Bug ID
int64
961
1.91M
Comment ID
int64
3.98k
17.1M
Author
stringlengths
8
48
Comment Text
stringlengths
1
64.3k
1,464,063
13,346,040
The following testcase crashes on mozilla-central revision 20180523-d36cd8bdbc5c See attachment. Backtrace: ==35==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc16cfd230 at pc 0x7f07512f988e bp 0x7ffc16cfcf20 sp 0x7ffc16cfcf18 READ of size 1 at 0x7ffc16cfd230 thread T0 SCARINESS: 27 (1-byte-read-stack-buffer-overflow) #0 0x7f07512f988d in sdp_getchoosetok /builds/worker/workspace/build/src/media/webrtc/signaling/src/sdp/sipcc/sdp_utils.c:452:15 #1 0x7f07512f1b4e in sdp_parse_media /builds/worker/workspace/build/src/media/webrtc/signaling/src/sdp/sipcc/sdp_token.c:1165:13 #2 0x7f07512e8b92 in sdp_parse /builds/worker/workspace/build/src/media/webrtc/signaling/src/sdp/sipcc/sdp_main.c:1138:18 #3 0x7f0751378a6f in mozilla::SipccSdpParser::Parse(std::string const&) /builds/worker/workspace/build/src/media/webrtc/signaling/src/sdp/SipccSdpParser.cpp:68:25 #4 0x7f075c50e51c in RunSdpParserFuzzing(unsigned char const*, unsigned long) /builds/worker/workspace/build/src/media/webrtc/signaling/fuzztest/sdp_parser_libfuzz.cpp:28:20 #5 0x5893fd in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /builds/worker/workspace/build/src/tools/fuzzing/libfuzzer/FuzzerLoop.cpp:517:13 #6 0x588c7b in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) /builds/worker/workspace/build/src/tools/fuzzing/libfuzzer/FuzzerLoop.cpp:442:3 #7 0x58a16d in fuzzer::Fuzzer::MutateAndTestOne() /builds/worker/workspace/build/src/tools/fuzzing/libfuzzer/FuzzerLoop.cpp:650:19 #8 0x58ab25 in fuzzer::Fuzzer::Loop(std::vector<std::string, fuzzer::fuzzer_allocator<std::string> > const&) /builds/worker/workspace/build/src/tools/fuzzing/libfuzzer/FuzzerLoop.cpp:773:5 #9 0x582185 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /builds/worker/workspace/build/src/tools/fuzzing/libfuzzer/FuzzerDriver.cpp:754:6 #10 0x7f075b3f81e5 in mozilla::FuzzerRunner::Run(int*, char***) /builds/worker/workspace/build/src/tools/fuzzing/interface/harness/FuzzerRunner.cpp:60:10 #11 0x7f075b337b33 in XREMain::XRE_mainStartup(bool*) /builds/worker/workspace/build/src/toolkit/xre/nsAppRunner.cpp:3916:35 #12 0x7f075b348f45 in XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&) /builds/worker/workspace/build/src/toolkit/xre/nsAppRunner.cpp:4857:12 #13 0x7f075b34a6d4 in XRE_main(int, char**, mozilla::BootstrapConfig const&) /builds/worker/workspace/build/src/toolkit/xre/nsAppRunner.cpp:4964:21 #14 0x4f4ef5 in do_main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:233:22 #15 0x4f4ef5 in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:306 #16 0x7f0772b4a1c0 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x211c0) #17 0x42476c in _start (/home/worker/firefox/firefox+0x42476c) DEDUP_TOKEN: sdp_getchoosetok Address 0x7ffc16cfd230 is located in stack of thread T0 at offset 656 in frame #0 0x7f07512f130f in sdp_parse_media /builds/worker/workspace/build/src/media/webrtc/signaling/src/sdp/sipcc/sdp_token.c:1107 DEDUP_TOKEN: sdp_parse_media This frame has 5 object(s): [32, 48) 'num' (line 1110) [64, 68) 'result' (line 1112) [80, 336) 'tmp' (line 1115) [400, 656) 'port' (line 1116) <== Memory access at offset 656 overflows this variable [720, 728) 'port_ptr' (line 1117) HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /builds/worker/workspace/build/src/media/webrtc/signaling/src/sdp/sipcc/sdp_utils.c:452:15 in sdp_getchoosetok Shadow bytes around the buggy address: 0x100002d979f0: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 04 f2 00 00 0x100002d97a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100002d97a10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f2 f2 0x100002d97a20: f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 0x100002d97a30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x100002d97a40: 00 00 00 00 00 00[f2]f2 f2 f2 f2 f2 f2 f2 00 f3 0x100002d97a50: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 0x100002d97a60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100002d97a70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100002d97a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100002d97a90: f1 f1 f1 f1 f8 f3 f3 f3 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Command: ./firefox/firefox -print_pcs=1 -handle_segv=0 -handle_bus=0 -handle_abrt=0 ./corpora/ -handle_ill=0 -handle_fpe=0 ==35==ABORTING
1,444,604
13,118,845
The following testcase crashes on mozilla-central revision 0817a733d45a+ (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --enable-debug --enable-optimize, run with --fuzzing-safe): var evalInFrame = (function (global) { var dbgGlobal = newGlobal(); var dbg = new dbgGlobal.Debugger(); return function evalInFrame(upCount, code) { dbg.addDebuggee(global); var frame = dbg.getNewestFrame().older; for (var i = 0; i < upCount; i++) { } var completion = frame.eval(code); }; })(this); enableTrackAllocations(); evalInFrame(1, "print(a)"); Backtrace: received signal SIGSEGV, Segmentation fault. 0x0000000000bf382c in js::LiveSavedFrameCache::find (this=this@entry=0x7fffffffcf80, cx=0x7ffff5f16000, framePtr=..., pc=0x7ffff480a2c8 ":\001", frame=...) at js/src/vm/SavedStacks.cpp:143 #0 0x0000000000bf382c in js::LiveSavedFrameCache::find (this=this@entry=0x7fffffffcf80, cx=0x7ffff5f16000, framePtr=..., pc=0x7ffff480a2c8 ":\001", frame=...) at js/src/vm/SavedStacks.cpp:143 #1 0x0000000000bf8322 in js::SavedStacks::insertFrames(JSContext*, js::FrameIter&, JS::MutableHandle<js::SavedFrame*>, mozilla::Variant<JS::AllFrames, JS::MaxFrames, JS::FirstSubsumedFrame>&&) (this=this@entry=0x7ffff5f3e100, cx=cx@entry=0x7ffff5f16000, iter=..., frame=..., capture=capture@entry=<unknown type in /mnt/LangFuzz/work/builds/debug64/dist/bin/js, CU 0x569a2d9, DIE 0x58e7259>) at js/src/vm/SavedStacks.cpp:1370 #2 0x0000000000bf9446 in js::SavedStacks::saveCurrentStack(JSContext*, JS::MutableHandle<js::SavedFrame*>, mozilla::Variant<JS::AllFrames, JS::MaxFrames, JS::FirstSubsumedFrame>&&) (this=this@entry=0x7ffff5f3e100, cx=cx@entry=0x7ffff5f16000, frame=..., capture=capture@entry=<...