Bug ID
int64
961
1.91M
Comment ID
int64
3.98k
17.1M
Author
stringlengths
8
48
Comment Text
stringlengths
1
64.3k
1,586,293
14,404,330
The attached crash information was submitted via the ASan Nightly Reporter on mozilla-central-asan-nightly revision 71.0a1-20190930095343-https://hg.mozilla.org/mozilla-central/rev/b19e0c207cfd521f933583ca1293d62c34ead546. For detailed crash information, see attachment.
1,586,494
14,405,690
This bug is for crash report bp-6e4e9c87-b863-4b7d-812e-82d560190830. ``` Top 10 frames of crashing thread: 0 libxul.so NS_CycleCollectorSuspect3 xpcom/base/nsCycleCollector.cpp:3763 1 libxul.so <name omitted> uriloader/base/nsDocLoader.cpp:171 2 libxul.so nsImapMockChannel::~nsImapMockChannel comm/mailnews/imap/src/nsImapProtocol.cpp:8480 3 libxul.so nsImapMockChannel::~nsImapMockChannel comm/mailnews/imap/src/nsImapProtocol.cpp:8473 4 libxul.so <name omitted> comm/mailnews/imap/src/nsImapProtocol.cpp:8460 5 libxul.so nsImapProtocol::RetryUrl comm/mailnews/imap/src/nsImapProtocol.cpp:1896 6 libxul.so nsImapProtocol::ProcessCurrentURL comm/mailnews/imap/src/nsImapProtocol.cpp 7 libxul.so nsImapProtocol::ImapThreadMainLoop comm/mailnews/imap/src/nsImapProtocol.cpp:1420 8 libxul.so nsImapProtocol::Run comm/mailnews/imap/src/nsImapProtocol.cpp:1103 9 libxul.so non-virtual thunk to nsImapProtocol::Run comm/mailnews/imap/src/nsImapProtocol.cpp ```
1,591,117
14,444,439
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:67.0) Gecko/20100101 Firefox/67.0 Steps to reproduce: I'm using rust nightly (from yesterday) and built firefox from trunk. I opened youtube link with video and clicked play (it crashes on any page that tries to play audio). Actual results: Tab crashed with following backtrace: Sandbox: seccomp sandbox violation: pid 84091, tid 84301, syscall 332, args 66 140653172312854 4096 4095 140652752458960 140652752458976. Killing process. Sandbox: crash reporter is disabled (or failed); trying stack trace: Sandbox: frame #01: syscall (/var/tmp/portage/sys-libs/glibc-2.30-r2/work/glibc-2.30/misc/../sysdeps/unix/sysv/linux/x86_64/syscall.S:38) Sandbox: frame #02: _ZN3std3sys4unix2fs9try_statx17h4543349cfb684145E.llvm.12725196948316218630 (crtstuff.c:?) Sandbox: frame #03: std::fs::File::metadata (/home/dev/home/sources/firefox-hg/mozilla-central/obj-x86_64-pc-linux-gnu/dist/bin/libxul.so) Sandbox: frame #04: memmap::MmapOptions::get_len::{{closure}} (/home/dev/home/sources/firefox-hg/mozilla-central/third_party/rust/memmap/src/lib.rs:122) Sandbox: frame #05: core::option::Option<T>::unwrap_or_else (/var/tmp/portage/dev-lang/rust-9999/work/rust-git-src/src/libcore/option.rs:421) Sandbox: frame #06: memmap::MmapOptions::get_len (/home/dev/home/sources/firefox-hg/mozilla-central/third_party/rust/memmap/src/lib.rs:131) Sandbox: frame #07: memmap::MmapOptions::map_mut (/home/dev/home/sources/firefox-hg/mozilla-central/third_party/rust/memmap/src/lib.rs:231) Sandbox: frame #08: audioipc::shm::SharedMemMutSlice::from (/home/dev/home/sources/firefox-hg/mozilla-central/obj-x86_64-pc-linux-gnu/dist/bin/libxul.so) Sandbox: frame #09: audioipc_client::stream::ClientStream::init (/home/dev/home/sources/firefox-hg/mozilla-central/media/audioipc/client/src/stream.rs:195) Sandbox: frame #10: audioipc_client::stream::init (crtstuff.c:?) Sandbox: frame #11: <audioipc_client::context::ClientContext as cubeb_backend::traits::ContextOps>::stream_init (/home/dev/home/sources/firefox-hg/mozilla-central/media/audioipc/client/src/context.rs:359) Sandbox: frame #12: cubeb_backend::capi::capi_stream_init (/home/dev/home/sources/firefox-hg/mozilla-central/third_party/rust/cubeb-backend/src/capi.rs:155) Sandbox: end of stack. Expected results: Tab shouldn't crash and video should play. It seems statx syscall is not whitelisted.
1,591,467
14,446,776
This bug is for crash report bp-b737eed7-af8c-45ae-b95d-8678c0191025. Seen while looking at nightly crash stats - small volume Windows crash which started in 20191024214023: https://bit.ly/368b1q8 Possible regression range based on build ID: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=ad7a152bc66c0d411a6fb0b210d675abed9693c7&tochange=dd7a79a0e83d6d24f672ce3f619f613ca7ab5f1d Stack references Bug 1590032. ni in case that is related ``` Top 10 frames of crashing thread: 0 xul.dll mozilla::dom::BrowserParent::GetContentPrincipal dom/ipc/BrowserParent.cpp:496 1 xul.dll bool nsFrameLoader::TryRemoteBrowserInternal dom/base/nsFrameLoader.cpp:2531 2 xul.dll nsFrameLoader::TryRemoteBrowser dom/base/nsFrameLoader.cpp:2705 3 xul.dll nsFrameLoader::ShowRemoteFrame dom/base/nsFrameLoader.cpp:1007 4 xul.dll nsFrameLoader::Show dom/base/nsFrameLoader.cpp:874 5 xul.dll nsSubDocumentFrame::ShowViewer layout/generic/nsSubDocumentFrame.cpp:196 6 xul.dll nsresult AsyncFrameInit::Run layout/generic/nsSubDocumentFrame.cpp:94 7 xul.dll nsContentUtils::RemoveScriptBlocker dom/base/nsContentUtils.cpp:5190 8 xul.dll mozilla::dom::Document::EndUpdate dom/base/Document.cpp:7031 9 xul.dll nsINode::ReplaceOrInsertBefore dom/base/nsINode.cpp:2407 ```
1,588,356
14,420,424
This bug is for crash report bp-c0a23330-e324-471e-8d1f-1bc5a0191012. This crash happened 9 times in 4 different instances in the Windows nightly 20191010214019. ``` Top 10 frames of crashing thread: 0 xul.dll nsINode::WrapObject dom/base/nsINode.cpp:2669 1 xul.dll static bool mozilla::dom::Element_Binding::get_openOrClosedShadowRoot dom/bindings/ElementBinding.cpp:4257 2 xul.dll mozilla::dom::binding_detail::GenericGetter<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions> dom/bindings/BindingUtils.cpp:3132 3 xul.dll js::InternalCallOrConstruct js/src/vm/Interpreter.cpp:549 4 xul.dll JS::Call js/src/jsapi.cpp:2722 5 xul.dll xpc::XrayWrapper<js::CrossCompartmentWrapper, xpc::DOMXrayTraits>::get js/xpconnect/wrappers/XrayWrapper.cpp:2089 6 xul.dll js::Proxy::get js/src/proxy/Proxy.cpp:353 7 xul.dll js::Proxy::get js/src/proxy/Proxy.cpp:352 8 xul.dll js::Proxy::get js/src/proxy/Proxy.cpp:352 9 xul.dll js::Proxy::get js/src/proxy/Proxy.cpp:352 ```
1,588,516
14,423,360
Created attachment 9100872 Screenshot_20191014_155250.png User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 Steps to reproduce: Nothing special. Permanent bug Actual results: The colors of the events are all all the same, i.e. light grey, whatever the calendar is Expected results: Each event should appear with a darker color and a color mark associated to a given calendar
1,588,524
14,423,424
Created attachment 9100879 rec of the issue.gif **[Notes]**: - If the "What's New" panel was accessed using keyboard navigation, the toolbar badge is not displayed on the "Firefox Account" toolbar button after a browser restart. **[Affected versions]**: - Firefox Beta 70.0b14 - Build ID: 20191010142853 - Firefox Nightly 71.0a1 - Build ID: 20191013213650 **[Affected Platforms]**: - All Windows - All Linux **[Prerequisites]**: - Have a new Firefox profile. **[Steps to reproduce]**: 1. Open the browser with the profile from prerequisites. 2. Focus the "Address Bar" and press the "Tab" key twice. 3. Press the "Right Arrow" key three times and press the "Enter" key. 4. Dismiss the "What's New" panel and restart the browser. 5. Wait ~5 minutes and observe the buttons displayed in the right part of the "Address Bar". **[Expected result]**: - The following buttons are displayed: - "View history, saved bookmarks and more"; - "Show sidebars"; - "Firefox Account". **[Actual result]**: - The "What's New" toolbar button is redisplayed in the right part of the "Firefox Account" one. **[Additional Notes]**: - The "What's New" toolbar button is not redisplayed if the "What's New" panel was opened by clicking the toolbar button. - Also, the toolbar badge is successfully displayed on the "Firefox Account" toolbar button if the "What's New" panel was opened by clicking the toolbar button. - Attached a screen recording of the issue.
1,589,407
14,430,243
It looks like [`mPrefHosts`](https://searchfox.org/mozilla-central/search?q=mPrefHosts&case=false&regexp=false&path=) is now a write-only variable which isn't used anywhere. STR: 1. Set the `urlclassifier.trackingAnnotationTable.testEntries` pref to `trackertest.org`. 2. Go to https://senglehardt.com/test/trackingprotection/test_pages/referrer_policy.html. Expected: The second iframe must say: The referrer accessible via `document.referrer` is: https://senglehardt.com/ Actual: It says: The referrer accessible via `document.referrer` is: https://senglehardt.com/test/trackingprotection/test_pages/referrer_policy.html Dimi, could you have a look please? Thanks!
1,590,479
14,439,508
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 Steps to reproduce: 1. Create a [child] document with javascript invoked upon user gesture: navigator.mediaDevices.getDisplayMedia({video: true}).then(stream => {console.log('got stream');}).catch(error => {console.log('error getting stream');}); 2. Create a [parent] document with an iframe element that points to the document in step #1, where the 2 documents are served from different origins. 3. Request/Load the parent document in Firefox 70 and invoke the action in the child document that requests getDisplayMedia. Additional Info: - Both pages are being served via HTTPS. - Setting the iframe attr allow = "display-capture *" or response header Feature-Policy = "display-capture *" with the following Firefox flags has no impact on this unexpected behavior (dom.security.featurePolicy.enabled | dom.security.featurePolicy.header.enabled) - Issue can also be replicated without a cross-origin iframe -- just load the child page in Private Browsing mode. - This appears to be a breaking change from FF69 -> FF70 (getDisplayMedia behaves as expected on FF69 w/ cross-origin iframe and Private Browsing mode). - Invoking getUserMedia with audio or video will succeed, allowing the user to select 'Allow' for camera and/or microphone access. - Disabling Enhanced Tracking Protection has no impact on this behavior. - If the iframe is same-origin, it succeeds as expected. Actual results: User is presented the browser screen content chooser, can select an application or screen but CANNOT click 'Allow' (disabled). User can ONLY click 'Dont Allow'. Expected results: User is presented the browser screen content chooser, can select an application or screen and click 'Allow' or 'Dont Allow'.
1,579,858
14,350,436
This bug is for crash report bp-b9bffbc9-27f0-4645-a38f-fad5e0190909. Seen while looking at 69 release crash stats, but present in 70 as well: https://bit.ly/2kb4pEw. Currently #28 overall without a bug. A handful of crashes were present in 68 release, but this is a bit more visible in 69. Comments are not particularly helpful. Correlations: (100.0% in signature vs 50.28% overall) process_type = content [34.88% vs 266.91% if startup_crash = null] (100.0% in signature vs 09.32% overall) address = 0x0 (100.0% in signature vs 30.28% overall) reason = EXCEPTION_ACCESS_VIOLATION_READ (38.76% in signature vs 99.17% overall) plugin_version = null (100.0% in signature vs 59.13% overall) cpu_arch = amd64 (84.50% in signature vs 40.79% overall) platform_pretty_version = Windows 10 (53.49% in signature vs 07.65% overall) Module "igd10iumd64.dll" = true (53.49% in signature vs 08.92% overall) Module "ntasn1.dll" = true (73.64% in signature vs 33.36% overall) plugin_filename = null (100.0% in signature vs 13.76% overall) startup_crash = null [34.88% vs 73.06% if process_type = content] (65.12% in signature vs 27.63% overall) shutdown_progress = null [34.88% vs 73.05% if process_type = content] (15.50% in signature vs 50.59% overall) Module "api-ms-win-crt-multibyte-l1-1-0.dll" = true (26.36% in signature vs 59.94% overall) contains_memory_report = null ``` Top 10 frames of crashing thread: 0 xul.dll XULContentSinkImpl::Release xpcom/ds/nsArray.cpp 1 xul.dll mozilla::CycleCollectedJSContext::~CycleCollectedJSContext xpcom/base/CycleCollectedJSContext.cpp:123 2 xul.dll void mozilla::dom::WorkerJSContext::~WorkerJSContext dom/workers/RuntimeService.cpp:943 3 xul.dll nsresult mozilla::dom::workerinternals::`anonymous namespace'::WorkerThreadPrimaryRunnable::Run dom/workers/RuntimeService.cpp:2366 4 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225 5 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486 6 xul.dll mozilla::ipc::MessagePumpForNonMainThreads::Run ipc/glue/MessagePump.cpp:333 7 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:308 8 xul.dll MessageLoop::Run ipc/chromium/src/base/message_loop.cc:290 9 xul.dll nsThread::ThreadFunc xpcom/threads/nsThread.cpp:459 ```
1,580,506
14,355,134
[Tracking Requested - why for this release]: Critical security UI not showing up. Would be great to get this as a dot-release ride-along at least. STR: Go to https://permission.site/ and click on "pointer lock". You *should* see a huge warning showing up that the website has taken control of your cursor and you can get it back, but it doesn't show up. This was regressed by bug 1533948. Neil, can you please take a look at this bug?
1,580,740
14,357,050
Created attachment 9092302 Freeze.png User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:70.0) Gecko/20100101 Firefox/70.0 Steps to reproduce: I open the Firefox and work some time. For example translating a page for the Mozilla Support. Actual results: Firefox freezes until I remove its task from Windows Task Manager. I tried to use crashfirefox64.exe utility to make some crash reports. But these reports are not create after the Firefox crashes... In Windows Task one of the Firefox processes shows as 'not responding' (see screenshot) Expected results: Firefox work normally without freezes.
1,581,548
14,364,619
This bug is for crash report bp-d7b91b49-8901-455b-84f8-c658e0190916. ``` Top 10 frames of crashing thread: 0 xul.dll nsWindowWatcher::OpenWindowInternal toolkit/components/windowwatcher/nsWindowWatcher.cpp:1042 1 xul.dll nsWindowWatcher::OpenWindow2 toolkit/components/windowwatcher/nsWindowWatcher.cpp:377 2 xul.dll nsGlobalWindowOuter::OpenInternal dom/base/nsGlobalWindowOuter.cpp:7243 3 xul.dll nsGlobalWindowOuter::OpenOuter dom/base/nsGlobalWindowOuter.cpp:5698 4 xul.dll nsGlobalWindowInner::Open dom/base/nsGlobalWindowInner.cpp:3750 5 xul.dll static bool mozilla::dom::Window_Binding::open dom/bindings/WindowBinding.cpp:2868 6 xul.dll mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::MaybeGlobalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions> dom/bindings/BindingUtils.cpp:3163 7 xul.dll js::InternalCallOrConstruct js/src/vm/Interpreter.cpp:539 8 xul.dll Interpret js/src/vm/Interpreter.cpp:3084 9 xul.dll js::RunScript js/src/vm/Interpreter.cpp:424 ``` this crash signature started showing up in 71.0a1 build 20190910095613 and then in 70.0b6 in higher volume - timing-wise this would point to the changes in bug 1579437. on the recent beta build the signature is currently accounting for 2.9% of all tab crashes.
1,581,988
14,368,096
According to MozRegression, this bug happens at [1] in Bug 1566285. A regression from FF 70. STR: 1. Open https://webvr.info/samples/04-simple-mirroring.html 2. Open another tab, go to Wikipedia 3. Close the first tab and wait VR process is shutdown. 4. Open another tab, go to https://webvr.info/samples/04-simple-mirroring.html. Expected result: We can get VR display and enter immersive mode successfully. Actual result: Can't get VR display. [1] https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=0fb761cd8fa448eb511e8b2520ede5a3230853ed&tochange=b6d154b2309846531934289c1e167208fc385ac3
1,593,394
14,462,201
Created attachment 9105938 flamegraph-npn.svg Just rebuilt Firefox recently (last commit via git-cinnabar: fe67766efd3e9cea9e831363b2a6a4061d4bfa36, before that was on 7d3c846792621de8bfc4e3d8b49427a3c763b4da) and it's unusable, just opening a new tab / typing in the url bar is extremely slow and the main process is spinning with 200% CPU usage. Turning off SOCKSv5 proxy (tor) fixes the problem. Flamegraph attached. Looks like two threads spinning (something like livelock?), a secondary one is endlessly getting ready/writable socket status and pinging the main thread, while the main thread just responds to these notifications (?) and does not really make progress. Have not bisected yet. Maybe something to do with http3?
1,594,035
14,468,690
[Notes]: - The issue is reproducible with all Normandy actions. - The issue is reproducible if a client unenrolls after updating Firefox Beta 70.0bx to the latest FIrefox Beta 71.0bx. - The issue is reproducible if a client unenrolls after updating Firefox Nightly 70.0a1 to the latest FIrefox Nightly 72.0a1. - The issue is reproducible if a client unenrolls after updating Firefox Nightly 71.0a1 to the latest FIrefox Nightly 72.0a1. - The issue is not reproducible when updating from Firefox Release 69 to 70. - The issue is also not reproducible when updating through beta versions or dot releases. - It seems to be a regression, but unfortunately we cannot find the regression range due to the fact that we need a Firefox update with a version change to reproduce the issue. [Affected Platforms]: - All Windows - All Mac - All Linux [Affected Versions]: - Firefox Beta 71.0b6 - Firefox Nightly 71.0a1 - Firefox Nightly 72.a1 [Prerequisites]: - Have a Firefox Beta or Nightly 70 version installed. - Have access to the stage delivery console. - Have an active multi-preferance [recipe](https://delivery-console.stage.mozaws.net/recipe/872/). - Have the `security.content.signature.root_hash` pref set to `DB:74:CE:58:E4:F9:D0:9E:E0:42:36:BE:6C:C5:C4:F6:6A:E7:74:7D:C0:21:42:7A:03:BC:2F:57:0C:8B:9B:90`. - Have the `app.normandy.api_url` pref set to `https://stage.normandy.nonprod.cloudops.mozgcp.net/api/v1`. - Have the `app.normandy.dev_mode` pref set to `true`. - Have the `app.normandy.logging.level` pref set to `0`. - Have the `services.settings.server` pref set to `https://settings.stage.mozaws.net/v1`. - Create a new pref named `cosmin` and set it as `true`. [Steps to reproduce]: 1. Open the browser with the profile from prerequisites. 2. Update the browser to the latest version. 3. Navigate to "about:studies" page and remove the active study. 4. Navigate to "about:telemetry#events-tab" page. 5. Search for an unenroll event. [Expected result]: - An “unenroll” event is successfully registered. [Actual result]: - No “unenroll” event is registered. [Additional Notes]: - The logs are correctly displayed in the browser console, but the events are not registered in "about:telemetry" page. - The issue is reproducible for all the unenroll events: "recipe-not-seen", "user-preference-changed", "individual-opt-out", “user-preference-changed-sideload" and "general-opt-out". - We are not sure if the telemetry event is sent to the server and it is not shown in about:telemetry page or the event is not sent at all. - Here is a link with the screen recording of the issue: [link](https://drive.google.com/open?id=1M9PlUybkHGM3iPExdEFEwk0RmChPUB2Z).
1,594,181
14,469,824
The attached crash information was submitted via the ASan Nightly Reporter on mozilla-central-asan-nightly revision 72.0a1-20191028215046-https://hg.mozilla.org/mozilla-central/rev/c65ef27b6fc78ec5140068913209bad3b55f1139. For detailed crash information, see attachment.
1,582,645
14,373,181
This bug is for crash report bp-1d03375a-1d36-415b-9b7e-d44250190919. ``` Top 10 frames of crashing thread: 0 xul.dll GeckoCrash toolkit/xre/nsAppRunner.cpp:5117 1 xul.dll static void gkrust_shared::panic_hook toolkit/library/rust/shared/lib.rs:248 2 xul.dll static void core::ops::function::Fn::call<fn src/libcore/ops/function.rs:69 3 xul.dll static void std::panicking::rust_panic_with_hook src/libstd/panicking.rs:481 4 xul.dll static <NoType> std::panicking::begin_panic<str*> src/libstd/panicking.rs:411 5 xul.dll static struct webrender_bindings::moz2d_renderer::Entry webrender_bindings::moz2d_renderer::BlobReader::read_entry gfx/webrender_bindings/src/moz2d_renderer.rs 6 xul.dll static void webrender_bindings::moz2d_renderer::{{impl}}::update gfx/webrender_bindings/src/moz2d_renderer.rs:641 7 xul.dll static void webrender::resource_cache::ResourceCache::pre_scene_building_update gfx/wr/webrender/src/resource_cache.rs:674 8 xul.dll static union core::option::Option<alloc::boxed::Box<webrender::scene_builder_thread::Transaction>> core::iter::adapters::{{impl}}::next<alloc::boxed::Box<webrender::scene_builder_thread::Transaction>, core::iter::adapters::zip::Zip<core::slice::Iter<webrender_api::api::DocumentId>, alloc::vec::Drain<webrender_api::api::TransactionMsg>>, closure> src/libcore/iter/adapters/mod.rs:570 9 xul.dll static union webrender::render_backend::RenderBackendStatus webrender::render_backend::RenderBackend::process_api_msg gfx/wr/webrender/src/render_backend.rs:1209 ```
1,582,832
14,374,467
This bug is for crash report bp-094af257-082d-4684-a095-cd35a0190920. Seen while looking at nightly crashes - these seem to be with Fission enabled: https://bit.ly/2kM5Jy3. The 71 crashes are macOS and Linux only. ``` Top 10 frames of crashing thread: 0 XUL mozilla::dom::BrowsingContext::CreateFromIPC docshell/base/BrowsingContext.cpp:163 1 XUL mozilla::dom::ContentChild::RecvRegisterBrowsingContextGroup dom/ipc/ContentChild.cpp:3907 2 XUL mozilla::dom::PContentChild::OnMessageReceived ipc/ipdl/PContentChild.cpp:12063 3 XUL mozilla::ipc::MessageChannel::DispatchMessage ipc/glue/MessageChannel.cpp:2185 4 XUL mozilla::ipc::MessageChannel::MessageTask::Run ipc/glue/MessageChannel.cpp:1985 5 XUL nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225 6 XUL NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486 7 XUL mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:110 8 XUL nsBaseAppShell::Run widget/nsBaseAppShell.cpp:137 9 XUL nsAppShell::Run widget/cocoa/nsAppShell.mm:705 ```
1,583,019
14,375,612
This bug is for crash report bp-52e61a77-c98a-4afc-a57c-8a9030190913. ``` Top 10 frames of crashing thread: 0 xul.dll PLDHashTable::Search xpcom/ds/PLDHashTable.cpp:506 1 xul.dll void mozilla::dom::`anonymous namespace'::PrepareDatastoreOp::Cleanup dom/localstorage/ActorsParent.cpp:7732 2 xul.dll nsresult mozilla::dom::`anonymous namespace'::LSRequestBase::Run dom/localstorage/ActorsParent.cpp:6604 3 xul.dll void mozilla::dom::`anonymous namespace'::PrepareDatastoreOp::ActorDestroy dom/localstorage/ActorsParent.cpp:7844 4 xul.dll mozilla::ipc::IProtocol::DestroySubtree ipc/glue/ProtocolUtils.cpp:572 5 xul.dll mozilla::ipc::IProtocol::DestroySubtree ipc/glue/ProtocolUtils.cpp:560 6 xul.dll mozilla::ipc::PBackgroundParent::OnChannelError ipc/ipdl/PBackgroundParent.cpp:5984 7 xul.dll nsresult mozilla::detail::RunnableMethodImpl<mozilla::dom::Performance*, void xpcom/threads/nsThreadUtils.h:1176 8 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225 9 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486 ```
1,584,165
14,385,524
Created attachment 9095485 test.mov **Affected versions:** - Firefox Nightly 71.0a1 from [taskcluster](https://treeherder.mozilla.org/#/jobs?repo=mozilla-central&revision=451e084cba667e115d04449cd870d81eb34c6a84) with the fix from bug 1583170 included. **Affected Platforms:** - MacOS 10.14 **Prerequisites:** - You are connected to a Lan network. **Steps to reproduce:** 1. Open Firefox and go to about:networking#networkid. 2. Enable and connect to a WiFi network. 3. Disconnect from Lan. 4. Connect back to Lan and disconnect from WiFi. **Expected result:** 1. A network ID is displayed as you're connected to a Lan network. 4. The previous network ID is shown. **Actual result:** 1. No network ID is available. 4. The network ID remains stuck to the one that was displayed on the WiFi connection. Update: - for step 4 it either remains stuck or does not display the network ID
1,584,613
14,390,184
Reported at https://github.com/mozilla/doh-rollout/issues/107#issuecomment-535929384
1,596,706
14,489,143
The following testcase crashes on mozilla-central revision 173de3ea2a27 (build with --disable-jemalloc --enable-address-sanitizer --enable-gczeal --enable-optimize="-O2 -g" --enable-fuzzing --enable-debug, run with --fuzzing-safe): _=>e 2n Backtrace: ==20199==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x5575856857f7 bp 0x7ffcaa999d40 sp 0x7ffcaa9997c0 T0) #0 0x5575856857f6 in JS::BigInt* JS::BigInt::parseLiteral<char16_t>(JSContext*, mozilla::Range<char16_t const>, bool*) js/src/vm/BigIntType.cpp #1 0x557585684686 in js::ParseBigIntLiteral(JSContext*, mozilla::Range<char16_t const> const&) js/src/vm/BigIntType.cpp:3399:17 #2 0x5575871c04fa in js::frontend::Parser<js::frontend::FullParseHandler, mozilla::Utf8Unit>::newBigInt() js/src/frontend/Parser.cpp:9730:15 #3 0x55758719dadd in js::frontend::GeneralParser<js::frontend::FullParseHandler, mozilla::Utf8Unit>::newBigInt() js/src/frontend/Parser.cpp:9752:27 #4 0x55758719dadd in js::frontend::GeneralParser<js::frontend::FullParseHandler, mozilla::Utf8Unit>::primaryExpr(js::frontend::YieldHandling, js::frontend::TripledotHandling, js::frontend::TokenKind, js::frontend::GeneralParser<js::frontend::FullParseHandler, mozilla::Utf8Unit>::PossibleError*, js::frontend::ParserBase::InvokedPrediction) js/src/frontend/Parser.cpp:10763 [...] Marking s-s because this will cause an out-of-bounds read in `BigInt::parseLiteralDigits` later on in release builds.
