaintFrame(gfxContext*, nsIFrame*, nsRegion const&, unsigned int, nsDisplayListBuilderMode, nsLayoutUtils::PaintFrameFlags)|hg:hg.mozilla.org/mozilla-central:layout/base/nsLayoutUtils.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|4105|0x27
13|32|libxul.so|mozilla::PresShell::Paint(nsView*, nsRegion const&, mozilla::PaintFlags)|hg:hg.mozilla.org/mozilla-central:layout/base/PresShell.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|6149|0x1e
13|33|libxul.so|nsViewManager::ProcessPendingUpdatesPaint(nsIWidget*)|hg:hg.mozilla.org/mozilla-central:view/nsViewManager.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|461|0x2e
13|34|libxul.so|nsViewManager::ProcessPendingUpdatesForView(nsView*, bool)|hg:hg.mozilla.org/mozilla-central:view/nsViewManager.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|396|0x17
13|35|libxul.so|nsViewManager::ProcessPendingUpdates()|hg:hg.mozilla.org/mozilla-central:view/nsViewManager.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|1019|0x17
13|36|libxul.so|nsRefreshDriver::Tick(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp)|hg:hg.mozilla.org/mozilla-central:layout/base/nsRefreshDriver.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|2104|0x10
13|37|libxul.so|mozilla::RefreshDriverTimer::TickRefreshDrivers(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp, nsTArray<RefPtr<nsRefreshDriver> >&)|hg:hg.mozilla.org/mozilla-central:layout/base/nsRefreshDriver.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|350|0x33
13|38|libxul.so|mozilla::RefreshDriverTimer::Tick(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp)|hg:hg.mozilla.org/mozilla-central:layout/base/nsRefreshDriver.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|344|0x4c
13|39|libxul.so|mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::TickRefreshDriver(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp)|hg:hg.mozilla.org/mozilla-central:layout/base/nsRefreshDriver.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|710|0x41
13|40|libxul.so|mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::ParentProcessVsyncNotifier::Run()|hg:hg.mozilla.org/mozilla-central:layout/base/nsRefreshDriver.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|510|0x3d
13|41|libxul.so|nsThread::ProcessNextEvent(bool, bool*)|hg:hg.mozilla.org/mozilla-central:xpcom/threads/nsThread.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|1225|0x16
13|42|libxul.so|NS_ProcessNextEvent(nsIThread*, bool)|hg:hg.mozilla.org/mozilla-central:xpcom/threads/nsThreadUtils.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|486|0x11
13|43|libxul.so|mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*)|hg:hg.mozilla.org/mozilla-central:ipc/glue/MessagePump.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|88|0xd
13|44|libxul.so|MessageLoop::RunInternal()|hg:hg.mozilla.org/mozilla-central:ipc/chromium/src/base/message_loop.cc:109ccdeb96342a315b86ef0c7ebe76738308673b|315|0x16
13|45|libxul.so|MessageLoop::Run()|hg:hg.mozilla.org/mozilla-central:ipc/chromium/src/base/message_loop.cc:109ccdeb96342a315b86ef0c7ebe76738308673b|290|0xb
13|46|libxul.so|nsBaseAppShell::Run()|hg:hg.mozilla.org/mozilla-central:widget/nsBaseAppShell.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|137|0xe
13|47|libxul.so|nsAppStartup::Run()|hg:hg.mozilla.org/mozilla-central:toolkit/components/startup/nsAppStartup.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|276|0x18
13|48|libxul.so|XREMain::XRE_mainRun()|hg:hg.mozilla.org/mozilla-central:toolkit/xre/nsAppRunner.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|4639|0x10
13|49|libxul.so|XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&)|hg:hg.mozilla.org/mozilla-central:toolkit/xre/nsAppRunner.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|4774|0x8
13|50|libxul.so|XRE_main(int, char**, mozilla::BootstrapConfig const&)|hg:hg.mozilla.org/mozilla-central:toolkit/xre/nsAppRunner.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|4855|0xf
13|51|libxul.so|GeckoStart|hg:hg.mozilla.org/mozilla-central:toolkit/xre/nsAndroidStartup.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|47|0xd
13|52|libxul.so|mozilla::BootstrapImpl::GeckoStart(_JNIEnv*, char**, int, mozilla::StaticXREAppData const&)|hg:hg.mozilla.org/mozilla-central:toolkit/xre/Bootstrap.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|77|0x11
13|53|libmozglue.so|Java_org_mozilla_gecko_mozglue_GeckoLoader_nativeRun|hg:hg.mozilla.org/mozilla-central:mozglue/android/APKOpen.cpp:109ccdeb96342a315b86ef0c7ebe76738308673b|372|0x2a
13|54|libart.so||||0x634318
```
|
|
1,563,542 | 14,215,095 |
This bug is for crash report bp-bd690590-ec87-41d2-90c0-f9a610190704.
```
Top 10 frames of crashing thread:
0 xul.dll mozilla::dom::ContentParent::RecvAttachBrowsingContext dom/ipc/ContentParent.cpp:5755
1 xul.dll mozilla::dom::PContentParent::OnMessageReceived ipc/ipdl/PContentParent.cpp:10538
2 xul.dll mozilla::ipc::MessageChannel::DispatchMessage ipc/glue/MessageChannel.cpp:2082
3 xul.dll mozilla::ipc::MessageChannel::MessageTask::Run ipc/glue/MessageChannel.cpp:1970
4 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225
5 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
6 xul.dll mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:110
7 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:308
8 xul.dll MessageLoop::Run ipc/chromium/src/base/message_loop.cc:290
9 xul.dll nsBaseAppShell::Run widget/nsBaseAppShell.cpp:137
```
this browser crash signature with `MOZ_RELEASE_ASSERT(parent) (Parent doesn't exist in parent process)` is spiking up since in nightly again since 69.0a1 build 20190703094734.
the crashes happen cross platform and account for 30% of browser crashes during the past 24h...
these were the changes going into the first affected nightly build:
* pushlog: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=fd2778a2ce8b&tochange=c52f9ebca761
* buglist: https://mzl.la/2Xo8nXT
|
|
1,563,684 | 14,216,219 |
Here's the error message in the Browser Console:
> uncaught exception: Protocol error (unknownError): error occurred while processing 'getCachedMessages': SecurityError: Permission denied to access property "windowUtils" on cross-origin object
Stack: getInnerWindowId@resource://devtools/server/actors/webconsole/utils.js:87:5
getInnerWindowIDsForFrames@resource://devtools/server/actors/webconsole/utils.js:99:32
getInnerWindowIDsForFrames@resource://devtools/server/actors/webconsole/utils.js:105:31
getInnerWindowIDsForFrames@resource://devtools/server/actors/webconsole/utils.js:105:31
getCachedMessages@resource://devtools/server/actors/webconsole/listeners/console-service.js:142:33
getCachedMessages@resource://devtools/server/actors/webconsole.js:861:24
onPacket@resource://devtools/server/main.js:1298:58
receiveMessage@resource://devtools/shared/transport/child-transport.js:66:16
Line: 87, column: 0
And then
> WebConsolePanel open failed. timeout: Connection timeout. Check the Error Console on both ends for potential error messages. Reopen the Web Console to try again.
Object { error: "timeout", message: "Connection timeout. Check the Error Console on both ends for potential error messages. Reopen the Web Console to try again." }
panel.js:73:15
At the very least, we shouldn't timeout the connection if we couldn't get cached messages.
|
|
1,564,077 | 14,220,208 |
Created attachment 9076491
Screenshot
When opening the page info window in a French build (starting from 69.0), the clear cookies and site data button is cut out at the bottom, the label is really close to the window border.
The button is correctly rendered if you open one of the sub panels (blocked cookies, or connection security details for instance) then go back to the main panel.
|
|
1,564,203 | 14,221,275 |
I have used MOZ-Regression to bisect this regression is between Jun. 29th and Jun. 30th, so it will be very possible to be a regression of Bug 1466702.
STR:
1. Go to https://webvr.info/samples/XX-vr-controllers.html and enter the immersive mode.
2. Open an another tab, https://www.wikipedia.org/, then closing the previous WebVR tab.
3. Wait for about 5 secs until VR process is shutdown, go to https://webvr.info/samples/XX-vr-controllers.html again, it will show WebVR supported but no VRDisplays.
|
|
1,573,051 | 14,292,280 |
Receive an e-mail with a link containing a reference, for example:
https://bugzilla.mozilla.org/show_bug.cgi?id=1552922#c9
Click on the link. In TB 69, the page opens to https://bugzilla.mozilla.org/show_bug.cgi?id=1552922 and not https://bugzilla.mozilla.org/show_bug.cgi?id=1552922#c9
Alice, can you please find the regression for us?