>) at js/src/vm/SavedStacks.cpp:1225 #3 0x0000000000bf97fa in js::SavedStacks::MetadataBuilder::build (this=<optimized out>, cx=0x7ffff5f16000, target=..., oomUnsafe=...) at js/src/vm/SavedStacks.cpp:1703 #4 0x0000000000b3f74b in JSCompartment::setNewObjectMetadata (this=0x7ffff5f3e000, cx=0x7ffff5f16000, obj=obj@entry=...) at js/src/vm/JSCompartment.cpp:1055 #5 0x0000000000b3fcab in js::SetNewObjectMetadata<JSObject> (obj=0x7ffff4d00580, cx=0x7ffff5f16000) at js/src/vm/JSObject-inl.h:389 #6 js::AutoSetNewObjectMetadata::~AutoSetNewObjectMetadata (this=0x7fffffffc250, __in_chrg=<optimized out>) at js/src/vm/JSCompartment.cpp:1423 #7 0x0000000000bd99a1 in js::ProxyObject::New (cx=0x7ffff5f16000, handler=<optimized out>, priv=..., proto_=..., options=...) at js/src/vm/ProxyObject.cpp:86 #8 0x0000000000a2b8c5 in js::NewProxyObject (cx=<optimized out>, handler=<optimized out>, priv=..., proto_=<optimized out>, options=...) at js/src/proxy/Proxy.cpp:828 #9 0x0000000000a2cefd in js::Wrapper::New (cx=cx@entry=0x7ffff5f16000, obj=<optimized out>, handler=0x2058820 <js::CrossCompartmentWrapper::singleton>, options=...) at js/src/proxy/Wrapper.cpp:322 #10 0x0000000000a2d042 in js::TransparentObjectWrapper (cx=0x7ffff5f16000, existing=..., obj=...) at js/src/proxy/Wrapper.cpp:441 #11 0x0000000000b45038 in JSCompartment::getOrCreateWrapper (this=this@entry=0x7ffff5f3e000, cx=cx@entry=0x7ffff5f16000, existing=..., existing@entry=..., obj=...) at js/src/vm/JSCompartment.cpp:430 #12 0x0000000000b45312 in JSCompartment::wrap (this=this@entry=0x7ffff5f3e000, cx=0x7ffff5f16000, obj=obj@entry=...) at js/src/vm/JSCompartment.cpp:476 #13 0x00000000004820f7 in JSCompartment::wrap (this=0x7ffff5f3e000, cx=0x7ffff5f16000, vp=...) at js/src/vm/JSCompartment-inl.h:155 #14 0x0000000000a24df7 in js::CrossCompartmentWrapper::call (this=0x2058820 <js::CrossCompartmentWrapper::singleton>, cx=0x7ffff5f16000, wrapper=..., args=...) at js/src/proxy/CrossCompartmentWrapper.cpp:362 #15 0x0000000000a35285 in js::Proxy::call (cx=0x7ffff5f16000, proxy=proxy@entry=..., args=...) at js/src/proxy/Proxy.cpp:510 #16 0x0000000000a3534d in js::proxy_Call (cx=0x7ffff5f16000, argc=<optimized out>, vp=<optimized out>) at js/src/proxy/Proxy.cpp:769 #17 0x000000000057b1dd in js::CallJSNative (cx=0x7ffff5f16000, native=0xa352d0 <js::proxy_Call(JSContext*, unsigned int, JS::Value*)>, args=...) at js/src/vm/JSContext-inl.h:290 [...] #31 0x00000000004440a2 in main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at js/src/shell/js.cpp:9408 rax 0x0 0 rbx 0x7fffffffcf80 140737488342912 rcx 0x7ffff6c282ad 140737333330605 rdx 0x0 0 rsi 0x7ffff6ef7770 140737336276848 rdi 0x7ffff6ef6540 140737336272192 rbp 0x7fffffffb4d0 140737488336080 rsp 0x7fffffffb460 140737488335968 r8 0x7ffff6ef7770 140737336276848 r9 0x7ffff7fe4780 140737354024832 r10 0x58 88 r11 0x7ffff6b9e7a0 140737332766624 r12 0x7fffffffb610 140737488336400 r13 0x7ffff5f16000 140737319624704 r14 0x7ffff480a2c8 140737295459016 r15 0x7fffffffb480 140737488336000 rip 0xbf382c <js::LiveSavedFrameCache::find(JSContext*, js::LiveSavedFrameCache::FramePtr&, unsigned char const*, JS::MutableHandle<js::SavedFrame*>) const+508> => 0xbf382c <js::LiveSavedFrameCache::find(JSContext*, js::LiveSavedFrameCache::FramePtr&, unsigned char const*, JS::MutableHandle<js::SavedFrame*>) const+508>: movl $0x0,0x0 0xbf3837 <js::LiveSavedFrameCache::find(JSContext*, js::LiveSavedFrameCache::FramePtr&, unsigned char const*, JS::MutableHandle<js::SavedFrame*>) const+519>: ud2 This is at most sec-moderate because it requires the debugger to be involved.
1,445,471
13,126,610
This bug was filed from the Socorro interface and is report bp-c8717d95-f034-4ea4-a15e-a6b700180310. ============================================================= Top 10 frames of crashing thread: 0 xul.dll mozilla::plugins::EndpointHandler<0>::Copy<void*, unsigned __int64> dom/plugins/ipc/FunctionBroker.h:663 1 xul.dll mozilla::plugins::Marshaler<0, mozilla::plugins::RequestHandler<17, int > >::MaybeUnmarshalParameter<0, void*, 1, 0>::UnmarshalParameter<unsigned __int64> dom/plugins/ipc/FunctionBroker.h:877 2 xul.dll mozilla::plugins::FunctionBroker<7, int >::BrokerCallServer dom/plugins/ipc/FunctionBroker.h:1400 3 xul.dll mozilla::plugins::FunctionBroker<7, int >::RunOriginalFunction dom/plugins/ipc/FunctionBroker.h:1252 4 xul.dll mozilla::plugins::FunctionBrokerParent::RecvBrokerFunction dom/plugins/ipc/FunctionBrokerParent.cpp:111 5 xul.dll mozilla::plugins::PFunctionBrokerParent::OnMessageReceived ipc/ipdl/PFunctionBrokerParent.cpp:137 6 xul.dll mozilla::ipc::MessageChannel::DispatchSyncMessage ipc/glue/MessageChannel.cpp:2078 7 xul.dll mozilla::ipc::MessageChannel::DispatchMessageW ipc/glue/MessageChannel.cpp:2036 8 xul.dll mozilla::ipc::MessageChannel::RunMessage ipc/glue/MessageChannel.cpp:1886 9 xul.dll mozilla::ipc::MessageChannel::MessageTask::Run ipc/glue/MessageChannel.cpp:1919 ============================================================= this browser crash signature is newly showing up in firefox 60 with MOZ_RELEASE_ASSERT(aDest) that got added in bug 1382251.