1,597,043
14,491,571
#122 for Firefox 70.0.1. #27 crash for Thunderbird 68.2.2. The crash rate is trivial before Thunderbird version 68, which makes one wonder whether Bug 1502061 - Crash in mozilla::a11y::RootAccessible::ProcessDOMEvent, fixed for v65, made this better or worse for Thunderbird. Perhaps we have a regression? (the author of that patch isn't around) bp-b5285f48-9aaa-46cb-99d7-a02670191116 Thunderbird 0 xul.dll mozilla::a11y::RootAccessible::ProcessDOMEvent accessible/generic/RootAccessible.cpp:351 1 xul.dll mozilla::a11y::TNotification<mozilla::a11y::RootAccessible, mozilla::dom::Event, nsINode>::Process accessible/base/NotificationController.h:72 2 xul.dll mozilla::a11y::NotificationController::WillRefresh accessible/base/NotificationController.cpp:837 3 xul.dll nsRefreshDriver::Tick layout/base/nsRefreshDriver.cpp:1892 4 xul.dll mozilla::RefreshDriverTimer::TickRefreshDrivers layout/base/nsRefreshDriver.cpp:325 5 xul.dll mozilla::RefreshDriverTimer::Tick layout/base/nsRefreshDriver.cpp:342 6 xul.dll mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::TickRefreshDriver layout/base/nsRefreshDriver.cpp:708 7 xul.dll mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::ParentProcessVsyncNotifier::Run layout/base/nsRefreshDriver.cpp:508 8 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1175 9 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486 bp-81ed8710-566c-4128-ad1c-8a0fe0191116 Firefox 70.0.1 0 xul.dll mozilla::a11y::RootAccessible::ProcessDOMEvent(mozilla::dom::Event*, nsINode*) accessible/generic/RootAccessible.cpp:351 1 xul.dll mozilla::a11y::TNotification<mozilla::a11y::RootAccessible, mozilla::dom::Event, nsINode>::Process() accessible/base/NotificationController.h:72 2 xul.dll mozilla::a11y::NotificationController::WillRefresh(mozilla::TimeStamp) accessible/base/NotificationController.cpp:837 3 xul.dll nsRefreshDriver::Tick(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp) layout/base/nsRefreshDriver.cpp:1892 4 xul.dll mozilla::RefreshDriverTimer::TickRefreshDrivers(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp, nsTArray<RefPtr<nsRefreshDriver> >&) layout/base/nsRefreshDriver.cpp:325 5 xul.dll mozilla::RefreshDriverTimer::Tick(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp) layout/base/nsRefreshDriver.cpp:342 6 xul.dll mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::TickRefreshDriver(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp) layout/base/nsRefreshDriver.cpp:708
1,597,206
14,494,235
The following testcase crashes on mozilla-central revision 4def8673359e (build with --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --enable-debug --enable-optimize, run with --fuzzing-safe --ion-offthread-compile=off): enableShellAllocationMetadataBuilder(function() {}); try { for (var i73 = 0; i73 < 10; ++i73) { var f38 = function() { function g99() { x48++; } g99(); } f38(); } } catch (e44) {} oomAfterAllocations(5) gc(); Backtrace: received signal SIGSEGV, Segmentation fault. #0 js::GCMarker::leaveWeakMarkingMode (this=this@entry=0x7ffff5f2a788) at js/src/gc/Marking.cpp:2616 #1 0x0000555555e969a1 in js::GCMarker::abortLinearWeakMarking (this=0x7ffff5f2a788) at js/src/gc/GCMarker.h:290 #2 js::WeakMap<js::HeapPtr<JSObject*>, js::HeapPtr<JS::Value> >::addWeakEntry (marker=marker@entry=0x7ffff5f2a788, key=<optimized out>, markable=...) at js/src/gc/WeakMap-inl.h:214 #3 0x0000555555e96b1f in js::WeakMap<js::HeapPtr<JSObject*>, js::HeapPtr<JS::Value> >::markEntries (this=0x7ffff4ddd580, marker=0x7ffff5f2a788) at js/src/gc/WeakMap-inl.h:245 #4 0x0000555555e92b45 in js::WeakMap<js::HeapPtr<JSObject*>, js::HeapPtr<JS::Value> >::trace (this=0x7ffff4ddd580, trc=0x7ffff5f2a788) at js/src/gc/WeakMap-inl.h:175 #5 0x0000555555d05102 in js::ObjectRealm::trace (this=0x7ffff471d868, trc=0x7ffff5f2a788) at js/src/vm/Realm.cpp:284 #6 0x0000555555d05197 in JS::Realm::traceRoots (this=<optimized out>, trc=<optimized out>, traceOrMark=<optimized out>) at js/src/vm/Realm.cpp:323 #7 0x00005555561e63b9 in js::gc::GCRuntime::traceRuntimeCommon (this=this@entry=0x7ffff5f29700, trc=trc@entry=0x7ffff5f2a788, traceOrMark=traceOrMark@entry=js::gc::GCRuntime::MarkRuntime) at js/src/gc/RootMarking.cpp:398 #8 0x00005555561e67e8 in js::gc::GCRuntime::traceRuntimeForMajorGC (this=this@entry=0x7ffff5f29700, trc=trc@entry=0x7ffff5f2a788, session=...) at js/src/gc/RootMarking.cpp:290 #9 0x0000555556188202 in js::gc::GCRuntime::beginMarkPhase (this=0x7ffff5f29700, reason=<optimized out>, session=...) at js/src/gc/GC.cpp:4060 #10 0x0000555556195108 in js::gc::GCRuntime::incrementalSlice (this=this@entry=0x7ffff5f29700, budget=..., gckind=..., reason=reason@entry=JS::GCReason::API, session=...) at js/src/gc/GC.cpp:6758 #11 0x0000555556195cce in js::gc::GCRuntime::gcCycle (this=this@entry=0x7ffff5f29700, nonincrementalByAPI=nonincrementalByAPI@entry=true, budget=..., gckind=..., reason=reason@entry=JS::GCReason::API) at js/src/gc/GC.cpp:7243 #12 0x000055555619629e in js::gc::GCRuntime::collect (this=this@entry=0x7ffff5f29700, nonincrementalByAPI=nonincrementalByAPI@entry=true, budget=..., gckindArg=..., reason=reason@entry=JS::GCReason::API) at js/src/gc/GC.cpp:7428 #13 0x00005555561968b5 in js::gc::GCRuntime::gc (this=0x7ffff5f29700, gckind=gckind@entry=GC_NORMAL, reason=reason@entry=JS::GCReason::API) at js/src/gc/GC.cpp:7510 #14 0x0000555556196a9f in JS::NonIncrementalGC (cx=cx@entry=0x7ffff5f27000, gckind=gckind@entry=GC_NORMAL, reason=reason@entry=JS::GCReason::API) at js/src/gc/GC.cpp:8344 #15 0x0000555555e60ee9 in GC (cx=cx@entry=0x7ffff5f27000, argc=<optimized out>, vp=<optimized out>) at js/src/builtin/TestingFunctions.cpp:509 #16 0x00005555559ce6f0 in CallJSNative (cx=0x7ffff5f27000, native=native@entry=0x555555e60e60 <GC(JSContext*, unsigned int, JS::Value*)>, reason=reason@entry=js::CallReason::Call, args=...) at js/src/vm/Interpreter.cpp:456 [...] #29 main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at js/src/shell/js.cpp:11535 rax 0x5555580befa0 93825037758368 rbx 0x7ffff5f2a788 140737319708552 rcx 0x555556f60a30 93825019546160 rdx 0x0 0 rsi 0x7ffff6eeb770 140737336227696 rdi 0x7ffff6eea540 140737336223040 rbp 0x7fffffffba80 140737488337536 rsp 0x7fffffffba10 140737488337424 r8 0x7ffff6eeb770 140737336227696 r9 0x7ffff7fe6cc0 140737354034368 r10 0x58 88 r11 0x7ffff6b927a0 140737332717472 r12 0x8 8 r13 0x7ffff5f2a788 140737319708552 r14 0x7fffffffbb10 140737488337680 r15 0x7ffff470e988 140737294428552 rip 0x5555561dce80 <js::GCMarker::leaveWeakMarkingMode()+592> => 0x5555561dce80 <js::GCMarker::leaveWeakMarkingMode()+592>: movl $0x0,0x0 0x5555561dce8b <js::GCMarker::leaveWeakMarkingMode()+603>: ud2 Marking s-s until investigated because this is GC related.
1,598,543
14,503,997
Created attachment 9110763 testcase.html Found with m-c 20191116-05f4ac2d6dd6 ``` ==20092==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x0049159fed00 at pc 0x7ffd1c84df9a bp 0x0049159fe220 sp 0x0049159fe268 READ of size 135 at 0x0049159fed00 thread T93 #0 0x7ffd1c84dfc2 in __asan_wrap_strlen Z:\task_1573467939\fetches\llvm-project\llvm\projects\compiler-rt\lib\sanitizer_common\sanitizer_common_interceptors.inc:365 #1 0x7ffd060528f5 in nsTSubstring<char>::Assign \src\xpcom\string\nsTSubstring.cpp:401 #2 0x7ffd06045c57 in nsTSubstring<char>::Assign \src\xpcom\string\nsTSubstring.cpp:380 #3 0x7ffd0e50bb42 in mozilla::media::LambdaRunnable<`lambda at z:/build/build/src/dom/media/systemservices/CamerasParent.cpp:592:54'>::Run \src\dom\media\systemservices\MediaUtils.h:73 #4 0x7ffd0749f303 in MessageLoop::DeferOrRunPendingTask \src\ipc\chromium\src\base\message_loop.cc:450 #5 0x7ffd074a0d3e in MessageLoop::DoWork \src\ipc\chromium\src\base\message_loop.cc:523 #6 0x7ffd0755f72d in mozilla::ipc::MessagePumpForNonMainUIThreads::DoRunLoop \src\ipc\glue\MessagePump.cpp:376 #7 0x7ffd074722c9 in base::MessagePumpWin::Run \src\ipc\chromium\src\base\message_pump_win.h:79 #8 0x7ffd0749e09e in MessageLoop::RunHandler \src\ipc\chromium\src\base\message_loop.cc:308 #9 0x7ffd074b0521 in base::Thread::ThreadMain \src\ipc\chromium\src\base\thread.cc:192 #10 0x7ffd07473adf in `anonymous namespace'::ThreadFunc \src\ipc\chromium\src\base\platform_thread_win.cc:19 #11 0x7ffd1c85f838 in __asan::AsanThread::ThreadStart Z:\task_1573467939\fetches\llvm-project\llvm\projects\compiler-rt\lib\asan\asan_thread.cc:262 #12 0x7ffd4c097bd3 in BaseThreadInitThunk+0x13 (C:\Windows\System32\KERNEL32.DLL+0x180017bd3) #13 0x7ffd1e6d4d8b in patched_BaseThreadInitThunk \src\mozglue\dllservices\WindowsDllBlocklist.cpp:564 #14 0x7ffd4c1ecee0 in RtlUserThreadStart+0x20 (C:\Windows\SYSTEM32\ntdll.dll+0x18006cee0) Address 0x0049159fed00 is located in stack of thread T64 at offset 192 in frame #0 0x7ffd0e50b66f in mozilla::media::LambdaRunnable<`lambda at z:/build/build/src/dom/media/systemservices/CamerasParent.cpp:592:54'>::Run \src\dom\media\systemservices\MediaUtils.h:73 This frame has 8 object(s): [32, 40) 'agg.tmp.i.i' [64, 192) 'deviceName.i' [224, 480) 'deviceUniqueId.i' <== Memory access at offset 192 partially underflows this variable [544, 560) 'name.i' [576, 592) 'uniqueId.i' [608, 612) 'devicePid.i' [624, 640) 'devInfo.i' [656, 712) 'ref.tmp16.i' HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp, SEH and C++ exceptions *are* supported) Thread T64 created by T27 here: #0 0x7ffd1c86095c in __asan_wrap_CreateThread Z:\task_1573467939\fetches\llvm-project\llvm\projects\compiler-rt\lib\asan\asan_win.cc:146 #1 0x7ffd4941d8d6 in beginthreadex+0x56 (C:\Windows\System32\ucrtbase.dll+0x18001d8d6) #2 0x7ffd1c41721d in _PR_MD_CREATE_THREAD \src\nsprpub\pr\src\md\windows\w95thred.c:153 #3 0x7ffd1c4482ec in _PR_NativeCreateThread \src\nsprpub\pr\src\threads\combined\pruthr.c:1058 #4 0x7ffd1c448c95 in _PR_CreateThread \src\nsprpub\pr\src\threads\combined\pruthr.c:1184 #5 0x7ffd1c43b6ef in PR_CreateThread \src\nsprpub\pr\src\threads\combined\pruthr.c:1404 #6 0x7ffd062efc37 in nsThread::Init \src\xpcom\threads\nsThread.cpp:673 #7 0x7ffd062fd757 in nsThreadManager::NewNamedThread \src\xpcom\threads\nsThreadManager.cpp:550 #8 0x7ffd06301f40 in NS_NewNamedThread \src\xpcom\threads\nsThreadUtils.cpp:139 #9 0x7ffd0edd47e4 in mozilla::dom::indexedDB::`anonymous namespace'::ConnectionPool::ScheduleTransaction \src\dom\indexedDB\ActorsParent.cpp:11403 #10 0x7ffd0edfcdc0 in mozilla::dom::indexedDB::`anonymous namespace'::TransactionDatabaseOperationBase::StartOnConnectionPool \src\dom\indexedDB\ActorsParent.cpp:21997 #11 0x7ffd0edc2fc3 in mozilla::dom::indexedDB::`anonymous namespace'::OpenDatabaseOp::DispatchToWorkThread \src\dom\indexedDB\ActorsParent.cpp:21054 #12 0x7ffd0edb3043 in mozilla::dom::indexedDB::`anonymous namespace'::FactoryOp::Run \src\dom\indexedDB\ActorsParent.cpp #13 0x7ffd0edca944 in mozilla::dom::indexedDB::`anonymous namespace'::WaitForTransactionsHelper::MaybeWaitForFileHandles \src\dom\indexedDB\ActorsParent.cpp:12589 #14 0x7ffd0edc99fe in mozilla::dom::indexedDB::`anonymous namespace'::WaitForTransactionsHelper::Run \src\dom\indexedDB\ActorsParent.cpp:12617 #15 0x7ffd0edc9c7e in mozilla::dom::indexedDB::`anonymous namespace'::WaitForTransactionsHelper::Run \src\dom\indexedDB\ActorsParent.cpp:12613 #16 0x7ffd0edc1805 in mozilla::dom::indexedDB::`anonymous namespace'::OpenDatabaseOp::BeginVersionChange \src\dom\indexedDB\ActorsParent.cpp:20943 #17 0x7ffd0edb3043 in mozilla::dom::indexedDB::`anonymous namespace'::FactoryOp::Run \src\dom\indexedDB\ActorsParent.cpp #18 0x7ffd062f4c47 in nsThread::ProcessNextEvent \src\xpcom\threads\nsThread.cpp:1250 #19 0x7ffd062febb8 in NS_ProcessNextEvent \src\xpcom\threads\nsThreadUtils.cpp:486 #20 0x7ffd0755f12c in mozilla::ipc::MessagePumpForNonMainThreads::Run \src\ipc\glue\MessagePump.cpp:333 #21 0x7ffd0749e09e in MessageLoop::RunHandler \src\ipc\chromium\src\base\message_loop.cc:308 #22 0x7ffd0749de35 in MessageLoop::Run \src\ipc\chromium\src\base\message_loop.cc:290 #23 0x7ffd062ecd26 in nsThread::ThreadFunc \src\xpcom\threads\nsThread.cpp:458 #24 0x7ffd1c4473dd in _PR_NativeRunThread \src\nsprpub\pr\src\threads\combined\pruthr.c:399 #25 0x7ffd1c4173f4 in pr_root \src\nsprpub\pr\src\md\windows\w95thred.c:139 #26 0x7ffd4941d9f1 in o_strncat_s+0x71 (C:\Windows\System32\ucrtbase.dll+0x18001d9f1) #27 0x7ffd1c85f838 in __asan::AsanThread::ThreadStart Z:\task_1573467939\fetches\llvm-project\llvm\projects\compiler-rt\lib\asan\asan_thread.cc:262 #28 0x7ffd4c097bd3 in BaseThreadInitThunk+0x13 (C:\Windows\System32\KERNEL32.DLL+0x180017bd3) #29 0x7ffd1e6d4d8b in patched_BaseThreadInitThunk \src\mozglue\dllservices\WindowsDllBlocklist.cpp:564 #30 0x7ffd4c1ecee0 in RtlUserThreadStart+0x20 (C:\Windows\SYSTEM32\ntdll.dll+0x18006cee0) Thread T27 created by T0 here: #0 0x7ffd1c86095c in __asan_wrap_CreateThread Z:\task_1573467939\fetches\llvm-project\llvm\projects\compiler-rt\lib\asan\asan_win.cc:146 #1 0x7ffd4941d8d6 in beginthreadex+0x56 (C:\Windows\System32\ucrtbase.dll+0x18001d8d6) #2 0x7ffd1c41721d in _PR_MD_CREATE_THREAD \src\nsprpub\pr\src\md\windows\w95thred.c:153 #3 0x7ffd1c4482ec in _PR_NativeCreateThread \src\nsprpub\pr\src\threads\combined\pruthr.c:1058 #4 0x7ffd1c448c95 in _PR_CreateThread \src\nsprpub\pr\src\threads\combined\pruthr.c:1184 #5 0x7ffd1c43b6ef in PR_CreateThread \src\nsprpub\pr\src\threads\combined\pruthr.c:1404 #6 0x7ffd062efc37 in nsThread::Init \src\xpcom\threads\nsThread.cpp:673 #7 0x7ffd062fd757 in nsThreadManager::NewNamedThread \src\xpcom\threads\nsThreadManager.cpp:550 #8 0x7ffd06301f40 in NS_NewNamedThread \src\xpcom\threads\nsThreadUtils.cpp:139 #9 0x7ffd075141ee in `anonymous namespace'::ParentImpl::CreateBackgroundThread \src\ipc\glue\BackgroundImpl.cpp:944 #10 0x7ffd0751a7bf in `anonymous namespace'::ParentImpl::CreateActorHelper::Run \src\ipc\glue\BackgroundImpl.cpp:1263 #11 0x7ffd062f4c47 in nsThread::ProcessNextEvent \src\xpcom\threads\nsThread.cpp:1250 #12 0x7ffd062febb8 in NS_ProcessNextEvent \src\xpcom\threads\nsThreadUtils.cpp:486 #13 0x7ffd062fe0f5 in nsThreadManager::SpinEventLoopUntilInternal \src\xpcom\threads\nsThreadManager.cpp:624 #14 0x7ffd16e449f1 in XPTC__InvokebyIndex+0x71 (C:\Users\Administrator\builds\asan\xul.dll+0x190e949f1) #15 0x7ffd083b0a51 in XPCWrappedNative::CallMethod \src\js\xpconnect\src\XPCWrappedNative.cpp:1149 #16 0x7ffd083b831e in XPC_WN_CallMethod \src\js\xpconnect\src\XPCWrappedNativeJSOps.cpp:946 #17 0x7ffd141203e4 in js::InternalCallOrConstruct \src\js\src\vm\Interpreter.cpp:548 #18 0x7ffd141235da in InternalCall \src\js\src\vm\Interpreter.cpp:617 #19 0x7ffd141046e4 in Interpret \src\js\src\vm\Interpreter.cpp:3119 #20 0x7ffd140e6f6a in js::RunScript \src\js\src\vm\Interpreter.cpp:423 #21 0x7ffd14120cb5 in js::InternalCallOrConstruct \src\js\src\vm\Interpreter.cpp:589 #22 0x7ffd141235da in InternalCall \src\js\src\vm\Interpreter.cpp:617 #23 0x7ffd14123812 in js::Call \src\js\src\vm\Interpreter.cpp:634 #24 0x7ffd14771e0f in js::fun_apply \src\js\src\vm\JSFunction.cpp:1190 #25 0x7ffd141203e4 in js::InternalCallOrConstruct \src\js\src\vm\Interpreter.cpp:548 #26 0x7ffd141235da in InternalCall \src\js\src\vm\Interpreter.cpp:617 #27 0x7ffd141046e4 in Interpret \src\js\src\vm\Interpreter.cpp:3119 #28 0x7ffd140e6f6a in js::RunScript \src\js\src\vm\Interpreter.cpp:423 #29 0x7ffd14120cb5 in js::InternalCallOrConstruct \src\js\src\vm\Interpreter.cpp:589 #30 0x7ffd141235da in InternalCall \src\js\src\vm\Interpreter.cpp:617 #31 0x7ffd14123812 in js::Call \src\js\src\vm\Interpreter.cpp:634 #32 0x7ffd14300566 in JS_CallFunctionValue \src\js\src\jsapi.cpp:2655 #33 0x7ffd0839e934 in nsXPCWrappedJS::CallMethod \src\js\xpconnect\src\XPCWrappedJSClass.cpp:956 #34 0x7ffd0632e966 in PrepareAndDispatch \src\xpcom\reflect\xptcall\md\win32\xptcstubs_x86_64.cpp:181 #35 0x7ffd16e44a48 in SharedStub+0x48 (C:\Users\Administrator\builds\asan\xul.dll+0x190e94a48) #36 0x7ffd13e6d039 in nsXREDirProvider::DoStartup \src\toolkit\xre\nsXREDirProvider.cpp:952 #37 0x7ffd13e1aa61 in XREMain::XRE_mainRun \src\toolkit\xre\nsAppRunner.cpp:4397 #38 0x7ffd13e1f42d in XREMain::XRE_main \src\toolkit\xre\nsAppRunner.cpp:4721 #39 0x7ffd13e212b8 in XRE_main \src\toolkit\xre\nsAppRunner.cpp:4802 #40 0x7ff7e3d9234e in NS_internal_main \src\browser\app\nsBrowserApp.cpp:308 #41 0x7ff7e3d91501 in wmain \src\toolkit\xre\nsWindowsWMain.cpp:131 #42 0x7ff7e3e8da67 in __scrt_common_main_seh f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl:288 #43 0x7ffd4c097bd3 in BaseThreadInitThunk+0x13 (C:\Windows\System32\KERNEL32.DLL+0x180017bd3) #44 0x7ffd4c1ecee0 in RtlUserThreadStart+0x20 (C:\Windows\SYSTEM32\ntdll.dll+0x18006cee0) SUMMARY: AddressSanitizer: stack-buffer-overflow Z:\task_1573467939\fetches\llvm-project\llvm\projects\compiler-rt\lib\sanitizer_common\sanitizer_common_interceptors.inc:365 in __asan_wrap_strlen Shadow bytes around the buggy address: 0x01c4f2f3fd50: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 0x01c4f2f3fd60: f8 f8 f2 f2 f8 f3 f3 f3 00 00 00 00 00 00 00 00 0x01c4f2f3fd70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x01c4f2f3fd80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 f8 f2 f2 f2 0x01c4f2f3fd90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x01c4f2f3fda0:[f2]f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 0x01c4f2f3fdb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x01c4f2f3fdc0: 00 00 00 00 f2 f2 f2 f2 f2 f2 f2 f2 00 00 f2 f2 0x01c4f2f3fdd0: 00 00 f2 f2 04 f2 f8 f8 f2 f2 f8 f8 f8 f8 f8 f8 0x01c4f2f3fde0: f8 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 0x01c4f2f3fdf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc Thread T93 created by T0 here: #0 0x7ffd1c86095c in __asan_wrap_CreateThread Z:\task_1573467939\fetches\llvm-project\llvm\projects\compiler-rt\lib\asan\asan_win.cc:146 #1 0x7ffd07473a7c in PlatformThread::Create \src\ipc\chromium\src\base\platform_thread_win.cc:57 #2 0x7ffd074afb0b in base::Thread::StartWithOptions \src\ipc\chromium\src\base\thread.cc:97 #3 0x7ffd0e5187de in mozilla::media::LambdaRunnable<`lambda at z:/build/build/src/dom/media/systemservices/CamerasParent.cpp:1069:43'>::Run \src\dom\media\systemservices\MediaUtils.h:73 #4 0x7ffd062f4c47 in nsThread::ProcessNextEvent \src\xpcom\threads\nsThread.cpp:1250 #5 0x7ffd062febb8 in NS_ProcessNextEvent \src\xpcom\threads\nsThreadUtils.cpp:486 #6 0x7ffd0755dd4f in mozilla::ipc::MessagePump::Run \src\ipc\glue\MessagePump.cpp:88 #7 0x7ffd0749e09e in MessageLoop::RunHandler \src\ipc\chromium\src\base\message_loop.cc:308 #8 0x7ffd0749de35 in MessageLoop::Run \src\ipc\chromium\src\base\message_loop.cc:290 #9 0x7ffd0fad46ca in nsBaseAppShell::Run \src\widget\nsBaseAppShell.cpp:137 #10 0x7ffd0fc6e858 in nsAppShell::Run \src\widget\windows\nsAppShell.cpp:406 #11 0x7ffd13b47095 in nsAppStartup::Run \src\toolkit\components\startup\nsAppStartup.cpp:276 #12 0x7ffd13e1b4fa in XREMain::XRE_mainRun \src\toolkit\xre\nsAppRunner.cpp:4586 #13 0x7ffd13e1f42d in XREMain::XRE_main \src\toolkit\xre\nsAppRunner.cpp:4721 #14 0x7ffd13e212b8 in XRE_main \src\toolkit\xre\nsAppRunner.cpp:4802 #15 0x7ff7e3d9234e in NS_internal_main \src\browser\app\nsBrowserApp.cpp:308 #16 0x7ff7e3d91501 in wmain \src\toolkit\xre\nsWindowsWMain.cpp:131 #17 0x7ff7e3e8da67 in __scrt_common_main_seh f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl:288 #18 0x7ffd4c097bd3 in BaseThreadInitThunk+0x13 (C:\Windows\System32\KERNEL32.DLL+0x180017bd3) #19 0x7ffd4c1ecee0 in RtlUserThreadStart+0x20 (C:\Windows\SYSTEM32\ntdll.dll+0x18006cee0) ```
1,598,605
14,504,460
The attached crash information was submitted via the ASan Nightly Reporter on mozilla-central-asan-nightly revision 72.0a1-20191119215132-https://hg.mozilla.org/mozilla-central/rev/92ff4d99f814bab4ddcb5ad7077e2c407b41c9d0. For detailed crash information, see attachment. I received 5 reports of this within a very short timeframe and all are anonymous.
1,598,822
14,505,993
Created attachment 9111005 Bugged version of Firefox Nightly on Linux 64-bit User Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/13.0 Safari/605.1.15 Epiphany/605.1.15 Steps to reproduce: It happened after an update no other cause. Actual results: When I tried to click on the browser, if I had another window open it would flip to another window. If it was the only window open the browser does not respond to anything. Expected results: The browser should have responded and stayed in view.