|
|
1,573,458 | 14,296,937 |
**Filed by:** ncsoregi [at] mozilla.com
**Parsed log:** https://treeherder.mozilla.org/logviewer.html#?job_id=261321292&repo=autoland
**Full log:** https://queue.taskcluster.net/v1/task/OkRuVInfRfeYNFySVhDsNg/runs/0/artifacts/public/logs/live_backing.log
---
[task 2019-08-13T12:16:08.360Z] 12:16:08 ERROR - PROCESS-CRASH | runner.py | application crashed [@ class JS::Symbol * js::gc::GCRuntime::tryNewTenuredThing<JS::Symbol,js::CanGC>(struct JSContext *, js::gc::AllocKind, unsigned __int64)]
[task 2019-08-13T12:16:08.361Z] 12:16:08 INFO - Crash dump filename: c:\users\task_1565695822\appdata\local\temp\tmpk3hspi.mozrunner\minidumps\ef384a46-ae89-4c46-b941-3bb49863277e.dmp
[task 2019-08-13T12:16:08.361Z] 12:16:08 INFO - Operating system: Windows NT
[task 2019-08-13T12:16:08.361Z] 12:16:08 INFO - 10.0.15063
[task 2019-08-13T12:16:08.362Z] 12:16:08 INFO - CPU: amd64
[task 2019-08-13T12:16:08.362Z] 12:16:08 INFO - family 6 model 94 stepping 3
[task 2019-08-13T12:16:08.363Z] 12:16:08 INFO - 8 CPUs
[task 2019-08-13T12:16:08.363Z] 12:16:08 INFO - GPU: UNKNOWN
[task 2019-08-13T12:16:08.363Z] 12:16:08 INFO - Crash reason: EXCEPTION_ACCESS_VIOLATION_READ
[task 2019-08-13T12:16:08.364Z] 12:16:08 INFO - Crash address: 0xb8
[task 2019-08-13T12:16:08.364Z] 12:16:08 INFO - Assertion: Unknown assertion type 0x00000000
[task 2019-08-13T12:16:08.364Z] 12:16:08 INFO - Process uptime: 33 seconds
[task 2019-08-13T12:16:08.364Z] 12:16:08 INFO - Thread 0 (crashed)
[task 2019-08-13T12:16:08.364Z] 12:16:08 INFO - 0 xul.dll!class JS::Symbol * js::gc::GCRuntime::tryNewTenuredThing<JS::Symbol,js::CanGC>(struct JSContext *, js::gc::AllocKind, unsigned __int64) [Allocator.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 270 + 0xb]
[task 2019-08-13T12:16:08.365Z] 12:16:08 INFO - rax = 0x0000000000000000 rdx = 0x0000000000000000
[task 2019-08-13T12:16:08.365Z] 12:16:08 INFO - rcx = 0x000002450872f000 rbx = 0x00000000ffffffff
[task 2019-08-13T12:16:08.365Z] 12:16:08 INFO - rsi = 0x000002450872f000 rdi = 0x0000000000000017
[task 2019-08-13T12:16:08.366Z] 12:16:08 INFO - rbp = 0x0000000000000017 rsp = 0x000000a97c7fd010
[task 2019-08-13T12:16:08.366Z] 12:16:08 INFO - r8 = 0x0000000000000010 r9 = 0x0000024508721000
[task 2019-08-13T12:16:08.366Z] 12:16:08 INFO - r10 = 0x00007ff872927948 r11 = 0x00007ff872927948
[task 2019-08-13T12:16:08.366Z] 12:16:08 INFO - r12 = 0x000002450872f000 r13 = 0x0000024508ac943a
[task 2019-08-13T12:16:08.366Z] 12:16:08 INFO - r14 = 0x0000000000000010 r15 = 0x00007ff870d67fe0
[task 2019-08-13T12:16:08.367Z] 12:16:08 INFO - rip = 0x00007ff870f3693d
[task 2019-08-13T12:16:08.367Z] 12:16:08 INFO - Found by: given as instruction pointer in context
[task 2019-08-13T12:16:08.367Z] 12:16:08 INFO - 1 xul.dll!JS::Symbol::newInternal(JSContext *,JS::SymbolCode,unsigned int,JS::Handle<JSAtom *>) [SymbolType.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 27 + 0x8]
[task 2019-08-13T12:16:08.367Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.368Z] 12:16:08 INFO - rsp = 0x000000a97c7fd060 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.368Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.368Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870dd8aaa
[task 2019-08-13T12:16:08.368Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.369Z] 12:16:08 INFO - 2 xul.dll!JS::Symbol::new_(JSContext *,JS::SymbolCode,JS::Handle<JSString *>) [SymbolType.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 44 + 0x15]
[task 2019-08-13T12:16:08.369Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.370Z] 12:16:08 INFO - rsp = 0x000000a97c7fd0b0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.370Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.370Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870dd8bef
[task 2019-08-13T12:16:08.370Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.371Z] 12:16:08 INFO - 3 xul.dll!static bool js::SymbolObject::construct(struct JSContext *, unsigned int, union JS::Value *) [Symbol.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 117 + 0xd]
[task 2019-08-13T12:16:08.371Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.372Z] 12:16:08 INFO - rsp = 0x000000a97c7fd110 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.372Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.372Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870d6809e
[task 2019-08-13T12:16:08.372Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.372Z] 12:16:08 INFO - 4 xul.dll!js::InternalCallOrConstruct(JSContext *,JS::CallArgs const &,js::MaybeConstruct) [Interpreter.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 539 + 0x3]
[task 2019-08-13T12:16:08.372Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.373Z] 12:16:08 INFO - rsp = 0x000000a97c7fd190 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.373Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.373Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870b7d14d
[task 2019-08-13T12:16:08.373Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.373Z] 12:16:08 INFO - 5 xul.dll!Interpret(JSContext *,js::RunState &) [Interpreter.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 3084 + 0x15]
[task 2019-08-13T12:16:08.373Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.374Z] 12:16:08 INFO - rsp = 0x000000a97c7fd2d0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.374Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.374Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870b713ca
[task 2019-08-13T12:16:08.374Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.374Z] 12:16:08 INFO - 6 xul.dll!js::RunScript(JSContext *,js::RunState &) [Interpreter.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 424 + 0xb]
[task 2019-08-13T12:16:08.374Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.375Z] 12:16:08 INFO - rsp = 0x000000a97c7fd700 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.375Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.375Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870b6bd22
[task 2019-08-13T12:16:08.375Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.376Z] 12:16:08 INFO - 7 xul.dll!js::InternalCallOrConstruct(JSContext *,JS::CallArgs const &,js::MaybeConstruct) [Interpreter.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 567 + 0xd]
[task 2019-08-13T12:16:08.376Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.376Z] 12:16:08 INFO - rsp = 0x000000a97c7fd780 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.376Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.376Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870b7d0ce
[task 2019-08-13T12:16:08.376Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.377Z] 12:16:08 INFO - 8 xul.dll!js::fun_call(JSContext *,unsigned int,JS::Value *) [JSFunction.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 1115 + 0x2d]
[task 2019-08-13T12:16:08.377Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.377Z] 12:16:08 INFO - rsp = 0x000000a97c7fd8c0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.377Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.377Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870ca26d4
[task 2019-08-13T12:16:08.377Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.378Z] 12:16:08 INFO - 9 xul.dll!js::InternalCallOrConstruct(JSContext *,JS::CallArgs const &,js::MaybeConstruct) [Interpreter.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 539 + 0x3]
[task 2019-08-13T12:16:08.378Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.378Z] 12:16:08 INFO - rsp = 0x000000a97c7fd9d0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.378Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.378Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870b7d14d
[task 2019-08-13T12:16:08.378Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.379Z] 12:16:08 INFO - 10 xul.dll!Interpret(JSContext *,js::RunState &) [Interpreter.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 3084 + 0x15]
[task 2019-08-13T12:16:08.379Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.379Z] 12:16:08 INFO - rsp = 0x000000a97c7fdb10 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.379Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.379Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870b713ca
[task 2019-08-13T12:16:08.379Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.380Z] 12:16:08 INFO - 11 xul.dll!js::RunScript(JSContext *,js::RunState &) [Interpreter.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 424 + 0xb]
[task 2019-08-13T12:16:08.380Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.380Z] 12:16:08 INFO - rsp = 0x000000a97c7fdf40 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.380Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.380Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870b6bd22
[task 2019-08-13T12:16:08.380Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.381Z] 12:16:08 INFO - 12 xul.dll!js::ExecuteKernel(JSContext *,JS::Handle<JSScript *>,JSObject &,JS::Value const &,js::AbstractFramePtr,JS::Value *) [Interpreter.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 786 + 0x5]
[task 2019-08-13T12:16:08.381Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.381Z] 12:16:08 INFO - rsp = 0x000000a97c7fdfc0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.381Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.381Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870b7e8ff
[task 2019-08-13T12:16:08.381Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.382Z] 12:16:08 INFO - 13 xul.dll!js::Execute(JSContext *,JS::Handle<JSScript *>,JSObject &,JS::Value *) [Interpreter.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 819 + 0x1e]
[task 2019-08-13T12:16:08.382Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.382Z] 12:16:08 INFO - rsp = 0x000000a97c7fe060 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.382Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.382Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870b7ea87
[task 2019-08-13T12:16:08.382Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.383Z] 12:16:08 INFO - 14 xul.dll!ExecuteScript(JSContext *,JS::Handle<JS::StackGCVector<JSObject *,js::TempAllocPolicy> >,JS::Handle<JSScript *>,JS::Value *) [CompilationAndEvaluation.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 468 + 0x11]
[task 2019-08-13T12:16:08.383Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.383Z] 12:16:08 INFO - rsp = 0x000000a97c7fe0e0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.383Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.383Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870c3ae5a
[task 2019-08-13T12:16:08.383Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.384Z] 12:16:08 INFO - 15 xul.dll!nsJSUtils::ExecutionContext::ExecScript() [nsJSUtils.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 416 + 0x9]
[task 2019-08-13T12:16:08.384Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.384Z] 12:16:08 INFO - rsp = 0x000000a97c7fe180 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.384Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.384Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86d0d0a85
[task 2019-08-13T12:16:08.384Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.385Z] 12:16:08 INFO - 16 xul.dll!static nsresult mozilla::dom::ExecuteCompiledScript(struct JSContext *, class mozilla::dom::ScriptLoadRequest *, class nsJSUtils::ExecutionContext & const) [ScriptLoader.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 2593 + 0x8]
[task 2019-08-13T12:16:08.385Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.385Z] 12:16:08 INFO - rsp = 0x000000a97c7fe1b0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.385Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.385Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86f9878b7
[task 2019-08-13T12:16:08.385Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.386Z] 12:16:08 INFO - 17 xul.dll!nsresult mozilla::dom::ScriptLoader::EvaluateScript(class mozilla::dom::ScriptLoadRequest *) [ScriptLoader.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 2817 + 0xb]
[task 2019-08-13T12:16:08.386Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.386Z] 12:16:08 INFO - rsp = 0x000000a97c7fe220 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.386Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.386Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86d0ce26b
[task 2019-08-13T12:16:08.387Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.387Z] 12:16:08 INFO - 18 xul.dll!nsresult mozilla::dom::ScriptLoader::ProcessRequest(class mozilla::dom::ScriptLoadRequest *) [ScriptLoader.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 2320 + 0xb]
[task 2019-08-13T12:16:08.387Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.387Z] 12:16:08 INFO - rsp = 0x000000a97c7fe620 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.387Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.387Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86d0cd744
[task 2019-08-13T12:16:08.388Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.388Z] 12:16:08 INFO - 19 xul.dll!bool mozilla::dom::ScriptLoader::ProcessExternalScript(class nsIScriptElement *, mozilla::dom::ScriptKind, class nsTAutoStringN<char16_t,64>, class nsIContent *) [ScriptLoader.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 1748 + 0xb]
[task 2019-08-13T12:16:08.388Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.388Z] 12:16:08 INFO - rsp = 0x000000a97c7fe6d0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.388Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.388Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86d147bf8
[task 2019-08-13T12:16:08.389Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.389Z] 12:16:08 INFO - 20 xul.dll!bool mozilla::dom::ScriptLoader::ProcessScriptElement(class nsIScriptElement *) [ScriptLoader.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 1587 + 0x18]
[task 2019-08-13T12:16:08.389Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.389Z] 12:16:08 INFO - rsp = 0x000000a97c7fe840 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.389Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.389Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86d0cbdec
[task 2019-08-13T12:16:08.390Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.390Z] 12:16:08 INFO - 21 xul.dll!mozilla::dom::ScriptElement::MaybeProcessScript() [ScriptElement.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 118 + 0xb]
[task 2019-08-13T12:16:08.390Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.390Z] 12:16:08 INFO - rsp = 0x000000a97c7feb50 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.391Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.391Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86d0cac12
[task 2019-08-13T12:16:08.391Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.391Z] 12:16:08 INFO - 22 xul.dll!void nsHtml5TreeOpExecutor::RunScript(class nsIContent *) [nsHtml5TreeOpExecutor.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 729 + 0xd]
[task 2019-08-13T12:16:08.391Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.392Z] 12:16:08 INFO - rsp = 0x000000a97c7febd0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.392Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.392Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86d0cb7f1
[task 2019-08-13T12:16:08.392Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.392Z] 12:16:08 INFO - 23 xul.dll!void nsHtml5TreeOpExecutor::RunFlushLoop() [nsHtml5TreeOpExecutor.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 532 + 0x8]
[task 2019-08-13T12:16:08.392Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.393Z] 12:16:08 INFO - rsp = 0x000000a97c7fec20 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.393Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.393Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86d00ef1e
[task 2019-08-13T12:16:08.393Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.393Z] 12:16:08 INFO - 24 xul.dll!nsresult nsHtml5ExecutorReflusher::Run() [nsHtml5TreeOpExecutor.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 70 + 0x5]
[task 2019-08-13T12:16:08.393Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.394Z] 12:16:08 INFO - rsp = 0x000000a97c7fece0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.394Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.394Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86d0e447e