1,445,524
13,126,952
This bug was filed from the Socorro interface and is report bp-589b7799-eb31-40a4-bd7d-c44e30180313. ============================================================= Seen while looking at early 59 Mac crash stats: http://bit.ly/2FIb1zx. This is a startup crash which has 17 crashes/17 installs so far. Although there appears to have been a similar signature in 58.0.2, the stack does look different. All of the crashes have the same crash reason: EXC_BAD_ACCESS / KERN_INVALID_ADDRESS I guessed on the component - perhaps someone can bucket this in a better place if it doesn't belong here. Top 10 frames of crashing thread: 0 XUL doLoadFromCommonData intl/icu/source/common/udata.cpp:952 1 XUL doOpenChoice intl/icu/source/common/udata.cpp:1330 2 XUL icu_60::LoadedNormalizer2Impl::load intl/icu/source/common/loadednormalizer2impl.cpp:80 3 XUL icu_60::Normalizer2::getInstance intl/icu/source/common/loadednormalizer2impl.cpp:126 4 XUL uidna_openUTS46_60 intl/icu/source/common/uts46.cpp:219 5 XUL nsIDNService::nsIDNService netwerk/dns/nsIDNService.cpp:153 6 XUL nsIDNServiceConstructor netwerk/build/nsNetModule.cpp:381 7 XUL nsComponentManagerImpl::CreateInstanceByContractID xpcom/components/nsComponentManager.cpp:1086 8 XUL nsComponentManagerImpl::GetServiceByContractID xpcom/components/nsComponentManager.cpp:1446 9 XUL nsGetServiceByContractID::operator const xpcom/components/nsComponentManagerUtils.cpp:67 =============================================================
1,446,672
13,135,895
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0 Build ID: 20180315232954 Steps to reproduce: After updating my 2 PCs to Firefox 60 beta I can't see my bookmarks in the sidebar or the library. If I put some text in the search box it shows the results so it seems that my bookmarks are there, but I can't browse it. Screenshot: https://i.imgur.com/Pb6dcBC.png Windows 10 60 bits
1,452,417
13,188,763
This bug was filed from the Socorro interface and is report bp-af95af75-2515-42fb-838b-c403a0180401. ============================================================= Top 10 frames of crashing thread: 0 xul.dll nsCOMPtr<nsIMutationObserver>::nsCOMPtr<nsIMutationObserver> mfbt/RefPtr.h:112 1 xul.dll nsHostResolver::DetachCallback netwerk/dns/nsHostResolver.cpp:1007 2 xul.dll nsDNSAsyncRequest::Cancel netwerk/dns/nsDNSService2.cpp:398 3 xul.dll mozilla::net::PACResolver::Notify netwerk/base/ProxyAutoConfig.cpp:311 4 xul.dll nsTimerImpl::Fire xpcom/threads/nsTimerImpl.cpp:704 5 xul.dll nsTimerEvent::Run xpcom/threads/TimerThread.cpp:290 6 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1096 7 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:519 8 xul.dll nsThread::Shutdown xpcom/threads/nsThread.cpp:814 9 xul.dll mozilla::net::WaitForThreadShutdown::Run netwerk/base/nsPACMan.cpp:160 ============================================================= this signature is newly showing up on windows since firefox 59 - probably related to bug 1424834 and just a signature change. it's a uaf in some instances though...
1,452,472
13,189,097
This bug was filed from the Socorro interface and is report bp-21c9e35e-b273-482c-9629-8a3720180407. ============================================================= Top 10 frames of crashing thread: 0 mozglue.dll MOZ_CrashPrintf mfbt/Assertions.cpp:50 1 xul.dll InvalidArrayIndex_CRASH xpcom/ds/nsTArray.cpp:26 2 xul.dll nsTArray_Impl<nsGridContainerFrame::TrackSize, nsTArrayInfallibleAllocator>::operator[] xpcom/ds/nsTArray.h:1067 3 xul.dll mozilla::MediaEngineWebRTCMicrophoneSource::Stop dom/media/webrtc/MediaEngineWebRTCAudio.cpp:737 4 xul.dll mozilla::MediaDevice::Stop dom/media/MediaManager.cpp:1012 5 xul.dll <lambda_8b50338af7815249e386b19989dff0e5>::operator dom/media/MediaManager.cpp:4105 6 xul.dll mozilla::detail::RunnableFunction<<lambda_114078868a915abed36bc5ffa2449d96> >::Run xpcom/threads/nsThreadUtils.h:536 7 xul.dll MessageLoop::DoWork ipc/chromium/src/base/message_loop.cc:535 8 xul.dll mozilla::ipc::MessagePumpForNonMainUIThreads::DoRunLoop ipc/glue/MessagePump.cpp:403 9 xul.dll base::MessagePumpWin::RunWithDispatcher ipc/chromium/src/base/message_pump_win.cc:56 ============================================================= these content crashes are newly showing up during the 60.0b cycle - so far from windows only. probably it's related to the changes in bug 1299515. the most common MOZ_CRASH Reason fieds in the reports are: ElementAt(aIndex = 18446744073709551615, aLength = 0) 18 56.25 % ElementAt(aIndex = 4294967295, aLength = 0)
1,452,576
13,191,471
This is using the libfuzzer-based fuzzing target that uses dom::ipc::StructuredCloneData as its entry point to cover the StructuredCloneReader code that is browser-only, with the patch from bug 1442722 applied. The target code has not landed on mozilla-central yet, if you need it to reproduce (in case stack + test attached do not suffice), please let me know. The attached testcase crashes on mozilla-central revision ee6283795f41: Backtrace: ==11032==ERROR: AddressSanitizer: SEGV on unknown address 0x00207fff6060 (pc 0x7f772fdf47bf bp 0x7ffe40073370 sp 0x7ffe40073260 T0) ==11032==The signal is caused by a READ memory access. #0 0x7f772fdf47be in get gfx/gl/../../mfbt/RefPtr.h:287:27 #1 0x7f772fdf47be in operator mozilla::gfx::DataSourceSurface * gfx/gl/../../mfbt/RefPtr.h:300 #2 0x7f772fdf47be in mozilla::dom::ImageBitmap::CreateFromCloneData(nsIGlobalObject*, mozilla::dom::ImageBitmapCloneData*) dom/canvas/ImageBitmap.cpp:815 #3 0x7f772b9ce318 in mozilla::dom::StructuredCloneHolder::CustomReadTransferHandler(JSContext*, JSStructuredCloneReader*, unsigned int, void*, unsigned long, JS::MutableHandle<JSObject*>) dom/base/StructuredCloneHolder.cpp:1205:34 #4 0x7f7738bbc0ec in JSStructuredCloneReader::readTransferMap() js/src/vm/StructuredClone.cpp:2495:18 #5 0x7f7738ba04c6 in JSStructuredCloneReader::read(JS::MutableHandle<JS::Value>) js/src/vm/StructuredClone.cpp:2612:10 #6 0x7f7738ba00b8 in ReadStructuredClone(JSContext*, JSStructuredCloneData&, JS::StructuredCloneScope, JS::MutableHandle<JS::Value>, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:636:14 #7 0x7f772b9c2ee9 in ReadFromBuffer dom/base/StructuredCloneHolder.cpp:363:8 #8 0x7f772b9c2ee9 in mozilla::dom::StructuredCloneHolder::ReadFromBuffer(nsISupports*, JSContext*, JSStructuredCloneData&, JS::MutableHandle<JS::Value>, mozilla::ErrorResult&) dom/base/StructuredCloneHolder.cpp:343 #9 0x7f77381b7e3a in FuzzingRunDomSC(unsigned char const*, unsigned long) dom/base/fuzztest/FuzzStructuredClone.cpp:68:10 [...] #22 0x421768 in _start (objdir-ff-libfuzzer/dist/bin/firefox+0x421768) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV gfx/gl/../../mfbt/RefPtr.h:287:27 in get ==11032==ABORTING The essential problem here is that we somehow end up in mozilla::dom::ImageBitmap::CreateFromCloneData which is same-process only, even if the data came under the different-process scope. As discussed with :baku, we either need better checks in StructuredCloneHolder to avoid entering any branches that we are not supposed to be in, under different-process scope, or, we somehow refactor something to improve the separation here. The first method is probably more viable but requires careful auditing of StructuredCloneHolder to not miss any checks. This is an exploitable sandbox escape, marking s-s and sec-high.