1,599,635
14,512,999
Created attachment 9111786 browser-console.log Was editing JSFiddle and was focused on the output iframe. On refresh, Inspector markup view was empty.
1,624,944
14,715,979
It looks as if Firefox has lost its ability to call WebGL 2 entry points with SAB as an input(?): STR: 1. in about:config, enable dom.postMessage.sharedArrayBuffer.bypassCOOP_COEP.insecure.enabled=true 2. Visit http://clb.confined.space/dump/unity/tiny3d-asmjs-tiny3d/Tiny3D.html The page will fail with ``` TypeError: WebGL2RenderingContext.uniformMatrix4fv: Float32Array branch of (Float32Array or sequence) can't be a SharedArrayBuffer or an ArrayBufferView backed by a SharedArrayBuffer ``` Basically the code is calling ```js glUniformMatrix4fv: function(location, count, transpose, value) { GLctx.uniformMatrix4fv(GL.uniforms[location], !!transpose, HEAPF32, value>>2, count*16); } ``` Observed in FF Nightly 76.0a1 (2020-03-24) (64-bit)
1,625,404
14,719,257
This the security-bug version of bug 1624451. Unsure if we want to tip our hand and mark that one as a sec bug, since it started public. webgl.copyTexSubImage supports reading from areas partially (or fully) outside the source resource. Since we would get undefined values (sec issue!) if we read out-of-bounds like this, we find the common subrect between the source resource size and the selected read rect. The WebGL spec defines out-of-bounds pixel reads as if they read zeros. However, in this case, and with a destination texture image/slice which has never been initialized, and currently contains uninitialized contents[1], we neglect to initialize (oops) the contents of the image/slice before (safely) copying the valid source subrect onto it. This results in a careful copy into part of an otherwise-uninitialized resource, and the whole resource slice then is then marked incorrectly as initialized. (Subsequent reads from the resource will treat it as initialized, leaking the uninitialized contents) The modern security model for GPU resource contents *should generally* restrict uninitialized data to within the process, not necessarily just from within the OpenGL context. Unfortunately for us, this means data could leak in from other GL contexts in the process. On Linux/Mac/Android, this should be only WebGL, and maybe Flash/Plugins, and we'll check if e.g. WebRender is affected.[2] Not all drivers we run WebGL on can be called "modern", so I have some concern that *leaked contents might be system-wide*, especially on older systems. General exploit: 1. create a large uninitialized texture resource 2. copyTexSubImage from out-of-bounds of a source resource 3. read back the uninitialized/leaked contents 4. Exfil interesting leaked contents? The hardest part here is (4), because: * The possible sources of leaks are other GPU resources on the machine, probably (but not certainly) in-process only. * It's hard to detect interesting contents to leak. * Maybe one could try to detect text, but you'll get an exfiltration dump mostly full of reddit. * Trying to exfiltrate all data is not trivial, because it's all (large) images. Due to the difficulty of an effective exfil path, I considered sec-medium, but sec-high seems safer because the core exploit up until exfil is easy, and exfil may be easy if you can afford to stream out a ton of images. Non-minimal testcase: https://www.khronos.org/registry/webgl/sdk/tests/conformance/misc/uninitialized-test.html?webglVersion=1&quiet=0&quick=1 This has a high false-negative rate, so you may need to refresh a number of times before you see a (true-positive) failure. (in red) [1]: Resource contents in WebGL are generally lazily initialized for performance reasons. On use, we lazily initialize the contents unless we can be sure the work would be redundant. [2]: jrmuizel, do you know of any other GPU contexts in the client process?
1,625,508
14,720,126
**Affected versions** * Latest Nightly 76.0a1 **Unaffected versions** * Firefox 75.0b10 * Firefox 74.0 **Affected platforms** * Windows 10 64bit **Unaffected platforms** * macOS 10.15 * Ubuntu 18.04 64bit **Steps to reproduce** 1. Visit https://hangouts.google.com/ or https://www.roundee.io/ 2. Join a room and allow the website to use the microphone (and camera if you have one, I did not) 3. Microphone does not work (I only could determine this if more then 1 person was in that call). **Expected result** * Microphone works without issues. **Actual result** * Microphone does not work. **Regression range** * First bad: 89e9e903 * Last good: 64935f92 * Pushlog: https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=64935f926183a4e3f89888db8fac62995f990fc5&tochange=89e9e9039a49b607f5a7bf64c53176a455cc14d9 * Potential regressor: https://bugzilla.mozilla.org/show_bug.cgi?id=1557282. Not sure if this is the right regressor so needinfo on Bob Owen to check if this is correct or not. **Additional notes** * I used a jack powered earphone with a splitter for audio and mic connectors. * I set the severity to Critical keeping in mind all that's happening now with Covid-19 and how many people are expected to use conferences. Plus we are late in the cycle, having this in beta will impact more users. * Other services could be also affected by this issue.
1,619,229
14,671,095
+++ This bug was initially created as a clone of Bug #1616535 +++ Assertion failure: !cx->runtime()->jitRuntime()->disallowArbitraryCode(), at /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:416 Bughunter has seen this 3 times on 2020-02-28 around 11 AM PT with builds on Linux from mozversion INFO | application_buildid: 20200228161940 mozversion INFO | application_changeset: fc9d28ae4655254a6ef8a57ac6577545b2a42ca7 with url https://news.google.com/?hl=es-419&gl=MX&ceid=MX:es-419 I have not been able to reproduce this manually however. It is probably related to an ad which was served. Perhaps we can target this code with the fuzzers again. Stack trace attachment 9130091
1,620,203
14,677,798
The following testcase crashes on mozilla-central revision 20200305-2e1a978b09d7 (build with (buildFlags not available), run with --fuzzing-safe --no-threads --ion-warmup-threshold=1 --baseline-warmup-threshold=0): "use strict"; var target = {}; var proxy = new Proxy(target, { defineProperty(set, [...x27], ... [{p10: q34}]) {} }); Reflect.defineProperty(proxy, "test", {writable: false}) Backtrace: received signal SIGSEGV, Segmentation fault. 0x00005555564c0881 in js::jit::GetPropIRGenerator::tryAttachDenseElement(JS::Handle<JSObject*>, js::jit::ObjOperandId, unsigned int, js::jit::Int32OperandId) () #0 0x00005555564c0881 in js::jit::GetPropIRGenerator::tryAttachDenseElement(JS::Handle<JSObject*>, js::jit::ObjOperandId, unsigned int, js::jit::Int32OperandId) () #1 0x00005555564bbfc0 in js::jit::GetPropIRGenerator::tryAttachStub() () #2 0x000055555639e8e6 in js::jit::TryAttachGetPropStub(char const*, JSContext*, js::jit::BaselineFrame*, js::jit::ICFallbackStub*, js::jit::CacheKind, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::Handle<JS::Value>) () #3 0x000055555639d86f in js::jit::DoGetElemFallback(JSContext*, js::jit::BaselineFrame*, js::jit::ICGetElem_Fallback*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::MutableHandle<JS::Value>) () #4 0x0000054a53184863 in ?? () [...] #28 0x0000000000000000 in ?? () rax 0x555556e205ff 93825018234367 rbx 0x7fffffff8430 140737488323632 rcx 0x555557ef4850 93825035880528 rdx 0x0 0 rsi 0x7ffff6efd770 140737336301424 rdi 0x7ffff6efc540 140737336296768 rbp 0x7fffffff8340 140737488323392 rsp 0x7fffffff8300 140737488323328 r8 0x7ffff6efd770 140737336301424 r9 0x7ffff7f9cd00 140737353731328 r10 0x58 88 r11 0x7ffff6ba47a0 140737332791200 r12 0x0 0 r13 0x0 0 r14 0x7ffff5e27000 140737318645760 r15 0x0 0 rip 0x5555564c0881 <js::jit::GetPropIRGenerator::tryAttachDenseElement(JS::Handle<JSObject*>, js::jit::ObjOperandId, unsigned int, js::jit::Int32OperandId)+145> => 0x5555564c0881 <_ZN2js3jit18GetPropIRGenerator21tryAttachDenseElementEN2JS6HandleIP8JSObjectEENS0_12ObjOperandIdEjNS0_14Int32OperandIdE+145>: movl $0x28b,0x0 0x5555564c088c <_ZN2js3jit18GetPropIRGenerator21tryAttachDenseElementEN2JS6HandleIP8JSObjectEENS0_12ObjOperandIdEjNS0_14Int32OperandIdE+156>: callq 0x5555557ef05e <abort> Marking s-s because this assertion can indicate a critical JIT bug.
1,620,290
14,678,368
The following testcase crashes on mozilla-central revision 20200305-2e1a978b09d7 (build with --enable-debug, run with --fuzzing-safe --no-threads): load("wasm-module-builder.js"); var module = new WasmModuleBuilder(); module.addMemory(); module.addFunction([-5.2, -91.2], kSig_v_v).addBody([ undefined | false, kExprI32StoreMem, 0, 0xFF, 0xFF, 0x7A ]).exportAs("main"); var instance = module.instantiate(); instance.exports.main(); Backtrace: Program terminated with signal SIGSEGV, Segmentation fault. #0 0x000055dac662ced6 in JSAtom* AtomizeUTF8OrWTF8Chars<JS::UTF8Chars>(JSContext*, char const*, unsigned long) () #1 0x000055dac727120c in js::wasm::Instance::getFuncDisplayAtom(JSContext*, unsigned int) const () #2 0x000055dac7270f00 in js::wasm::WasmFrameIter::functionDisplayAtom() const () #3 0x000055dac6738f20 in js::SavedStacks::insertFrames(JSContext*, JS::MutableHandle<js::SavedFrame*>, mozilla::Variant<JS::AllFrames, JS::MaxFrames, JS::FirstSubsumedFrame>&&) () #4 0x000055dac673877b in js::SavedStacks::saveCurrentStack(JSContext*, JS::MutableHandle<js::SavedFrame*>, mozilla::Variant<JS::AllFrames, JS::MaxFrames, JS::FirstSubsumedFrame>&&) () #5 0x000055dac6467621 in JS::CaptureCurrentStack(JSContext*, JS::MutableHandle<JSObject*>, mozilla::Variant<JS::AllFrames, JS::MaxFrames, JS::FirstSubsumedFrame>&&) () #6 0x000055dac646c0d5 in js::ErrorToException(JSContext*, JSErrorReport*, JSErrorFormatString const* (*)(void*, unsigned int), void*) () #7 0x000055dac66334d2 in js::ReportErrorNumberVA(JSContext*, unsigned int, JSErrorFormatString const* (*)(void*, unsigned int), void*, unsigned int, js::ErrorArgumentsType, __va_list_tag*) () #8 0x000055dac64456cf in JS_ReportErrorNumberUTF8(JSContext*, JSErrorFormatString const* (*)(void*, unsigned int), void*, unsigned int, ...) () #9 0x000055dac71f7a2f in WasmHandleTrap() () #10 0x00001dfc51300208 in ?? () #11 0x0000000000000000 in ?? () rax 0x55dac78e64fd 94398139229437 rbx 0x7f0dd1727000 139697325240320 rcx 0x55dac892a850 94398156286032 rdx 0x0 0 rsi 0x7f0dd27e0770 139697342777200 rdi 0x7f0dd27df540 139697342772544 rbp 0x7fff2fb16fc0 140733993545664 rsp 0x7fff2fb16e40 140733993545280 r8 0x7f0dd27e0770 139697342777200 r9 0x7f0dd3883d00 139697360223488 r10 0x58 88 r11 0x7f0dd24877a0 139697339266976 r12 0x7f0dd1727000 139697325240320 r13 0x7f0dd173f0a0 139697325338784 r14 0x2 2 r15 0x7f0dd1727000 139697325240320 rip 0x55dac662ced6 <JSAtom* AtomizeUTF8OrWTF8Chars<JS::UTF8Chars>(JSContext*, char const*, unsigned long)+2294> => 0x55dac662ced6 <_Z22AtomizeUTF8OrWTF8CharsIN2JS9UTF8CharsEEP6JSAtomP9JSContextPKcm+2294>: movl $0x425,0x0 0x55dac662cee1 <_Z22AtomizeUTF8OrWTF8CharsIN2JS9UTF8CharsEEP6JSAtomP9JSContextPKcm+2305>: callq 0x55dac622505e <abort> Marking s-s because it is not immediately clear to me what the consequences of violating that assert would be.
1,620,314
14,678,536
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:75.0) Gecko/20100101 Firefox/75.0 Steps to reproduce: A user reports [PRINT no longer works](https://groups.google.com/forum/?fromgroups#!topic/mozilla.support.thunderbird/64TXLXNeD9c). I tested with Build ID: 20200305093511 and with the previous build on Ubuntu 18.04.3 LTS and see the same problem. Select a message in the Thread Pane. Select Print from the menu. Actual results: No response from the printer. Print manager application indicates that there are no active jobs. Expected results: Message should have been printed.
1,621,684
14,689,549
The audio-playing wakelock is used by the ProcessPriorityManager to know not to lower the process priority of background tabs that are playing audio. I just checked builds going back to when this first landed, and it seems as if the audio wakelock _never_ was being set. This means that background audio tabs always get low process priority _unless_ they're playing video (at which time they are set to "below normal"). Strangely, it looks like the audio wakelocks _are_ being set on my macOS device. Not sure why.
1,621,935
14,691,190
Created attachment 9132844 WebRequestFromFile.zip This is quite urgent because it affects badly any content blocker webextension (most obviously NoScript / uBlock), which are unable to "see", let alone block, any 3rd party request from locally opened files, including scripts. According to user reports, this is a 74 regression. __Steps to reproduce:__ 1. unzip the attached WebRequestFromFile.zip in a local directory and install the manifest.json it contains as a temporary addon and click the "Inspect" 2. Move the test.html file from the aforementioned directory to somewhere else outside (__not__ a subdirectory, see "Fun fact" below), and open it in Firefox 3. Check the console in the Toolbox - Extension tab __Actual results:__ No event is logged in the console. __Expected results:__ The console should show two log lines, one for onBeforeRequest and the other for onHeadersReceived. __Fun fact that left me scraping my head for a while:__ If I opened test.html from file:///my/original/working/path/WebRequestFromFile/test.html or from a subdirectory, the bug was NOT reproducible (both events get logged). Wherever else I placed the file (either by moving, copying or symlinking it), other than there or in a subdirectory within, the bug was reliably reproducible. I've attempted any kind of variation (path length, path components, even just renaming the same directory with just one character change), but the mystery persisted. Then the enlightenment: I tried to move the temporary add-on path, rather than the file, and could confirm that the bug is not reproducible __if the HTML file is in the same path as the extension or in a subpath__ :D (bonus points to whomever can explain why).
1,622,749
14,697,828
This bug is for crash report bp-c7d6c59b-46c3-4a74-b1a7-9647a0200314. ``` Top 10 frames of crashing thread: 0 xul.dll mozilla::dom::ClientOpenWindow dom/clients/manager/ClientOpenWindowUtils.cpp:401 1 xul.dll mozilla::detail::ProxyFunctionRunnable<`lambda at Z:/task_1584182567/build/src/dom/clients/manager/ClientManagerService.cpp:568:22', mozilla::MozPromise<mozilla::dom::ClientOpResult, mozilla::CopyableErrorResult, 0> >::Run xpcom/threads/MozPromise.h:1456 2 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1220 3 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:481 4 xul.dll mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:87 5 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:308 6 xul.dll MessageLoop::Run ipc/chromium/src/base/message_loop.cc:290 7 xul.dll nsBaseAppShell::Run widget/nsBaseAppShell.cpp:137 8 xul.dll nsAppShell::Run widget/windows/nsAppShell.cpp:406 9 xul.dll nsAppStartup::Run toolkit/components/startup/nsAppStartup.cpp:271 ```
1,624,511
14,712,607
Created attachment 9135310 Screen Shot of a pinned tab that happened to be in the same process as a crashed one Twice in the last few days tab crashes on Nightly have caused total data loss (including the URL and session back/forward history) of all the tabs in that content process. This includes tabs that had been restored for a long time so it wasn't a race condition losing the URL while it's loading (there are known bugs about that). I clicked "Restore All Tabs" on the tab crashed page btw. I don't see anything relevant in the Browser Console. Notice in my screenshot that the tab title is "New Tab", the back and forward buttons are disabled and the address bar is blank. The only thing that remains is the favicon but I have no idea what bugs I had pinned since the favicons are the same… Expected result: I should never lose the session history from crashed tabs and I definitely shouldn't lose the tab's URL. I didn't try to reproduce the problem in Safe Mode. I filed this is Tabbed Browser, not Session Restore since IMO the URL in the address bar and back/forward history shouldn't have been lost in the first place. [Tracking Requested - why for this release]: Tab data is lost upon content process crash… the whole point of session restore was to
1,631,331
14,764,411
This bug is for crash report bp-88ab7b43-bba5-4f43-859d-63f4d0200419. ``` Top 10 frames of crashing thread: 0 xul.dll RustMozCrash mozglue/static/rust/wrappers.cpp:16 1 xul.dll mozglue_static::panic_hook mozglue/static/rust/lib.rs:89 2 xul.dll core::ops::function::Fn::call<fn ../f3e1a954d2ead4e2fc197c7da7d71e6c61bad196/src/libcore/ops/function.rs:232 3 xul.dll std::panicking::rust_panic_with_hook ../f3e1a954d2ead4e2fc197c7da7d71e6c61bad196//src/libstd/panicking.rs:475 4 xul.dll std::panicking::begin_panic_handler ../f3e1a954d2ead4e2fc197c7da7d71e6c61bad196//src/libstd/panicking.rs:375 5 xul.dll core::panicking::panic_fmt ../f3e1a954d2ead4e2fc197c7da7d71e6c61bad196//src/libcore/panicking.rs:84 6 xul.dll core::result::unwrap_failed ../f3e1a954d2ead4e2fc197c7da7d71e6c61bad196//src/libcore/result.rs:1188 7 xul.dll webrender::renderer::Renderer::render_impl gfx/wr/webrender/src/renderer.rs:3407 8 xul.dll webrender::renderer::Renderer::render gfx/wr/webrender/src/renderer.rs:3185 9 xul.dll webrender_bindings::bindings::wr_renderer_render gfx/webrender_bindings/src/bindings.rs:599 ``` The oldest buildid with this crash is 20200414094457. The raw crash reason is: ``` called `Result::unwrap()` on an `Err` value: Shader(Compilation("gpu_cache_update", "")) ``` From what I can tell we should be failing around [here](https://searchfox.org/mozilla-central/rev/a4d62e09a4c46aef918667fa759bf9ae898dc258/gfx/wr/webrender/src/renderer.rs#1489-1493).
1,633,471
14,782,025
Created attachment 9143711 6ef347da-94d8-49f8-bbe3-49b200200420-upload_file_minidump_browser.log This bug is for crash report bp-6ef347da-94d8-49f8-bbe3-49b200200420. ``` Top 10 frames of crashing thread: 0 mozglue.dll replace_realloc memory/replace/phc/PHC.cpp:1265 1 @0x96e377 2 xul.dll static mozilla::dom::FeaturePolicyUtils::ForEachFeature dom/security/featurepolicy/FeaturePolicyUtils.cpp:92 3 xul.dll mozilla::dom::FeaturePolicy::InheritPolicy dom/security/featurepolicy/FeaturePolicy.cpp:42 4 xul.dll mozilla::dom::Document::InitFeaturePolicy dom/base/Document.cpp:3460 5 xul.dll mozilla::dom::Document::StartDocumentLoad dom/base/Document.cpp:3173 6 xul.dll nsHTMLDocument::StartDocumentLoad dom/html/nsHTMLDocument.cpp:463 7 xul.dll nsContentDLF::CreateInstance layout/build/nsContentDLF.cpp 8 xul.dll nsDocShell::NewContentViewerObj docshell/base/nsDocShell.cpp:7787 9 xul.dll nsDocShell::CreateContentViewer docshell/base/nsDocShell.cpp:7518 ``` This looks like a regression that started with buildid 20200416094846. I've attached a full stack trace for the main process.
1,634,339
14,788,343
This bug is for crash report bp-378dd1b6-e940-40d3-b374-f5a920200430. ``` Top 10 frames of crashing thread: 0 XUL nsDOMNavigationTiming::nsDOMNavigationTiming dom/base/nsDOMNavigationTiming.cpp:550 1 XUL std::__1::__function::__func<nsDocShell::ResumeRedirectedLoad /builds/worker/fetches/clang/include/c++/v1/functional:1707 2 XUL mozilla::dom::ChildProcessChannelListener::OnChannelReady /builds/worker/fetches/clang/include/c++/v1/functional:1860 3 XUL mozilla::dom::ContentChild::RecvCrossProcessRedirect dom/ipc/ContentChild.cpp:3498 4 XUL mozilla::dom::PContentChild::OnMessageReceived ipc/ipdl/PContentChild.cpp:12418 5 XUL mozilla::ipc::MessageChannel::DispatchMessage ipc/glue/MessageChannel.cpp:2186 6 XUL mozilla::ipc::MessageChannel::MessageTask::Run ipc/glue/MessageChannel.cpp:1989 7 XUL nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1200 8 XUL mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:87 9 XUL MessageLoop::Run ipc/chromium/src/base/message_loop.cc:290 ``` I've hit this tab crash randomly while trying to navigate to a local page (about:support) on macOS 10.14 I will investigate this further in order to find reliable STR. [Notes]: * From the other crash reports with this signature, it seems that this issue affects Windows and Ubuntu 20.04 as well. * Also this seems to go way back to 74.0 builds (per crash reports). * Feel free to change the component if this doesn't fit here
1,629,680
14,752,640
From Partner: When l choose Mozilla Options – General – Language – English - In this case both search entities – search bar and address bar – Google by default. My Windows set is English. Yet IP address is Moscow, Russia (double checked that). This should not be happening. Can we have someone help investigate? I can loop them in with her to see if there are some odd setting issues. Can we add there Yandex search by default, if IP locale is Russian?
1,608,118
14,582,471
`sender.replaceTrack` appears broken like out of a bad movie. STRs: 1. Open https://jsfiddle.net/jib1/yukbn0ep/ and allow camera 2. Check `☑ scramble` Expected result: - Video switches from camera (track 1) to consistent white noise (track 2) Actual result: - Tracks (Video and white noise) alternate rapidly, flickering back and forth forever. `scramble` switch stops working. Tested on Mac and Windows. Regression range: 8:34.06 INFO: Narrowed inbound regression window from [f02f44b9, 313e9635] (3 builds) to [7c1213a7, 313e9635] (2 builds) (~1 steps left) 8:34.06 INFO: No more inbound revisions, bisection finished. 8:34.06 INFO: Last good revision: 7c1213a74d2844a2da97228e4660ffd8711b9346 8:34.06 INFO: First bad revision: 313e96351327ad2a57182dc37743cedb1d8efa78 8:34.06 INFO: Pushlog: https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=7c1213a74d2844a2da97228e4660ffd8711b9346&tochange=313e96351327ad2a57182dc37743cedb1d8efa78 Since bug 1601034 got uplifted, this just went to release. 😞
1,608,256
14,583,491
The following testcase crashes on mozilla-central revision 20200107-e728bf01a2b6 (build with --enable-debug, run with --fuzzing-safe --no-threads --baseline-warmup-threshold=1 --ion-full-warmup-threshold=1 --blinterp-warmup-threshold=1): function foo(obj, x43, y62, z7) { obj.x43 = x43; } function bar() { var objz = { x43: 2 } for (var i89 = 0; i89 < 1100; i89++) { foo(/x/, 1, 2, 3); foo(objz, false, "bar", "foo"); } } bar(); Backtrace: received signal SIGSEGV, Segmentation fault. 0x0000555556731e08 in js::jit::MacroAssembler::initGCSlots(js::jit::Register, js::jit::Register, js::jit::NativeTemplateObject const&, bool) () #0 0x0000555556731e08 in js::jit::MacroAssembler::initGCSlots(js::jit::Register, js::jit::Register, js::jit::NativeTemplateObject const&, bool) () #1 0x000055555672fac1 in js::jit::MacroAssembler::initGCThing(js::jit::Register, js::jit::Register, js::jit::TemplateObject const&, bool) () #2 0x0000555556536b58 in js::jit::CodeGenerator::visitRegExp(js::jit::LRegExp*) () #3 0x0000555556558784 in js::jit::CodeGenerator::generateBody() () #4 0x0000555556595ff3 in js::jit::CodeGenerator::generate() () #5 0x00005555565d0981 in js::jit::GenerateCode(js::jit::MIRGenerator*, js::jit::LIRGraph*) () #6 0x00005555565d0b2b in js::jit::CompileBackEnd(js::jit::MIRGenerator*) () #7 0x00005555565d341f in js::jit::Compile(JSContext*, JS::Handle<JSScript*>, js::jit::BaselineFrame*, unsigned int, unsigned char*, bool) () #8 0x00005555565d4122 in IonCompileScriptForBaseline(JSContext*, js::jit::BaselineFrame*, unsigned int, unsigned char*) () #9 0x00005555565d46fd in js::jit::IonCompileScriptForBaselineOSR(JSContext*, js::jit::BaselineFrame*, unsigned int, unsigned char*, js::jit::IonOsrTempData**) () #10 0x00001194eb2c7877 in ?? () #11 0x00007fffffffb6c8 in ?? () #12 0x00007fffffffb640 in ?? () #13 0x0000000000000000 in ?? () rax 0x555556fbeeab 93825019932331 rbx 0x1 1 rcx 0x555557f1d838 93825036048440 rdx 0x0 0 rsi 0x7ffff6efd770 140737336301424 rdi 0x7ffff6efc540 140737336296768 rbp 0x7fffffffb080 140737488334976 rsp 0x7fffffffb010 140737488334864 r8 0x7ffff6efd770 140737336301424 r9 0x7ffff7f98d00 140737353714944 r10 0x58 88 r11 0x7ffff6ba47a0 140737332791200 r12 0x4 4 r13 0xfff9800000000000 -1829587348619264 r14 0x4 4 r15 0x7ffff5cfc040 140737317421120 rip 0x555556731e08 <js::jit::MacroAssembler::initGCSlots(js::jit::Register, js::jit::Register, js::jit::NativeTemplateObject const&, bool)+1784> => 0x555556731e08 <_ZN2js3jit14MacroAssembler11initGCSlotsENS0_8RegisterES2_RKNS0_20NativeTemplateObjectEb+1784>: movl $0x432,0x0 0x555556731e13 <_ZN2js3jit14MacroAssembler11initGCSlotsENS0_8RegisterES2_RKNS0_20NativeTemplateObjectEb+1795>: callq 0x5555557f7fc2 <abort> Marking s-s because this JIT assert does not look safe.