[task 2019-08-13T12:16:08.394Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.394Z] 12:16:08 INFO - 25 xul.dll!mozilla::SchedulerGroup::Runnable::Run() [SchedulerGroup.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 295 + 0x1c]
[task 2019-08-13T12:16:08.394Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.395Z] 12:16:08 INFO - rsp = 0x000000a97c7fed30 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.395Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.395Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86d36438a
[task 2019-08-13T12:16:08.395Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.395Z] 12:16:08 INFO - 26 xul.dll!nsThread::ProcessNextEvent(bool,bool *) [nsThread.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 1225 + 0x6]
[task 2019-08-13T12:16:08.395Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.396Z] 12:16:08 INFO - rsp = 0x000000a97c7fedd0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.396Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.396Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86c948368
[task 2019-08-13T12:16:08.396Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.396Z] 12:16:08 INFO - 27 xul.dll!NS_ProcessNextEvent(nsIThread *,bool) [nsThreadUtils.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 486 + 0x26]
[task 2019-08-13T12:16:08.396Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.397Z] 12:16:08 INFO - rsp = 0x000000a97c7ff340 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.397Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.397Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86c946ed5
[task 2019-08-13T12:16:08.397Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.397Z] 12:16:08 INFO - 28 xul.dll!mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate *) [MessagePump.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 88 + 0xa]
[task 2019-08-13T12:16:08.397Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.398Z] 12:16:08 INFO - rsp = 0x000000a97c7ff390 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.398Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.398Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86cb3f185
[task 2019-08-13T12:16:08.398Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.398Z] 12:16:08 INFO - 29 xul.dll!MessageLoop::RunHandler() [message_loop.cc:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 308 + 0xf]
[task 2019-08-13T12:16:08.399Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.399Z] 12:16:08 INFO - rsp = 0x000000a97c7ff410 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.399Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.400Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86c924b28
[task 2019-08-13T12:16:08.400Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.400Z] 12:16:08 INFO - 30 xul.dll!MessageLoop::Run() [message_loop.cc:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 290 + 0x5]
[task 2019-08-13T12:16:08.400Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.400Z] 12:16:08 INFO - rsp = 0x000000a97c7ff460 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.400Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.401Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86c946ac1
[task 2019-08-13T12:16:08.401Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.401Z] 12:16:08 INFO - 31 xul.dll!nsBaseAppShell::Run() [nsBaseAppShell.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 137 + 0x8]
[task 2019-08-13T12:16:08.401Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.401Z] 12:16:08 INFO - rsp = 0x000000a97c7ff4b0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.402Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.402Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86cb3f004
[task 2019-08-13T12:16:08.402Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.402Z] 12:16:08 INFO - 32 xul.dll!nsAppShell::Run() [nsAppShell.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 406 + 0x8]
[task 2019-08-13T12:16:08.402Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.402Z] 12:16:08 INFO - rsp = 0x000000a97c7ff4f0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.402Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.403Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86cb3cbc0
[task 2019-08-13T12:16:08.403Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.403Z] 12:16:08 INFO - 33 xul.dll!XRE_RunAppShell() [nsEmbedFunctions.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 934 + 0x9]
[task 2019-08-13T12:16:08.403Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.403Z] 12:16:08 INFO - rsp = 0x000000a97c7ff540 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.404Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.404Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870abf4c9
[task 2019-08-13T12:16:08.404Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.404Z] 12:16:08 INFO - 34 xul.dll!MessageLoop::RunHandler() [message_loop.cc:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 308 + 0xf]
[task 2019-08-13T12:16:08.404Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.404Z] 12:16:08 INFO - rsp = 0x000000a97c7ff590 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.405Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.405Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86c924b28
[task 2019-08-13T12:16:08.405Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.405Z] 12:16:08 INFO - 35 xul.dll!MessageLoop::Run() [message_loop.cc:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 290 + 0x5]
[task 2019-08-13T12:16:08.406Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.406Z] 12:16:08 INFO - rsp = 0x000000a97c7ff5e0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.406Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.406Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff86c946ac1
[task 2019-08-13T12:16:08.406Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.406Z] 12:16:08 INFO - 36 xul.dll!XRE_InitChildProcess(int,char * * const,XREChildData const *) [nsEmbedFunctions.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 769 + 0x5]
[task 2019-08-13T12:16:08.407Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.407Z] 12:16:08 INFO - rsp = 0x000000a97c7ff630 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.407Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.407Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff870abee68
[task 2019-08-13T12:16:08.407Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.407Z] 12:16:08 INFO - 37 firefox.exe!static int content_process_main(class mozilla::Bootstrap *, int, char * *) [plugin-container.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 56 + 0x13]
[task 2019-08-13T12:16:08.408Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.408Z] 12:16:08 INFO - rsp = 0x000000a97c7ff890 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.408Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.408Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff621ad1762
[task 2019-08-13T12:16:08.408Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.408Z] 12:16:08 INFO - 38 firefox.exe!static int NS_internal_main(int, char * *, char * *) [nsBrowserApp.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 267 + 0xa]
[task 2019-08-13T12:16:08.409Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.409Z] 12:16:08 INFO - rsp = 0x000000a97c7ff8f0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.409Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.409Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff621ad13c8
[task 2019-08-13T12:16:08.409Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.409Z] 12:16:08 INFO - 39 firefox.exe!wmain [nsWindowsWMain.cpp:9ef1dcfda500b98dbea2e921e0a103e795a59703 : 131 + 0x15]
[task 2019-08-13T12:16:08.410Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.410Z] 12:16:08 INFO - rsp = 0x000000a97c7ffa90 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.410Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.410Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff621ad122d
[task 2019-08-13T12:16:08.410Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.410Z] 12:16:08 INFO - 40 firefox.exe!static int __scrt_common_main_seh() [exe_common.inl : 288 + 0x22]
[task 2019-08-13T12:16:08.411Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.411Z] 12:16:08 INFO - rsp = 0x000000a97c7ffb50 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.411Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.411Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff621b1bff8
[task 2019-08-13T12:16:08.411Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.411Z] 12:16:08 INFO - 41 kernel32.dll!BaseThreadInitThunk + 0x14
[task 2019-08-13T12:16:08.411Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.412Z] 12:16:08 INFO - rsp = 0x000000a97c7ffb90 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.412Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.412Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff892b92774
[task 2019-08-13T12:16:08.412Z] 12:16:08 INFO - Found by: call frame info
[task 2019-08-13T12:16:08.412Z] 12:16:08 INFO - 42 ntdll.dll!SdbpCheckMatchingRegistryEntry + 0x29d
[task 2019-08-13T12:16:08.412Z] 12:16:08 INFO - rbx = 0x00000000ffffffff rbp = 0x0000000000000017
[task 2019-08-13T12:16:08.413Z] 12:16:08 INFO - rsp = 0x000000a97c7ffbc0 r12 = 0x000002450872f000
[task 2019-08-13T12:16:08.413Z] 12:16:08 INFO - r13 = 0x0000024508ac943a r14 = 0x0000000000000010
[task 2019-08-13T12:16:08.413Z] 12:16:08 INFO - r15 = 0x00007ff870d67fe0 rip = 0x00007ff894eb0d61
[task 2019-08-13T12:16:08.413Z] 12:16:08 INFO - Found by: call frame info
|
|
1,574,792 | 14,306,060 |
User Agent: Mozilla/5.0 (Android 9; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0
Steps to reproduce:
Firefox mobile 68.0.2
View a bug
Press the Dependency tree link
Get prompted to sign in
Press sign in with Github
Actual results:
Got an error message:
Bugzilla has suffered an internal error:
Bugzilla cannot log you into an external site via GitHub.
Expected results:
I should have been able to log in
(Signing in with email and password worked)
|
|
1,567,114 | 14,244,270 |
User Agent: Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
Steps to reproduce:
Since today all Internet providers in Kazakhstan started MITM on all encrypted HTTPS traffic.
They asked end-users to install government-issued certificate authority on all devices in every browser: http://qca.kz/
Actual results:
MITM attack: https://i.imgur.com/rFEjXKw.jpg
Message from Internet provider, requires to install this CA: https://i.imgur.com/WyKjOug.jpg
Proofs: https://atlas.ripe.net/measurements/22372655/#!probes
Official site with root CA: http://qca.kz/
Links to certificates:
http://qca.kz/qazca.cer
http://qca.kz/qazca.pem
http://qca.kz/qazca.der
Expected results:
I think this CA should be blacklisted by Mozilla and Firefox should not accept it at all even user installed it manually.
This will save privacy of all Internet users in Kazakhstan.
|
|
1,567,209 | 14,244,841 |
**Filed by:** malexandru [at] mozilla.com
**Parsed log:** https://treeherder.mozilla.org/logviewer.html#?job_id=257155064&repo=autoland
**Full log:** https://queue.taskcluster.net/v1/task/K0eOr3udTZiZlvk-MFgD6A/runs/0/artifacts/public/logs/live_backing.log
---
14:38:46 INFO - TEST-PASS | testing/marionette/harness/marionette_harness/tests/unit/test_switch_window_content.py TestSwitchToWindowContent.test_switch_from_content_to_chrome_window_should_not_change_selected_tab | took 262ms
14:38:46 INFO - TEST-START | testing/marionette/harness/marionette_harness/tests/unit/test_switch_window_content.py TestSwitchToWindowContent.test_switch_tabs_in_different_windows_with_focus_change
14:38:46 INFO - 1563460726731 Marionette DEBUG 38 -> [0,34,"WebDriver:GetWindowHandles",{}]
14:38:46 INFO - 1563460726732 Marionette DEBUG 38 <- [1,34,null,["2147483649"]]
14:38:46 INFO - 1563460726733 Marionette DEBUG 38 -> [0,35,"WebDriver:DeleteSession",{}]
14:38:46 INFO - 1563460726735 Marionette DEBUG 38 <- [1,35,null,{"value":null}]
14:38:46 INFO - 1563460726738 Marionette DEBUG Closed connection 38
14:38:46 INFO - 1563460726740 Marionette DEBUG Accepted connection 39 from 127.0.0.1:51145
14:38:46 INFO - 1563460726742 Marionette DEBUG 39 -> [0,1,"WebDriver:NewSession",{"strictFileInteractability":true}]
14:38:46 INFO - 1563460726743 Marionette TRACE [2147483649] Frame script loaded
14:38:46 INFO - 1563460726748 Marionette TRACE [2147483649] Frame script registered
<...>
14:38:47 INFO - mozcrash Downloading symbols from: https://queue.taskcluster.net/v1/task/CAyn3hHOQ4yzcMxf1V_YGg/artifacts/public/build/target.crashreporter-symbols.zip
14:38:51 INFO - mozcrash Copy/paste: /Users/cltbld/tasks/task_1563460464/build/macosx64-minidump_stackwalk /var/folders/gb/jlp_n2rx4kg9g6r66z2qmdhh000017/T/tmpnjCUP6.mozrunner/minidumps/7A609E44-2C50-4CDC-BE67-85C137995361.dmp /var/folders/gb/jlp_n2rx4kg9g6r66z2qmdhh000017/T/tmpI2nOwi
14:38:58 INFO - mozcrash Saved minidump as /Users/cltbld/tasks/task_1563460464/build/blobber_upload_dir/7A609E44-2C50-4CDC-BE67-85C137995361.dmp
14:38:58 INFO - mozcrash Saved app info as /Users/cltbld/tasks/task_1563460464/build/blobber_upload_dir/7A609E44-2C50-4CDC-BE67-85C137995361.extra
14:38:59 INFO - PROCESS-CRASH | testing/marionette/harness/marionette_harness/tests/unit/test_switch_window_content.py TestSwitchToWindowContent.test_switch_tabs_in_different_windows_with_focus_change | application crashed [@ std::__1::__tree_balance_after_insert<std::__1::__tree_node_base<void*>*>(std::__1::__tree_node_base<void*>*, std::__1::__tree_node_base<void*>*)]
14:38:59 INFO - Crash dump filename: /var/folders/gb/jlp_n2rx4kg9g6r66z2qmdhh000017/T/tmpnjCUP6.mozrunner/minidumps/7A609E44-2C50-4CDC-BE67-85C137995361.dmp
14:38:59 INFO - Operating system: Mac OS X
14:38:59 INFO - 10.14.5 18F132
14:38:59 INFO - CPU: amd64
14:38:59 INFO - family 6 model 69 stepping 1
14:38:59 INFO - 4 CPUs
14:38:59 INFO -
14:38:59 INFO - GPU: UNKNOWN
14:38:59 INFO -
14:38:59 INFO - Crash reason: EXC_BAD_ACCESS / KERN_INVALID_ADDRESS
14:38:59 INFO - Crash address: 0x0
14:38:59 INFO - Process uptime: 25 seconds
14:38:59 INFO -
14:38:59 INFO - Thread 63 (crashed)
14:38:59 INFO - 0 XUL!void std::__1::__tree_balance_after_insert<std::__1::__tree_node_base<void*>*>(std::__1::__tree_node_base<void*>*, std::__1::__tree_node_base<void*>*) [__tree:03bb034db3d6e806e915fd36874f20dd5adb14b6 : 278 + 0x4]
14:38:59 INFO - rax = 0x0000000000000000 rdx = 0x0000000000000000
14:38:59 INFO - rcx = 0x000000012960a5c0 rbx = 0x000000012960a5c8
14:38:59 INFO - rsi = 0x000000012a232780 rdi = 0x0000000124ea2300
14:38:59 INFO - rbp = 0x00007000102805e0 rsp = 0x00007000102805e0
14:38:59 INFO - r8 = 0x0000000102500180 r9 = 0x0000000000000003
14:38:59 INFO - r10 = 0x0000000000000000 r11 = 0x0000000000000246
14:38:59 INFO - r12 = 0x0000000120ca6a50 r13 = 0x000000012a232780
14:38:59 INFO - r14 = 0x0000000000000667 r15 = 0x000000012960a5c0
14:38:59 INFO - rip = 0x0000000103b78f9e
14:38:59 INFO - Found by: given as instruction pointer in context
14:38:59 INFO - 1 XUL!mozilla::ipc::SetupMachMemory(int, ReceivePort*, MachPortSender*, MachPortSender*, ReceivePort*, bool) [SharedMemoryBasic_mach.mm:03bb034db3d6e806e915fd36874f20dd5adb14b6 : 139 + 0xc8]
14:38:59 INFO - rbp = 0x0000700010280680 rsp = 0x00007000102805f0
14:38:59 INFO - rip = 0x0000000103c6c1b8
14:38:59 INFO - Found by: previous frame's frame pointer
14:38:59 INFO - 2 XUL!mozilla::ipc::MacProcessLauncher::DoFinishLaunch() [GeckoChildProcessHost.cpp:03bb034db3d6e806e915fd36874f20dd5adb14b6 : 1242 + 0x43]
|
|
1,568,163 | 14,253,635 |
Created attachment 9079960
crash_tools.gif
**Affected versions**
* Firefox 70.0a1 (20190722214346)
* Firefox 69.0b7 (20190722201635)
**Affected platforms**
* Windows 10x64
**Steps to reproduce**
1. Launch Firefox with a new profile and open Browser Tools (Ctrl+ Shift+ C).
2. Enable [browser toolbox](https://developer.mozilla.org/en-US/docs/Tools/Browser_Toolbox).
3. Open the browser toolbox.
4. Select Accessibility in the toolbar and the Accessibility Inspector.
5. Continuously move the pointer over Browser Tools (Inspector, Console, Debugger, etc.).
**Expected result**
* Firefox doesn't crash.