1,452,666
13,192,286
STR: 1. Visit about:debugging and load the attached extension, which opens example.com. 2. Click on the extension button (in the browser UI) to trigger a navigation from the extension's content script. 3. Look at the global JS console. Expected result: No errors Actual result : The following error is shown: Utils: Failed to serialize principal '[xpconnect wrapped nsIPrincipal]' [Exception... "Could not convert JavaScript argument arg 0 [nsISerializationHelper.serializeToString]" nsresult: "0x80570009 (NS_ERROR_XPC_BAD_CONVERT_JS)" location: "JS frame :: resource://gre/modules/sessionstore/Utils.jsm :: serializePrincipal :: line 126" data: no] Tip: To debug, attach a content toolbox, and put a conditional breakpoint at https://searchfox.org/mozilla-central/rev/7ccb618f45a1398e31a086a009f87c8fd3a790b6/toolkit/modules/sessionstore/Utils.jsm#122 with condition: principal.origin.startsWith('[Expanded Principal') Stack trace: serializePrincipal@resource://gre/modules/sessionstore/Utils.jsm:122:9 serializeEntry@resource://gre/modules/sessionstore/SessionHistory.jsm:234:35 collect@resource://gre/modules/sessionstore/SessionHistory.jsm:91:21 collect@resource://gre/modules/sessionstore/SessionHistory.jsm:30:12 collectFrom/<@chrome://browser/content/content-sessionStore.js:384:21 send@chrome://browser/content/content-sessionStore.js:897:19 sendWhenIdle@chrome://browser/content/content-sessionStore.js:860:9 requestIdleCallback handler*sendWhenIdle@chrome://browser/content/content-sessionStore.js:868:7 push/this._timeout<@chrome://browser/content/content-sessionStore.js:840:15 notify@resource://gre/modules/Timer.jsm:44:7 This is probably the root cause of bug 1429490, which was "fixed" by a try-catch. I have reproduced the problem in Firefox 59.0.2 and the Firefox Nightly (61.0a1, build ID 20180407220122).
1,453,541
13,199,883
Similar to bug 1436189, but we also need to build items that intersect the OOF frames, not the just the OOF frames themselves.
1,454,126
13,205,515
Created attachment 8967914 testcase.html ==83696==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f2bf39babcf bp 0x7fff3b755170 sp 0x7fff3b755170 T0) ==83696==The signal is caused by a READ memory access. ==83696==Hint: address points to the zero page. #0 0x7f2bf39babce in nsMappedAttributes::GetAttr(nsAtom*) const src/dom/base/nsMappedAttributes.cpp:183:28 #1 0x7f2bf835819b in AttrValueIs src/obj-firefox/dist/include/mozilla/dom/Element.h:2008:46 #2 0x7f2bf835819b in IsMozEditorBogusNode src/obj-firefox/dist/include/mozilla/EditorBase.h:1073 #3 0x7f2bf835819b in mozilla::TextEditRules::CreateBogusNodeIfNeeded(mozilla::dom::Selection*) src/editor/libeditor/TextEditRules.cpp:1435 #4 0x7f2bf8357ab1 in mozilla::TextEditRules::Init(mozilla::TextEditor*) src/editor/libeditor/TextEditRules.cpp:143:17 #5 0x7f2bf836686a in mozilla::TextEditor::EndEditorInit() src/editor/libeditor/TextEditor.cpp:208:17 #6 0x7f2bf8367958 in ~AutoEditInitRulesTrigger src/editor/libeditor/TextEditUtils.cpp:93:28 #7 0x7f2bf8367958 in mozilla::TextEditor::Init(nsIDocument&, mozilla::dom::Element*, nsISelectionController*, unsigned int, nsTSubstring<char16_t> const&) src/editor/libeditor/TextEditor.cpp:142 #8 0x7f2bf6849ab0 in nsTextEditorState::PrepareEditor(nsTSubstring<char16_t> const*) src/dom/html/nsTextEditorState.cpp:1414:25 #9 0x7f2bf8b81cef in nsTextControlFrame::EnsureEditorInitialized() src/layout/forms/nsTextControlFrame.cpp:317:28 #10 0x7f2bf66ba683 in mozilla::dom::HTMLInputElement::GetEventTargetParent(mozilla::EventChainPreVisitor&) src/dom/html/HTMLInputElement.cpp:3429:25 #11 0x7f2bf6436cd8 in mozilla::EventTargetChainItem::GetEventTargetParent(mozilla::EventChainPreVisitor&) src/dom/events/EventDispatcher.cpp:425:12 #12 0x7f2bf643a9af in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, nsIDOMEvent*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) src/dom/events/EventDispatcher.cpp:894:19 #13 0x7f2bf89b9645 in mozilla::ScrollFrameHelper::FireScrollEvent() src/layout/generic/nsGfxScrollFrame.cpp:4972:5 #14 0x7f2bf89b9034 in mozilla::ScrollFrameHelper::ScrollEvent::Run() src/layout/generic/nsGfxScrollFrame.cpp:4925:14 #15 0x7f2bf85ae73b in nsRefreshDriver::DispatchScrollEvents() src/layout/base/nsRefreshDriver.cpp:1289:12 #16 0x7f2bf85b1242 in nsRefreshDriver::Tick(long, mozilla::TimeStamp) src/layout/base/nsRefreshDriver.cpp:1893:7 #17 0x7f2bf85c1310 in TickDriver src/layout/base/nsRefreshDriver.cpp:337:13 #18 0x7f2bf85c1310 in mozilla::RefreshDriverTimer::TickRefreshDrivers(long, mozilla::TimeStamp, nsTArray<RefPtr<nsRefreshDriver> >&) src/layout/base/nsRefreshDriver.cpp:307 #19 0x7f2bf85c0ec4 in mozilla::RefreshDriverTimer::Tick(long, mozilla::TimeStamp) src/layout/base/nsRefreshDriver.cpp:328:5 #20 0x7f2bf85c3c4e in RunRefreshDrivers src/layout/base/nsRefreshDriver.cpp:770:5 #21 0x7f2bf85c3c4e in mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::TickRefreshDriver(mozilla::TimeStamp) src/layout/base/nsRefreshDriver.cpp:683 #22 0x7f2bf85becf9 in mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::ParentProcessVsyncNotifier::Run() src/layout/base/nsRefreshDriver.cpp:529:20 #23 0x7f2bf0777c89 in nsThread::ProcessNextEvent(bool, bool*) src/xpcom/threads/nsThread.cpp:1096:14 #24 0x7f2bf07936c0 in