1,608,785
14,588,763
The following testcase crashes on mozilla-central revision 9f55d547e196+ (build with --enable-gczeal --enable-optimize --enable-debug, run with --fuzzing-safe --no-threads): var g92 = newGlobal({ newCompartment: true }); var dbg = Debugger(g92); dbg.onNewScript = function(s3) {}; g92.eval(` function f96() { class l24 {} f96([, 2]); } f96(); `); Backtrace: received signal SIGSEGV, Segmentation fault. #0 js::RunScript (cx=0x7ffff5f27000, state=...) at js/src/vm/Interpreter.cpp:393 #1 0x0000555556bc6e91 in js::InternalCallOrConstruct (cx=0x7ffff5f27000, args=..., construct=js::NO_CONSTRUCT, reason=(unknown: -177096704)) at js/src/vm/Interpreter.cpp:583 #2 0x0000555556bd7f79 in js::Call (cx=<optimized out>, fval=..., thisv=..., args=..., rval=..., reason=js::CallReason::Call) at js/src/vm/Interpreter.cpp:628 #3 js::Call (cx=0x7ffff5f27000, fval=..., thisObj=<optimized out>, arg0=..., rval=...) at js/src/vm/Interpreter.h:111 #4 0x000055555729d445 in js::Debugger::fireNewScript (this=0x7ffff5f57800, cx=0x7ffff5f27000, scriptReferent=...) at js/src/debugger/Debugger.cpp:2198 #5 0x000055555729f569 in js::DebugAPI::slowPathOnNewScript(JSContext*, JS::Handle<JSScript*>)::$_16::operator()(js::Debugger*) const (this=<optimized out>, dbg=<optimized out>) at js/src/debugger/Debugger.cpp:2337 #6 js::Debugger::dispatchHook<js::DebugAPI::slowPathOnNewScript(JSContext*, JS::Handle<JSScript*>)::$_15, js::DebugAPI::slowPathOnNewScript(JSContext*, JS::Handle<JSScript*>)::$_16>(JSContext*, js::DebugAPI::slowPathOnNewScript(JSContext*, JS::Handle<JSScript*>)::$_15, js::DebugAPI::slowPathOnNewScript(JSContext*, JS::Handle<JSScript*>)::$_16) (cx=<optimized out>, hookIsEnabled=..., fireHook=...) at js/src/debugger/Debugger.cpp:2265 #7 js::DebugAPI::slowPathOnNewScript (cx=0x7ffff5f27000, script=...) at js/src/debugger/Debugger.cpp:2330 #8 0x0000555556bb1281 in js::MakeDefaultConstructor (cx=0x7ffff5f27000, script=..., pc=0x7ffff5f02df2 "q", proto=...) at js/src/vm/Interpreter.cpp:324 #9 0x0000087bc8385e3d in ?? () #10 0x0000000000000000 in ?? () rax 0x555555a019b7 93824997136823 rbx 0x2 2 rcx 0x55555838c380 93825040696192 rdx 0x0 0 rsi 0x7ffff6eeb770 140737336227696 rdi 0x7ffff6eea540 140737336223040 rbp 0x7ffffffcac80 140737488137344 rsp 0x7ffffffcac30 140737488137264 r8 0x7ffff6eeb770 140737336227696 r9 0x7ffff7fe6c80 140737354034304 r10 0x58 88 r11 0x7ffff6b927a0 140737332717472 r12 0x7ffff5f27000 140737319694336 r13 0x7ffffffcad60 140737488137568 r14 0x7ffffffcacd0 140737488137424 r15 0xfffdffffffffffff -562949953421313 rip 0x555556bb1c07 <js::RunScript(JSContext*, js::RunState&)+919> => 0x555556bb1c07 <js::RunScript(JSContext*, js::RunState&)+919>: movl $0x18a,0x0 0x555556bb1c12 <js::RunScript(JSContext*, js::RunState&)+930>: callq 0x555556b48be0 <abort()> Hiding based on jandem's request. Since content can't access the debugger, this probably isn't as severe as the other variants of this bug we found.
1,609,166
14,591,715
STEPS TO REPRODUCE 1. In a fresh profile from the toolbar menu, select Sign in to Firefox (Turn on Sync) 2. Create a new account but do not verify 3. Notice that browser enters "verification required" state 4. Enter verification code EXPECTED RESULTS * Sync becomes verified and starts working ACTUAL RESULTS * Remains in "verification required" state until user selects "Resend Verification" in sync prefs
1,610,023
14,598,233
I just noticed a problem with the display of messages in Thunderbird 74.0a1 20200117095219 on Fedora 31 x86_64. It appeared I had sent a personal email and accidentally included [email protected], [email protected] and [email protected] in the To: list when I sent it. I was mortified but on closer investigation the message did not appear in the news groups or mailing lists and it was a red-herring. On closer inspection of my emails, I found every email showed these extra email addresses in the To: list even though the view source for the email did not show them. Quitting Thunderbird and restarting resolved the issue. I did see a lot of "XUL box for mail-messageid element contained an inline #text child, forcing all its children to be wrapped in a block." messages in the error console. I can't for certain blame it on today's build since it is possible I missed it since I don't normally read mail I've already sent. I don't have steps to reproduce but I'll comment here if I do.
1,603,055
14,540,487
Created attachment 9115128 pocs.zip Hello, There is a Type confusion between BigInt and Object Vulnerability in Firefox. Tested Platforms: 1)Ubuntu 64-bit 16.04.3 (Memory 8G)+ firefox release version nightly 71.0 (64-bit) When using firefox to load the poc.html, it manifests itself in the form of the following crash: ---cut--- [----------------------------------registers-----------------------------------] RAX: 0x7ffc8dd921f0 --> 0x2ac4b96192040 RBX: 0xac3e674300ed4900 RCX: 0xac3e674300ed4900 RDX: 0x7ffc8dd9208c --> 0x8dd921f000007ffc RSI: 0x7ffc8dd921f0 --> 0x2ac4b96192040 RDI: 0x2ac4b96192040 RBP: 0x7ffc8dd91fb0 --> 0x7ffc8dd91fd0 --> 0x7ffc8dd91ff0 --> 0x7ffc8dd92040 --> 0x7ffc8dd920a0 --> 0x7ffc8dd920f0 (--> ...) RSP: 0x7ffc8dd91fb0 --> 0x7ffc8dd91fd0 --> 0x7ffc8dd91ff0 --> 0x7ffc8dd92040 --> 0x7ffc8dd920a0 --> 0x7ffc8dd920f0 (--> ...) RIP: 0x7fdb2df3367c (<js::GetObjectClass(JSObject const*)+12>: mov rdi,QWORD PTR [rdi]) R8 : 0xac3e674300ed4900 R9 : 0x0 R10: 0x7ffc8dd91c08 --> 0x7ffc8dd92410 --> 0x34a50a6004a0 --> 0x2c4b9615d610 --> 0x7fdb39940c70 --> 0x7fdb37415616 (--> ...) R11: 0xac3e674300ed4900 R12: 0x8 R13: 0x7fdb296bc098 --> 0xfff9800000000000 R14: 0x7fdb2a05c601 --> 0x2560000000b R15: 0x1 EFLAGS: 0x10206 (carry PARITY adjust zero sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7fdb2df33671 <js::GetObjectClass(JSObject const*)+1>: mov rbp,rsp 0x7fdb2df33674 <js::GetObjectClass(JSObject const*)+4>: mov QWORD PTR [rbp-0x8],rdi 0x7fdb2df33678 <js::GetObjectClass(JSObject const*)+8>: mov rdi,QWORD PTR [rbp-0x8] => 0x7fdb2df3367c <js::GetObjectClass(JSObject const*)+12>: mov rdi,QWORD PTR [rdi] 0x7fdb2df3367f <js::GetObjectClass(JSObject const*)+15>: mov rax,QWORD PTR [rdi] 0x7fdb2df33682 <js::GetObjectClass(JSObject const*)+18>: pop rbp 0x7fdb2df33683 <js::GetObjectClass(JSObject const*)+19>: ret 0x7fdb2df33684: nop WORD PTR cs:[rax+rax*1+0x0] [------------------------------------stack-------------------------------------] 0000| 0x7ffc8dd91fb0 --> 0x7ffc8dd91fd0 --> 0x7ffc8dd91ff0 --> 0x7ffc8dd92040 --> 0x7ffc8dd920a0 --> 0x7ffc8dd920f0 (--> ...) 0008| 0x7ffc8dd91fb8 --> 0x7fdb2df56165 (<js::IsProxy(JSObject const*)+21>: mov rdi,rax) 0016| 0x7ffc8dd91fc0 --> 0x10000002a1a6c78 0024| 0x7ffc8dd91fc8 --> 0x2ac4b96192040 0032| 0x7ffc8dd91fd0 --> 0x7ffc8dd91ff0 --> 0x7ffc8dd92040 --> 0x7ffc8dd920a0 --> 0x7ffc8dd920f0 --> 0x7ffc8dd92240 (--> ...) 0040| 0x7ffc8dd91fd8 --> 0x7fdb34b04515 (<JSObject::is<js::ProxyObject>() const+21>: and al,0x1) 0048| 0x7ffc8dd91fe0 --> 0x7ffc8dd92208 --> 0xfffcac4b96192040 0056| 0x7ffc8dd91fe8 --> 0x2ac4b96192040 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGSEGV 0x00007fdb2df3367c in js::GetObjectClass (obj=0x2ac4b96192040) at /home/bo13oy/Desktop/firefox_build/mozilla-release/objdir-frontend/dist/include/jsfriendapi.h:613 613 return reinterpret_cast<const shadow::Object*>(obj)->group->clasp; gdb-peda$ gdb-peda$ bt #0 0x00007fdb2df3367c in js::GetObjectClass (obj=0x2ac4b96192040) at /home/bo13oy/Desktop/firefox_build/mozilla-release/objdir-frontend/dist/include/jsfriendapi.h:613 #1 0x00007fdb2df56165 in js::IsProxy (obj=0x2ac4b96192040) at /home/bo13oy/Desktop/firefox_build/mozilla-release/objdir-frontend/dist/include/js/Proxy.h:381 #2 0x00007fdb34b04515 in JSObject::is<js::ProxyObject> (this=0x2ac4b96192040) at /home/bo13oy/Desktop/firefox_build/mozilla-release/js/src/vm/ProxyObject.h:148 #3 0x00007fdb34c7c815 in js::GetBuiltinClass (cx=0x7fdb2a02a000, obj=..., cls=0x7ffc8dd9208c) at /home/bo13oy/Desktop/firefox_build/mozilla-release/js/src/jsfriendapi.cpp:264 #4 0x00007fdb34c3ef0e in IsGivenTypeObject (cx=0x7fdb2a02a000, obj=..., typeClass=@0x7ffc8dd920d4: js::ESClass::Array, isType=0x7ffc8dd921c7) at /home/bo13oy/Desktop/firefox_build/mozilla-release/js/src/jsapi.cpp:3124 #5 0x00007fdb34c3ee85 in JS_IsArrayObject (cx=0x7fdb2a02a000, obj=..., isArray=0x7ffc8dd921c7) at /home/bo13oy/Desktop/firefox_build/mozilla-release/js/src/jsapi.cpp:3134 #6 0x00007fdb2f170d70 in XPCArrayHomogenizer::GetTypeForArray (cx=0x7fdb2a02a000, array=..., length=0xc, resultType=0x7ffc8dd923d8, resultID=0x7ffc8dd92490) at /home/bo13oy/Desktop/firefox_build/mozilla-release/js/xpconnect/src/XPCVariant.cpp:191 #7 0x00007fdb2f170787 in XPCVariant::InitializeData (this=0x7fdb2a1a6c40, cx=0x7fdb2a02a000) at /home/bo13oy/Desktop/firefox_build/mozilla-release/js/xpconnect/src/XPCVariant.cpp:336 #8 0x00007fdb2f16fe93 in XPCVariant::newVariant (cx=0x7fdb2a02a000, aJSVal=...) at /home/bo13oy/Desktop/firefox_build/mozilla-release/js/xpconnect/src/XPCVariant.cpp:105 #9 0x00007fdb2f1946b1 in nsXPConnect::JSToVariant (this=0x7fdb2b91ed00, ctx=0x7fdb2a02a000, value=..., _retval=0x7ffc8dd92638) at /home/bo13oy/Desktop/firefox_build/mozilla-release/js/xpconnect/src/nsXPConnect.cpp:867 #10 0x00007fdb3232bad3 in txMozillaXSLTProcessor::SetParameter (this=0x7fdb29148280, aCx=0x7fdb2a02a000, aNamespaceURI=..., aLocalName=..., aValue=..., aRv=...) at /home/bo13oy/Desktop/firefox_build/mozilla-release/dom/xslt/xslt/txMozillaXSLTProcessor.cpp:1114 #11 0x00007fdb30c7f784 in mozilla::dom::XSLTProcessor_Binding::setParameter (cx=0x7fdb2a02a000, obj=..., self=0x7fdb29148280, args=...) at /home/bo13oy/Desktop/firefox_build/mozilla-release/objdir-frontend/dom/bindings/XSLTProcessorBinding.cpp:246 #12 0x00007fdb310596e8 in mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions> ( cx=0x7fdb2a02a000, argc=0x3, vp=0x7ffc8dd93830) at /home/bo13oy/Desktop/firefox_build/mozilla-release/dom/bindings/BindingUtils.cpp:3198 #13 0x00007fdb34b04160 in CallJSNative (cx=0x7fdb2a02a000, native=0x7fdb31059040 <mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*)>, reason=js::CallReason::Call, args=...) at /home/bo13oy/Desktop/firefox_build/mozilla-release/js/src/vm/Interpreter.cpp:458 #14 js::InternalCallOrConstruct (cx=0x7fdb2a02a000, args=..., construct=js::NO_CONSTRUCT, reason=js::CallReason::Call) at /home/bo13oy/Desktop/firefox_build/mozilla-release/js/src/vm/Interpreter.cpp:550 #15 0x00007fdb34b04e83 in InternalCall (cx=0x7fdb2a02a000, args=..., reason=js::CallReason::Call) at /home/bo13oy/Desktop/firefox_build/mozilla-release/js/src/vm/Interpreter.cpp:619 #16 0x00007fdb34b04cff in js::CallFromStack (cx=0x7fdb2a02a000, args=...) at /home/bo13oy/Desktop/firefox_build/mozilla-release/js/src/vm/Interpreter.cpp:623 #17 0x00007fdb355002c1 in js::jit::DoCallFallback (cx=0x7fdb2a02a000, frame=0x7ffc8dd938c8, stub=0x7fdb28846590, argc=0x3, vp=0x7ffc8dd93830, res=...) at /home/bo13oy/Desktop/firefox_build/mozilla-release/js/src/jit/BaselineIC.cpp:2938 #18 0x00003d32d56df798 in ?? () #19 0x00007ffc8dd98100 in ?? () #20 0x00007ffc8dd937f0 in ?? () #21 0xfff9800000000000 in ?? () #22 0x00007fdb374024c8 in js::jit::vmFunctions () from /home/bo13oy/Desktop/firefox_build/mozilla-release/objdir-frontend/dist/bin/libxul.so ---cut--- Here's a snippet of the method. -----source code ------- // static bool XPCArrayHomogenizer::GetTypeForArray(JSContext* cx, HandleObject array, uint32_t length, nsXPTType* resultType, nsID* resultID) { Type state = tUnk; Type type; RootedValue val(cx); RootedObject jsobj(cx); for (uint32_t i = 0; i < length; i++) { if (!JS_GetElement(cx, array, i, &val)) { return false; } if (val.isInt32()) { type = tInt; } else if (val.isDouble()) { type = tDbl; } else if (val.isBoolean()) { type = tBool; } else if (val.isUndefined() || val.isSymbol()) { state = tVar; break; } else if (val.isNull()) { type = tNull; } else if (val.isString()) { type = tStr; } /***************** add patch sample code start ********************/ else if(val.isBigInt()) //patch { type = tBigInt; } /*****************add patch sample code end ********************/ else { MOZ_ASSERT(val.isObject(), "invalid type of jsval!"); jsobj = &val.toObject(); bool isArray; if (!JS_IsArrayObject(cx, jsobj, &isArray)) { return false; } if (isArray) { type = tArr; } else if (xpc::JSValue2ID(cx, val)) { type = tID; } else { type = tISup; } } ...... -----source code ------- Thank you, bo13oy Qihoo 360 Vulcan Team.
1,604,198
14,549,747
**[Affected Versions]:** - Firefox Nightly 73.0a1 (Build ID 20191215214948) **[Affected Platforms]:** - Win 10 - Mac 10.14 - Linux Debian 9 **[Steps to reproduce]:** 1. Open about:preferences#home page. 2. In Firefox Home Content section set Top Sites to be listed on 2 rows. 3. Open a new tab page. 4. Resize the browser to 1121 width. 5. Observe Top Sites section. **[Expected results]:** Top Sites section is displayed on 2 rows. **[Actual results]:** Top Sites section is displayed on 1 row. **[Additional notes]:** - Under 1121px browser width Top Sites are displayed in 1 row, no matter how is set in about:preferences#home page. - Over 1121px browser width Top Sites are displayed as set in about:preferences#home page. - Issue is not reproducible with Discovery Stream disabled. - Issue is not reproducible for Highlights section.
1,604,717
14,553,754
Created attachment 9116643 screenshot.png [Tracking Requested - why for this release]: Matt, this is a regression in 73 Nightly from your DocumentChannel bug 1574372. It prevents me from downloading the Skype installer. ### Steps to reproduce 1. Open https://www.skype.com/en/get-skype/ 2. Click the "Get Skype for Mac" (or whatever) 3. Firefox will download the Skype installer .dmg and try to open it in the Disk Mounter helper app. ### Expected result The Skype installer .dmg should be downloaded. ### Actual result An error message reporting "/Users/chris/Downloads/H2LbGtVx.dmg.part could not be saved, because the source file could not be read." See the attached screenshot. I bisected this regression to the following pushlog, which points to DocumentChannel bug 1574372: https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=90cf0ce6c916dc56b5b5c0577f468fc5c4e89745&tochange=d9958362b9bd30f00a64627cb6041df808068cb9
1,604,800
14,554,401
This bug is for crash report bp-73596e27-d2c3-4bf6-b649-6e1e80191214. Seen while looking at nightly crash stats - crashes started in 20191213094653: https://bit.ly/2rYOmxp Possible regression range based on Build ID: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=192e0e33eb597e8d923eb89f6d49bf42654e9d11&tochange=f09f24f2b545919ab0db4bd352c276779c58bcc6 ``` Top 10 frames of crashing thread: 0 XUL mozilla::gfx::AdjustedPattern::operator mozilla::gfx::Pattern* gfx/2d/DrawTargetWrapAndRecord.cpp:239 1 XUL mozilla::gfx::DrawTargetWrapAndRecord::FillRect gfx/2d/DrawTargetWrapAndRecord.cpp:309 2 XUL gfxSurfaceDrawable::DrawInternal gfx/thebes/gfxDrawable.cpp 3 XUL gfxSurfaceDrawable::Draw gfx/thebes/gfxDrawable.cpp:64 4 XUL gfxUtils::DrawPixelSnapped gfx/thebes/gfxUtils.cpp:562 5 XUL mozilla::image::RasterImage::DrawInternal image/RasterImage.cpp:1380 6 XUL mozilla::image::RasterImage::Draw image/RasterImage.cpp:1442 7 XUL DrawImageInternal layout/base/nsLayoutUtils.cpp:6872 8 XUL nsLayoutUtils::DrawSingleImage layout/base/nsLayoutUtils.cpp:6957 9 XUL nsImageFrame::PaintImage layout/generic/nsImageFrame.cpp:2010 ```
1,616,132
14,646,357
There are always two valid slots, but we need to check the slot contents for non-nulls.
1,618,325
14,663,549
Created attachment 9129263 testcase.html Testcase found while fuzzing mozilla-central rev 7f41334e1044 (built with --enable-address-sanitizer). ``` ==3340==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000244 (pc 0x7fb4681e1477 bp 0x7ffeeaa463d0 sp 0x7ffeeaa45b88 T0) ==3340==The signal is caused by a READ memory access. ==3340==Hint: address points to the zero page. #0 0x7fb4681e1476 in memcpy /build/glibc-OTsEL5/glibc-2.27/string/../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:134 #1 0x563326d8b257 in __asan_memcpy /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:22:3 #2 0x7fb44b261ef9 in mozilla::ClientWebGLContext::ReadPixels(int, int, int, int, unsigned int, unsigned int, mozilla::dom::ArrayBufferView_base<&(js::UnwrapArrayBufferView(JSObject*)), &(js::GetArrayBufferViewLengthAndData(JSObject*, unsigned int*, bool*, unsigned char**)), &(JS_GetArrayBufferViewType(JSObject*))> const&, unsigned int, mozilla::dom::CallerType, mozilla::ErrorResult&) const /builds/worker/workspace/build/src/dom/canvas/ClientWebGLContext.cpp:3960:43 #3 0x7fb44a87f364 in mozilla::ClientWebGLContext::ReadPixels(int, int, int, int, unsigned int, unsigned int, mozilla::dom::Nullable<mozilla::dom::ArrayBufferView_base<&(js::UnwrapArrayBufferView(JSObject*)), &(js::GetArrayBufferViewLengthAndData(JSObject*, unsigned int*, bool*, unsigned char**)), &(JS_GetArrayBufferViewType(JSObject*))> > const&, mozilla::dom::CallerType, mozilla::ErrorResult&) const /builds/worker/workspace/build/src/dom/canvas/ClientWebGLContext.h:1946:5 #4 0x7fb44a9041bf in mozilla::dom::WebGLRenderingContext_Binding::readPixels(JSContext*, JS::Handle<JSObject*>, void*, JSJitMethodCallArgs const&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/WebGLRenderingContextBinding.cpp:13567:24 #5 0x7fb44b114138 in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:3171:13 #6 0x7fb4515f4473 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:477:13 #7 0x7fb4515f4473 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:569:12 #8 0x7fb4515f626a in InternalCall(JSContext*, js::AnyInvokeArgs const&, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:632:10 #9 0x7fb4515daca7 in CallFromStack /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:636:10 #10 0x7fb4515daca7 in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3049:16 #11 0x7fb4515be191 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:449:10 #12 0x7fb4515f4555 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:604:13 #13 0x7fb4515f626a in InternalCall(JSContext*, js::AnyInvokeArgs const&, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:632:10 #14 0x7fb4515f6546 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:649:8 #15 0x7fb451792be2 in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jsapi.cpp:2797:10 #16 0x7fb44ad2d140 in mozilla::dom::EventListener::HandleEvent(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/EventListenerBinding.cpp:52:8 #17 0x7fb44b7ddfcb in void mozilla::dom::EventListener::HandleEvent<mozilla::dom::EventTarget*>(mozilla::dom::EventTarget* const&, mozilla::dom::Event&, mozilla::ErrorResult&, char const*, mozilla::dom::CallbackObject::ExceptionHandling, JS::Realm*) /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/dom/EventListenerBinding.h:66:12 #18 0x7fb44b7dda04 in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1073:43 #19 0x7fb44b7df066 in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event**, mozilla::dom::EventTarget*, nsEventStatus*, bool) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1271:17 #20 0x7fb44b7ccd4f in mozilla::EventTargetChainItem::HandleEvent(mozilla::EventChainPostVisitor&, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:356:17 #21 0x7fb44b7cb2a1 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:558:16 #22 0x7fb44b7cfd5b in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:1055:11 #23 0x7fb44de1722e in nsDocumentViewer::LoadComplete(nsresult) /builds/worker/workspace/build/src/layout/base/nsDocumentViewer.cpp:1144:7 #24 0x7fb450955f07 in nsDocShell::EndPageLoad(nsIWebProgress*, nsIChannel*, nsresult) /builds/worker/workspace/build/src/docshell/base/nsDocShell.cpp:6084:20 #25 0x7fb4509550b5 in nsDocShell::OnStateChange(nsIWebProgress*, nsIRequest*, unsigned int, nsresult) /builds/worker/workspace/build/src/docshell/base/nsDocShell.cpp:5867:7 #26 0x7fb450959b1f in non-virtual thunk to nsDocShell::OnStateChange(nsIWebProgress*, nsIRequest*, unsigned int, nsresult) /builds/worker/workspace/build/src/docshell/base/nsDocShell.cpp #27 0x7fb447f6fde0 in nsDocLoader::DoFireOnStateChange(nsIWebProgress*, nsIRequest*, int&, nsresult) /builds/worker/workspace/build/src/uriloader/base/nsDocLoader.cpp:1348:3 #28 0x7fb447f6ed6c in nsDocLoader::doStopDocumentLoad(nsIRequest*, nsresult) /builds/worker/workspace/build/src/uriloader/base/nsDocLoader.cpp:907:14 #29 0x7fb447f6b040 in nsDocLoader::DocLoaderIsEmpty(bool) /builds/worker/workspace/build/src/uriloader/base/nsDocLoader.cpp:727:9 #30 0x7fb447f6d873 in nsDocLoader::OnStopRequest(nsIRequest*, nsresult) /builds/worker/workspace/build/src/uriloader/base/nsDocLoader.cpp:615:5 #31 0x7fb447f6e8fc in non-virtual thunk to nsDocLoader::OnStopRequest(nsIRequest*, nsresult) /builds/worker/workspace/build/src/uriloader/base/nsDocLoader.cpp #32 0x7fb4457fc6f7 in mozilla::net::nsLoadGroup::NotifyRemovalObservers(nsIRequest*, nsresult) /builds/worker/workspace/build/src/netwerk/base/nsLoadGroup.cpp:604:22 #33 0x7fb4457ff907 in mozilla::net::nsLoadGroup::RemoveRequest(nsIRequest*, nsISupports*, nsresult) /builds/worker/workspace/build/src/netwerk/base/nsLoadGroup.cpp:511:10 #34 0x7fb4495102ff in mozilla::dom::Document::DoUnblockOnload() /builds/worker/workspace/build/src/dom/base/Document.cpp:10746:18 #35 0x7fb4494c5eac in mozilla::dom::Document::UnblockOnload(bool) /builds/worker/workspace/build/src/dom/base/Document.cpp:10678:9 #36 0x7fb4494eadfc in mozilla::dom::Document::DispatchContentLoadedEvents() /builds/worker/workspace/build/src/dom/base/Document.cpp:7349:3 #37 0x7fb4495b6bd4 in applyImpl<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:1160:12 #38 0x7fb4495b6bd4 in apply<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:1166:12 #39 0x7fb4495b6bd4 in mozilla::detail::RunnableMethodImpl<mozilla::dom::Document*, void (mozilla::dom::Document::*)(), true, (mozilla::RunnableKind)0>::Run() /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:1212:13 #40 0x7fb44553e68d in mozilla::SchedulerGroup::Runnable::Run() /builds/worker/workspace/build/src/xpcom/threads/SchedulerGroup.cpp:282:20 #41 0x7fb445572c98 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1220:14 #42 0x7fb44557dafc in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:481:10 #43 0x7fb4467d3e9f in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:87:21 #44 0x7fb4466c70c7 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #45 0x7fb4466c70c7 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308:3 #46 0x7fb4466c70c7 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290:3 #47 0x7fb44d85b3d8 in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:137:27 #48 0x7fb45138e3c6 in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:944:20 #49 0x7fb4466c70c7 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #50 0x7fb4466c70c7 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308:3 #51 0x7fb4466c70c7 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290:3 #52 0x7fb45138d989 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:779:34 #53 0x563326dbe433 in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28 #54 0x563326dbe433 in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:303:18 #55 0x7fb468147b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /build/glibc-OTsEL5/glibc-2.27/string/../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:134 in memcpy ```
1,610,572
14,603,480
Given the regression of Bug 1609973 we should just disable FP for FF73 and re-evaluate what to do for FF74.