**Actual result**
* Firefox crashes at mozilla::a11y::HyperTextAccessible::NativeRole : https://crash-stats.mozilla.org/report/index/90a4b865-a3f9-47c2-961b-068050190723#tab-details.
**Additional Notes**
* Cannot search for regression range due to bug 1564542.
* I cannot reproduce the issue on macOS 10.14 or Ubuntu 18.04.
* Note that the issue may be intermittent.
* Attached a screen recording with the issue.
|
|
1,568,921 | 14,260,459 |
Because the addons.mozilla.org website includes the ability to remove add-ons, this can be used to override enterprise policies. Regardless of whether or not the add-on is locked by a policy, it can still be removed using the website.
Instead, add-ons should only be removable if the enterprise policies allow for it.
|
|
1,569,756 | 14,267,719 |
This bug is for crash report bp-d8aef9c7-6eac-4049-a8bf-269e20190725.
Seen while looking at nightly crashes - these crashes started in 20190724220024: https://bit.ly/2Ka2B7O. 12 crashes/8 installs so far.
Possible regression range based on Build ID: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=69ac304560c98a733d44a0245fe9782dc6a465e2&tochange=1da5a37de0fd1695e96a9d5e7f59fbd84d8759b2
Bug 1567614? ni on Aaron
```
Top 10 frames of crashing thread:
0 xul.dll static class mozilla::Result<mozilla::Ok, mozilla::WindowsError> mozilla::ShellExecuteByExplorer widget/windows/ShellHeaderOnlyUtils.h:76
1 xul.dll static class mozilla::Result<mozilla::Ok, mozilla::WindowsError> mozilla::ShellExecuteByExplorer widget/windows/ShellHeaderOnlyUtils.h:203
2 xul.dll nsMIMEInfoWin::LoadUriInternal uriloader/exthandler/win/nsMIMEInfoWin.cpp:242
3 xul.dll nsExternalHelperAppService::LoadURI uriloader/exthandler/nsExternalHelperAppService.cpp:1010
4 xul.dll mozilla::dom::ContentParent::RecvLoadURIExternal dom/ipc/ContentParent.cpp:3851
5 xul.dll mozilla::dom::PContentParent::OnMessageReceived ipc/ipdl/PContentParent.cpp:7051
6 xul.dll mozilla::ipc::MessageChannel::DispatchMessage ipc/glue/MessageChannel.cpp:2108
7 xul.dll mozilla::ipc::MessageChannel::MessageTask::Run ipc/glue/MessageChannel.cpp:1986
8 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225
9 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
```
|
|
1,576,262 | 14,318,849 |
This bug is for crash report bp-99d112cf-956e-46ac-91bf-f5ee50190805.
Fairly small volume crash which started in 20190805095413: https://bit.ly/2KSJZL6.
Possible regression range based on build id: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=30a8df41ff6db0323d045bdc56cb5f0c95e92b9a&tochange=dba2c8019074a017293f708cec0292607c2e803c
Code was touched in Bug 1570207. ni on :kmag
```
Top 10 frames of crashing thread:
0 libxul.so mozilla::dom::BrowsingContext::CanAccess docshell/base/BrowsingContext.cpp:547
1 libxul.so nsDocShell::CanAccessItem docshell/base/nsDocShell.cpp:2858
2 libxul.so nsDocShell::DoFindItemWithName docshell/base/nsDocShell.cpp:2951
3 libxul.so nsDocShell::FindItemWithName docshell/base/nsDocShell.cpp:2891
4 libxul.so mozilla::dom::TabGroup::FindItemWithName dom/base/TabGroup.cpp:236
5 libxul.so nsDocShell::DoFindItemWithName docshell/base/nsDocShell.cpp:2996
6 libxul.so nsDocShell::FindItemWithName docshell/base/nsDocShell.cpp:2915
7 libxul.so nsDocShell::PerformRetargeting docshell/base/nsDocShell.cpp:8680
8 libxul.so nsDocShell::InternalLoad docshell/base/nsDocShell.cpp:9235
9 libxul.so nsDocShell::OnLinkClickSync docshell/base/nsDocShell.cpp:12841
```
|
|
1,577,061 | 14,327,248 |
[Tracking Requested - why for this release]:
Security issue in update code.
```
static nsresult GetCurrentWorkingDir(char* buf, size_t size) {
// Cannot use NS_GetSpecialDirectory because XPCOM is not yet initialized.
// This code is duplicated from xpcom/io/SpecialSystemDirectory.cpp:
#if defined(XP_WIN)
wchar_t wpath[MAX_PATH];
if (!_wgetcwd(wpath, size)) {
return NS_ERROR_FAILURE;
}
NS_ConvertUTF16toUTF8 path(wpath);
strncpy(buf, path.get(), size);
#else
if (!getcwd(buf, size)) {
return NS_ERROR_FAILURE;
}
#endif
return NS_OK;
}
```
(This is only an issue for the Windows variant)
* In the call to `_wgetcwd`, we're using `size` as the size of the destination buffer, but the true value that should be passed in here is `ArrayLength(wpath)` (in other words, `MAX_PATH`).
* The caller is passing `sizeof(workingDirPath) == MAXPATHLEN == 1024` in *bytes*, whereas `_wgetcwd` expects *characters*. So we call `_wgetcwd` claiming that the buffer can hold 1024 characters when in fact it can only hold 260.
* In debug builds at least, it looks like `_wgetcwd` fills the remainder of the buffer with zeros, which results in the stack corruption.
|
|
1,577,311 | 14,328,941 |
Created attachment 9088839
testcase.html
Testcase found while fuzzing mozilla-central rev 546d1fd47c9a. This bug appears to be due to a race condition and may require up to a minute to trigger. Further, due to the use of XHR, the testcase must be served via a local webserver.
Also note, that the top contents of worker.js is not relevant to the bug but it appears that the load time of workers.js is related and the additional content delays loading enough to trigger the crash.
```
==28067==ERROR: AddressSanitizer: heap-use-after-free on address 0x603000741778 at pc 0x7fc3444f05a2 bp 0x7fc3314fd100 sp 0x7fc3314fd0f8
READ of size 8 at 0x603000741778 thread T41 (DOM Worker)
#0 0x7fc3444f05a1 in operator bool /builds/worker/workspace/build/src/obj-firefox/dist/include/js/RootingAPI.h:339:56
#1 0x7fc3444f05a1 in TraceCallbackFunc::Trace(JS::Heap<JSObject*>*, char const*, void*) const /builds/worker/workspace/build/src/xpcom/base/nsCycleCollectorTraceJSHelpers.cpp:48
#2 0x7fc3444a70ee in mozilla::CycleCollectedJSRuntime::TraverseNativeRoots(nsCycleCollectionNoteRootCallback&) /builds/worker/workspace/build/src/xpcom/base/CycleCollectedJSRuntime.cpp:797:15
#3 0x7fc3444a8e97 in mozilla::CycleCollectedJSRuntime::TraverseRoots(nsCycleCollectionNoteRootCallback&) /builds/worker/workspace/build/src/xpcom/base/CycleCollectedJSRuntime.cpp:1140:3
#4 0x7fc3444ec0de in nsCycleCollector::BeginCollection(ccType, nsICycleCollectorListener*) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3611:19
#5 0x7fc3444eb300 in nsCycleCollector::Collect(ccType, js::SliceBudget&, nsICycleCollectorListener*, bool) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3413:9
#6 0x7fc3444eee6c in nsCycleCollector_collect(nsICycleCollectorListener*) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3949:21
#7 0x7fc352d7ee17 in callGCCallback /builds/worker/workspace/build/src/js/src/gc/GC.cpp:1488:3
#8 0x7fc352d7ee17 in js::gc::GCRuntime::maybeCallGCCallback(JSGCStatus) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:6986
#9 0x7fc352d7fe70 in ~AutoCallGCCallbacks /builds/worker/workspace/build/src/js/src/gc/GC.cpp:6965:32
#10 0x7fc352d7fe70 in js::gc::GCRuntime::gcCycle(bool, js::SliceBudget, mozilla::Maybe<JSGCInvocationKind> const&, JS::GCReason) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7076
#11 0x7fc352d83759 in js::gc::GCRuntime::collect(bool, js::SliceBudget, mozilla::Maybe<JSGCInvocationKind> const&, JS::GCReason) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7247:9
#12 0x7fc352d1ae8f in js::gc::GCRuntime::gc(JSGCInvocationKind, JS::GCReason) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7329:3
#13 0x7fc34d221ad1 in mozilla::dom::workerinternals::(anonymous namespace)::WorkerThreadPrimaryRunnable::Run() /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:2342:5
#14 0x7fc3446a23a0 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1225:14
#15 0x7fc3446a83e8 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10
#16 0x7fc3458a79f4 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:333:5
#17 0x7fc3457a1202 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10
#18 0x7fc3457a1202 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308
#19 0x7fc3457a1202 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290
#20 0x7fc34469bcea in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:458:11
#21 0x7fc3674db0bd in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:198:5
#22 0x7fc36711f6da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da)
#23 0x7fc3660fd88e in clone /build/glibc-OTsEL5/glibc-2.27/misc/../sysdeps/unix/sysv/linux/x86_64/clone.S:95
0x603000741778 is located 24 bytes inside of 32-byte region [0x603000741760,0x603000741780)
freed by thread T41 (DOM Worker) here:
#0 0x5569afb3e942 in __interceptor_free /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:124:3
#1 0x7fc3444e3876 in SnowWhiteKiller::~SnowWhiteKiller() /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:2416:7
#2 0x7fc3444e255e in nsCycleCollector::FreeSnowWhite(bool) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:2609:3
#3 0x7fc3444ebd18 in nsCycleCollector::BeginCollection(ccType, nsICycleCollectorListener*) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3584:3
#4 0x7fc3444eb300 in nsCycleCollector::Collect(ccType, js::SliceBudget&, nsICycleCollectorListener*, bool) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3413:9
#5 0x7fc3444eee6c in nsCycleCollector_collect(nsICycleCollectorListener*) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3949:21
#6 0x7fc352d7ee17 in callGCCallback /builds/worker/workspace/build/src/js/src/gc/GC.cpp:1488:3
#7 0x7fc352d7ee17 in js::gc::GCRuntime::maybeCallGCCallback(JSGCStatus) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:6986
#8 0x7fc352d7fe70 in ~AutoCallGCCallbacks /builds/worker/workspace/build/src/js/src/gc/GC.cpp:6965:32
#9 0x7fc352d7fe70 in js::gc::GCRuntime::gcCycle(bool, js::SliceBudget, mozilla::Maybe<JSGCInvocationKind> const&, JS::GCReason) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7076
#10 0x7fc352d83759 in js::gc::GCRuntime::collect(bool, js::SliceBudget, mozilla::Maybe<JSGCInvocationKind> const&, JS::GCReason) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7247:9
#11 0x7fc352d1ae8f in js::gc::GCRuntime::gc(JSGCInvocationKind, JS::GCReason) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7329:3
#12 0x7fc34d221ad1 in mozilla::dom::workerinternals::(anonymous namespace)::WorkerThreadPrimaryRunnable::Run() /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:2342:5
#13 0x7fc3446a23a0 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1225:14
#14 0x7fc3446a83e8 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10
#15 0x7fc3458a79f4 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:333:5
#16 0x7fc3457a1202 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10
#17 0x7fc3457a1202 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308
#18 0x7fc3457a1202 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290
#19 0x7fc34469bcea in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:458:11
#20 0x7fc3674db0bd in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:198:5
#21 0x7fc36711f6da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da)
previously allocated by thread T41 (DOM Worker) here:
#0 0x5569afb3ecc3 in __interceptor_malloc /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:146:3
#1 0x5569afb73a2d in moz_xmalloc /builds/worker/workspace/build/src/memory/mozalloc/mozalloc.cpp:52:15
#2 0x7fc34b8e8ce1 in operator new /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/cxxalloc.h:33:10
#3 0x7fc34b8e8ce1 in mozilla::dom::Blob::Stream(JSContext*, JS::MutableHandle<JSObject*>, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/file/Blob.cpp:362