NS_ProcessNextEvent(nsIThread*, bool) src/xpcom/threads/nsThreadUtils.cpp:519:10 #25 0x7f2bf165c74a in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) src/ipc/glue/MessagePump.cpp:97:21 #26 0x7f2bf15b1289 in RunInternal src/ipc/chromium/src/base/message_loop.cc:326:10 #27 0x7f2bf15b1289 in RunHandler src/ipc/chromium/src/base/message_loop.cc:319 #28 0x7f2bf15b1289 in MessageLoop::Run() src/ipc/chromium/src/base/message_loop.cc:299 #29 0x7f2bf805fd3a in nsBaseAppShell::Run() src/widget/nsBaseAppShell.cpp:157:27 #30 0x7f2bfc0ef06b in nsAppStartup::Run() src/toolkit/components/startup/nsAppStartup.cpp:290:30 #31 0x7f2bfc2f7c1c in XREMain::XRE_mainRun() src/toolkit/xre/nsAppRunner.cpp:4834:22 #32 0x7f2bfc2fad5c in XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&) src/toolkit/xre/nsAppRunner.cpp:4979:8 #33 0x7f2bfc2fc224 in XRE_main(int, char**, mozilla::BootstrapConfig const&) src/toolkit/xre/nsAppRunner.cpp:5071:21 #34 0x4f168b in do_main src/browser/app/nsBrowserApp.cpp:231:22 #35 0x4f168b in main src/browser/app/nsBrowserApp.cpp:304 #36 0x7f2c0fe9482f in __libc_start_main /build/glibc-Cl5G7W/glibc-2.23/csu/../csu/libc-start.c:291 #37 0x420f48 in _start (firefox+0x420f48)
1,454,285
13,206,967
The following testcase crashes on mozilla-central revision e96685584bf7 (build with --enable-debug, run with --fuzzing-safe --no-threads --ion-eager): "".replace([], async function() { for await (c of d) { function f() {}; return; } }); Backtrace: #0 js::Shape::numFixedSlots (this=0x0) at js/src/vm/Shape.h:1049 #1 js::jit::BaselineCompiler::getEnvironmentCoordinateAddressFromObject (this=this@entry=0x7ffe7d270b40, objReg=objReg@entry=..., reg=reg@entry=...) at js/src/jit/BaselineCompiler.cpp:2715 #2 0x000000000102e260 in js::jit::BaselineCompiler::getEnvironmentCoordinateAddress (reg=..., this=0x7ffe7d270b40) at js/src/jit/BaselineCompiler.cpp:2727 #3 js::jit::BaselineCompiler::emit_JSOP_GETALIASEDVAR (this=this@entry=0x7ffe7d270b40) at js/src/jit/BaselineCompiler.cpp:2735 #4 0x0000000001048108 in js::jit::BaselineCompiler::emitBody (this=this@entry=0x7ffe7d270b40) at js/src/jit/BaselineCompiler.cpp:1034 /snip For detailed crash information, see attachment. This also seems to crash opt builds at js::jit::BaselineCompiler::getEnvironmentCoordinateAddressFromObject near null.
1,454,692
13,212,838
Per discussion with Milan and Dan today, we want to cherry-pick the relevant Skia security fixes which have landed upstream since the m55 release we're shipping in ESR52 rather than trying to do a wholesale uplift of m66. Dan is going to work on compiling a spreadsheet of the fixes in question.
1,454,743
13,213,387
Section reordering broke how the spocs code gets sections from the SectionManager. This needs to be fixed asap and uplifted to 60 so the experiment can be run.
1,446,811
13,136,619
This bug was filed from the Socorro interface and is report bp-940927c6-1fc7-43e1-a7a3-0a5fe0180318. ============================================================= Top 10 frames of crashing thread: 0 XUL js::gc::StoreBuffer::putSlot js/src/gc/StoreBuffer.h:308 1 XUL js::ExportEntryObject::create js/src/gc/Barrier.h:723 2 XUL js::ModuleBuilder::processExport js/src/builtin/ModuleObject.cpp:1473 3 XUL js::frontend::GeneralParser<js::frontend::FullParseHandler, char16_t>::exportLexicalDeclaration js/src/frontend/Parser.cpp:5453 4 XUL js::frontend::GeneralParser<js::frontend::FullParseHandler, char16_t>::exportDeclaration js/src/frontend/Parser.cpp 5 XUL js::frontend::GeneralParser<js::frontend::FullParseHandler, char16_t>::statementListItem js/src/frontend/Parser.cpp:7759 6 XUL js::frontend::GeneralParser<js::frontend::FullParseHandler, char16_t>::statementList js/src/frontend/Parser.cpp:4228 7 XUL js::frontend::Parser<js::frontend::FullParseHandler, char16_t>::moduleBody js/src/frontend/Parser.cpp:2269 8 XUL BytecodeCompiler::compileModule js/src/frontend/BytecodeCompiler.cpp:408 9 XUL js::frontend::CompileModule js/src/frontend/BytecodeCompiler.cpp:606 ============================================================= The line that triggers this crash seems to be export const [THREAD_NEW, THREAD_MUTED, THREAD_FAVORITE, THREAD_DELETED] = [0, 1, 2, 4]; in a web extension, with <script type="module">
1,447,156
13,141,041
This bug was filed from the Socorro interface and is report bp-2abc1d56-a0e3-4b3d-afd2-0e5b00180319. ============================================================= Top 10 frames of crashing thread: 0 xul.dll mozilla::dom::IDBFactory::OpenInternal dom/indexedDB/IDBFactory.cpp:716 1 xul.dll mozilla::dom::IDBFactory::Open dom/indexedDB/IDBFactory.cpp:504 2 xul.dll mozilla::dom::IDBFactoryBinding::open dom/bindings/IDBFactoryBinding.cpp:278 3 xul.dll mozilla::dom::GenericBindingMethod dom/bindings/BindingUtils.cpp:3031 4 xul.dll js::InternalCallOrConstruct js/src/vm/Interpreter.cpp:468 5 xul.dll InternalCall js/src/vm/Interpreter.cpp:517 6 xul.dll Interpret js/src/vm/Interpreter.cpp:3086 7 xul.dll js::RunScript js/src/vm/Interpreter.cpp:418 8 xul.dll js::InternalCallOrConstruct js/src/vm/Interpreter.cpp:490 9 xul.dll InternalCall js/src/vm/Interpreter.cpp:517 ============================================================= the signature for this browser crash during shutdown is regressing in volume in firefox 60.