1,610,790
14,605,008
Created attachment 9122321 firefox.png User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4017.0 Safari/537.36 Edg/81.0.389.2 Steps to reproduce: after the yesterdays update my firefox nightly started to no longer work. starting firefox.exe opens the UI but does neither allow to navigate to any url nor does it allow to open internal pages like about:config or about:profile or similar the firefox about dialog reports 74.0a1 (2020-01-21) (64-Bit) and no available updates. I already tried to - start with a fresh profile - re-install over the existing instance - uninstall + install a fresh firefox - re-start the workstation - re-download the installer and install again - delete all folders named Mozilla, Mozilla Firefox or similar - cleaned up the windows registry related twitter conversation: https://twitter.com/markusstaab/status/1219913504091668485 Actual results: after starting firefox its not possible to navigate to any website. its neither possible via dropdown autocomplete chosen via mouse, nor by typing in a url. its not even possible to stop firefox using the "X" windows icon. exiting using the hamburger->exit works. Expected results: firefox should just work, allow open websites etc
1,610,880
14,605,640
Whilst browsing the web using Firefox Nightly (`ASAN` built from https://hg.mozilla.org/mozilla-central/rev/be3a05f615a557fd4c5171f789cc460688d9c3b8), the browser crashed. I had 38 tabs open, it's hard to say which one triggered this. ``` ==323834==ERROR: AddressSanitizer: heap-use-after-free on address 0x60f0007f8568 at pc 0x7f846b0a505b bp 0x7f84412f28b0 sp 0x7f84412f28a8 READ of size 8 at 0x60f0007f8568 thread T40 (IPDL Background) #0 0x7f846b0a505a in mozilla::dom::quota::QuotaObject::LockedMaybeUpdateSize(long, bool) /builds/worker/workspace/build/src/dom/quota/ActorsParent.cpp:3285:39 #1 0x7f846b0a3084 in mozilla::dom::quota::QuotaObject::MaybeUpdateSize(long, bool) /builds/worker/workspace/build/src/dom/quota/ActorsParent.cpp:3226:10 #2 0x7f846bf31100 in UpdateUsage /builds/worker/workspace/build/src/dom/localstorage/ActorsParent.cpp:5503:24 #3 0x7f846bf31100 in NoteInactiveDatabase /builds/worker/workspace/build/src/dom/localstorage/ActorsParent.cpp:4941:28 #4 0x7f846bf31100 in UnregisterSnapshot /builds/worker/workspace/build/src/dom/localstorage/ActorsParent.cpp:5680:15 #5 0x7f846bf31100 in mozilla::dom::(anonymous namespace)::Snapshot::Finish() /builds/worker/workspace/build/src/dom/localstorage/ActorsParent.cpp:5965:14 #6 0x7f846bf2ede9 in mozilla::dom::(anonymous namespace)::Snapshot::RecvFinish() /builds/worker/workspace/build/src/dom/localstorage/ActorsParent.cpp:6122:3 #7 0x7f8465419a32 in mozilla::dom::PBackgroundLSSnapshotParent::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/build/src/obj-firefox/ipc/ipdl/PBackgroundLSSnapshotParent.cpp:215:28 #8 0x7f8465435cbd in mozilla::ipc::PBackgroundParent::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/build/src/obj-firefox/ipc/ipdl/PBackgroundParent.cpp:3522:32 #9 0x7f8464afc206 in mozilla::ipc::MessageChannel::DispatchAsyncMessage(mozilla::ipc::ActorLifecycleProxy*, IPC::Message const&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:2214:25 #10 0x7f8464af8502 in mozilla::ipc::MessageChannel::DispatchMessage(IPC::Message&&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:2136:9 #11 0x7f8464afa0f9 in mozilla::ipc::MessageChannel::RunMessage(mozilla::ipc::MessageChannel::MessageTask&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:1975:3 #12 0x7f8464afa727 in mozilla::ipc::MessageChannel::MessageTask::Run() /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:2006:13 #13 0x7f8463999d59 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1220:14 #14 0x7f84639a3281 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #15 0x7f8464b049a3 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:332:5 #16 0x7f8464a283e2 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #17 0x7f8464a283e2 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308:3 #18 0x7f8464a283e2 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290:3 #19 0x7f8463993736 in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:464:10 #20 0x7f847a1db288 in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #21 0x7f847d4464e1 in start_thread (/lib64/libpthread.so.0+0x94e1) #22 0x7f847d007692 in clone (/lib64/libc.so.6+0x101692) 0x60f0007f8568 is located 120 bytes inside of 168-byte region [0x60f0007f84f0,0x60f0007f8598) freed by thread T46 (QuotaManager IO) here: #0 0x561eab6d592d in free /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:123:3 #1 0x7f846b1283d1 in operator delete /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/cxxalloc.h:51:10 #2 0x7f846b1283d1 in Release /builds/worker/workspace/build/src/dom/quota/ActorsParent.cpp:875:3 #3 0x7f846b1283d1 in Release /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:50:40 #4 0x7f846b1283d1 in Release /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:379:36 #5 0x7f846b1283d1 in ~RefPtr /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:81:7 #6 0x7f846b1283d1 in Destruct /builds/worker/workspace/build/src/obj-firefox/dist/include/nsTArray.h:547:45 #7 0x7f846b1283d1 in DestructRange /builds/worker/workspace/build/src/obj-firefox/dist/include/nsTArray.h:2240:7 #8 0x7f846b1283d1 in RemoveElementsAtUnsafe /builds/worker/workspace/build/src/obj-firefox/dist/include/nsTArray.h:2299:3 #9 0x7f846b1283d1 in nsTArray_Impl<RefPtr<mozilla::dom::quota::OriginInfo>, nsTArrayInfallibleAllocator>::RemoveElementsAt(unsigned long, unsigned long) /builds/worker/workspace/build/src/obj-firefox/dist/include/nsTArray.h:2293:3 #10 0x7f846b0a6deb in mozilla::dom::quota::QuotaManager::LockedRemoveQuotaForOrigin(mozilla::dom::quota::PersistenceType, nsTSubstring<char> const&, nsTSubstring<char> const&) /builds/worker/workspace/build/src/dom/quota/ActorsParent.cpp:7472:16 #11 0x7f846b10f234 in RemoveQuotaForOrigin /builds/worker/workspace/build/src/dom/quota/QuotaManager.h:227:5 #12 0x7f846b10f234 in mozilla::dom::quota::(anonymous namespace)::ClearRequestBase::DeleteFiles(mozilla::dom::quota::QuotaManager*, mozilla::dom::quota::PersistenceType) /builds/worker/workspace/build/src/dom/quota/ActorsParent.cpp:9705:24 #13 0x7f846b10cdf1 in mozilla::dom::quota::(anonymous namespace)::ClearRequestBase::DoDirectoryWork(mozilla::dom::quota::QuotaManager*) /builds/worker/workspace/build/src/dom/quota/ActorsParent.cpp #14 0x7f846b0f5c3a in DirectoryWork /builds/worker/workspace/build/src/dom/quota/ActorsParent.cpp:8266:8 #15 0x7f846b0f5c3a in mozilla::dom::quota::(anonymous namespace)::OriginOperationBase::Run() /builds/worker/workspace/build/src/dom/quota/ActorsParent.cpp:8164:12 #16 0x7f8463999d59 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1220:14 #17 0x7f84639a3281 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #18 0x7f8464b0485a in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:302:20 #19 0x7f8464a283e2 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #20 0x7f8464a283e2 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308:3 #21 0x7f8464a283e2 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290:3 #22 0x7f8463993736 in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:464:10 #23 0x7f847a1db288 in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #24 0x7f847d4464e1 in start_thread (/lib64/libpthread.so.0+0x94e1) previously allocated by thread T46 (QuotaManager IO) here: #0 0x561eab6d5bad in malloc /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:145:3 #1 0x561eab70aefd in moz_xmalloc /builds/worker/workspace/build/src/memory/mozalloc/mozalloc.cpp:52:15 #2 0x7f846b0ae3d1 in operator new /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/cxxalloc.h:33:10 #3 0x7f846b0ae3d1 in mozilla::dom::quota::QuotaManager::EnsureQuotaForOrigin(mozilla::dom::quota::PersistenceType, nsTSubstring<char> const&, nsTSubstring<char> const&) /builds/worker/workspace/build/src/dom/quota/ActorsParent.cpp:4038:18 #4 0x7f846bf3793a in DatabaseWork /builds/worker/workspace/build/src/dom/localstorage/ActorsParent.cpp:7312:19 #5 0x7f846bf3793a in mozilla::dom::(anonymous namespace)::PrepareDatastoreOp::NestedRun() /builds/worker/workspace/build/src/dom/localstorage/ActorsParent.cpp:7805:12 #6 0x7f846bf343d3 in mozilla::dom::(anonymous namespace)::LSRequestBase::Run() /builds/worker/workspace/build/src/dom/localstorage/ActorsParent.cpp #7 0x7f8463999d59 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1220:14 #8 0x7f84639a3281 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #9 0x7f8464b049a3 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:332:5 #10 0x7f8464a283e2 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #11 0x7f8464a283e2 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308:3 #12 0x7f8464a283e2 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290:3 #13 0x7f8463993736 in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:464:10 #14 0x7f847a1db288 in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #15 0x7f847d4464e1 in start_thread (/lib64/libpthread.so.0+0x94e1) Thread T40 (IPDL Background) created by T0 here: #0 0x561eab6c033a in pthread_create /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cc:209:3 #1 0x7f847a1c9663 in _PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:458:14 #2 0x7f847a1b368e in PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:533:12 #3 0x7f8463995d33 in nsThread::Init(nsTSubstring<char> const&) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:670:8 #4 0x7f84639a2461 in nsThreadManager::NewNamedThread(nsTSubstring<char> const&, unsigned int, nsIThread**) /builds/worker/workspace/build/src/xpcom/threads/nsThreadManager.cpp:621:12 #5 0x7f84639a5f43 in NS_NewNamedThread(nsTSubstring<char> const&, nsIThread**, nsIRunnable*, unsigned int) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:139:57 #6 0x7f8464abed79 in NS_NewNamedThread<16> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:69:10 #7 0x7f8464abed79 in (anonymous namespace)::ParentImpl::CreateBackgroundThread() /builds/worker/workspace/build/src/ipc/glue/BackgroundImpl.cpp:943:7 #8 0x7f8464a89125 in CreateActorForSameProcess /builds/worker/workspace/build/src/ipc/glue/BackgroundImpl.cpp:853:32 #9 0x7f8464a89125 in GetOrCreateForCurrentThread /builds/worker/workspace/build/src/ipc/glue/BackgroundImpl.cpp:1455:9 #10 0x7f8464a89125 in mozilla::ipc::BackgroundChild::GetOrCreateForCurrentThread(nsIEventTarget*) /builds/worker/workspace/build/src/ipc/glue/BackgroundImpl.cpp:657:10 #11 0x7f8469e3c3d7 in mozilla::dom::ClientManager::ClientManager() /builds/worker/workspace/build/src/dom/clients/manager/ClientManager.cpp:50:7 #12 0x7f8469e3f180 in mozilla::dom::ClientManager::GetOrCreateForCurrentThread() /builds/worker/workspace/build/src/dom/clients/manager/ClientManager.cpp:208:14 #13 0x7f8469e30cea in mozilla::dom::ClientManager::CreateSource(mozilla::dom::ClientType, nsISerialEventTarget*, nsIPrincipal*) /builds/worker/workspace/build/src/dom/clients/manager/ClientManager.cpp:264:31 #14 0x7f846f3bb43a in nsDocShell::MaybeCreateInitialClientSource(nsIPrincipal*) /builds/worker/workspace/build/src/docshell/base/nsDocShell.cpp:2504:26 #15 0x7f846f3ef16f in nsDocShell::CreateAboutBlankContentViewer(nsIPrincipal*, nsIPrincipal*, nsIContentSecurityPolicy*, nsIURI*, bool, bool, mozilla::dom::WindowGlobalChild*) /builds/worker/workspace/build/src/docshell/base/nsDocShell.cpp:6597:5 #16 0x7f846f3f033c in CreateAboutBlankContentViewer /builds/worker/workspace/build/src/docshell/base/nsDocShell.cpp:6655:10 #17 0x7f846f3f033c in non-virtual thunk to nsDocShell::CreateAboutBlankContentViewer(nsIPrincipal*, nsIPrincipal*, nsIContentSecurityPolicy*) /builds/worker/workspace/build/src/docshell/base/nsDocShell.cpp #18 0x7f846f4b753d in mozilla::AppWindow::Initialize(nsIAppWindow*, nsIAppWindow*, nsIURI*, int, int, bool, nsIRemoteTab*, mozIDOMWindowProxy*, nsWidgetInitData&) /builds/worker/workspace/build/src/xpfe/appshell/AppWindow.cpp:297:21 #19 0x7f846f4dcec3 in nsAppShellService::JustCreateTopWindow(nsIAppWindow*, nsIURI*, unsigned int, int, int, bool, nsIRemoteTab*, mozIDOMWindowProxy*, mozilla::AppWindow**) /builds/worker/workspace/build/src/xpfe/appshell/nsAppShellService.cpp:668:25 #20 0x7f846f4de36d in nsAppShellService::CreateTopLevelWindow(nsIAppWindow*, nsIURI*, unsigned int, int, int, nsIRemoteTab*, mozIDOMWindowProxy*, nsIAppWindow**) /builds/worker/workspace/build/src/xpfe/appshell/nsAppShellService.cpp:172:8 #21 0x7f846fdc7073 in nsAppStartup::CreateChromeWindow(nsIWebBrowserChrome*, unsigned int, nsIRemoteTab*, mozIDOMWindowProxy*, unsigned long, bool*, nsIWebBrowserChrome**) /builds/worker/workspace/build/src/toolkit/components/startup/nsAppStartup.cpp:629:15 #22 0x7f846ff9629d in CreateChromeWindow /builds/worker/workspace/build/src/toolkit/components/windowwatcher/nsWindowWatcher.cpp:419:33 #23 0x7f846ff9629d in nsWindowWatcher::OpenWindowInternal(mozIDOMWindowProxy*, char const*, char const*, char const*, bool, bool, bool, nsIArray*, bool, bool, bool, nsDocShellLoadState*, mozilla::dom::BrowsingContext**) /builds/worker/workspace/build/src/toolkit/components/windowwatcher/nsWindowWatcher.cpp:904:12 #24 0x7f846ff93822 in nsWindowWatcher::OpenWindow(mozIDOMWindowProxy*, char const*, char const*, char const*, nsISupports*, mozIDOMWindowProxy**) /builds/worker/workspace/build/src/toolkit/components/windowwatcher/nsWindowWatcher.cpp:292:3 #25 0x7f84639d6351 in NS_InvokeByIndex /builds/worker/workspace/build/src/xpcom/reflect/xptcall/md/unix/xptcinvoke_asm_x86_64_unix.S:106 #26 0x7f846572be24 in Invoke /builds/worker/workspace/build/src/js/xpconnect/src/XPCWrappedNative.cpp:1643:10 #27 0x7f846572be24 in Call /builds/worker/workspace/build/src/js/xpconnect/src/XPCWrappedNative.cpp:1184:19 #28 0x7f846572be24 in XPCWrappedNative::CallMethod(XPCCallContext&, XPCWrappedNative::CallMode) /builds/worker/workspace/build/src/js/xpconnect/src/XPCWrappedNative.cpp:1150:23 #29 0x7f8465731ec4 in XPC_WN_CallMethod(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/js/xpconnect/src/XPCWrappedNativeJSOps.cpp:947:10 #30 0x7f84702b8c9e in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:452:13 #31 0x7f84702b8c9e in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:544:12 #32 0x7f84702a1e1d in CallFromStack /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:612:10 #33 0x7f84702a1e1d in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3021:16 #34 0x7f8470284cb5 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:424:10 #35 0x7f84702b95d8 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:580:13 #36 0x7f84702bb5a9 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:625:8 #37 0x7f847045637b in JS_CallFunctionValue(JSContext*, JS::Handle<JSObject*>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jsapi.cpp:2734:10 #38 0x7f846571c568 in nsXPCWrappedJS::CallMethod(unsigned short, nsXPTMethodInfo const*, nsXPTCMiniVariant*) /builds/worker/workspace/build/src/js/xpconnect/src/XPCWrappedJSClass.cpp:956:17 #39 0x7f84639d79e1 in PrepareAndDispatch /builds/worker/workspace/build/src/xpcom/reflect/xptcall/md/unix/xptcstubs_x86_64_linux.cpp:125:37 #40 0x7f84639d68ea in SharedStub (/home/geeknik/firefox/libxul.so+0x22fd8ea) #41 0x7f846fa7d5e6 in nsCommandLine::EnumerateHandlers(nsresult (*)(nsICommandLineHandler*, nsICommandLine*, void*), void*) /builds/worker/workspace/build/src/toolkit/components/commandlines/nsCommandLine.cpp:448:10 #42 0x7f846fa7eb2a in nsCommandLine::Run() /builds/worker/workspace/build/src/toolkit/components/commandlines/nsCommandLine.cpp:503:8 #43 0x7f847003ef37 in XREMain::XRE_mainRun() /builds/worker/workspace/build/src/toolkit/xre/nsAppRunner.cpp:4537:19 #44 0x7f84700415ee in XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&) /builds/worker/workspace/build/src/toolkit/xre/nsAppRunner.cpp:4740:8 #45 0x7f8470042a10 in XRE_main(int, char**, mozilla::BootstrapConfig const&) /builds/worker/workspace/build/src/toolkit/xre/nsAppRunner.cpp:4821:21 #46 0x561eab708511 in do_main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:217:22 #47 0x561eab708511 in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:339:16 #48 0x7f847cf2d1a2 in __libc_start_main (/lib64/libc.so.6+0x271a2) Thread T46 (QuotaManager IO) created by T40 (IPDL Background) here: #0 0x561eab6c033a in pthread_create /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cc:209:3 #1 0x7f847a1c9663 in _PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:458:14 #2 0x7f847a1b368e in PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:533:12 #3 0x7f8463995d33 in nsThread::Init(nsTSubstring<char> const&) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:670:8 #4 0x7f84639a2461 in nsThreadManager::NewNamedThread(nsTSubstring<char> const&, unsigned int, nsIThread**) /builds/worker/workspace/build/src/xpcom/threads/nsThreadManager.cpp:621:12 #5 0x7f84639a5f43 in NS_NewNamedThread(nsTSubstring<char> const&, nsIThread**, nsIRunnable*, unsigned int) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:139:57 #6 0x7f846b0a97e3 in NS_NewNamedThread<16> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:69:10 #7 0x7f846b0a97e3 in mozilla::dom::quota::QuotaManager::Init(nsTSubstring<char16_t> const&) /builds/worker/workspace/build/src/dom/quota/ActorsParent.cpp:3917:8 #8 0x7f846b0a8a2f in mozilla::dom::quota::QuotaManager::GetOrCreate(nsIRunnable*, nsIEventTarget*) /builds/worker/workspace/build/src/dom/quota/ActorsParent.cpp:3534:28 #9 0x7f846b4d5b8a in FinishOpen /builds/worker/workspace/build/src/dom/indexedDB/ActorsParent.cpp:20517:3 #10 0x7f846b4d5b8a in mozilla::dom::indexedDB::(anonymous namespace)::FactoryOp::Run() /builds/worker/workspace/build/src/dom/indexedDB/ActorsParent.cpp:20649:12 #11 0x7f8463999d59 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1220:14 #12 0x7f84639a3281 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #13 0x7f8464b0485a in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:302:20 #14 0x7f8464a283e2 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #15 0x7f8464a283e2 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308:3 #16 0x7f8464a283e2 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290:3 #17 0x7f8463993736 in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:464:10 #18 0x7f847a1db288 in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #19 0x7f847d4464e1 in start_thread (/lib64/libpthread.so.0+0x94e1) SUMMARY: AddressSanitizer: heap-use-after-free /builds/worker/workspace/build/src/dom/quota/ActorsParent.cpp:3285:39 in mozilla::dom::quota::QuotaObject::LockedMaybeUpdateSize(long, bool) Shadow bytes around the buggy address: 0x0c1e800f7050: fd fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa 0x0c1e800f7060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e800f7070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e800f7080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e800f7090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fd fd =>0x0c1e800f70a0: fd fd fd fd fd fd fd fd fd fd fd fd fd[fd]fd fd 0x0c1e800f70b0: fd fd fd fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e800f70c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e800f70d0: fa fa fa fa fa fa fa fa fa fa fd fd fd fd fd fd 0x0c1e800f70e0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fa 0x0c1e800f70f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==323834==ABORTING ```
1,611,081
14,606,942
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:73.0) Gecko/20100101 Firefox/73.0 Steps to reproduce: 1. Start Firefox 73.0b8 2. Open https://xenon.coheris.com/ff73/ 3. Press F12 4. Press F5 in the Firefox window Actual results: 4. Page is blank Expected results: 4. Page should be displayed as in step 2
1,611,588
14,610,690
[Tracking Requested - why for this release]: This bug is for crash report bp-700cb11c-7c27-430c-ba87-fc20f0200125. ``` Top 10 frames of crashing thread: 0 xul.dll mozilla::dom::ExternalHelperAppParent::Init uriloader/exthandler/ExternalHelperAppParent.cpp:83 1 xul.dll mozilla::dom::ContentParent::RecvPExternalHelperAppConstructor dom/ipc/ContentParent.cpp:3826 2 xul.dll mozilla::dom::PContentParent::OnMessageReceived ipc/ipdl/PContentParent.cpp:8388 3 xul.dll mozilla::ipc::MessageChannel::DispatchMessage ipc/glue/MessageChannel.cpp:2134 4 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1241 5 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486 6 xul.dll mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:109 7 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:308 8 xul.dll MessageLoop::Run ipc/chromium/src/base/message_loop.cc:290 9 xul.dll nsBaseAppShell::Run widget/nsBaseAppShell.cpp:137 ``` this crash signature is showing up in 73.0b9 and accounting for 1.7% of browser crashes in early stability data there. presumably the disabling of DocumentChannel triggered this spike.
1,612,006
14,614,970
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.130 Safari/537.36 Steps to reproduce: https://janus.conf.meetecho.com/screensharingtest.html https://www.webrtc-experiment.com/getDisplayMedia/ https://www.webrtc-experiment.com/Pluginfree-Screen-Sharing Tried all the above links but it leads to the same error OS version macOS Catalina Version 10.15.3 firefox version :72.0.2 Actual results: WebRTC error: MediaStreamError { name: "NotFoundError", message: "The object can not be found here.", constraint: "", stack: "" } Share does not work
1,612,108
14,615,612
**[Affected versions]:** - Firefox 73.0b11 Build-ID 20200128001646 **[Affected Platforms]:** - Windows 10 - Mac 10.14 - Linux Debian 9 **[Steps to reproduce]:** 1. Open about:welcome page. 2. Observe the top-right side of the page. **[Expected result]:** - A grayed out and unactionable “X” button is displayed. **[Actual result]:** - An actionable “X” button is displayed. **[Regression]:** - Last good revision: 63822634f6ffb878bd3aa64c1789b3452d178bee - First bad revision: 0152641c5419db9c9e723afe55bef1b63c699e96 Pushlog: https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=63822634f6ffb878bd3aa64c1789b3452d178bee&tochange=0152641c5419db9c9e723afe55bef1b63c699e96 **[Additional notes]:** - The onboarding Triplets are dismissed if the “X” button is clicked. - This issue was fixed on Firefox Nightly 74.0a1 (Build 20200129093157) by Bug 1609462. @thecount, @pdahiya could you please take a look at Bug 1609462 and see if it will be safe to be uplifted in Beta?
1,612,636
14,618,683
The following testcase crashes on mozilla-central revision 20200131-76ee1827c820 (build with --enable-debug, run with --fuzzing-safe --no-threads --baseline-warmup-threshold=0): var concat = String.prototype.concat; function f18(b83) { var a11 = arguments; if (b83) f18(false); g22 = {}; g22.apply = concat; g22.apply(null, a11); } f18(true); Backtrace: received signal SIGSEGV, Segmentation fault. 0x0000555555d9ac9d in JSString* js::ToStringSlow<(js::AllowGC)0>(JSContext*, js::MaybeRooted<JS::Value, (js::AllowGC)0>::HandleType) () #0 0x0000555555d9ac9d in JSString* js::ToStringSlow<(js::AllowGC)0>(JSContext*, js::MaybeRooted<JS::Value, (js::AllowGC)0>::HandleType) () #1 0x0000555555bd8abb in str_concat(JSContext*, unsigned int, JS::Value*) () #2 0x00001595c9a059df in ?? () #3 0x00007fffffffafb0 in ?? () #4 0x00007fffffffaf58 in ?? () #5 0x00003802027a1380 in ?? () #6 0x0000000000000000 in ?? () rax 0x555556e66f44 93825018523460 rbx 0x7fffffffaed0 140737488334544 rcx 0x555557f3c840 93825036175424 rdx 0x0 0 rsi 0x7ffff6efd770 140737336301424 rdi 0x7ffff6efc540 140737336296768 rbp 0x7fffffffae90 140737488334480 rsp 0x7fffffffae90 140737488334480 r8 0x7ffff6efd770 140737336301424 r9 0x7ffff7f9cd00 140737353731328 r10 0x58 88 r11 0x7ffff6ba47a0 140737332791200 r12 0x7ffff5e27000 140737318645760 r13 0x7fffffffbae0 140737488337632 r14 0x7fffffffaf90 140737488334736 r15 0x1 1 rip 0x555555d9ac9d <JSString* js::ToStringSlow<(js::AllowGC)0>(JSContext*, js::MaybeRooted<JS::Value, (js::AllowGC)0>::HandleType)+509> => 0x555555d9ac9d <_ZN2js12ToStringSlowILNS_7AllowGCE0EEEP8JSStringP9JSContextNS_11MaybeRootedIN2JS5ValueEXT_EE10HandleTypeE+509>: movl $0x8b0,0x0 0x555555d9aca8 <_ZN2js12ToStringSlowILNS_7AllowGCE0EEEP8JSStringP9JSContextNS_11MaybeRootedIN2JS5ValueEXT_EE10HandleTypeE+520>: callq 0x5555557fb496 <abort> Because what would an All Hands Party be without a JIT bug? \o/
1,613,668
14,626,520
**Steps to reproduce** 1. Open the netmonitor 1. Make sure the devtools window is wide enough 1. Hit <kbd>Esc</kbd> to get the split console **Expected results** Everything is like in regular console **Actual results** The console is missing its filter buttons --- When narrowing down the window, the filter buttons will appear in their own toolbar, as expected.
1,614,252
14,631,838
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:73.0) Gecko/20100101 Firefox/73.0 Steps to reproduce: 1) Korean is selected as current input source 2) Spend some time 3) Activate browser window (Cmd+Tab) Actual results: "Sometimes" whole browser window does not accept any click input. Once after changing input source to English, everything gets back into normal. Expected results: Browser should accept click input.