#4 0x7fc348d2c051 in mozilla::dom::Blob_Binding::stream(JSContext*, JS::Handle<JSObject*>, mozilla::dom::Blob*, JSJitMethodCallArgs const&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/BlobBinding.cpp:745:24
#5 0x7fc34b07179d in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:3163:13
#6 0x7fc351c6df07 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:447:13
#7 0x7fc351c6df07 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:539
#8 0x7fc351c561ac in CallFromStack /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:598:10
#9 0x7fc351c561ac in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3084
#10 0x7fc351c3784f in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:424:10
#11 0x7fc351c6ea0f in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:567:13
#12 0x7fc351c70c32 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:610:8
#13 0x7fc352782368 in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jsapi.cpp:2722:10
#14 0x7fc34a8d5a24 in mozilla::dom::EventHandlerNonNull::Call(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, JS::MutableHandle<JS::Value>, mozilla::ErrorResult&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/EventHandlerBinding.cpp:267:37
#15 0x7fc34b83afb1 in Call<nsCOMPtr<mozilla::dom::EventTarget> > /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/dom/EventHandlerBinding.h:363:12
#16 0x7fc34b83afb1 in mozilla::JSEventHandler::HandleEvent(mozilla::dom::Event*) /builds/worker/workspace/build/src/dom/events/JSEventHandler.cpp:205
#17 0x7fc34b7ff59c in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1041:22
#18 0x7fc34b80103e in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event**, mozilla::dom::EventTarget*, nsEventStatus*, bool) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1233:17
#19 0x7fc34b7e7a5a in HandleEvent /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/EventListenerManager.h:353:5
#20 0x7fc34b7e7a5a in mozilla::EventTargetChainItem::HandleEvent(mozilla::EventChainPostVisitor&, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:349
#21 0x7fc34b7e6272 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:551:16
#22 0x7fc34b7ebc3b in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:1047:11
#23 0x7fc34b7f2cb0 in mozilla::EventDispatcher::DispatchDOMEvent(nsISupports*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsPresContext*, nsEventStatus*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp
#24 0x7fc34b7ae01d in mozilla::DOMEventTargetHelper::DispatchEvent(mozilla::dom::Event&, mozilla::dom::CallerType, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/events/DOMEventTargetHelper.cpp:166:17
Thread T41 (DOM Worker) created by T0 (file:// Content) here:
#0 0x5569afb2729d in __interceptor_pthread_create /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cc:210:3
#1 0x7fc3674cd1b8 in _PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:430:14
#2 0x7fc3674b6d9e in PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:503:12
#3 0x7fc34469e1d9 in nsThread::Init(nsTSubstring<char> const&) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:672:8
#4 0x7fc34d2829c8 in mozilla::dom::WorkerThread::Create(mozilla::dom::WorkerThreadFriendKey const&) /builds/worker/workspace/build/src/dom/workers/WorkerThread.cpp:92:7
#5 0x7fc34d1f293d in mozilla::dom::workerinternals::RuntimeService::ScheduleWorker(mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:1431:14
#6 0x7fc34d1f0fb4 in mozilla::dom::workerinternals::RuntimeService::RegisterWorker(mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:1296:19
#7 0x7fc34d251202 in mozilla::dom::WorkerPrivate::Constructor(JSContext*, nsTSubstring<char16_t> const&, bool, mozilla::dom::WorkerType, nsTSubstring<char16_t> const&, nsTSubstring<char> const&, mozilla::dom::WorkerLoadInfo*, mozilla::ErrorResult&, nsTString<char16_t>) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:2327:24
#8 0x7fc34d201765 in mozilla::dom::Worker::Constructor(mozilla::dom::GlobalObject const&, nsTSubstring<char16_t> const&, mozilla::dom::WorkerOptions const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/workers/Worker.cpp:30:41
#9 0x7fc34a5be50c in mozilla::dom::Worker_Binding::_constructor(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/WorkerBinding.cpp:1141:52
#10 0x7fc351c71bf7 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:447:13
#11 0x7fc351c71bf7 in CallJSNativeConstructor /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:463
#12 0x7fc351c71bf7 in InternalConstruct(JSContext*, js::AnyConstructArgs const&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:656
#13 0x7fc352f59829 in js::jit::DoCallFallback(JSContext*, js::jit::BaselineFrame*, js::jit::ICCall_Fallback*, unsigned int, JS::Value*, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jit/BaselineIC.cpp:3210:10
#14 0x2384695c8797 (<unknown module>)
#15 0x62100044c1ff (<unknown module>)
#16 0x2384695c648e (<unknown module>)
#17 0x7fc35315ee3d in EnterBaseline /builds/worker/workspace/build/src/js/src/jit/BaselineJIT.cpp:111:5
#18 0x7fc35315ee3d in js::jit::EnterBaselineInterpreterAtBranch(JSContext*, js::InterpreterFrame*, unsigned char*) /builds/worker/workspace/build/src/js/src/jit/BaselineJIT.cpp:184
#19 0x7fc351c5e167 in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:1991:17
#20 0x7fc351c3784f in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:424:10
#21 0x7fc351c6ea0f in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:567:13
#22 0x7fc351c70c32 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:610:8
#23 0x7fc352782368 in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jsapi.cpp:2722:10
#24 0x7fc34a8dad40 in mozilla::dom::EventListener::HandleEvent(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/EventListenerBinding.cpp:52:8
#25 0x7fc34b7ff565 in HandleEvent<mozilla::dom::EventTarget *> /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/dom/EventListenerBinding.h:66:12
#26 0x7fc34b7ff565 in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1035
#27 0x7fc34b800fe0 in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event**, mozilla::dom::EventTarget*, nsEventStatus*, bool) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1233:17
#28 0x7fc34b7e7a5a in HandleEvent /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/EventListenerManager.h:353:5
#29 0x7fc34b7e7a5a in mozilla::EventTargetChainItem::HandleEvent(mozilla::EventChainPostVisitor&, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:349
#30 0x7fc34b7e6272 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:551:16
#31 0x7fc34b7ebc3b in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:1047:11
#32 0x7fc34b7f2cb0 in mozilla::EventDispatcher::DispatchDOMEvent(nsISupports*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsPresContext*, nsEventStatus*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp
#33 0x7fc348ad2fca in nsINode::DispatchEvent(mozilla::dom::Event&, mozilla::dom::CallerType, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/base/nsINode.cpp:1061:17
#34 0x7fc348470559 in nsContentUtils::DispatchEvent(mozilla::dom::Document*, nsISupports*, nsTSubstring<char16_t> const&, mozilla::CanBubble, mozilla::Cancelable, mozilla::Composed, mozilla::Trusted, bool*, mozilla::ChromeOnlyDispatch) /builds/worker/workspace/build/src/dom/base/nsContentUtils.cpp:3973:28
#35 0x7fc348470323 in nsContentUtils::DispatchTrustedEvent(mozilla::dom::Document*, nsISupports*, nsTSubstring<char16_t> const&, mozilla::CanBubble, mozilla::Cancelable, mozilla::Composed, bool*) /builds/worker/workspace/build/src/dom/base/nsContentUtils.cpp:3943:10
#36 0x7fc3487ba9b2 in mozilla::dom::Document::DispatchContentLoadedEvents() /builds/worker/workspace/build/src/dom/base/Document.cpp:7060:3
#37 0x7fc3488a2484 in applyImpl<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:1124:12
#38 0x7fc3488a2484 in apply<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:1130
#39 0x7fc3488a2484 in mozilla::detail::RunnableMethodImpl<mozilla::dom::Document*, void (mozilla::dom::Document::*)(), true, (mozilla::RunnableKind)0>::Run() /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:1176
#40 0x7fc344670451 in mozilla::SchedulerGroup::Runnable::Run() /builds/worker/workspace/build/src/xpcom/threads/SchedulerGroup.cpp:295:32
#41 0x7fc3446a23a0 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1225:14
#42 0x7fc3446a83e8 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10
#43 0x7fc3458a602f in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:88:21
#44 0x7fc3457a1202 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10
#45 0x7fc3457a1202 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308
#46 0x7fc3457a1202 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290
#47 0x7fc34dab8d99 in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:137:27
#48 0x7fc3519b68df in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:934:20
#49 0x7fc3457a1202 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10
#50 0x7fc3457a1202 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308
#51 0x7fc3457a1202 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290
#52 0x7fc3519b6186 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:769:34
#53 0x5569afb71d73 in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28
#54 0x5569afb71d73 in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:267
#55 0x7fc365ffdb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-use-after-free /builds/worker/workspace/build/src/obj-firefox/dist/include/js/RootingAPI.h:339:56 in operator bool
Shadow bytes around the buggy address:
0x0c06800e0290: fa fa fd fd fd fa fa fa 00 00 00 fa fa fa 00 00
0x0c06800e02a0: 00 fa fa fa fd fd fd fa fa fa fd fd fd fd fa fa
0x0c06800e02b0: fd fd fd fa fa fa fd fd fd fd fa fa fd fd fd fd
0x0c06800e02c0: fa fa 00 00 00 00 fa fa fd fd fd fd fa fa fd fd
0x0c06800e02d0: fd fa fa fa fd fd fd fd fa fa fd fd fd fd fa fa
=>0x0c06800e02e0: fd fd fd fa fa fa fd fd fd fa fa fa fd fd fd[fd]
0x0c06800e02f0: fa fa fd fd fd fd fa fa fd fd fd fa fa fa fd fd
0x0c06800e0300: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa
0x0c06800e0310: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd
0x0c06800e0320: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd
0x0c06800e0330: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==28067==ABORTING
```
|
|
1,578,070 | 14,334,444 |
This bug is for crash report bp-0b708881-01c2-4302-8627-350170190901.
This appears 11 times in 11 different installations in the Windows nightlies
of 20190829214656.
```
Top 10 frames of crashing thread:
0 ntdll.dll NtWaitForAlertByThreadId
1 ntdll.dll RtlSleepConditionVariableSRW
2 kernelbase.dll SleepConditionVariableSRW
3 mozglue.dll mozilla::detail::ConditionVariableImpl::wait mozglue/misc/ConditionVariable_windows.cpp:50
4 xul.dll struct already_AddRefed<nsIRunnable> mozilla::ThreadEventQueue<mozilla::PrioritizedEventQueue>::GetEvent xpcom/threads/ThreadEventQueue.cpp:153
5 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1134
6 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
7 xul.dll mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:110
8 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:308
9 xul.dll MessageLoop::Run ipc/chromium/src/base/message_loop.cc:290
```
|
|
1,578,810 | 14,341,802 |
Created attachment 9090447
testcase.html
Testcase found while fuzzing mozilla-central rev 174361d15292.