1,447,989
13,148,308
The following testcase crashes on mozilla-central revision 7771df14ea18+ (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --disable-debug --enable-optimize, run with --fuzzing-safe --ion-eager --ion-offthread-compile=off): var set = () => summary >>> 0xffffffff; gczeal(17, 1); var result = false; set(result[0]); Backtrace: received signal SIGSEGV, Segmentation fault. MOZ_CrashPrintf (aLine=aLine@entry=2579, aFormat=aFormat@entry=0xe96238 "Got 0x%lx expected magic word 0x%lx") at mfbt/Assertions.cpp:63 #0 MOZ_CrashPrintf (aLine=aLine@entry=2579, aFormat=aFormat@entry=0xe96238 "Got 0x%lx expected magic word 0x%lx") at mfbt/Assertions.cpp:63 #1 0x00000000009eef1d in js::ReportMagicWordFailure (actual=<optimized out>, expected=expected@entry=11647069175327152089) at js/src/vm/TypeInference.cpp:2578 #2 0x0000000000a02a3f in js::TypeConstraint::checkMagic (this=0x7ffff49da0a0) at js/src/vm/TypeInference.h:586 #3 js::TypeConstraint::next (this=0x7ffff49da0a0) at js/src/vm/TypeInference.h:591 #4 js::ConstraintTypeSet::addType (this=0x7ffff5f55ca0, cx=0x7ffff5f15000, type=...) at js/src/vm/TypeInference.cpp:717 #5 0x0000000000a08a46 in js::TypeMonitorResult (cx=cx@entry=0x7ffff5f15000, script=<optimized out>, pc=<optimized out>, types=0x7ffff5f55ca0, type=...) at js/src/vm/TypeInference.cpp:3337 #6 0x00000000005c8f72 in js::TypeScript::Monitor (cx=cx@entry=0x7ffff5f15000, script=<optimized out>, pc=pc@entry=0x7ffff49f8140 "7\347\001", types=types@entry=0x7ffff5f55ca0, rval=...) at js/src/vm/TypeInference-inl.h:607 #7 0x00000000005b59ec in js::jit::DoGetElemFallback (cx=0x7ffff5f15000, frame=0x7fffffffcc88, stub_=0x7ffff49fa1c0, lhs=..., rhs=..., res=...) at js/src/jit/BaselineIC.cpp:615 #8 0x00002ffc609184e4 in ?? () #9 0x0000000000000000 in ?? () rax 0x1c37d20 29588768 rbx 0x7ffff5f55ca0 140737319885984 rcx 0x7fffffc2 2147483586 rdx 0x1c37ddd 29588957 rsi 0x0 0 rdi 0x1c37da0 29588896 rbp 0x7ffff5f15000 140737319620608 rsp 0x7fffffffc720 140737488340768 r8 0x0 0 r9 0x3d 61 r10 0x0 0 r11 0xfffffffffffffff1 -15 r12 0x7ffff49da0a0 140737297359008 r13 0x3 3 r14 0xa1a2b3b4c5c6d7d9 -6799674898382399527 r15 0x0 0 rip 0x42f7ac <MOZ_CrashPrintf(int, char const*, ...)+243> => 0x42f7ac <MOZ_CrashPrintf(int, char const*, ...)+243>: movl $0x0,0x0 0x42f7b7 <MOZ_CrashPrintf(int, char const*, ...)+254>: ud2 Marking s-s because this looks like a type inference problem involving GC, which is potentially dangerous.
1,448,136
13,149,657
The following testcase crashes on mozilla-central revision 7771df14ea18+ (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --enable-debug --enable-optimize, run with --fuzzing-safe --cpu-count=2): print = function(s) { return s.toString(); } assertEq = function(a,b) { try { print(a); print(b); } catch(exc) {} } g = newGlobal(); g.parent = this; g.eval("(" + function() { Debugger(parent).onExceptionUnwind = function(frame) { frame.older } } + ")()") function a() {}; function b() {}; for (let _ of Array(10000)) assertEq(b instanceof a, true); function c(){}; function d(){}; function e(){}; Object.defineProperty(a, Symbol.hasInstance, {value: assertEq }); let funcs = [a, b, c, d]; for (let f of funcs) assertEq(e instanceof f, true); Backtrace: received signal SIGSEGV, Segmentation fault. 0x0000000000643148 in JSScript::offsetToPC (this=<optimized out>, offset=<optimized out>) at js/src/vm/JSScript.h:1234 #0 0x0000000000643148 in JSScript::offsetToPC (this=<optimized out>, offset=<optimized out>) at js/src/vm/JSScript.h:1234 #1 0x000000000062332f in js::jit::ICEntry::pc (script=<optimized out>, this=<optimized out>) at js/src/jit/SharedIC.h:302 #2 js::jit::TryAttachInstanceOfStub (cx=0x7ffff5f16000, frame=frame@entry=0x7fffffffc588, stub=stub@entry=0x7ffff5fa2da8, lhs=..., lhs@entry=..., rhs=..., rhs@entry=..., attached=attached@entry=0x7fffffffc488) at js/src/jit/BaselineIC.cpp:4127 #3 0x00000000006235e4 in js::jit::DoInstanceOfFallback (cx=0x7ffff5f16000, frame=0x7fffffffc588, stub=0x7ffff5fa2da8, lhs=..., rhs=..., res=...) at js/src/jit/BaselineIC.cpp:4176 #4 0x00000797ccca0f8f in ?? () [...] #24 0x0000000000000000 in ?? () rax 0x0 0 rbx 0x7ffff5fa2da8 140737320201640 rcx 0x7ffff6c282ad 140737333330605 rdx 0x0 0 rsi 0x7ffff6ef7770 140737336276848 rdi 0x7ffff6ef6540 140737336272192 rbp 0x7fffffffc200 140737488339456 rsp 0x7fffffffc200 140737488339456 r8 0x7ffff6ef7770 140737336276848 r9 0x7ffff7fe4780 140737354024832 r10 0x58 88 r11 0x7ffff6b9e7a0 140737332766624 r12 0x7ffff5fa2dc8 140737320201672 r13 0x7fffffffc488 140737488340104 r14 0x7fffffffc4a0 140737488340128 r15 0x7fffffffc240 140737488339520 rip 0x643148 <JSScript::offsetToPC(unsigned long) const+104> => 0x643148 <JSScript::offsetToPC(unsigned long) const+104>: movl $0x0,0x0 0x643153 <JSScript::offsetToPC(unsigned long) const+115>: ud2 Likely debugger-only.