1,614,339
14,632,466
Created attachment 9125493 testcase.html Testcase found while fuzzing mozilla-central rev d3aa4a9e4dfd. ``` ==20676==ERROR: AddressSanitizer: heap-use-after-free on address 0x6140003b0cf0 at pc 0x7fe90543b850 bp 0x7fe84ab2cb70 sp 0x7fe84ab2cb68 READ of size 8 at 0x6140003b0cf0 thread T78 (DOM Worker) #0 0x7fe90543b84f in GetSize /builds/worker/workspace/build/src/obj-firefox/dist/include/nsDeque.h:83:42 #1 0x7fe90543b84f in mozilla::dom::EventSourceImpl::CloseInternal() /builds/worker/workspace/build/src/dom/base/EventSource.cpp:392:30 #2 0x7fe9056c7a89 in operator() /builds/worker/workspace/build/src/dom/base/nsIGlobalObject.cpp:171:14 #3 0x7fe9056c7a89 in std::_Function_handler<void (mozilla::DOMEventTargetHelper*, bool*), nsIGlobalObject::DisconnectEventTargetObjects()::$_11>::_M_invoke(std::_Any_data const&, mozilla::DOMEventTargetHelper*&&, bool*&&) /builds/worker/fetches/clang/bin/../lib/gcc/x86_64-unknown-linux-gnu/7.4.0/../../../../include/c++/7.4.0/bits/std_function.h:316:2 #4 0x7fe905686797 in operator() /builds/worker/fetches/clang/bin/../lib/gcc/x86_64-unknown-linux-gnu/7.4.0/../../../../include/c++/7.4.0/bits/std_function.h:706:14 #5 0x7fe905686797 in nsIGlobalObject::ForEachEventTargetObject(std::function<void (mozilla::DOMEventTargetHelper*, bool*)> const&) const /builds/worker/workspace/build/src/dom/base/nsIGlobalObject.cpp:162:5 #6 0x7fe905685dcb in nsIGlobalObject::DisconnectEventTargetObjects() /builds/worker/workspace/build/src/dom/base/nsIGlobalObject.cpp:170:3 #7 0x7fe908ffe555 in NoteTerminating /builds/worker/workspace/build/src/dom/workers/WorkerScope.cpp:184:3 #8 0x7fe908ffe555 in mozilla::dom::WorkerPrivate::NotifyInternal(mozilla::dom::WorkerStatus) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:4198:23 #9 0x7fe9090156fe in mozilla::dom::WorkerRunnable::Run() /builds/worker/workspace/build/src/dom/workers/WorkerRunnable.cpp:369:12 #10 0x7fe908ffe191 in mozilla::dom::WorkerPrivate::ProcessAllControlRunnablesLocked() /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:3427:9 #11 0x7fe908ffcc59 in mozilla::dom::WorkerPrivate::DoRunLoop(JSContext*) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:2789:21 #12 0x7fe908fca294 in mozilla::dom::workerinternals::(anonymous namespace)::WorkerThreadPrimaryRunnable::Run() /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:2318:40 #13 0x7fe901490358 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1220:14 #14 0x7fe90149b16c in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #15 0x7fe9026eecf4 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:332:5 #16 0x7fe9025e66d7 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #17 0x7fe9025e66d7 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308:3 #18 0x7fe9025e66d7 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290:3 #19 0x7fe9014894a7 in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:464:10 #20 0x7fe92544acde in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #21 0x7fe92508c6da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da) #22 0x7fe92406a88e in clone /build/glibc-OTsEL5/glibc-2.27/misc/../sysdeps/unix/sysv/linux/x86_64/clone.S:95 0x6140003b0cf0 is located 176 bytes inside of 432-byte region [0x6140003b0c40,0x6140003b0df0) freed by thread T78 (DOM Worker) here: #0 0x5574da313b9d in free /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:123:3 #1 0x7fe9054a1d28 in ~ /builds/worker/workspace/build/src/dom/base/EventSource.cpp:1704:38 #2 0x7fe9054a1d28 in _M_destroy /builds/worker/fetches/clang/bin/../lib/gcc/x86_64-unknown-linux-gnu/7.4.0/../../../../include/c++/7.4.0/bits/std_function.h:207:4 #3 0x7fe9054a1d28 in std::_Function_base::_Base_manager<mozilla::dom::EventSourceImpl::CreateWorkerRef(mozilla::dom::WorkerPrivate*)::$_21>::_M_manager(std::_Any_data&, std::_Any_data const&, std::_Manager_operation) /builds/worker/fetches/clang/bin/../lib/gcc/x86_64-unknown-linux-gnu/7.4.0/../../../../include/c++/7.4.0/bits/std_function.h:231:8 #4 0x7fe90901385d in mozilla::dom::StrongWorkerRef::~StrongWorkerRef() /builds/worker/workspace/build/src/dom/workers/WorkerRef.cpp:186:35 #5 0x7fe909013c98 in mozilla::dom::ThreadSafeWorkerRef::~ThreadSafeWorkerRef() /builds/worker/workspace/build/src/dom/workers/WorkerRef.cpp:210:1 #6 0x7fe90543c07a in Release /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/dom/WorkerRef.h:191:3 #7 0x7fe90543c07a in Release /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:50:40 #8 0x7fe90543c07a in Release /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:379:36 #9 0x7fe90543c07a in assign_assuming_AddRef /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:69:7 #10 0x7fe90543c07a in operator= /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:168:5 #11 0x7fe90543c07a in mozilla::dom::EventSourceImpl::ReleaseWorkerRef() /builds/worker/workspace/build/src/dom/base/EventSource.cpp:1717:14 #12 0x7fe90543b7f4 in mozilla::dom::EventSourceImpl::CloseInternal() /builds/worker/workspace/build/src/dom/base/EventSource.cpp:389:5 #13 0x7fe9056c7a89 in operator() /builds/worker/workspace/build/src/dom/base/nsIGlobalObject.cpp:171:14 #14 0x7fe9056c7a89 in std::_Function_handler<void (mozilla::DOMEventTargetHelper*, bool*), nsIGlobalObject::DisconnectEventTargetObjects()::$_11>::_M_invoke(std::_Any_data const&, mozilla::DOMEventTargetHelper*&&, bool*&&) /builds/worker/fetches/clang/bin/../lib/gcc/x86_64-unknown-linux-gnu/7.4.0/../../../../include/c++/7.4.0/bits/std_function.h:316:2 #15 0x7fe905686797 in operator() /builds/worker/fetches/clang/bin/../lib/gcc/x86_64-unknown-linux-gnu/7.4.0/../../../../include/c++/7.4.0/bits/std_function.h:706:14 #16 0x7fe905686797 in nsIGlobalObject::ForEachEventTargetObject(std::function<void (mozilla::DOMEventTargetHelper*, bool*)> const&) const /builds/worker/workspace/build/src/dom/base/nsIGlobalObject.cpp:162:5 #17 0x7fe905685dcb in nsIGlobalObject::DisconnectEventTargetObjects() /builds/worker/workspace/build/src/dom/base/nsIGlobalObject.cpp:170:3 #18 0x7fe908ffe555 in NoteTerminating /builds/worker/workspace/build/src/dom/workers/WorkerScope.cpp:184:3 #19 0x7fe908ffe555 in mozilla::dom::WorkerPrivate::NotifyInternal(mozilla::dom::WorkerStatus) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:4198:23 #20 0x7fe9090156fe in mozilla::dom::WorkerRunnable::Run() /builds/worker/workspace/build/src/dom/workers/WorkerRunnable.cpp:369:12 #21 0x7fe908ffe191 in mozilla::dom::WorkerPrivate::ProcessAllControlRunnablesLocked() /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:3427:9 #22 0x7fe908ffcc59 in mozilla::dom::WorkerPrivate::DoRunLoop(JSContext*) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:2789:21 #23 0x7fe908fca294 in mozilla::dom::workerinternals::(anonymous namespace)::WorkerThreadPrimaryRunnable::Run() /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:2318:40 #24 0x7fe901490358 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1220:14 #25 0x7fe90149b16c in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #26 0x7fe9026eecf4 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:332:5 #27 0x7fe9025e66d7 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #28 0x7fe9025e66d7 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308:3 #29 0x7fe9025e66d7 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290:3 #30 0x7fe9014894a7 in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:464:10 #31 0x7fe92544acde in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:201:5 previously allocated by thread T78 (DOM Worker) here: #0 0x5574da313e1d in malloc /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:145:3 #1 0x5574da34962d in moz_xmalloc /builds/worker/workspace/build/src/memory/mozalloc/mozalloc.cpp:52:15 #2 0x7fe905447a00 in operator new /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/cxxalloc.h:33:10 #3 0x7fe905447a00 in mozilla::dom::EventSource::EventSource(nsIGlobalObject*, nsICookieSettings*, bool) /builds/worker/workspace/build/src/dom/base/EventSource.cpp:1779:11 #4 0x7fe905447f66 in mozilla::dom::EventSource::Constructor(mozilla::dom::GlobalObject const&, nsTSubstring<char16_t> const&, mozilla::dom::EventSourceInit const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/base/EventSource.cpp:1821:41 #5 0x7fe906c201bb in mozilla::dom::EventSource_Binding::_constructor(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/EventSourceBinding.cpp:712:57 #6 0x7fe90d432a5e in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:470:13 #7 0x7fe90d432a5e in CallJSNativeConstructor /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:486:8 #8 0x7fe90d432a5e in InternalConstruct(JSContext*, js::AnyConstructArgs const&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:688:10 #9 0x7fe90d432134 in js::ConstructFromStack(JSContext*, JS::CallArgs const&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:715:10 #10 0x7fe90d40ac1c in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3032:16 #11 0x7fe90d3f9d44 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:442:10 #12 0x7fe90d42feb5 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:597:13 #13 0x7fe90d431bca in InternalCall(JSContext*, js::AnyInvokeArgs const&, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:625:10 #14 0x7fe90d431ea6 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:642:8 #15 0x7fe90d5c7ca2 in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jsapi.cpp:2797:10 #16 0x7fe906ad79e3 in mozilla::dom::EventHandlerNonNull::Call(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, JS::MutableHandle<JS::Value>, mozilla::ErrorResult&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/EventHandlerBinding.cpp:267:37 #17 0x7fe9076b23cb in void mozilla::dom::EventHandlerNonNull::Call<nsCOMPtr<mozilla::dom::EventTarget> >(nsCOMPtr<mozilla::dom::EventTarget> const&, mozilla::dom::Event&, JS::MutableHandle<JS::Value>, mozilla::ErrorResult&, char const*, mozilla::dom::CallbackObject::ExceptionHandling, JS::Realm*) /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/dom/EventHandlerBinding.h:364:12 #18 0x7fe9076b06eb in mozilla::JSEventHandler::HandleEvent(mozilla::dom::Event*) /builds/worker/workspace/build/src/dom/events/JSEventHandler.cpp:201:12 #19 0x7fe9076755ce in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1079:22 #20 0x7fe907676ba6 in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event**, mozilla::dom::EventTarget*, nsEventStatus*, bool) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1271:17 #21 0x7fe90766488f in mozilla::EventTargetChainItem::HandleEvent(mozilla::EventChainPostVisitor&, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:356:17 #22 0x7fe907662de1 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:558:16 Thread T78 (DOM Worker) created by T0 here: #0 0x5574da2fe5aa in pthread_create /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cc:209:3 #1 0x7fe92543b185 in _PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:458:14 #2 0x7fe92542c0fe in PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:533:12 #3 0x7fe90148bf84 in nsThread::Init(nsTSubstring<char> const&) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:670:8 #4 0x7fe9090248ab in mozilla::dom::WorkerThread::Create(mozilla::dom::WorkerThreadFriendKey const&) /builds/worker/workspace/build/src/dom/workers/WorkerThread.cpp:92:7 #5 0x7fe908fa4226 in mozilla::dom::workerinternals::RuntimeService::ScheduleWorker(mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:1427:14 #6 0x7fe908fa2cb2 in mozilla::dom::workerinternals::RuntimeService::RegisterWorker(mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:1292:19 #7 0x7fe908ff7c60 in mozilla::dom::WorkerPrivate::Constructor(JSContext*, nsTSubstring<char16_t> const&, bool, mozilla::dom::WorkerType, nsTSubstring<char16_t> const&, nsTSubstring<char> const&, mozilla::dom::WorkerLoadInfo*, mozilla::ErrorResult&, nsTString<char16_t>) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:2375:24 #8 0x7fe908fb0867 in mozilla::dom::Worker::Constructor(mozilla::dom::GlobalObject const&, nsTSubstring<char16_t> const&, mozilla::dom::WorkerOptions const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/workers/Worker.cpp:32:41 #9 0x7fe9068ca410 in mozilla::dom::Worker_Binding::_constructor(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/WorkerBinding.cpp:1088:52 #10 0x7fe90d432a5e in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:470:13 #11 0x7fe90d432a5e in CallJSNativeConstructor /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:486:8 #12 0x7fe90d432a5e in InternalConstruct(JSContext*, js::AnyConstructArgs const&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:688:10 #13 0x7fe90d432134 in js::ConstructFromStack(JSContext*, JS::CallArgs const&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:715:10 #14 0x7fe90d40ac1c in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3032:16 #15 0x7fe90d3f9d44 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:442:10 #16 0x7fe90d42feb5 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:597:13 #17 0x7fe90d431bca in InternalCall(JSContext*, js::AnyInvokeArgs const&, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:625:10 #18 0x7fe90d431ea6 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:642:8 #19 0x7fe90d5c7ca2 in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jsapi.cpp:2797:10 #20 0x7fe906bcb800 in mozilla::dom::EventListener::HandleEvent(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/EventListenerBinding.cpp:52:8 #21 0x7fe907675b0b in void mozilla::dom::EventListener::HandleEvent<mozilla::dom::EventTarget*>(mozilla::dom::EventTarget* const&, mozilla::dom::Event&, mozilla::ErrorResult&, char const*, mozilla::dom::CallbackObject::ExceptionHandling, JS::Realm*) /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/dom/EventListenerBinding.h:66:12 #22 0x7fe907675544 in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1073:43 #23 0x7fe907676ba6 in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event**, mozilla::dom::EventTarget*, nsEventStatus*, bool) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1271:17 #24 0x7fe90766488f in mozilla::EventTargetChainItem::HandleEvent(mozilla::EventChainPostVisitor&, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:356:17 #25 0x7fe907662de1 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:558:16 #26 0x7fe90766789b in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:1055:11 #27 0x7fe90766c809 in mozilla::EventDispatcher::DispatchDOMEvent(nsISupports*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsPresContext*, nsEventStatus*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp #28 0x7fe90568d71e in nsINode::DispatchEvent(mozilla::dom::Event&, mozilla::dom::CallerType, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/base/nsINode.cpp:1259:17 #29 0x7fe9050f5237 in nsContentUtils::DispatchEvent(mozilla::dom::Document*, nsISupports*, nsTSubstring<char16_t> const&, mozilla::CanBubble, mozilla::Cancelable, mozilla::Composed, mozilla::Trusted, bool*, mozilla::ChromeOnlyDispatch) /builds/worker/workspace/build/src/dom/base/nsContentUtils.cpp:4077:28 #30 0x7fe9050f4f73 in nsContentUtils::DispatchTrustedEvent(mozilla::dom::Document*, nsISupports*, nsTSubstring<char16_t> const&, mozilla::CanBubble, mozilla::Cancelable, mozilla::Composed, bool*) /builds/worker/workspace/build/src/dom/base/nsContentUtils.cpp:4047:10 #31 0x7fe9053b7a15 in mozilla::dom::Document::DispatchContentLoadedEvents() /builds/worker/workspace/build/src/dom/base/Document.cpp:7204:3 #32 0x7fe9054837c4 in applyImpl<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:1163:12 #33 0x7fe9054837c4 in apply<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:1169:12 #34 0x7fe9054837c4 in mozilla::detail::RunnableMethodImpl<mozilla::dom::Document*, void (mozilla::dom::Document::*)(), true, (mozilla::RunnableKind)0>::Run() /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:1215:13 #35 0x7fe901490358 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1220:14 #36 0x7fe90149b16c in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #37 0x7fe9026ecf6f in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:87:21 #38 0x7fe9025e66d7 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #39 0x7fe9025e66d7 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308:3 #40 0x7fe9025e66d7 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290:3 #41 0x7fe9096bba08 in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:137:27 #42 0x7fe90cfb074b in nsAppStartup::Run() /builds/worker/workspace/build/src/toolkit/components/startup/nsAppStartup.cpp:272:30 #43 0x7fe90d1c4501 in XREMain::XRE_mainRun() /builds/worker/workspace/build/src/toolkit/xre/nsAppRunner.cpp:4566:22 #44 0x7fe90d1c6426 in XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&) /builds/worker/workspace/build/src/toolkit/xre/nsAppRunner.cpp:4701:8 #45 0x7fe90d1c7103 in XRE_main(int, char**, mozilla::BootstrapConfig const&) /builds/worker/workspace/build/src/toolkit/xre/nsAppRunner.cpp:4752:21 #46 0x5574da3468ff in do_main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:217:22 #47 0x5574da3468ff in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:331:16 #48 0x7fe923f6ab96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-use-after-free /builds/worker/workspace/build/src/obj-firefox/dist/include/nsDeque.h:83:42 in GetSize Shadow bytes around the buggy address: 0x0c288006e140: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c288006e150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c288006e160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c288006e170: 00 00 00 00 00 00 00 00 00 00 00 00 00 fa fa fa 0x0c288006e180: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd =>0x0c288006e190: fd fd fd fd fd fd fd fd fd fd fd fd fd fd[fd]fd 0x0c288006e1a0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c288006e1b0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fa fa 0x0c288006e1c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c288006e1d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c288006e1e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==20676==ABORTING ```
1,614,885
14,636,241
[Tracking Requested - why for this release]: In the first few hours of the 73 rollout there are numerous user reports that Firefox lost the ability to open any urls (same symptoms as bug 1610790) - this is sometimes accompanied by the application error code 0xc0000005 in the windows event log for firefox. i'm able to somewhat reproduce that on windows 10 by setting the compatibility settings for firefox to run as "windows 7", though it's not possible to tell if this same configuration was in place for everyone affected that reported these symptoms.
1,605,402
14,558,821
Created attachment 9117273 maven-metadata-logs.txt Over the past month or so :sebastian and :davidb have noted Fenix doesn't get the most recent Geckoview (or any other package hosted on https://snapshots.maven.mozilla.org/). We couldn't diagnose the issue until bug 1600995 was solved. ## Steps to reproduce _Extracted from this thread[1]_ 1. Notice a newly created package (say `feature-app-links-27.0.0-20191218.130110-1` is visibly added [2] but not listed on the corresponding `maven-metadata.xml`[3]. 2. See beetmover uploaded this package at 13:18:45 UTC[4]: > 2019-12-18 13:18:45,315 - beetmoverscript.script - INFO - put /app/workdir/cot/W0R39-DHSDqVRwMV2kSvqA/public/build/feature-app-links-27.0.0-20191218.130110-1.pom: 200 3. Get the logs of the lambda function that is triggered after step 2. Logs are attached to this bug. 4. See these lines: > 2019/12/18/[$LATEST]4a620f804c444614a080f462a47102f0 2019-12-18T13:19:04.810Z 2019-12-18T13:19:04.817Z WARN: Could not invalidate cache. Reason: An error occurred (Throttling) when calling the CreateInvalidation operation (reached max retries: 4): Rate exceeded [...] 2019/12/18/[$LATEST]4a620f804c444614a080f462a47102f0 2019-12-18T13:19:08.484Z 2019-12-18T13:19:19.857Z WARN: Could not invalidate cache. Reason: An error occurred (Throttling) when calling the CreateInvalidation operation (reached max retries: 4): Rate exceeded [...] 2019/12/18/[$LATEST]4a620f804c444614a080f462a47102f0 2019-12-18T13:19:18.701Z 2019-12-18T13:19:19.857Z WARN: Could not invalidate cache. Reason: An error occurred (Throttling) when calling the CreateInvalidation operation (reached max retries: 4): Rate exceeded [...] 2019/12/18/[$LATEST]4a620f804c444614a080f462a47102f0 2019-12-18T13:19:24.309Z 2019-12-18T13:19:24.315Z WARN: Could not invalidate cache. Reason: An error occurred (Throttling) when calling the CreateInvalidation operation (reached max retries: 4): Rate exceeded [...] 2019/12/18/[$LATEST]4a620f804c444614a080f462a47102f0 2019-12-18T13:19:37.647Z 2019-12-18T13:19:39.350Z WARN: Could not invalidate cache. Reason: An error occurred (Throttling) when calling the CreateInvalidation operation (reached max retries: 4): Rate exceeded 5. See these lines are output by the `invalidate_cloudfront()`[5] function. This problem occurs often enough to be visible by engineering management and we have no way to predict what component will be impacted. ## More context I think CloudFront is bailing out on us because we're hammering it on a very short amount of time. Each component uploaded on snapshot.maven.mozilla.org updates 5 files (4 on maven.mozilla.org) managed by CloudFront. There are 86 components uploaded each time. Therefore it adds up to 430 invalidation requests. Before bug 1580481, we had 2 beetmover workers, which means the load was throttled by them. Now, we dynamically scale, which explains why we didn't see this issue before. Moreover, looking at the timestamps in the logs, this run spent 72% of its runtime (45.6s over 62.7s) retrying to invalidate the cache. So, I think we're wasting lambda resources for not much. ## Solutions? I guess a simple fix would be to batch the 5 invalidation requests into 1. The fix would be in maven-lambda. Although, we may run into this issue if the number of components keeps increasing. :oremj, do you see another ways of solving this? [1] https://mozilla.slack.com/archives/CKM7DLL67/p1576687361053600 [2] https://snapshots.maven.mozilla.org/?prefix=maven2/org/mozilla/components/feature-app-links/27.0.0-SNAPSHOT/ [3] https://snapshots.maven.mozilla.org/maven2/org/mozilla/components/feature-app-links/27.0.0-SNAPSHOT/maven-metadata.xml (Note: it now is listed) [4] https://firefox-ci-tc.services.mozilla.com/tasks/AFsy1jn8QCCDSRgCPT-_tg/runs/0/logs/https%3A%2F%2Ffirefox-ci-tc.services.mozilla.com%2Fapi%2Fqueue%2Fv1%2Ftask%2FAFsy1jn8QCCDSRgCPT-_tg%2Fruns%2F0%2Fartifacts%2Fpublic%2Flogs%2Flive_backing.log#L23 [5] https://github.com/mozilla-releng/maven-lambda/blob/cca6eb9c67af6300b821c26a072ff0e3aedd174d/maven_lambda/metadata.py#L286-L307
1,605,641
14,560,412
The following testcase crashes on mozilla-central revision 20191222-ca5ff9e3c66e (build with --disable-debug, run with --fuzzing-safe --ion-offthread-compile=off --ion-full-warmup-threshold=0 --baseline-eager): var obj = typeof prototype; var thrower = function() { throw new x(); }; [...{} [thrower(...[typeof unescape])]] = obj; Backtrace: received signal SIGSEGV, Segmentation fault. 0x00005555557bac4b in js::ToBooleanSlow(JS::Handle<JS::Value>) () #0 0x00005555557bac4b in js::ToBooleanSlow(JS::Handle<JS::Value>) () #1 0x0000555555f75ca8 in js::jit::HandleException(js::jit::ResumeFromException*) () #2 0x000007684d53982b in ?? () #3 0xfffe14e206200668 in ?? () #4 0x00007fffffffbce8 in ?? () #5 0x0000000000000000 in ?? () rax 0x480000000000a 1266637395197962 rbx 0x7fffffffbe10 140737488338448 rcx 0xfffe000000000000 -562949953421312 rdx 0xfffb000000000000 -1407374883553280 rsi 0xfff8000100000000 -2251795518717952 rdi 0x7fffffffb810 140737488336912 rbp 0x7fffffffb710 140737488336656 rsp 0x7fffffffb710 140737488336656 r8 0x8 8 r9 0x3b539eb90660 65230331250272 r10 0x7ffff4bca800 140737299392512 r11 0x9b5487da 2606008282 r12 0x7ffff4c3f5ac 140737299871148 r13 0x7fffffffbb01 140737488337665 r14 0x20 32 r15 0x7ffff5e22000 140737318625280 rip 0x5555557bac4b <js::ToBooleanSlow(JS::Handle<JS::Value>)+75> => 0x5555557bac4b <_ZN2js13ToBooleanSlowEN2JS6HandleINS0_5ValueEEE+75>: mov (%rax),%rcx 0x5555557bac4e <_ZN2js13ToBooleanSlowEN2JS6HandleINS0_5ValueEEE+78>: mov (%rcx),%rcx This looks like a dangerous type confusion, both from the assert and the non-zero crash, marking s-s.
1,606,901
14,572,251
This bug is for crash report bp-fc264654-c85a-44d6-b13e-789fb0200103. Seen while looking at nightly crashes: https://bit.ly/2SRxCU2. Fairly low volume Windows crash which started in 20191205215330 All crashes have MOZ_RELEASE_ASSERT((aVar).get_PParentToChildStreamParent()) (NULL actor value passed to non-nullable param) Possible regression range based on build id: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=6989fcd6bab30c909411fbec04a4f29a78024ddd&tochange=ed92ceb9cb68d134de79f7e71aa70882e5a91f31 There are two IPC related landings in that changeset. ``` Top 10 frames of crashing thread: 0 xul.dll static mozilla::ipc::IPDLParamTraits<mozilla::ipc::IPCRemoteStreamType>::Write ipc/ipdl/InputStreamParams.cpp:898 1 xul.dll static mozilla::ipc::IPDLParamTraits<mozilla::ipc::IPCRemoteStreamParams>::Write ipc/ipdl/InputStreamParams.cpp:1096 2 xul.dll static mozilla::ipc::IPDLParamTraits<mozilla::ipc::InputStreamParams>::Write ipc/ipdl/InputStreamParams.cpp:2030 3 xul.dll static mozilla::ipc::IPDLParamTraits<mozilla::ipc::IPCStream>::Write ipc/ipdl/IPCStream.cpp:45 4 xul.dll static mozilla::ipc::IPDLParamTraits<mozilla::Maybe<mozilla::ipc::IPCStream> >::Write ipc/glue/IPDLParamTraits.h:250 5 xul.dll static mozilla::ipc::IPDLParamTraits<nsIInputStream*>::Write ipc/glue/IPCStreamUtils.cpp:537 6 xul.dll static mozilla::ipc::IPDLParamTraits<mozilla::dom::ReplacementChannelConfigInit>::Write ipc/ipdl/DOMTypes.cpp:2856 7 xul.dll static mozilla::ipc::IPDLParamTraits<mozilla::Maybe<mozilla::dom::ReplacementChannelConfigInit> >::Write ipc/glue/IPDLParamTraits.h:250 8 xul.dll static mozilla::ipc::IPDLParamTraits<mozilla::net::RedirectToRealChannelArgs>::Write ipc/ipdl/NeckoChannelParams.cpp:4942 9 xul.dll mozilla::net::PDocumentChannelParent::SendRedirectToRealChannel ipc/ipdl/PDocumentChannelParent.cpp:136 ```
1,607,443
14,577,321
Created attachment 9119085 RAW-EXPLOIT-POC.html We received an email to security@: ``` This is Ella from Qihoo 360 ATA team. We just caught a wild used 0day, and it's already been exploited in active attacks in the wild. It take advantage of PAC script engine and it is a remote cod execution issue. Attached is the POC for your reference. ``` Decrypted and attached, no analysis yet.