```
==21473==ERROR: AddressSanitizer: heap-use-after-free on address 0x61300006a478 at pc 0x7f912e7ae55b bp 0x7ffe7ff40830 sp 0x7ffe7ff40828
READ of size 8 at 0x61300006a478 thread T0 (file:// Content)
#0 0x7f912e7ae55a in operator bool /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:302:45
#1 0x7f912e7ae55a in mozilla::PeerConnectionMedia::OnCandidateFound_m(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, mozilla::CandidateInfo const&) /builds/worker/workspace/build/src/media/webrtc/signaling/src/peerconnection/PeerConnectionMedia.cpp:676
#2 0x7f912e86568c in apply<mozilla::PeerConnectionMedia *, void (mozilla::PeerConnectionMedia::*)(const std::__cxx11::basic_string<char> &, const mozilla::CandidateInfo &), std::__cxx11::basic_string<char>, mozilla::CandidateInfo, 0, 1> /builds/worker/workspace/build/src/obj-firefox/dist/include/mtransport/runnable_utils.h:78:5
#3 0x7f912e86568c in mozilla::runnable_args_memfn<mozilla::PeerConnectionMedia*, void (mozilla::PeerConnectionMedia::*)(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, mozilla::CandidateInfo const&), std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, mozilla::CandidateInfo>::Run() /builds/worker/workspace/build/src/obj-firefox/dist/include/mtransport/runnable_utils.h:148
#4 0x7f912c0adb86 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1225:14
#5 0x7f912c0b3a88 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10
#6 0x7f912d2b8044 in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:110:5
#7 0x7f912d1b4e72 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10
#8 0x7f912d1b4e72 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308
#9 0x7f912d1b4e72 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290
#10 0x7f91354e0539 in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:137:27
#11 0x7f91393d4a7f in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:934:20
#12 0x7f912d1b4e72 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10
#13 0x7f912d1b4e72 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308
#14 0x7f912d1b4e72 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290
#15 0x7f91393d4326 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:769:34
#16 0x563076334d5a in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28
#17 0x563076334d5a in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:272
#18 0x7f914da9ab96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
0x61300006a478 is located 248 bytes inside of 336-byte region [0x61300006a380,0x61300006a4d0)
freed by thread T0 (file:// Content) here:
#0 0x563076301a12 in __interceptor_free /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:124:3
#1 0x7f912e864b70 in apply<mozilla::PeerConnectionMedia *, void (mozilla::PeerConnectionMedia::*)()> /builds/worker/workspace/build/src/obj-firefox/dist/include/mtransport/runnable_utils.h:78:5
#2 0x7f912e864b70 in mozilla::runnable_args_memfn<mozilla::PeerConnectionMedia*, void (mozilla::PeerConnectionMedia::*)()>::Run() /builds/worker/workspace/build/src/obj-firefox/dist/include/mtransport/runnable_utils.h:148
#3 0x7f912c0adb86 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1225:14
#4 0x7f912c0b3a88 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10
#5 0x7f9135091d96 in SpinEventLoopUntil<mozilla::ProcessFailureBehavior::ReportToCaller, (lambda at /builds/worker/workspace/build/src/dom/xhr/XMLHttpRequestMainThread.cpp:2912:31)> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:348:25
#6 0x7f9135091d96 in mozilla::dom::XMLHttpRequestMainThread::SendInternal(mozilla::dom::BodyExtractorBase const*, bool) /builds/worker/workspace/build/src/dom/xhr/XMLHttpRequestMainThread.cpp:2912
#7 0x7f913508fc2a in mozilla::dom::XMLHttpRequestMainThread::Send(JSContext*, mozilla::dom::Nullable<mozilla::dom::DocumentOrBlobOrArrayBufferViewOrArrayBufferOrFormDataOrURLSearchParamsOrUSVString> const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/xhr/XMLHttpRequestMainThread.cpp:2686:11
#8 0x7f913203e4f5 in mozilla::dom::XMLHttpRequest_Binding::send(JSContext*, JS::Handle<JSObject*>, mozilla::dom::XMLHttpRequest*, JSJitMethodCallArgs const&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/XMLHttpRequestBinding.cpp:1345:24
#9 0x7f9132aae81d in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:3168:13
#10 0x7f913968be17 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:447:13
#11 0x7f913968be17 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:539
#12 0x7f91396740bc in CallFromStack /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:598:10
#13 0x7f91396740bc in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3084
#14 0x7f913965575f in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:424:10
#15 0x7f913968c91f in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:567:13
#16 0x7f913968eb42 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:610:8
#17 0x7f913a1f7738 in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jsapi.cpp:2723:10
#18 0x7f9132319060 in mozilla::dom::EventListener::HandleEvent(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/EventListenerBinding.cpp:52:8
#19 0x7f9133245305 in HandleEvent<mozilla::dom::EventTarget *> /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/dom/EventListenerBinding.h:66:12
#20 0x7f9133245305 in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1035
#21 0x7f9133246d80 in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event**, mozilla::dom::EventTarget*, nsEventStatus*, bool) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1233:17
#22 0x7f913322d7fa in HandleEvent /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/EventListenerManager.h:353:5
#23 0x7f913322d7fa in mozilla::EventTargetChainItem::HandleEvent(mozilla::EventChainPostVisitor&, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:349
#24 0x7f913322c012 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:551:16
#25 0x7f91332319db in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:1047:11
previously allocated by thread T0 (file:// Content) here:
#0 0x563076301d93 in __interceptor_malloc /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:146:3
#1 0x56307633740d in moz_xmalloc /builds/worker/workspace/build/src/memory/mozalloc/mozalloc.cpp:52:15
#2 0x7f912e774613 in operator new /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/cxxalloc.h:33:10
#3 0x7f912e774613 in mozilla::PeerConnectionImpl::Initialize(mozilla::dom::PeerConnectionObserver&, nsGlobalWindowInner*, mozilla::dom::RTCConfiguration const&, nsISupports*) /builds/worker/workspace/build/src/media/webrtc/signaling/src/peerconnection/PeerConnectionImpl.cpp:506
#4 0x7f912e775aeb in mozilla::PeerConnectionImpl::Initialize(mozilla::dom::PeerConnectionObserver&, nsGlobalWindowInner&, mozilla::dom::RTCConfiguration const&, nsISupports*, mozilla::ErrorResult&) /builds/worker/workspace/build/src/media/webrtc/signaling/src/peerconnection/PeerConnectionImpl.cpp:529:18
#5 0x7f9130f57aea in mozilla::dom::PeerConnectionImpl_Binding::initialize(JSContext*, JS::Handle<JSObject*>, mozilla::PeerConnectionImpl*, JSJitMethodCallArgs const&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/PeerConnectionImplBinding.cpp:98:24
#6 0x7f9132aae81d in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:3168:13
#7 0x7f913968be17 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:447:13
#8 0x7f913968be17 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:539
#9 0x7f91396740bc in CallFromStack /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:598:10
#10 0x7f91396740bc in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3084
#11 0x7f913965575f in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:424:10
#12 0x7f913968c91f in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:567:13
#13 0x7f913968eb42 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:610:8
#14 0x7f913a1f7738 in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jsapi.cpp:2723:10
#15 0x7f913114713a in mozilla::dom::RTCPeerConnectionJSImpl::__Init(mozilla::dom::RTCConfiguration const&, mozilla::dom::Optional<JS::Handle<JSObject*> > const&, mozilla::ErrorResult&, JS::Realm*) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/RTCPeerConnectionBinding.cpp:8786:8
#16 0x7f91311625cd in mozilla::dom::RTCPeerConnection::Constructor(mozilla::dom::GlobalObject const&, JSContext*, mozilla::dom::RTCConfiguration const&, mozilla::dom::Optional<JS::Handle<JSObject*> > const&, mozilla::ErrorResult&, JS::Handle<JSObject*>) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/RTCPeerConnectionBinding.cpp:10156:16
#17 0x7f91312b285f in mozilla::dom::RTCPeerConnection_Binding::_constructor(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/RTCPeerConnectionBinding.cpp:6125:63
#18 0x7f913968fb07 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:447:13
#19 0x7f913968fb07 in CallJSNativeConstructor /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:463
#20 0x7f913968fb07 in InternalConstruct(JSContext*, js::AnyConstructArgs const&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:656
#21 0x7f9139673f85 in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3075:16
#22 0x7f913965575f in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:424:10
#23 0x7f913968c91f in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:567:13
#24 0x7f913968eb42 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:610:8
SUMMARY: AddressSanitizer: heap-use-after-free /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:302:45 in operator bool
Shadow bytes around the buggy address:
0x0c2680005430: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd
0x0c2680005440: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c2680005450: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c2680005460: fd fd fd fd fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2680005470: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
=>0x0c2680005480: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd[fd]
0x0c2680005490: fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa fa
0x0c26800054a0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c26800054b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c26800054c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c26800054d0: 00 00 00 04 fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==21473==ABORTING
```
|
|
1,579,222 | 14,344,605 |
It appears we have a spike in this signature in the Fennec 68.1 release: https://crash-stats.mozilla.org/signature/?signature=JSAutoRealm%3A%3AJSAutoRealm#summary. No particular trend in the URLs. APIs range from 16-28. Top crashing devices so far are two HUAWEI CLT-L29 and WAS-LX1A, followed by the Samsung Galaxy S5 mini.
Spinning this out of Bug 1535346 as requested.
|
|
1,579,743 | 14,347,999 |
Created attachment 9091319
build.log
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0
Steps to reproduce:
System information:
Windwos 10 ver. 1903 (OS Build 18362.295)
Visual Studio 2019 16.2.4
MozillaBuild 3.2
If any other system information is required please let me know.
hg up 3064469c073d
./mach build
-> Build succeed
hg up 13282d7a47a5
./mach build
-> Build fails
Bug that this rev. is related to: https://bugzilla.mozilla.org/show_bug.cgi?id=1578576
Actual results:
The following error occured:
1:59.08 c:/mozilla-source/mozilla-central/gfx/angle/checkout/src/libGLESv2/global_state.cpp(39,1): error: static_assert failed due to requirement 'std::is_trivially_constructible<std::atomic<std::mutex *>>::value' "global mutex is not trivially constructible"
1:59.08 static_assert(std::is_trivially_constructible<decltype(g_Mutex)>::value,
1:59.09 ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1:59.58 1 error generated.
1:59.62 mozmake.EXE[4]: *** [c:/mozilla-source/mozilla-central/config/rules.mk:789: global_state.obj] Error 1
1:59.63 mozmake.EXE[3]: *** [c:/mozilla-source/mozilla-central/config/recurse.mk:74: gfx/angle/targets/libGLESv2/target-objects] Error 2
1:59.64 mozmake.EXE[3]: *** Waiting for unfinished jobs....
3:02.77 mozmake.EXE[2]: *** [c:/mozilla-source/mozilla-central/config/recurse.mk:34: compile] Error 2
3:02.77 mozmake.EXE[1]: *** [c:/mozilla-source/mozilla-central/config/rules.mk:391: default] Error 2
3:02.77 mozmake.EXE: *** [client.mk:125: build] Error 2
3:02.81 310 compiler warnings present.
Expected results:
The build succeeds.
|
|
1,645,414 | 14,878,656 |
The following testcase crashes on mozilla-central revision 20200612-fea1e502ea28 (debug build, run with --fuzzing-safe --no-threads test.js):
See attachment.
Backtrace:
received signal SIGSEGV, Segmentation fault.
0x0000555556665369 in js::jit::ReorderInstructions(js::jit::MIRGraph&) ()
#0 0x0000555556665369 in js::jit::ReorderInstructions(js::jit::MIRGraph&) ()
#1 0x000055555666c93a in js::jit::OptimizeMIR(js::jit::MIRGenerator*) ()
#2 0x000055555692849e in js::wasm::IonCompileFunctions(js::wasm::ModuleEnvironment const&, js::LifoAlloc&, mozilla::Vector<js::wasm::FuncCompileInput, 8ul, js::SystemAllocPolicy> const&, js::wasm::CompiledCode*, mozilla::UniquePtr<char [], JS::FreePolicy>*) ()
#3 0x000055555691365d in ExecuteCompileTask(js::wasm::CompileTask*, mozilla::UniquePtr<char [], JS::FreePolicy>*) ()
#4 0x0000555556914457 in js::wasm::ModuleGenerator::finishFuncDefs() ()
#5 0x000055555689e2ae in bool DecodeCodeSection<js::wasm::Decoder>(js::wasm::ModuleEnvironment const&, js::wasm::Decoder&, js::wasm::ModuleGenerator&) ()
#6 0x000055555689de49 in js::wasm::CompileBuffer(js::wasm::CompileArgs const&, js::wasm::ShareableBytes const&, mozilla::UniquePtr<char [], JS::FreePolicy>*, mozilla::Vector<mozilla::UniquePtr<char [], JS::FreePolicy>, 0ul, js::SystemAllocPolicy>*, JS::OptimizedEncodingListener*) ()
#7 0x000055555697c8f4 in js::WasmModuleObject::construct(JSContext*, unsigned int, JS::Value*) ()
#8 0x0000555555942e92 in CallJSNative(JSContext*, bool (*)(JSContext*, unsigned int, JS::Value*), js::CallReason, JS::CallArgs const&) ()
[...]