1,600,367
14,518,379
Created attachment 9112624 testcase.html Reduced with m-c: BuildID=20191129094247 SourceStamp=79c674504d23705095f572227f1f167dabede843 ``` ==58144==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fa842cb46b0 bp 0x7ffc1c1e7030 sp 0x7ffc1c1e7000 T0) ==58144==The signal is caused by a READ memory access. ==58144==Hint: address points to the zero page. #0 0x7fa842cb46af in nsFieldSetFrame::GetNaturalBaselineBOffset(mozilla::WritingMode, mozilla::BaselineSharingGroup, int*) const src/layout/forms/nsFieldSetFrame.cpp #1 0x7fa842cb3cbb in BaselineBOffset src/layout/generic/nsIFrameInlines.h:164:7 #2 0x7fa842cb3cbb in nsFieldSetFrame::GetLogicalBaseline(mozilla::WritingMode) const src/layout/forms/nsFieldSetFrame.cpp:820:27 #3 0x7fa842bce806 in PlaceFrame src/layout/generic/nsLineLayout.cpp:1367:35 #4 0x7fa842bce806 in nsLineLayout::ReflowFrame(nsIFrame*, nsReflowStatus&, mozilla::ReflowOutput*, bool&) src/layout/generic/nsLineLayout.cpp:1058:7 #5 0x7fa842b79642 in nsInlineFrame::ReflowInlineFrame(nsPresContext*, mozilla::ReflowInput const&, nsInlineFrame::InlineReflowInput&, nsIFrame*, nsReflowStatus&) src/layout/generic/nsInlineFrame.cpp:674:15 #6 0x7fa842b781c1 in nsInlineFrame::ReflowFrames(nsPresContext*, mozilla::ReflowInput const&, nsInlineFrame::InlineReflowInput&, mozilla::ReflowOutput&, nsReflowStatus&) src/layout/generic/nsInlineFrame.cpp:548:7 #7 0x7fa842b76d75 in nsInlineFrame::Reflow(nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, nsReflowStatus&) src/layout/generic/nsInlineFrame.cpp:363:3 #8 0x7fa842bcd6f1 in nsLineLayout::ReflowFrame(nsIFrame*, nsReflowStatus&, mozilla::ReflowOutput*, bool&) src/layout/generic/nsLineLayout.cpp:878:13 #9 0x7fa84296b9c3 in nsBlockFrame::ReflowInlineFrame(mozilla::BlockReflowInput&, nsLineLayout&, nsLineList_iterator, nsIFrame*, LineReflowStatus*) src/layout/generic/nsBlockFrame.cpp:4376:15 #10 0x7fa84296a2c3 in nsBlockFrame::DoReflowInlineFrames(mozilla::BlockReflowInput&, nsLineLayout&, nsLineList_iterator, nsFlowAreaRect&, int&, nsFloatManager::SavedState*, bool*, LineReflowStatus*, bool) src/layout/generic/nsBlockFrame.cpp:4178:5 #11 0x7fa842962920 in nsBlockFrame::ReflowInlineFrames(mozilla::BlockReflowInput&, nsLineList_iterator, bool*) src/layout/generic/nsBlockFrame.cpp:4063:9 #12 0x7fa84295b951 in nsBlockFrame::ReflowLine(mozilla::BlockReflowInput&, nsLineList_iterator, bool*) src/layout/generic/nsBlockFrame.cpp:3042:5 #13 0x7fa8429512fc in nsBlockFrame::ReflowDirtyLines(mozilla::BlockReflowInput&) src/layout/generic/nsBlockFrame.cpp:2582:7 #14 0x7fa84294841d in nsBlockFrame::Reflow(nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, nsReflowStatus&) src/layout/generic/nsBlockFrame.cpp:1325:3 #15 0x7fa84296830c in nsBlockReflowContext::ReflowBlock(mozilla::LogicalRect const&, bool, nsCollapsingMargin&, int, bool, nsLineBox*, mozilla::ReflowInput&, nsReflowStatus&, mozilla::BlockReflowInput&) src/layout/generic/nsBlockReflowContext.cpp:293:11 #16 0x7fa84295e402 in nsBlockFrame::ReflowBlockFrame(mozilla::BlockReflowInput&, nsLineList_iterator, bool*) src/layout/generic/nsBlockFrame.cpp:3694:11 #17 0x7fa84295baab in nsBlockFrame::ReflowLine(mozilla::BlockReflowInput&, nsLineList_iterator, bool*) src/layout/generic/nsBlockFrame.cpp:3039:5 #18 0x7fa8429512fc in nsBlockFrame::ReflowDirtyLines(mozilla::BlockReflowInput&) src/layout/generic/nsBlockFrame.cpp:2582:7 #19 0x7fa84294841d in nsBlockFrame::Reflow(nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, nsReflowStatus&) src/layout/generic/nsBlockFrame.cpp:1325:3 #20 0x7fa84299f757 in nsContainerFrame::ReflowChild(nsIFrame*, nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, mozilla::WritingMode const&, mozilla::LogicalPoint const&, nsSize const&, nsIFrame::ReflowChildFlags, nsReflowStatus&, nsOverflowContinuationTracker*) src/layout/generic/nsContainerFrame.cpp:910:14 #21 0x7fa84299e281 in nsCanvasFrame::Reflow(nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, nsReflowStatus&) src/layout/generic/nsCanvasFrame.cpp:738:5 #22 0x7fa84299f757 in nsContainerFrame::ReflowChild(nsIFrame*, nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, mozilla::WritingMode const&, mozilla::LogicalPoint const&, nsSize const&, nsIFrame::ReflowChildFlags, nsReflowStatus&, nsOverflowContinuationTracker*) src/layout/generic/nsContainerFrame.cpp:910:14 #23 0x7fa842aab11b in nsHTMLScrollFrame::ReflowScrolledFrame(mozilla::ScrollReflowInput*, bool, bool, mozilla::ReflowOutput*) src/layout/generic/nsGfxScrollFrame.cpp:649:3 #24 0x7fa842aac4d8 in nsHTMLScrollFrame::ReflowContents(mozilla::ScrollReflowInput*, mozilla::ReflowOutput const&) src/layout/generic/nsGfxScrollFrame.cpp:763:3 #25 0x7fa842ab1e71 in nsHTMLScrollFrame::Reflow(nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, nsReflowStatus&) src/layout/generic/nsGfxScrollFrame.cpp:1142:3 #26 0x7fa842934a3c in nsContainerFrame::ReflowChild(nsIFrame*, nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, int, int, nsIFrame::ReflowChildFlags, nsReflowStatus&, nsOverflowContinuationTracker*) src/layout/generic/nsContainerFrame.cpp:950:14 #27 0x7fa842933c01 in mozilla::ViewportFrame::Reflow(nsPresContext*, mozilla::ReflowOutput&, mozilla::ReflowInput const&, nsReflowStatus&) src/layout/generic/ViewportFrame.cpp:299:7 #28 0x7fa8427088df in mozilla::PresShell::DoReflow(nsIFrame*, bool, mozilla::OverflowChangedTracker*) src/layout/base/PresShell.cpp:9179:11 #29 0x7fa842721397 in mozilla::PresShell::ProcessReflowCommands(bool) src/layout/base/PresShell.cpp:9352:24 #30 0x7fa84271ed1a in mozilla::PresShell::DoFlushPendingNotifications(mozilla::ChangesToFlush) src/layout/base/PresShell.cpp:4111:11 #31 0x7fa8426a1baf in FlushPendingNotifications src/obj-firefox/dist/include/mozilla/PresShell.h:1452:5 #32 0x7fa8426a1baf in nsRefreshDriver::Tick(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp) src/layout/base/nsRefreshDriver.cpp:2050:20 #33 0x7fa8426b27a1 in TickDriver src/layout/base/nsRefreshDriver.cpp:373:13 #34 0x7fa8426b27a1 in mozilla::RefreshDriverTimer::TickRefreshDrivers(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp, nsTArray<RefPtr<nsRefreshDriver> >&) src/layout/base/nsRefreshDriver.cpp:350:7 #35 0x7fa8426b22cb in mozilla::RefreshDriverTimer::Tick(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp) src/layout/base/nsRefreshDriver.cpp:367:5 #36 0x7fa8426b1613 in RunRefreshDrivers src/layout/base/nsRefreshDriver.cpp:819:5 #37 0x7fa8426b1613 in mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::TickRefreshDriver(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp) src/layout/base/nsRefreshDriver.cpp:739:16 #38 0x7fa8426b0947 in mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::NotifyVsync(mozilla::VsyncEvent const&) src/layout/base/nsRefreshDriver.cpp:634:9 #39 0x7fa842f9aba9 in mozilla::layout::VsyncChild::RecvNotify(mozilla::VsyncEvent const&) src/layout/ipc/VsyncChild.cpp:65:16 #40 0x7fa83b2543df in mozilla::layout::PVsyncChild::OnMessageReceived(IPC::Message const&) src/obj-firefox/ipc/ipdl/PVsyncChild.cpp:187:54 #41 0x7fa83acbfe4e in mozilla::ipc::PBackgroundChild::OnMessageReceived(IPC::Message const&) src/obj-firefox/ipc/ipdl/PBackgroundChild.cpp:5876:32 #42 0x7fa83a5300e6 in mozilla::ipc::MessageChannel::DispatchAsyncMessage(mozilla::ipc::ActorLifecycleProxy*, IPC::Message const&) src/ipc/glue/MessageChannel.cpp:2208:25 #43 0x7fa83a52b101 in mozilla::ipc::MessageChannel::DispatchMessage(IPC::Message&&) src/ipc/glue/MessageChannel.cpp:2130:9 #44 0x7fa83a52d671 in mozilla::ipc::MessageChannel::RunMessage(mozilla::ipc::MessageChannel::MessageTask&) src/ipc/glue/MessageChannel.cpp:1972:3 #45 0x7fa83a52e537 in mozilla::ipc::MessageChannel::MessageTask::Run() src/ipc/glue/MessageChannel.cpp:2003:13 #46 0x7fa8393186fa in nsThread::ProcessNextEvent(bool, bool*) src/xpcom/threads/nsThread.cpp:1250:14 #47 0x7fa83931fba1 in NS_ProcessNextEvent(nsIThread*, bool) src/xpcom/threads/nsThreadUtils.cpp:486:10 #48 0x7fa83a53929f in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) src/ipc/glue/MessagePump.cpp:88:21 #49 0x7fa83a4434d2 in RunInternal src/ipc/chromium/src/base/message_loop.cc:315:10 #50 0x7fa83a4434d2 in RunHandler src/ipc/chromium/src/base/message_loop.cc:308:3 #51 0x7fa83a4434d2 in MessageLoop::Run() src/ipc/chromium/src/base/message_loop.cc:290:3 #52 0x7fa8421253c8 in nsBaseAppShell::Run() src/widget/nsBaseAppShell.cpp:137:27 #53 0x7fa84618ce76 in XRE_RunAppShell() src/toolkit/xre/nsEmbedFunctions.cpp:934:20 #54 0x7fa83a4434d2 in RunInternal src/ipc/chromium/src/base/message_loop.cc:315:10 #55 0x7fa83a4434d2 in RunHandler src/ipc/chromium/src/base/message_loop.cc:308:3 #56 0x7fa83a4434d2 in MessageLoop::Run() src/ipc/chromium/src/base/message_loop.cc:290:3 #57 0x7fa84618c6c4 in XRE_InitChildProcess(int, char**, XREChildData const*) src/toolkit/xre/nsEmbedFunctions.cpp:769:34 #58 0x55baa259dc5c in content_process_main src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28 #59 0x55baa259dc5c in main src/browser/app/nsBrowserApp.cpp:272:18 ```
1,602,190
14,532,751
```js function f(x, y) { return (y ? 0.1 : (x ? Math.fround(1) : (1 / 0))); } let i = [1]; for (let j = 0; j < 2; ++j) { for (let k = 0; k < 2; ++k) { print(f(1, i[k])); } } ``` ```bash $ ./js-dbg-64-dm-linux-x86_64-0d24f14c0847 --fuzzing-safe --no-threads --baseline-eager --no-ion testcase.js 0.1 1 0.1 1 $ ``` ```bash $ ./js-dbg-64-dm-linux-x86_64-0d24f14c0847 --fuzzing-safe --no-threads --ion-eager testcase.js 0.1 1 0.10000000149011612 1 ``` Tested this on m-c rev 0d24f14c0847. My configure flags are: AR=ar sh ./configure --enable-debug --enable-more-deterministic --with-ccache --enable-gczeal --enable-debug-symbols --disable-tests autobisectjs shows this is probably related to the following changeset: The first bad revision is: changeset: https://hg.mozilla.org/mozilla-central/rev/03783d54b398 user: Jan de Mooij date: Wed Nov 20 17:03:29 2019 +0000 summary: Bug 1595476 part 3 - Rewrite and simplify control flow logic in Ion for bytecode -> MIR compilation. r=tcampbell Setting s-s as a start, as a bug involving MIR is listed as a potential regressor. Jan, is bug 1595476 a likely regressor?
546,748
4,540,735
We had no Windows builds between Feb. 11 and Feb. 16; a new accessibility topcrash appeared in the Feb. 16 builds. Unfortunately, due to PGO, etc., the topcrash's signature changes every day. The ones for yesterday are: http://crash-stats.mozilla.com/report/list?product=Firefox&branch=1.9.3&platform=windows&query_search=signature&query_type=exact&query=&date=&range_value=31&range_unit=days&process_type=all&plugin_field=&plugin_query_type=&plugin_query=&do_query=1&signature=nsRefPtr%3CAddStyleSheetTxn%3E%3A%3Aassign_assuming_AddRef%28AddStyleSheetTxn*%29%20|%20nsAccEventQueue%3A%3AShutdown%28%29 and the ones for today are: http://crash-stats.mozilla.com/report/list?product=Firefox&branch=1.9.3&platform=windows&query_search=signature&query_type=exact&query=&date=&range_value=1&range_unit=weeks&process_type=all&plugin_field=&plugin_query_type=&plugin_query=&do_query=1&signature=nsRefPtr%3CnsGenericElement%3E%3A%3Aassign_assuming_AddRef%28nsGenericElement*%29%20|%20nsAccEventQueue%3A%3AShutdown%28%29
554,354
4,599,240
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729) Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.9.2) Gecko/20100115 Firefox/3.6 (.NET CLR 3.5.30729) When using DHE cipher suites, a correctly crafted server key exchange message will crash Firefox. struct { opaque dh_p<1..2^16-1>; opaque dh_g<1..2^16-1>; opaque dh_Ys<1..2^16-1>; } ServerDHParams; /* Ephemeral DH parameters */ dh_p can be zero length, dh_g can be zero length - but when dh_Ys is zero length; Firefox crashes. example encoding: 00 00 00 00 00 00 Signature on key is validated first - so easiest done by Evil TLS Server(TM). Reproducible: Always Steps to Reproduce: Modify TLS server to send a 0 length dh_Ys. Actual Results: On linux - firefox vanishes. On windows - crash report application comes up. Expected Results: Rejection of invalid dh params. Some similar bad parameters are caught with errors about memory allocation failure.
558,540
4,631,851
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.3a5pre) Gecko/20100409 Minefield/3.7a5pre (.NET CLR 3.5.30729) Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.3a5pre) Gecko/20100409 Minefield/3.7a5pre (.NET CLR 3.5.30729) After two crashes the session restore tab appears. If you deselect one or more tabs the session can not be restored. If you don't change the selection (i.e. restore everything) it works. Reproducible: Always Steps to Reproduce: 1.close Minefield 2.copy the attached sessionstore.js into the profile folder 3.start Minefield 4.in the sessionrestore tab deselect one entry (e.g. the last) 5.click Restore (6. type "about:sessionrestore" into the location bar and press enter 7.click Restore) Actual Results: After step 5 nothing is restored. An error is logged in the error console. After step 7 everything is restored. Expected Results: Partial restore should work.
576,761
4,781,132
User-Agent: Mozilla/5.0 (Windows; Windows NT 6.1; WOW64; en-US; rv:2.0b2pre) Gecko/20100703 Minefield/4.0b2pre Build Identifier: Mozilla/5.0 (Windows; Windows NT 6.1; WOW64; en-US; rv:2.0b2pre) Gecko/20100703 Minefield/4.0b2pre When you specify a transform and transition on an element, transitioning between an unspecified state and a specified state will crash when you move the mouse off the element (i.e. when the transition starts to reverse) It only happens when it quickly switches back and forth between the states, transitioning entirely to one state and back again is fine. Transitioning between two specified transforms (i.e. rotate(0deg) and rotate(360deg) works fine, it's only when the starting transform is unspecified. Sorry if this doesn't make much sense, the testcase I'll attach should show it clearer. Reproducible: Always Steps to Reproduce: 1. Load the attached testcase 2. Place the cursor in the top right corner of the box 3. Wait until the rotation proceeds until the cursor moves off the element, and it starts rotating back. It mainly crashes for me, but I have seen it work ok when trying to reproduce it. So it might be required to test a few times.
578,215
4,790,911
User-Agent: Mozilla/5.0 (Windows; Windows NT 6.0; en-US; rv:2.0b2pre) Gecko/20100712 Minefield/4.0b2pre Firefox/3.6 Build Identifier: Mozilla/5.0 (Windows; Windows NT 6.0; en-US; rv:2.0b2pre) Gecko/20100712 Minefield/4.0b2pre Firefox/3.6 Page flashes for a fraction of a second, then browser crashes Reproducible: Always Steps to Reproduce: 1.Download a zip build, 20100712090037 03782d915403 or later 2.Unzip and start the browser 3.Open the page http://html5test.com/ Actual Results: Browser crashes Expected Results: Page opens, no crash Last good build: 20100712073718 58eb7d767d6f Crashes with fresh profile, safe-mode Some crash reports (Hourlies, so may not help much): bp-3960e94c-f33f-4547-bdff-cc0022100712 bp-f9b2d2b9-7e16-4997-9495-2096b2100712 bp-093a46e3-cbf4-474a-9f64-3a65f2100712 ... [@ xul.dll@0x45fcf2] [@ xul.dll@0x4698f9] EXCEPTION_ACCESS_VIOLATION
515,316
4,289,254
[Build Id] > Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.4pre) Gecko/20090907 Shredder/3.0b4pre "Use my account settings" of retention policy of a folder is changed to Inbox's setting when "Use my account settings" of Inbox is changed. This was observed while I tried to see Tb trunk's behaviour for Bug 515037. a) Above is observed on all of POP3(Non Global Inbox use), IMAP, "Local Folders". b) Upon folder creation, "Use my account settings" looks to be inherited from "Use my account settings" of Inbox of the account. c) Problem doesn't seem to occur on folder of "Default Account". d) Problem is observed after restart of Tb. e) Once retention policy setting of a folder is changed with "Use my account settings"=unchecked, problem doesn't seem to occur, even after change back to original/default setting. Data/Control block for retention policy is not cleanly initialized upon folder creation? [Steps to reproduce] 1. Create a new profile 2. Create first account(default account, POP3) => "Local Folders" is created too. 3. Create Inbox, Sent etc. at "Local Folders" 4. Create some accounts(POP3, IMAP. Non default account) 5. Create some folders under each account. 6. View "Use my account settings" of Inbox and some folders under an account. 7. Change "Use my account settings" of Inbox (Checked=>Unchecked, Unchecked=>Checked) 8. View "Use my account settings" of folders. If Checked=>Unchecked at step 7, Unchecked. If Unhecked=>Checked at step 7, Checked.
516,709
4,300,389
Created attachment 400764 more detailed information (stack) from windbg/!exploitable 1.9.1 Nightly Debug Build steps to reproduce: -> Load http://www.laserwords.com/commercial.php in a debugger --> !exploitable report a problem 93c.c18): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=ffff0104 ebx=0519e7c8 ecx=00000000 edx=00baad04 esi=05196578 edi=ffff0105 eip=74da6e19 esp=00126448 ebp=00126458 iopl=0 nv up ei ng nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010286 USP10!LoadCmapFontGlyphs+0x59: 74da6e19 66893c53 mov word ptr [ebx+edx*2],di ds:0023:068f41d0=???? 0:000> !exploitable -v HostMachine\HostUser Executing Processor Architecture is x86 Debuggee is in User Mode Debuggee is a live user mode debugging session on the local machine Event Type: Exception Exception Faulting Address: 0x68f41d0 First Chance Exception Type: STATUS_ACCESS_VIOLATION (0xC0000005) Exception Sub-Type: Write Access Violation Exception Hash (Major/Minor): 0x287e0601.0x7074110b Stack Trace: USP10!LoadCmapFontGlyphs+0x59 USP10!FillCMAP+0x36 USP10!LoadFont+0x1de USP10!FindOrCreateFaceCache+0x9c USP10!FindOrCreateSizeCacheWithoutRealizationID+0xc7 USP10!FindOrCreateSizeCacheUsingRealizationID+0x5d USP10!UpdateCache+0x2c USP10!ScriptCheckCache+0x67 USP10!ScriptShape+0x88 thebes!UniscribeItem::ShapeUniscribe+0x11a thebes!UniscribeItem::Shape+0x3a thebes!gfxWindowsFontGroup::InitTextRunUniscribe+0x19b thebes!gfxWindowsFontGroup::MakeTextRun+0x169 thebes!TextRunWordCache::MakeTextRun+0x7bb thebes!gfxTextRunWordCache::MakeTextRun+0x2f gklayout!MakeTextRun+0x77 gklayout!BuildTextRunsScanner::BuildTextRunForFrames+0xcef gklayout!BuildTextRunsScanner::FlushFrames+0x1f6 gklayout!BuildTextRuns+0x656 gklayout!nsTextFrame::EnsureTextRun+0xb2 gklayout!nsTextFrame::Reflow+0x420 gklayout!nsLineLayout::ReflowFrame+0x3ab gklayout!nsBlockFrame::ReflowInlineFrame+0x5e gklayout!nsBlockFrame::DoReflowInlineFrames+0x210 gklayout!nsBlockFrame::ReflowInlineFrames+0xf2 gklayout!nsBlockFrame::ReflowLine+0x2c2 gklayout!nsBlockFrame::ReflowDirtyLines+0x561 gklayout!nsBlockFrame::Reflow+0x251 gklayout!nsBlockReflowContext::ReflowBlock+0x1a3 gklayout!nsBlockFrame::ReflowBlockFrame+0x6b3 gklayout!nsBlockFrame::ReflowLine+0xd2 gklayout!nsBlockFrame::ReflowDirtyLines+0x561 gklayout!nsBlockFrame::Reflow+0x251 gklayout!nsBlockReflowContext::ReflowBlock+0x1a3 gklayout!nsBlockFrame::ReflowBlockFrame+0x6b3 gklayout!nsBlockFrame::ReflowLine+0xd2 gklayout!nsBlockFrame::ReflowDirtyLines+0x561 gklayout!nsBlockFrame::Reflow+0x251 gklayout!nsBlockReflowContext::ReflowBlock+0x1a3 gklayout!nsBlockFrame::ReflowBlockFrame+0x6b3 gklayout!nsBlockFrame::ReflowLine+0xd2 gklayout!nsBlockFrame::ReflowDirtyLines+0x561 gklayout!nsBlockFrame::Reflow+0x251 gklayout!nsBlockReflowContext::ReflowBlock+0x1a3 gklayout!nsBlockFrame::ReflowBlockFrame+0x6b3 gklayout!nsBlockFrame::ReflowLine+0xd2 gklayout!nsBlockFrame::ReflowDirtyLines+0x561 gklayout!nsBlockFrame::Reflow+0x251 gklayout!nsBlockReflowContext::ReflowBlock+0x1a3 gklayout!nsBlockFrame::ReflowBlockFrame+0x6b3 gklayout!nsBlockFrame::ReflowLine+0xd2 gklayout!nsBlockFrame::ReflowDirtyLines+0x561 gklayout!nsBlockFrame::Reflow+0x251 gklayout!nsBlockReflowContext::ReflowBlock+0x1a3 gklayout!nsBlockFrame::ReflowBlockFrame+0x6b3 gklayout!nsBlockFrame::ReflowLine+0xd2 gklayout!nsBlockFrame::ReflowDirtyLines+0x561 gklayout!nsBlockFrame::Reflow+0x251 gklayout!nsBlockReflowContext::ReflowBlock+0x1a3 gklayout!nsBlockFrame::ReflowBlockFrame+0x6b3 gklayout!nsBlockFrame::ReflowLine+0xd2 gklayout!nsBlockFrame::ReflowDirtyLines+0x561 gklayout!nsBlockFrame::Reflow+0x251 gklayout!nsContainerFrame::ReflowChild+0xe9 Instruction Address: 0x0000000074da6e19 Description: User Mode Write AV Short Description: WriteAV Exploitability Classification: EXPLOITABLE Recommended Bug Title: Exploitable - User Mode Write AV starting at USP10!LoadCmapFontGlyphs+0x0000000000000059 (Hash=0x287e0601.0x7074110b) User mode write access violations that are not near NULL are exploitable.