#20 0x00005555557b9d6d in main ()
rax 0x55555714783c 93825021540412
rbx 0x7ffff5799aa8 140737311775400
rcx 0x5555583d8980 93825041009024
rdx 0x0 0
rsi 0x7ffff7105770 140737338431344
rdi 0x7ffff7104540 140737338426688
rbp 0x7fffffff8650 140737488324176
rsp 0x7fffffff8540 140737488323904
r8 0x7ffff7105770 140737338431344
r9 0x7ffff7f9bd40 140737353727296
r10 0x58 88
r11 0x7ffff6dac7a0 140737334921120
r12 0x7ffff579a678 140737311778424
r13 0x7fffffff89d0 140737488325072
r14 0x7ffff579a4b8 140737311777976
r15 0x1d 29
rip 0x555556665369 <js::jit::ReorderInstructions(js::jit::MIRGraph&)+2793>
=> 0x555556665369 <_ZN2js3jit19ReorderInstructionsERNS0_8MIRGraphE+2793>: movl $0xc1,0x0
0x555556665374 <_ZN2js3jit19ReorderInstructionsERNS0_8MIRGraphE+2804>: callq 0x5555558494ce <abort>
Marking s-s because the impact of this JIT assertion is unclear until triaged.
|
|
1,585,367 | 14,396,906 |
**Prerequisites**
* Make sure that the "Use selected profile without asking at startup" box is checked in FF Profile Manager
* Make sure no version of FF is installed.
* Make sure that you clear any FF files from so you get a clean install:
rd /s /q %userprofile%\AppData\Roaming\Mozilla
rd /s /q %userprofile%\AppData\Local\Mozilla
rd /s /q %userprofile%\AppData\LocalLow\Mozilla
* acer_distribution.zip : https://www.dropbox.com/s/ud8ii2btmrvxgl2/acer_distribution.zip?dl=0
* acer_langpacks.zip: https://www.dropbox.com/s/qo9odm3ymjzkzuo/acer_langpacks.zip?dl=0
**Affected platforms**
* Windows 10x64
* Windows 7x32
**Steps to reproduce**
1. Install an older version of Beta (eg 68.0b5 32bit), but do not start it.
2. Unzip the file acer_distribution.zip into the C:\Program Files (x86)\Mozilla Firefox directory.
3. Launch Firefox.
4. Update Firefox to latest version .
5. Perform a search from the URL bar.
**Expected result**
* The code in the search is pc=MOZD
**Actual result**
* The code in the search is pc=MOZI
**Additional notes**
* If I’ve updated from 70.0b5 the code in the search is pc=MOZD
* This is not limited to a particular locale, I've reproduced with en-US and ar
* On RC builds the issue isn’t reproducible
|
|
1,585,398 | 14,397,149 |
##### [Environment:]
Windows 10, Ubuntu 16.04
70.0b11 2019-09-30
71.0a1 2019-10-01
##### [Description:]
For the Fx70 MVP, it shouldn't be possible to generate multiple secure passwords in the same session for the same principal (see bug 1569568 and bug 1551723). The generated secure password should be re-used throughout the session for the same principal.
##### [Steps:]
1. Open Firefox with a new profile.
2. Access https://bugs.mattn.ca/pwmgr/login_and_change_form.html
3. In the "Login form" provide an username and a password.
4. Press log in and save the credentials.
5. Press back to reload the form.
6. Remove the auto-filled password and right click/Fill Password/Generate password (at this step you can use whichever password field in the form)
7. Click on the blue icon key from the address bar and update the user/pass from step 4 in the door-hanger using user/generated_password.
8. Once the update+merge is done, choose another password field or just delete the password and to use it again and right click/Fill Password/Generate password
##### [Actual Result:]
The generated password from step 8 is different from the generated password @ step 6
debug log: https://pastebin.com/RXuEjFXZ
Guessing this is the problem: LoginManagerParent: Removing generated-password cache entry for origin: https://bugs.mattn.ca LoginManagerParent.jsm:212:12
##### [Expected Result:]
The generated password is the same throughout the session.
##### [Notes:]
~~1. Refreshing the page after step 6 will result in correct functionality~~ (incorrect)
2. This behavior is active only after a merge.
3. Marking this as a regression, since 70.0b3 20190902120346 did not exhibit this behavior.
|
|
1,585,615 | 14,399,316 |
**Affected versions**
* Firefox 71.0a1
**Affected platforms**
* Windows 10 x64
* Ubuntu 18.04 x64
* macOS 10.13
**Steps to reproduce**
1. Open with a clean profile a site with Social Trackers (e.g.: http://www.psimadethis.com/) in 4 different tabs.
**Expected result**
* The Social Tracking Protection doorhanger is triggered.
**Actual result**
* The Social Tracking Protection doorhanger is not triggered at all, no matter how many times you open a link.
**Regression range**
* last good: 2019-09-10
* first bad: 2019-09-11
* Bug 1570631 might have caused this issue.
**Additional note:**
* The Cryptominers and Fingerprinters doorhangers are displayed.
|
|
1,585,760 | 14,400,495 |
Found while fuzzing mozilla-central rev e545376c3391. I don't currently have a working testcase but will update if one becomes available.
```
==128192==ERROR: AddressSanitizer: heap-use-after-free on address 0x617000048ef8 at pc 0x7f7000f35d53 bp 0x7ffd0622a390 sp 0x7ffd0622a388
READ of size 8 at 0x617000048ef8 thread T0 (file:// Content)
#0 0x7f7000f35d52 in mozilla::layers::PersistentBufferProviderShared::Create(mozilla::gfx::IntSizeTyped<mozilla::gfx::UnknownUnits>, mozilla::gfx::SurfaceFormat, mozilla::layers::KnowsCompositor*) /src/gfx/layers/PersistentBufferProvider.cpp:103:49
#1 0x7f70012eb83b in mozilla::layers::WebRenderLayerManager::CreatePersistentBufferProvider(mozilla::gfx::IntSizeTyped<mozilla::gfx::UnknownUnits> const&, mozilla::gfx::SurfaceFormat) /src/gfx/layers/wr/WebRenderLayerManager.cpp:746:7
#2 0x7f7004a6384b in mozilla::dom::CanvasRenderingContext2D::TrySharedTarget(RefPtr<mozilla::gfx::DrawTarget>&, RefPtr<mozilla::layers::PersistentBufferProvider>&) /src/dom/canvas/CanvasRenderingContext2D.cpp:1435:32
#3 0x7f7004a6204b in mozilla::dom::CanvasRenderingContext2D::EnsureTarget(mozilla::gfx::RectTyped<mozilla::gfx::UnknownUnits, float> const*, bool) /src/dom/canvas/CanvasRenderingContext2D.cpp:1300:8
#4 0x7f7004a7f76c in mozilla::dom::CanvasRenderingContext2D::EnsureWritablePath() /src/dom/canvas/CanvasRenderingContext2D.cpp:3068:3
#5 0x7f7004a81650 in mozilla::dom::CanvasRenderingContext2D::Rect(double, double, double, double) /src/dom/canvas/CanvasRenderingContext2D.cpp:3030:3
#6 0x7f700355ac48 in mozilla::dom::CanvasRenderingContext2D_Binding::rect(JSContext*, JS::Handle<JSObject*>, mozilla::dom::CanvasRenderingContext2D*, JSJitMethodCallArgs const&) /src/obj-firefox/dom/bindings/CanvasRenderingContext2DBinding.cpp:5529:24
#7 0x7f7004966516 in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*) /src/dom/bindings/BindingUtils.cpp:3250:13
#8 0x7f700b5cd51c in CallJSNative /src/js/src/vm/Interpreter.cpp:458:13
#9 0x7f700b5cd51c in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) /src/js/src/vm/Interpreter.cpp:551
#10 0x7f700b5b5ba0 in CallFromStack /src/js/src/vm/Interpreter.cpp:624:10
#11 0x7f700b5b5ba0 in Interpret(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:3113
#12 0x7f700b59733f in js::RunScript(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:424:10
#13 0x7f700b5ce026 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) /src/js/src/vm/Interpreter.cpp:592:13
#14 0x7f700b5d0379 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>, js::CallReason) /src/js/src/vm/Interpreter.cpp:637:8
#15 0x7f700c18b96b in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /src/js/src/jsapi.cpp:2728:10
#16 0x7f700412aed0 in mozilla::dom::EventListener::HandleEvent(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, mozilla::ErrorResult&) /src/obj-firefox/dom/bindings/EventListenerBinding.cpp:52:8
#17 0x7f7005104765 in HandleEvent<mozilla::dom::EventTarget *> /src/obj-firefox/dist/include/mozilla/dom/EventListenerBinding.h:66:12
#18 0x7f7005104765 in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /src/dom/events/EventListenerManager.cpp:1033
#19 0x7f70051061db in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event**, mozilla::dom::EventTarget*, nsEventStatus*, bool) /src/dom/events/EventListenerManager.cpp:1231:17
#20 0x7f70050ecbea in HandleEvent /src/obj-firefox/dist/include/mozilla/EventListenerManager.h:353:5
#21 0x7f70050ecbea in mozilla::EventTargetChainItem::HandleEvent(mozilla::EventChainPostVisitor&, mozilla::ELMCreationDetector&) /src/dom/events/EventDispatcher.cpp:349
#22 0x7f70050eb402 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /src/dom/events/EventDispatcher.cpp:551:16
#23 0x7f70050f0dee in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /src/dom/events/EventDispatcher.cpp:1045:11
#24 0x7f7007ac2414 in nsDocumentViewer::LoadComplete(nsresult) /src/layout/base/nsDocumentViewer.cpp:1170:7
#25 0x7f700a719ba1 in nsDocShell::EndPageLoad(nsIWebProgress*, nsIChannel*, nsresult) /src/docshell/base/nsDocShell.cpp:6568:20
#26 0x7f700a718e1e in nsDocShell::OnStateChange(nsIWebProgress*, nsIRequest*, unsigned int, nsresult) /src/docshell/base/nsDocShell.cpp:6346:7
#27 0x7f700a71da5f in non-virtual thunk to nsDocShell::OnStateChange(nsIWebProgress*, nsIRequest*, unsigned int, nsresult) /src/docshell/base/nsDocShell.cpp
#28 0x7f70008fbd6c in nsDocLoader::DoFireOnStateChange(nsIWebProgress*, nsIRequest*, int&, nsresult) /src/uriloader/base/nsDocLoader.cpp:1354:3
#29 0x7f70008fa9ec in nsDocLoader::doStopDocumentLoad(nsIRequest*, nsresult) /src/uriloader/base/nsDocLoader.cpp:913:14
#30 0x7f70008f65b9 in nsDocLoader::DocLoaderIsEmpty(bool) /src/uriloader/base/nsDocLoader.cpp:732:9
#31 0x7f70008f9466 in nsDocLoader::OnStopRequest(nsIRequest*, nsresult) /src/uriloader/base/nsDocLoader.cpp:620:5
#32 0x7f70008fa5cc in non-virtual thunk to nsDocLoader::OnStopRequest(nsIRequest*, nsresult) /src/uriloader/base/nsDocLoader.cpp
#33 0x7f6ffe0a6730 in mozilla::net::nsLoadGroup::RemoveRequest(nsIRequest*, nsISupports*, nsresult) /src/netwerk/base/nsLoadGroup.cpp:568:22
#34 0x7f7001fbbbf8 in DoUnblockOnload /src/dom/base/Document.cpp:10769:18
#35 0x7f7001fbbbf8 in mozilla::dom::Document::UnblockOnload(bool) /src/dom/base/Document.cpp:10701
#36 0x7f7005082fda in ~LoadBlockingAsyncEventDispatcher /src/dom/events/AsyncEventDispatcher.cpp:117:18
#37 0x7f7005082fda in mozilla::LoadBlockingAsyncEventDispatcher::~LoadBlockingAsyncEventDispatcher() /src/dom/events/AsyncEventDispatcher.cpp:115
#38 0x7f6ffde2357c in Release /src/xpcom/threads/nsThreadUtils.cpp:54:1
#39 0x7f6ffde2357c in mozilla::CancelableRunnable::Release() /src/xpcom/threads/nsThreadUtils.cpp:76
#40 0x7f6ffdde3c84 in assign_assuming_AddRef /src/obj-firefox/dist/include/nsCOMPtr.h:367:7
#41 0x7f6ffdde3c84 in assign_assuming_AddRef /src/obj-firefox/dist/include/nsCOMPtr.h:390
#42 0x7f6ffdde3c84 in operator= /src/obj-firefox/dist/include/nsCOMPtr.h:678
#43 0x7f6ffdde3c84 in mozilla::SchedulerGroup::Runnable::Run() /src/xpcom/threads/SchedulerGroup.cpp:299
#44 0x7f6ffde153b9 in nsThread::ProcessNextEvent(bool, bool*) /src/xpcom/threads/nsThread.cpp:1225:14
#45 0x7f6ffde1c028 in NS_ProcessNextEvent(nsIThread*, bool) /src/xpcom/threads/nsThreadUtils.cpp:486:10
#46 0x7f6fff0546ff in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /src/ipc/glue/MessagePump.cpp:88:21