521,849
4,342,425
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/532.0 (KHTML, like Gecko) Chrome/3.0.195.25 Safari/532.0 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.4) Gecko/20091007 Firefox/3.5.4 (.NET CLR 3.5.30729) When Starting the newest build of firefox you first get the following error. Could not initialize the application's security componet. The most likely cause is problems with files in your application's profile directory. Please check that this directory has no read/write restrictions... after you dismiss the alert, any https url will result in a Secure Connection Failed message in the browser. This seems to be a problem with this build only going back to older versions fixes the problem Reproducible: Always Steps to Reproduce: 1. open firefox confirm your receive alert dialog box 2. 3. Actual Results: notice any sites that require ssl do not work get error code (Error code: ssl_error_ssl_disabled)
524,462
4,363,878
regression? crash [@ gfxWindowsFontGroup::WhichFontSupportsChar(nsTArray<nsRefPtr<FontEntry> > const&, unsigned int)] appears as top of stack for both FF and TB. No FF crashes prior to 3.1 aka 3.5, so perhaps a regression? For thunderbird, about 1/3-1/2 look to be crashes during startup. 99% windows, but here are two Mac crashes: TB bp-324d1f10-ed11-4e33-9830-94dc92090717 SM bp-c17887a3-fb93-44fc-bff3-81adf2091002 bp-02466c92-dc16-42a0-aa23-46e352091025 0 thunderbird.exe gfxWindowsFontGroup::WhichFontSupportsChar gfx/thebes/src/gfxWindowsFonts.cpp:2383 1 thunderbird.exe gfxWindowsFontGroup::WhichPrefFontSupportsChar gfx/thebes/src/gfxWindowsFonts.cpp:2513 2 thunderbird.exe gfxFontGroup::FindFontForChar gfx/thebes/src/gfxFont.cpp:1129 3 thunderbird.exe gfxFontGroup::ComputeRanges gfx/thebes/src/gfxFont.cpp:1182 4 thunderbird.exe gfxWindowsFontGroup::InitTextRunUniscribe gfx/thebes/src/gfxWindowsFonts.cpp:2607 5 thunderbird.exe gfxWindowsFontGroup::MakeTextRun gfx/thebes/src/gfxWindowsFonts.cpp:1444 6 thunderbird.exe TextRunWordCache::MakeTextRun gfx/thebes/src/gfxTextRunWordCache.cpp:683 7 thunderbird.exe gfxTextRunWordCache::MakeTextRun gfx/thebes/src/gfxTextRunWordCache.cpp:992 8 thunderbird.exe gfxTextRunCache::MakeTextRun gfx/thebes/src/gfxTextRunCache.cpp:89 9 thunderbird.exe nsThebesFontMetrics::AutoTextRun::AutoTextRun gfx/src/thebes/nsThebesFontMetrics.h:171 10 thunderbird.exe nsThebesFontMetrics::GetWidth gfx/src/thebes/nsThebesFontMetrics.cpp:340 11 thunderbird.exe nsThebesRenderingContext::GetWidthInternal gfx/src/thebes/nsThebesRenderingContext.cpp:869 12 thunderbird.exe nsRenderingContextImpl::GetWidth gfx/src/shared/nsRenderingContextImpl.cpp:170 13 thunderbird.exe nsLayoutUtils::GetStringWidth layout/base/nsLayoutUtils.cpp:2487 14 thunderbird.exe nsTreeBodyFrame::AdjustForCellText layout/xul/base/src/tree/src/nsTreeBodyFrame.cpp:1521 15 thunderbird.exe nsTreeBodyFrame::PaintText layout/xul/base/src/tree/src/nsTreeBodyFrame.cpp:3618 16 thunderbird.exe nsTreeBodyFrame::PaintCell layout/xul/base/src/tree/src/nsTreeBodyFrame.cpp:3306 17 thunderbird.exe nsTreeBodyFrame::PaintRow layout/xul/base/src/tree/src/nsTreeBodyFrame.cpp:3097 18 thunderbird.exe nsTreeBodyFrame::PaintTreeBody layout/xul/base/src/tree/src/nsTreeBodyFrame.cpp:2900 19 thunderbird.exe PaintTreeBody layout/xul/base/src/tree/src/nsTreeBodyFrame.cpp:2828 20 thunderbird.exe nsDisplayGeneric::Paint layout/base/nsDisplayList.h:875 21 thunderbird.exe nsDisplayList::Paint layout/base/nsDisplayList.cpp:313 22 thunderbird.exe nsDisplayClip::Paint layout/base/nsDisplayList.cpp:978 23 thunderbird.exe nsDisplayList::Paint layout/base/nsDisplayList.cpp:313 24 thunderbird.exe nsLayoutUtils::PaintFrame layout/base/nsLayoutUtils.cpp:1114 25 thunderbird.exe PresShell::Paint layout/base/nsPresShell.cpp:5775 26 thunderbird.exe nsViewManager::RenderViews view/src/nsViewManager.cpp:648 FF crashes with comments: bp-14bd7ab9-18db-41c3-89e7-db8202091017 bp-4b194b29-ceb9-4324-8afe-dfed62090904 Also appears in SM 2.0 http://crash-stats.mozilla.com/report/index/88e0b210-3e72-453b-b107-c5a592091012
525,581
4,373,285
There are a number of Firefox 3.6b1 crash reports at AffixMgr::suffix_check: http://crash-stats.mozilla.com/report/list?product=Firefox&version=Firefox%3A3.6b1&query_search=signature&query_type=exact&query=&date=&range_value=1&range_unit=weeks&do_query=1&signature=AffixMgr%3A%3Asuffix_check%28char%20const*%2C%20int%2C%20int%2C%20AffEntry*%2C%20char**%2C%20int%2C%20int*%2C%20unsigned%20short%2C%20unsigned%20short%2C%20char%29
536,485
4,462,467
We've now seen our first crash in the new code that uses Intel's new AES instructions. Server crashes almost immediately after startup of benchmark test. Stack trace : t@353 (l@353) terminated by signal SEGV (Segmentation Fault) 0xfffffd7ffa49b006: intel_aes_decrypt_cbc_256+0x0226: (dbx) where current thread: t@353 =>[1] intel_aes_decrypt_cbc_256(0x18ed9da8, 0x942e7010, 0x18ed9d88, 0x4800, 0x942f1010, 0x30), at 0xfffffd7ffa49b006 [2] AES_Decrypt(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at 0xfffffd7ffa4474fa [3] ssl3_HandleRecord(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at 0xfffffd7ffb848699 [4] ssl3_GatherCompleteHandshake(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at 0xfffffd7ffb84a4b3 [5] ssl_GatherRecord1stHandshake(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at 0xfffffd7ffb84b8f4 [6] ssl_SecureRecv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at 0xfffffd7ffb858006 [7] ssl_Recv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at 0xfffffd7ffb86187f [8] DaemonSession::run(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at 0xfffffd7ffd1c9761 [9] ThreadMain(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at 0xfffffd7ffcf79347 [10] _pt_root(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at 0xfffffd7ffd434e15 [11] _thrp_setup(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at 0xfffffd7fff143244 [12] _lwp_start(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at 0xfffffd7fff143500 (dbx) x $rdi /4 x 0x0000000018ed9da8: 0x2e75 0x6ca1 0x24a6 0x2246 (dbx) x $rip /16 x 0xfffffd7ffa49b006: intel_aes_decrypt_cbc_256+0x0226: 0x0f66 0xdf38 0x660f 0xef0f 0xf3c8 0x7f0f 0x060c 0x41f3 Crash occurs at this instruction: 1624 .byte 0x66,0x0f,0x38,0xdf,0x0f /* aesdeclast (%rdi), %xmm1 */ Crash is a SIGSEGV. Memory at address in RDI register is readily accessible. Unclear why SEGV occurs. Do we know that this code actually works on any real Intel CPUs? Maybe we need a way to disable/override the test for this instruction set.
666,516
5,550,424
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_7) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.797.0 Safari/535.1 Build Identifier: xulrunner (all versions) This is an old bug and it was reported like 2 years ago. I thought it was fixed but that is not the case in xul2.0 and perhaps even xul5.0 In summary, if we override @mozilla.org/security/certoverride;1 via the following chrome manifest component {6c367300-5a77-11df-a08a-0800200c9a61} components/CertOverrideService.js contract @mozilla.org/security/certoverride;1 {6c367300-5a77-11df-a08a-0800200c9a61} A crash will occur within certManager.xul when the following line is invoked serverTreeView.loadCertsFromCache(certcache, nsIX509Cert.SERVER_CERT); As far as I remember the issue was somehow related to the way the XPCOM instance was handled in the C code (old code conventions?). This service @mozilla.org/security/certoverride;1 is actually overridden by several popular extensions and products such as Selenium. A legitimate reason for overriding it is to hide bad ssl certificate problems. Reproducible: Always Steps to Reproduce: See above. Actual Results: The app crashes when certManager.xul is opened. Expected Results: It should not crash.
667,225
5,556,272
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:7.0a1) Gecko/20110625 Firefox/7.0a1 Build Identifier: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:7.0a1) Gecko/20110625 Firefox/7.0a1 The latest hourly azure builds are having problem with specifically this IE test : Psychedelic Browsing ( http://ie.microsoft.com/testdrive/performance/psychedelicbrowsing/Default.html ) Reproducible: Always Steps to Reproduce: 1.Have the latest Hourly (at point of bug posting) having the Azure Rendering engine ( http://ftp.mozilla.org/pub/mozilla.org/firefox/tinderbox-builds/mozilla-central-win32/1309018896/ ) 2.Open link ie.microsoft.com/testdrive/performance/psychedelicbrowsing/Default.html 3.Start the Psychedelic Browsing test by clicking Find Out Actual Results: Firefox Crashes Expected Results: The test should run properly as it runs on latest Nightly (7.0a1 (2011-06-25))
668,222
5,564,572
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:5.0) Gecko/20100101 Firefox/5.0 Build ID: 20110622131247 Steps to reproduce: Just upgraded to TB 5.0 and Lightning 1.0b4 on Linux x86-64 bit. Apparently bugzilla does not have 1.0b4 version in the drop down list, so I had to put unspecified. Colleague scheduled a meeting with Outlook. I get an email, with an option to Accept, Deny, Tentative...Apparently after I hit Accept, buttons disappear for a few sec and they show again with nothing processed. Actual results: Nothing and that is the problem. Expected results: Meeting processed and showing up in my calendar. Additionally an email should have been sent to the originator that I Accepted the meeting.
606,141
5,027,095
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:2.0b6) Gecko/20100101 Firefox/4.0b6 Build Identifier: with JIT enable, [i for(i in j)] will cause crash when j.length>=1048576. Reproducible: Always Steps to Reproduce: // Crash with JIT D:\Documents and Settings\Lymtics\My Documents>js -m -j js> for (var str="0",i=20;i--;) void(str=str+str); js> str.length 1048576 js> [i for(i in str)] Assertion failure: tracecx->bailExit, at d:/Projects/mozilla-central/js/src/jstracer.cpp:7961 D:\Documents and Settings\Lymtics\My Documents> // Exception Throw without JIT D:\Documents and Settings\Lymtics\My Documents>js -m js> for (var str="0",i=20;i--;) void(str=str+str); js> [i for(i in str)] typein:3: InternalError: array initialiser too large js> Also with JIT enabled, this makes firefox crash too. Actual Results: crash. Expected Results: an Exception throwed
610,162
5,063,160
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.11 (KHTML, like Gecko) Chrome/9.0.570.0 Safari/534.11 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2.12) Gecko/20101026 Firefox/3.6.12 Using nsICryptoHash.updateFromStream() with the SHA-512 algorithm, the results returned when running under Windows are incorrect for files of exactly 512MB or larger. I've tested the same XPI under the following hardware / OS / browser combos: 64-bit hardware, Windows 7 64-bit, Fx 3.6.12 64-bit hardware, Windows XP 32-bit (in a VM), Fx 4.0b6 64-bit hardware, Mac OS X 10.6.4 32-bit, Fx 3.6.12 64-bit hardware, Mac OS X 10.6.4 32-bit (in a VM), Fx 3.6.12 Both Windows versions gave correct hashes until the file size hit exactly 512MB (536,870,912 bytes), when the hashes returned became incorrect. Both Mac OS X instances gave the correct hash regardless of the file size. I've verified the hash using the Mac OS X terminal, and 5 independent Windows applications (dp-hash, KRyLack, DivHash, Febooti Tweak, HashCalc)... they all return the same hash, so it really does appear as if Fx running under Windows returns incorrect hashes when the file is 512MB or larger. See the attachment "testnsicrypto.xpi" for a very simple add-on which will let you hash files (it's available at the bottom of the "Tools" menu after installation). Note 1: The add-on runs in the main thread as I wanted to rule out running in a background thread causing the issue, so you have to ignore the "Not responding" message in the title bar until the hashing process has finished (it takes about 15 seconds per 500MB). Note 2: Most of the files I tested were created from the Windows 7 command line using "fsutil file createnew <filename> <length in bytes>" - which seems to create files filled with NUL characters. However, I have also tested some other large files, such as virtual disk images, which have real data in them, and saw the same issue. Note 3: I have attached a ZIP file containing two large files - "lf536870911", which is exactly 1 byte less than 512MB, and "lf536870912" which is exactly 512MB. You will need 1GB of disk space to expand these to, even though the download is only 1.2MB! Note 4: This issue also seems present when using SHA-384 algorithm but not SHA-256 or earlier. However, the bulk of my testing has been using the SHA-512 algorithm. Reproducible: Always Steps to Reproduce: 1. Select a file less than 512MB 2. Hash it on Windows and Mac OS X 3. Select a file of exactly 512MB or more 4. Hash it on Windows and Mac OS X Actual Results: For the file less than 512MB, the hashes are the same over OSes. For the larger file, the Windows version of Fx is giving an incorrect hash. Expected Results: I would expect the same hash on both Windows and Mac OS X, regardless of the file size. For the 536,870,911 byte file, I get the following SHA-512 hash from all programs tested: ca38ed29e4b841a2d666805615ccf741e11e9a7dae3c06ae5d5a055bfe1deec4f03adab6e3f86b5c843e008001570a782f9a1b8cf730bb2a370e371452d71abd For the 536,870,912 file, I get the following SHA-512 hash from Fx 3.6.12 (under Mac OS X), as well as the 5 Windows applications mentioned previously: df68d060d2adafc2c4794407118f8116d000715233b2550302115556380d1d5b018ebce1c7fa412a8bc5e01e097b33db64d1e9117b3f7bdd8925f09b6594590a However, for Fx 3.6.12 and 4.0b6 running under Windows, I get this hash: db28f910b037d4d73758c790c5753980ed5903120e242649d092cc3466875559d86d64946020e4b3f8760d3c191428df33ed45fedbc6162bda4a4d2e3e116411
596,610
4,940,935
Steps to Reproduce: 1. Look at the 2010/09/15 08:40:17 mark in tinderbox:mobile 2. Download a nightly build for fennec for Maemo or Android from ftp://ftp.mozilla.org/pub/mozilla.org/mobile/nightly/latest-mobile-trunk/ Actual Results: Builds are crashing on startup. Expected Results: tinderbox burning across the board.
599,068
4,962,331
Created attachment 478013 Testcase and supporting files Marc Schoenefeld reported the following to [email protected] today. The crash on its face looks like a null-deref, but Marc thinks there are signs of heap corruption, so hiding for now. I can confirm the crash, but Crash Reporter had problems submitting the report both times I tried. ------ Hi, another crash on ffx 3.6.10/OSX 10.6 with signs of heap corruption, repeatedly trying to free the same modified object location. Crashwrangler reports exploitable=no, but afaics that just refers to the instruction the control flow finally dies, the attacker's heap magic would happen before this point. Cheers Marc Faulty glyph (id:92) outline detected - replacing with a space/null glyph - in memory font kind firefox-bin(64195,0xa033d500) malloc: *** error for object 0x18f5c04: incorrect checksum for freed object - object was probably modified after being freed. *** set a breakpoint in malloc_error_break to debug firefox-bin(64195,0xa033d500) malloc: *** error for object 0x18f5c00: incorrect checksum for freed object - object was probably modified after being freed. *** set a breakpoint in malloc_error_break to debug Faulty glyph (id:92) outline detected - replacing with a space/null glyph - in memory font kind firefox-bin(64195,0xa033d500) malloc: *** error for object 0x2282004: incorrect checksum for freed object - object was probably modified after being freed. *** set a breakpoint in malloc_error_break to debug firefox-bin(64195,0xa033d500) malloc: *** error for object 0x2282000: incorrect checksum for freed object - object was probably modified after being freed. *** set a breakpoint in malloc_error_break to debug Faulty glyph (id:92) outline detected - replacing with a space/null glyph - in memory font kind firefox-bin(64195,0xa033d500) malloc: *** error for object 0x2282004: incorrect checksum for freed object - object was probably modified after being freed. *** set a breakpoint in malloc_error_break to debug firefox-bin(64195,0xa033d500) malloc: *** error for object 0x2282000: incorrect checksum for freed object - object was probably modified after being freed. *** set a breakpoint in malloc_error_break to debug Faulty glyph (id:92) outline detected - replacing with a space/null glyph - in memory font kind firefox-bin(64195,0xa033d500) malloc: *** error for object 0x2282004: incorrect checksum for freed object - object was probably modified after being freed. *** set a breakpoint in malloc_error_break to debug firefox-bin(64195,0xa033d500) malloc: *** error for object 0x2282000: incorrect checksum for freed object - object was probably modified after being freed. *** set a breakpoint in malloc_error_break to debug Faulty glyph (id:92) outline detected - replacing with a space/null glyph - in memory font kind firefox-bin(64195,0xa033d500) malloc: *** error for object 0x2282004: incorrect checksum for freed object - object was probably modified after being freed. *** set a breakpoint in malloc_error_break to debug firefox-bin(64195,0xa033d500) malloc: *** error for object 0x2282000: incorrect checksum for freed object - object was probably modified after being freed. *** set a breakpoint in malloc_error_break to debug Crashed thread log = 0 libmozjs.dylib 0x00fd13c1 JS_CallTracer + 129 1 libmozjs.dylib 0x010539e8 js_GetScriptLineExtent + 2248 2 libmozjs.dylib 0x00fcc587 js_PutArgsObject + 1479 3 libmozjs.dylib 0x00ff2f35 js_GetterOnlyPropertyStub + 5029 4 libmozjs.dylib 0x00fd15ad JS_CallTracer + 621 5 libmozjs.dylib 0x01053943 js_GetScriptLineExtent + 2083 6 libmozjs.dylib 0x00fcc587 js_PutArgsObject + 1479 7 libmozjs.dylib 0x00ff2f35 js_GetterOnlyPropertyStub + 5029 8 libmozjs.dylib 0x00fd15ad JS_CallTracer + 621 9 libmozjs.dylib 0x00fcc52a js_PutArgsObject + 1386 10 libmozjs.dylib 0x00ff2f35 js_GetterOnlyPropertyStub + 5029 11 libmozjs.dylib 0x00fd15ad JS_CallTracer + 621 12 libmozjs.dylib 0x00ff2edf js_GetterOnlyPropertyStub + 4943 13 libmozjs.dylib 0x00fd15ad JS_CallTracer + 621 14 libmozjs.dylib 0x00ff2f21 js_GetterOnlyPropertyStub + 5009 15 libmozjs.dylib 0x00fd15ad JS_CallTracer + 621 <snip> 180 XUL 0x0001079b XRE_main + 15723 181 org.mozilla.firefox 0x00002cb8 start + 2168 182 org.mozilla.firefox 0x00002542 start + 258 183 org.mozilla.firefox 0x00002469 start + 41 log name is: ./crashlogs/mod_after_free_retry.crashlog.txt --- exception=EXC_BAD_ACCESS:signal=10:is_exploitable= no:instruction_disassembly=divl CONSTANT(%ecx):instruction_address=0x0000000000fd13c1:access_type=unknown:access_address=0x0000000000000008: Null dereference, probably not exploitable
594,808
4,925,624
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.3 (KHTML, like Gecko) Chrome/6.0.472.55 Safari/534.3 Build Identifier: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0b5) Gecko/20100101 Firefox/4.0b5 Repro: <script> oSelection = window.getSelection(); oRange = document.createRange(); oSelection.addRange(oRange); oRange.detach(); oSelection.removeRange(oRange); </script> The code above both detaches a range from the selection as well as remove it, which causes a NULL ptr crash. The code is probably missing a check somewhere. Reproducible: Always Steps to Reproduce: 1. Load the repro in Firefox 3/4 2. Crash FTW! Actual Results: NULL pointer crash Expected Results: Nothing or JavaScript error thrown Appears to work in Firefox 3.6 and 4.0. I will upload a crash report for both.
602,826
4,997,607
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:2.0b7pre) Gecko/20100101 Firefox/4.0b7pre Build Identifier: Could be related to bug 601676. I tweaked configure.in line for python and added python2.7 is order to see build process working. But the problem is that produced software are not working anymore. They are just eating CPU (up to 101%) and nothing more :( Reproducible: Always Steps to Reproduce: 1.See details in bug #601676 2. 3. Actual Results: Not working builds. Just eating CPU. Expected Results: Working builds. Official nightly build are working perfectly.
488,015
4,056,149
Steps to reproduce: 1. Open http://ytooyama.spaces.live.com/ 2. Click anywhere on the content area or close tab / window Crash report is http://crash-stats.mozilla.com/report/index/9395c260-acc4-4347-a1e6-1f9332090412 . Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2a1pre) Gecko/20090411 Minefield/3.6a1pre
489,007
4,065,661
Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2a1pre) Gecko/20090418 Firefox/3.6a1pre Steps to reproduce: - Load bbc.co.uk (topsite) - Assertion Seems to be a regression, did not happen with yesterdays build. I will try to create a testcase. From Brendan on IRC: < brendan> Tomcat: regression from 488816 most likely Assertion failure: thisObj == globalObj, at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jstracer.cpp:6277 Program received signal SIGTRAP, Trace/breakpoint trap. JS_Assert (s=0x40ff0e "thisObj == globalObj", file=0x40dad4 "/work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jstracer.cpp", ln=6277) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jsutil.cpp:69 69 abort(); (gdb) bt #0 JS_Assert (s=0x40ff0e "thisObj == globalObj", file=0x40dad4 "/work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jstracer.cpp", ln=6277) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jsutil.cpp:69 #1 0x003a3a57 in TraceRecorder::getThis (this=0x16b58640, this_ins=@0xbfffc7ec) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jstracer.cpp:6277 #2 0x003a3bd6 in TraceRecorder::record_JSOP_THIS (this=0x16b58640) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jstracer.cpp:8478 #3 0x003b2d4b in TraceRecorder::monitorRecording (cx=0xb37c00, tr=0x16b58640, op=JSOP_THIS) at jsopcode.tbl:186 #4 0x002c7a6d in js_Interpret (cx=0xb37c00) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jsinterp.cpp:3030 #5 0x002f3ce7 in js_Invoke (cx=0xb37c00, argc=1, vp=0xf75420, flags=0) at jsinterp.cpp:1388 #6 0x002f3f91 in js_InternalInvoke (cx=0xb37c00, obj=0x1365b920, fval=374692320, flags=0, argc=1, argv=0x14aa1480, rval=0xbfffd138) at jsinterp.cpp:1441 #7 0x002774d9 in JS_CallFunctionValue (cx=0xb37c00, obj=0x1365b920, fval=374692320, argc=1, argv=0x14aa1480, rval=0xbfffd138) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jsapi.cpp:5184 #8 0x0bb5104c in nsJSContext::CallEventHandler (this=0x135f3990, aTarget=0x16b556f0, aScope=0x1365b920, aHandler=0x165559e0, aargv=0x14c67bd4, arv=0xbfffd284) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/dom/base/nsJSEnvironment.cpp:2009 #9 0x0bb7ba99 in nsGlobalWindow::RunTimeout (this=0x16b556f0, aTimeout=0x15c51440) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/dom/base/nsGlobalWindow.cpp:7736 #10 0x0bb7c01a in nsGlobalWindow::TimerCallback (aTimer=0xaacfee0, aClosure=0x15c51440) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/dom/base/nsGlobalWindow.cpp:8070 #11 0x00551636 in nsTimerImpl::Fire (this=0xaacfee0) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/xpcom/threads/nsTimerImpl.cpp:427 #12 0x0055186e in nsTimerEvent::Run (this=0x15c50af0) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/xpcom/threads/nsTimerImpl.cpp:519 #13 0x00549e80 in nsThread::ProcessNextEvent (this=0x715970, mayWait=0, result=0xbfffd4e4) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/xpcom/threads/nsThread.cpp:510 #14 0x004d2c76 in NS_ProcessPendingEvents_P (thread=0x715970, timeout=20) at nsThreadUtils.cpp:180 #15 0x098d578f in nsBaseAppShell::NativeEventCallback (this=0x7331d0) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/widget/src/xpwidgets/nsBaseAppShell.cpp:121 #16 0x0988befa in nsAppShell::ProcessGeckoEvents (aInfo=0x7331d0) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/widget/src/cocoa/nsAppShell.mm:412 #17 0x90ffa5f5 in CFRunLoopRunSpecific () #18 0x90ffacd8 in CFRunLoopRunInMode () #19 0x9356b2c0 in RunCurrentEventLoopInMode () #20 0x9356b0d9 in ReceiveNextEventCommon () #21 0x9356af4d in BlockUntilNextEventMatchingListInMode () #22 0x95a6cd7d in _DPSNextEvent () #23 0x95a6c630 in -[NSApplication nextEventMatchingMask:untilDate:inMode:dequeue:] () #24 0x95a6566b in -[NSApplication run] () #25 0x09889354 in nsAppShell::Run (this=0x7331d0) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/widget/src/cocoa/nsAppShell.mm:723 #26 0x0a57e35e in nsAppStartup::Run (this=0x74f3c0) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/toolkit/components/startup/src/nsAppStartup.cpp:192 #27 0x00083904 in XRE_main (argc=1, argv=0xbfffea7c, aAppData=0x70edf0) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/toolkit/xre/nsAppRunner.cpp:3340 #28 0x000026e3 in main (argc=1, argv=0xbfffea7c) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/browser/app/nsBrowserApp.cpp:156
489,079
4,066,193
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2a1pre) Gecko/20090418 Minefield/3.6a1pre GTB5 Build Identifier: trunk Shredder/Thunderbird 3.0b3pre 20090119033223 When updating Shredder to the latest trunk, Lightning no longer functions. The list of calendars cannot be seen in the calendar view, nor can the actual appointments on the calendar. Reproducible: Always Steps to Reproduce: 1. Update Shredder to latest trunk (today) 2. Restart Shredder 3. Calendars disappear Actual Results: The list of calendars cannot be seen in the calendar view, nor can the actual appointments on the calendar. Expected Results: To see my calendars, of course!
490,818
4,080,179
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b4) Gecko/20090423 Firefox/3.5b4 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b4) Gecko/20090423 Firefox/3.5b4 I've been using http://smallsharptools.com/Downloads/SmallSharpTools.Packer/SmallSharpTools.Packer-4.0.3-Setup.msi to pack my JavaScript file for a few months (it's an offline variation of http://dean.edwards.name/packer/) and it works fine in all recent browsers, but it fails in Firefox 3.5 beta 4. I've tried to remove as much of the code as possible before submitting it, to make it easier to debug. The empty functions I've put in are necessary to make it fail. Reproducible: Always Steps to Reproduce: 1. Open the attached HTML file. Actual Results: Error: theMatrix is not a constructor Source File: FF35TestCase.html Line: 8 Expected Results: No error.
503,402
4,191,671
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.0.11) Gecko/2009060214 Firefox/3.0.11 Build Identifier: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.0.11) Gecko/2009060214 Firefox/3.0.11 Calling e.g. JSON.stringify({ x: 1 }, null, -4) is at least stopping the js processing in the current threat. Possibly hanging the page. No error occurs, but processing stops. Reproducible: Always Steps to Reproduce: 1. document.body.innerHTML = JSON.stringify({x:1},null,-4); Actual Results: A whole lotta nothing Expected Results: The body contains only {"x":1} since the ECMA 5 spec for JSON says only values between 0 and 100 (possibly less than 100--I heard of an update but haven't investigated) are supported. Anything else is treated as empty string. This was discovered by the test suite I built for YUI when adding native browser support to the JSON utility. I abstracted the test suite out to just exercise native implementations. It is available here for your reference: http://lucassmith.name/pub/browser_bugs/ff/native_json.html It may come in handy for your tests. If there are tests in there that misinterpret the spec, I'd love to know.
504,424
4,200,149
Steps to Reproduce: 1. Go to the community gallery 2. Click on one of the letter links 3. Click on the "last" link at the bottom of the box Actual Results: A new page that's mostly blank except for a vertical list of qmo members shows up Expected Results: The last 9 qmo members (in alphabetical order) should show up in the box itself.
492,562
4,094,547
Hi guys. The final component of the Fastest Firefox page is now ready for QA...please take a look. This is the page where people will actually upload their videos to us. It'll be accessed from https://www-trunk.stage.mozilla.com/en-US/firefox/fastest/. Alex Buchanan, who built the uploader, notes that the following items are still missing: 1) the uploads and log directories are locked down, IT to set these up as they would be in production, bug 491757 2) locale detection. I've written this, I'll commit it to stage after some testing QA guys, I know you're super busy right now, but is there any chance we could get this finalized by the end of the week?