#47 0x7f6ffef4d7b2 in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10
#48 0x7f6ffef4d7b2 in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308
#49 0x7f6ffef4d7b2 in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290
#50 0x7f70073cb719 in nsBaseAppShell::Run() /src/widget/nsBaseAppShell.cpp:137:27
#51 0x7f700b315c6f in XRE_RunAppShell() /src/toolkit/xre/nsEmbedFunctions.cpp:934:20
#52 0x7f6ffef4d7b2 in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10
#53 0x7f6ffef4d7b2 in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308
#54 0x7f6ffef4d7b2 in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290
#55 0x7f700b315516 in XRE_InitChildProcess(int, char**, XREChildData const*) /src/toolkit/xre/nsEmbedFunctions.cpp:769:34
#56 0x5607b18b6bfa in content_process_main /src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28
#57 0x5607b18b6bfa in main /src/browser/app/nsBrowserApp.cpp:272
#58 0x7f7020deeb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
#59 0x5607b17d821c in _start (/home/worker/builds/m-c-20190930162137-fuzzing-asan-opt/firefox+0x4921c)
0x617000048ef8 is located 248 bytes inside of 648-byte region [0x617000048e00,0x617000049088)
freed by thread T0 (file:// Content) here:
#0 0x5607b18838b2 in __interceptor_free /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:124:3
#1 0x7f70016d2f7c in Release /src/obj-firefox/dist/include/mozilla/layers/CompositorBridgeChild.h:60:3
#2 0x7f70016d2f7c in Release /src/gfx/layers/../../mfbt/RefPtr.h:48
#3 0x7f70016d2f7c in Release /src/gfx/layers/../../mfbt/RefPtr.h:373
#4 0x7f70016d2f7c in assign_assuming_AddRef /src/gfx/layers/../../mfbt/RefPtr.h:67
#5 0x7f70016d2f7c in operator= /src/gfx/layers/../../mfbt/RefPtr.h:162
#6 0x7f70016d2f7c in Revoke /src/obj-firefox/dist/include/nsThreadUtils.h:749
#7 0x7f70016d2f7c in Revoke /src/obj-firefox/dist/include/nsThreadUtils.h:1190
#8 0x7f70016d2f7c in ~RunnableMethodImpl /src/obj-firefox/dist/include/nsThreadUtils.h:1151
#9 0x7f70016d2f7c in mozilla::detail::RunnableMethodImpl<RefPtr<mozilla::layers::CompositorBridgeChild>, void (mozilla::layers::CompositorBridgeChild::*)(), true, (mozilla::RunnableKind)0>::~RunnableMethodImpl() /src/obj-firefox/dist/include/nsThreadUtils.h:1151
#10 0x7f6ffddfff4c in mozilla::Runnable::Release() /src/xpcom/threads/nsThreadUtils.cpp:54:1
#11 0x7f6ffde15b9a in ~nsCOMPtr_base /src/obj-firefox/dist/include/nsCOMPtr.h:331:7
#12 0x7f6ffde15b9a in nsThread::ProcessNextEvent(bool, bool*) /src/xpcom/threads/nsThread.cpp:1272
#13 0x7f6ffde1c028 in NS_ProcessNextEvent(nsIThread*, bool) /src/xpcom/threads/nsThreadUtils.cpp:486:10
#14 0x7f6fff0546ff in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /src/ipc/glue/MessagePump.cpp:88:21
#15 0x7f6ffef4d7b2 in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10
#16 0x7f6ffef4d7b2 in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308
#17 0x7f6ffef4d7b2 in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290
#18 0x7f70073cb719 in nsBaseAppShell::Run() /src/widget/nsBaseAppShell.cpp:137:27
#19 0x7f700b315c6f in XRE_RunAppShell() /src/toolkit/xre/nsEmbedFunctions.cpp:934:20
#20 0x7f6ffef4d7b2 in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10
#21 0x7f6ffef4d7b2 in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308
#22 0x7f6ffef4d7b2 in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290
#23 0x7f700b315516 in XRE_InitChildProcess(int, char**, XREChildData const*) /src/toolkit/xre/nsEmbedFunctions.cpp:769:34
#24 0x5607b18b6bfa in content_process_main /src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28
#25 0x5607b18b6bfa in main /src/browser/app/nsBrowserApp.cpp:272
#26 0x7f7020deeb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
previously allocated by thread T0 (file:// Content) here:
#0 0x5607b1883c33 in __interceptor_malloc /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:146:3
#1 0x5607b18b92bd in moz_xmalloc /src/memory/mozalloc/mozalloc.cpp:52:15
#2 0x7f70016973ab in operator new /src/obj-firefox/dist/include/mozilla/cxxalloc.h:33:10
#3 0x7f70016973ab in mozilla::layers::CompositorManagerChild::CreateContentCompositorBridge(unsigned int) /src/gfx/layers/ipc/CompositorManagerChild.cpp:105
#4 0x7f7006949501 in mozilla::dom::ContentChild::RecvInitRendering(mozilla::ipc::Endpoint<mozilla::layers::PCompositorManagerChild>&&, mozilla::ipc::Endpoint<mozilla::layers::PImageBridgeChild>&&, mozilla::ipc::Endpoint<mozilla::gfx::PVRManagerChild>&&, mozilla::ipc::Endpoint<mozilla::PRemoteDecoderManagerChild>&&, nsTArray<unsigned int>&&) /src/dom/ipc/ContentChild.cpp:1544:8
#5 0x7f6fff3cb3b5 in mozilla::dom::PContentChild::OnMessageReceived(IPC::Message const&) /src/obj-firefox/ipc/ipdl/PContentChild.cpp:8247:56
#6 0x7f6fff04b316 in mozilla::ipc::MessageChannel::DispatchAsyncMessage(mozilla::ipc::ActorLifecycleProxy*, IPC::Message const&) /src/ipc/glue/MessageChannel.cpp:2185:25
#7 0x7f6fff045f6d in mozilla::ipc::MessageChannel::DispatchMessage(IPC::Message&&) /src/ipc/glue/MessageChannel.cpp:2109:9
#8 0x7f6fff048597 in mozilla::ipc::MessageChannel::RunMessage(mozilla::ipc::MessageChannel::MessageTask&) /src/ipc/glue/MessageChannel.cpp:1954:3
#9 0x7f6fff049427 in mozilla::ipc::MessageChannel::MessageTask::Run() /src/ipc/glue/MessageChannel.cpp:1985:13
#10 0x7f6ffde153b9 in nsThread::ProcessNextEvent(bool, bool*) /src/xpcom/threads/nsThread.cpp:1225:14
#11 0x7f6ffde1c028 in NS_ProcessNextEvent(nsIThread*, bool) /src/xpcom/threads/nsThreadUtils.cpp:486:10
#12 0x7f6fff0546ff in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /src/ipc/glue/MessagePump.cpp:88:21
#13 0x7f6ffef4d7b2 in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10
#14 0x7f6ffef4d7b2 in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308
#15 0x7f6ffef4d7b2 in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290
#16 0x7f70073cb719 in nsBaseAppShell::Run() /src/widget/nsBaseAppShell.cpp:137:27
#17 0x7f700b315c6f in XRE_RunAppShell() /src/toolkit/xre/nsEmbedFunctions.cpp:934:20
#18 0x7f6ffef4d7b2 in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10
#19 0x7f6ffef4d7b2 in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308
#20 0x7f6ffef4d7b2 in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290
#21 0x7f700b315516 in XRE_InitChildProcess(int, char**, XREChildData const*) /src/toolkit/xre/nsEmbedFunctions.cpp:769:34
#22 0x5607b18b6bfa in content_process_main /src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28
#23 0x5607b18b6bfa in main /src/browser/app/nsBrowserApp.cpp:272
#24 0x7f7020deeb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-use-after-free /src/gfx/layers/PersistentBufferProvider.cpp:103:49 in mozilla::layers::PersistentBufferProviderShared::Create(mozilla::gfx::IntSizeTyped<mozilla::gfx::UnknownUnits>, mozilla::gfx::SurfaceFormat, mozilla::layers::KnowsCompositor*)
Shadow bytes around the buggy address:
0x0c2e80001180: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c2e80001190: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c2e800011a0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c2e800011b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2e800011c0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
=>0x0c2e800011d0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd[fd]
0x0c2e800011e0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c2e800011f0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c2e80001200: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c2e80001210: fd fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2e80001220: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==128192==ABORTING
```
|
|
1,586,176 | 14,403,555 |
In `NSC_EncryptUpdate`, suppose that the `*pulEncryptedPartLen` parameter is smaller than the block size.
We assume the following path through the function:
```
...
if (crv != CKR_OK) // false
...
if (!pEncryptedPart) { // false
...
if (context->doPad) { // true
/* deal with previous buffered data */
if (context->padDataLength != 0) { // true
/* fill in the padded to a full block size */
for (...) {
// this loop continues until context->padDataLength == context->blockSize
// for this to happen, it's sufficient that ulPartLen >= context->blockSize
// i.e., that there are at least context->blockSize bytes of input
// or more precisely, this will happen when
// ulPartLen + context->padDataLength >= context->blockSize
}
/* not enough data to encrypt yet? then return */
if (context->padDataLength != context->blockSize) { // false, due to above
...
}
/* encrypt the current padded data */
rv = (*context->update)(context->cipherInfo, pEncryptedPart,
&padoutlen, context->blockSize, context->padBuf,
context->blockSize);
```
In the call to `context->update`, the fourth parameter indicates the maximum length which can be written to the output buffer `pEncryptedPart`. This parameter is set to be `context->blockSize`, even though only `*pulEncryptedPartLen` bytes remain in the output buffer, and we were assuming that `*pulEncryptedPartLen` was less than the block size.
There are two ramifications of this: first, we can have a small out-of-bounds write here. The call to `context->update` can write up to about `context->blockSize` bytes off of the end of the output buffer.
Second, `context->update` will write to the variable `padoutlen` indicating the number of bytes written. Supposing `context->update` does write the allowed maximum of `context->blockSize` bytes to the buffer, we will have `padoutlen == context->blockSize`. Then:
```
pEncryptedPart += padoutlen; // advancing the pEncryptedPart pointer beyond the end of the buffer
maxout -= padoutlen;
```
Since `maxout` was initialized to be `*pulEncryptedPartLen` and is thus smaller than the block size in this case, the subtraction will wrap around and give a very large positive value for `maxout` due to its unsigned type.
The subsequent use of `maxout` here:
```
/* do it: NOTE: this assumes buf size in is >= buf size out! */
rv = (*context->update)(context->cipherInfo, pEncryptedPart,
&outlen, maxout, pPart, ulPartLen);
```
will allow `context->update` to write up to `maxout` many bytes, that is, effectively arbitrarily many bytes to `pEncryptedPart`. This is an out-of-bounds write arbitrarily far beyond the buffer.
I think the first call to `context->update` should pass `maxout` rather than `context->blockSize` as the fourth parameter, so that the maximum output length is `maxout` rather than `context->blockSize`. I.e.,
```
rv = (*context->update)(context->cipherInfo, pEncryptedPart,
- &padoutlen, context->blockSize, context->padBuf,
+ &padoutlen, maxout, context->padBuf,
context->blockSize);
```
The related function `NSC_DecryptUpdate` already does this: it uses `maxout` for the maximum-output-length parameter to `context->update` every time it calls `context->update`.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.