1,449,829
13,165,635
This bug was filed from the Socorro interface and is report bp-6b26f22f-39f9-4047-94bf-0b62b0180328. ============================================================= Top 10 frames of crashing thread: 0 libxul.so mozilla::jni::Accessor::EndAccess<mozilla::java::AndroidGamepadManager::OnGamepadAdded_t> 1 libxul.so mozilla::jni::Method<mozilla::java::GeckoProcessManager::Start_t, int>::Call<mozilla::jni::StringParam, mozilla::jni::Ref<mozilla::jni::TypedObject<jobjectArray>, _jobjectArray*>, int, int, int, int> widget/android/jni/Accessors.h:99 2 libxul.so mozilla::java::GeckoProcessManager::Start widget/android/GeneratedJNIWrappers.cpp:2405 3 libxul.so mozilla::ipc::GeckoChildProcessHost::LaunchAndroidService ipc/glue/GeckoChildProcessHost.cpp:1225 4 libxul.so mozilla::ipc::GeckoChildProcessHost::PerformAsyncLaunchInternal ipc/glue/GeckoChildProcessHost.cpp:812 5 libxul.so mozilla::ipc::GeckoChildProcessHost::PerformAsyncLaunch ipc/glue/GeckoChildProcessHost.cpp:544 6 libxul.so mozilla::ipc::GeckoChildProcessHost::RunPerformAsyncLaunch ipc/glue/GeckoChildProcessHost.cpp:552 7 libxul.so mozilla::detail::RunnableMethodArguments<std::__ndk1::vector<std::__ndk1::basic_string<char, std::__ndk1::char_traits<char>, std::__ndk1::allocator<char> >, std::__ndk1::allocator<std::__ndk1::basic_string<char, std::__ndk1::char_traits<char>, std::__ndk1::allocator<char> > > > >::applyImpl<mozilla::ipc::GeckoChildProcessHost, bool , StoreCopyPassByConstLRef<std::__ndk1::vector<std::__ndk1::basic_string<char, std::__ndk1::char_traits<char>, std::__ndk1::allocator<char> >, std::__ndk1::allocator<std::__ndk1::basic_string<char, std::__ndk1::char_traits<char>, std::__ndk1::allocator<char> > > > >, 0> xpcom/threads/nsThreadUtils.h:1164 8 libxul.so mozilla::detail::RunnableMethodImpl<mozilla::ipc::GeckoChildProcessHost*, bool , false, mozilla::RunnableKind::Standard, std::__ndk1::vector<std::__ndk1::basic_string<char, std::__ndk1::char_traits<char>, std::__ndk1::allocator<char> >, std::__ndk1::allocator<std::__ndk1::basic_string<char, std::__ndk1::char_traits<char>, std::__ndk1::allocator<char> > > > >::Run xpcom/threads/nsThreadUtils.h:1170 9 libxul.so MessageLoop::RunTask ipc/chromium/src/base/message_loop.cc:452 =============================================================
1,449,898
13,166,212
Created attachment 8963531 Proof of concept page When a PDF file opens in the built-in PDF Viewer, the stream converter will retrieve the file data and post it as a message to the viewer (see https://dxr.mozilla.org/mozilla-central/rev/a456475502b80a1264642d9eaee9394a8fad8315/browser/extensions/pdfjs/content/PdfStreamConverter.jsm#605). When doing this, it specifies "*" as the recipient's origin. So if the PDF Viewer got replaced by another document in the meantime, that other document will receive the message. Steps to reproduce: 1. Open the attached proof of concept page. 2. Enter the URL of a PDF file into the text field and click "Download" 3. Wait a bit. When testing with https://www.microsoft.com/en-us/research/wp-content/uploads/2006/11/www2007.pdf, this page succeeds within a few seconds for me and displays the first 160 bytes of the PDF file. It does that by loading the PDF in a hidden frame first to make sure that it is cached. After that it will repeatedly load the PDF file in a frame, then replace the frame contents by about:blank after a random time interval. I am not entirely sure why it doesn't work reliably with other PDF files for me, but with some tweaks to the timing it should be possible. So a malicious website should be able to retrieve PDF files in the background that only the website visitor can access. That might be documents on the intranet for example, or private documents on some storage service. I tested with Firefox 59.0.2 and Firefox 61.0a1 (2018-03-28) nightly on Linux.
1,450,270
13,169,049
The switch to intl.locale.requested from general.useragent.locale broke all non-US Acer builds. The reason is that they set the general.useragent.locale preference as a default preference and the migration code only handles user preferences. They ship all the locales and then set the default in distribution.ini. I'm going to add a workaround to distribution.js for this.
1,450,688
13,173,903
Created attachment 8964282 trigger.html Testcase found while fuzzing mozilla-central rev c44f60c43432. ==31751==ERROR: AddressSanitizer: SEGV on unknown address 0x0000000000d8 (pc 0x7ff7193914cb bp 0x7ffdee1b7ad0 sp 0x7ffdee1b7ad0 T0) ==31751==The signal is caused by a READ memory access. ==31751==Hint: address points to the zero page. #0 0x7ff7193914ca in JS::GetRealmPrivate(JS::Realm*) /builds/worker/workspace/build/src/js/src/vm/Realm.cpp:51:43 #1 0x7ff70dc37da8 in Get /builds/worker/workspace/build/src/js/xpconnect/src/xpcprivate.h:3075:22 #2 0x7ff70dc37da8 in Get /builds/worker/workspace/build/src/js/xpconnect/src/xpcprivate.h:3085 #3 0x7ff70dc37da8 in xpc::GetXBLScope(JSContext*, JSObject*) /builds/worker/workspace/build/src/js/xpconnect/src/XPCWrappedNativeScope.cpp:295 #4 0x7ff7138c4578 in GetXBLScopeOrGlobal /builds/worker/workspace/build/src/obj-firefox/dist/include/xpcpublic.h:107:12 #5 0x7ff7138c4578 in GetOrCreateMapEntryForPrototype /builds/worker/workspace/build/src/dom/xbl/nsXBLBinding.cpp:893 #6 0x7ff7138c4578 in nsXBLBinding::DoInitJSClass(JSContext*, JS::Handle<JSObject*>, nsTString<char16_t> const&, nsXBLPrototypeBinding*, JS::MutableHandle<JSObject*>, bool*) /builds/worker/workspace/build/src/dom/xbl/nsXBLBinding.cpp:975 #7 0x7ff7138e26fa in InitClass /builds/worker/workspace/build/src/dom/xbl/nsXBLPrototypeBinding.cpp:484:10 #8 0x7ff7138e26fa in nsXBLProtoImpl::InitTargetObjects(nsXBLPrototypeBinding*, nsIContent*, JS::MutableHandle<JSObject*>, bool*) /builds/worker/workspace/build/src/dom/xbl/nsXBLProtoImpl.cpp:226 #9 0x7ff7138e10a4 in nsXBLProtoImpl::InstallImplementation(nsXBLPrototypeBinding*, nsXBLBinding*) /builds/worker/workspace/build/src/dom/xbl/nsXBLProtoImpl.cpp:65:17 #10 0x7ff7138c2a9d in nsXBLBinding::InstallImplementation() /builds/worker/workspace/build/src/dom/xbl/nsXBLBinding.cpp:589:33 #11 0x7ff713912b6a in nsXBLService::LoadBindings(mozilla::dom::Element*, nsIURI*, nsIPrincipal*, nsXBLBinding**, bool*) /builds/worker/workspace/build/src/dom/xbl/nsXBLService.cpp:563:22 #12 0x7ff71445acbf in nsCSSFrameConstructor::AddFrameConstructionItemsInternal(nsFrameConstructorState&, nsIContent*, nsContainerFrame*, nsAtom*, int, bool, mozilla::ComputedStyle*, unsigned int, nsTArray<nsIAnonymousContentCreator::ContentInfo>*, nsCSSFrameConstructor::FrameConstructionItemList&) /builds/worker/workspace/build/src/layout/base/nsCSSFrameConstructor.cpp:5678:33 #13 0x7ff71447dd96 in DoAddFrameConstructionItems /builds/worker/workspace/build/src/layout/base/nsCSSFrameConstructor.cpp:5592:3 #14 0x7ff71447dd96 in nsCSSFrameConstructor::AddFrameConstructionItems(nsFrameConstructorState&, nsIContent*, bool, nsCSSFrameConstructor::InsertionPoint const&, nsCSSFrameConstructor::FrameConstructionItemList&) /builds/worker/workspace/build/src/layout/base/nsCSSFrameConstructor.cpp:5613 #15 0x7ff71448c3a8 in nsCSSFrameConstructor::ContentAppended(nsIContent*, nsIContent*, nsCSSFrameConstructor::InsertionKind) /builds/worker/workspace/build/src/layout/base/nsCSSFrameConstructor.cpp:7290:5 #16 0x7ff714418193 in mozilla::RestyleManager::ProcessRestyledFrames(nsStyleChangeList&) /builds/worker/workspace/build/src/layout/base/RestyleManager.cpp:1389:27 #17 0x7ff714426f75 in mozilla::ServoRestyleManager::DoProcessPendingRestyles(mozilla::ServoTraversalFlags) /builds/worker/workspace/build/src/layout/base/ServoRestyleManager.cpp:1183:9 #18 0x7ff7143e076d in ProcessPendingRestyles /builds/worker/workspace/build/src/layout/base/ServoRestyleManager.cpp:1259:3 #19 0x7ff7143e076d in ProcessPendingRestyles /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RestyleManagerInlines.h:43 #20 0x7ff7143e076d in mozilla::PresShell::DoFlushPendingNotifications(mozilla::ChangesToFlush) /builds/worker/workspace/build/src/layout/base/PresShell.cpp:4291 #21 0x7ff714370b39 in FlushPendingNotifications /builds/worker/workspace/build/src/obj-firefox/dist/include/nsIPresShell.h:592:5 #22 0x7ff714370b39 in nsRefreshDriver::Tick(long, mozilla::TimeStamp) /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:1913 #23 0x7ff714380060 in TickDriver /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:338:13 #24 0x7ff714380060 in mozilla::RefreshDriverTimer::TickRefreshDrivers(long, mozilla::TimeStamp, nsTArray<RefPtr<nsRefreshDriver> >&) /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:308 #25 0x7ff71437fc26 in mozilla::RefreshDriverTimer::Tick(long, mozilla::TimeStamp) /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:330:5 #26 0x7ff71438299e in RunRefreshDrivers /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:771:5 #27 0x7ff71438299e in mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::TickRefreshDriver(mozilla::TimeStamp) /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:684 #28 0x7ff71438259e in mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::NotifyVsync(mozilla::TimeStamp) /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:585:9 #29 0x7ff714c2e86f in mozilla::layout::VsyncChild::RecvNotify(mozilla::TimeStamp const&) /builds/worker/workspace/build/src/layout/ipc/VsyncChild.cpp:68:16 #30 0x7ff70d7cf379 in mozilla::layout::PVsyncChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/build/src/obj-firefox/ipc/ipdl/PVsyncChild.cpp:156:20 #31 0x7ff70d6a584a in mozilla::ipc::PBackgroundChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/build/src/obj-firefox/ipc/ipdl/PBackgroundChild.cpp:1968:28 #32 0x7ff70d1ed6be in mozilla::ipc::MessageChannel::DispatchAsyncMessage(IPC::Message const&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:2135:25 #33 0x7ff70d1ea641 in mozilla::ipc::MessageChannel::DispatchMessage(IPC::Message&&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:2065:17 #34 0x7ff70d1ebe3c in mozilla::ipc::MessageChannel::RunMessage(mozilla::ipc::MessageChannel::MessageTask&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:1911:5 #35 0x7ff70d1ec498 in mozilla::ipc::MessageChannel::MessageTask::Run() /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:1944:15 #36 0x7ff70c309cc8 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1096:14 #37 0x7ff70c326030 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:519:10 #38 0x7ff70d1f5216 in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:125:5 #39 0x7ff70d144ff9 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:326:10 #40 0x7ff70d144ff9 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:319 #41 0x7ff70d144ff9 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:299 #42 0x7ff713e1b1fa in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:157:27 #43 0x7ff71809f2cb in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:893:22 #44 0x7ff70d144ff9 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:326:10 #45 0x7ff70d144ff9 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:319 #46 0x7ff70d144ff9 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:299 #47 0x7ff71809ecaa in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:719:34 #48 0x4f50dc in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:50:30 #49 0x4f50dc in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:280 #50 0x7ff72c10582f in __libc_start_main /build/glibc-Cl5G7W/glibc-2.23/csu/../csu/libc-start.c:291
1,450,690
13,173,939
[Affected versions]: - 61.0a1 (2018-04-02) - 60.0b8 build1 (20180329154119) [Affected platforms]: - Windows 10 x64 - Ubuntu 16.04 x64 - macOS 10.13.3 [Preconditions] - You need access to SHIELD Control Panel ( https://normandy-admin.stage.mozaws.net/ ) - Set the 'app.normandy.dev_mode' preference to 'true' to run recipes immediately on startup. - Set the 'app.normandy.logging.level' preference to '0' to enable more logging. - Set the 'security.content.signature.root_hash' preference to 'DB:74:CE:58:E4:F9:D0:9E:E0:42:36:BE:6C:C5:C4:F6:6A:E7:74:7D:C0:21:42:7A:03:BC:2F:57:0C:8B:9B:90'. - Set the preference value for 'app.normandy.api_url' to 'https://normandy.stage.mozaws.net/api/v1'. [Steps to reproduce]: 1. Open the SHIELD Control Panel. 2. Create, approve and publish a new opt-out-study recipe. 3. Launch Firefox having the pre-requisites set and open: - browser console - about:studies - about:telemetry (locate the Events tab and choose "dynamic" in top right corner dropdown) - about:addons [Expected result]: - [step 3] - Browser console will show that the recipe has been successfully fetched and executed - about:studies will list the current study as active - about:telemetry will display the details about the current event - The chosen extension is downloaded, installed and listed as enabled in about:addons [Actual result]: - [step 3] - The recipe is displayed as fetched and executed, but the 'Invalid extra key for event ["normandy", "enroll", "addon_study"]. (unknown)' JS warning is displayed in Browser Console (see the screenshot https://drive.google.com/file/d/1BmOmdUbHXqJPm3ideuiBwZqS3ZezMX3q/view?usp=sharing) - The current study is displayed as active in about:studies - There is no event created in about:telemetry for the current opt-out-study - The extension is successfully installed and enabled [Regression range]: - The issue was introduced on 60.0a1 (2018-03-07) - It seems that it was regressed by bug 1439519 [Additional notes] - If using a corrupt extension, the unenrollment event is properly created in about:telemetry
1,450,795
13,174,914
The following testcase crashes on mozilla-central revision 8063b0c54b88 (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --enable-debug --enable-optimize, run with --fuzzing-safe --ion-offthread-compile=off): function wasmEvalText(str, imports) { let binary = wasmTextToBinary(str); m = new WebAssembly.Module(binary); return new WebAssembly.Instance(m, imports); } var { table } = wasmEvalText(`(module (func $add (result i32) (param i32) (param i32) get_local 0 ) (table (export "table") 10 anyfunc) (elem (i32.const 0) $add) )`).exports; for (var i = 0; i < 100; i++) { table.get(0)((true).get++, i*2+1); } Backtrace: received signal SIGSEGV, Segmentation fault. 0x0000000000d67730 in CallingActivation () at js/src/wasm/WasmBuiltins.cpp:68 #0 0x0000000000d67730 in CallingActivation () at js/src/wasm/WasmBuiltins.cpp:68 #1 0x0000000000d6b5ee in CoerceInPlace_JitEntry (funcExportIndex=0, tlsData=0x7ffff4947000, argv=0x7fffffffc4a8) at js/src/wasm/WasmBuiltins.cpp:345 #2 0x000038b192d9e23a in ?? () [...] #18 0x0000000000000000 in ?? () rax 0x0 0 rbx 0x7ffff5f15000 140737319620608 rcx 0x7ffff6c282ad 140737333330605 rdx 0x0 0 rsi 0x7ffff6ef7770 140737336276848 rdi 0x7ffff6ef6540 140737336272192 rbp 0x7fffffffc420 140737488340000 rsp 0x7fffffffc410 140737488339984 r8 0x7ffff6ef7770 140737336276848 r9 0x7ffff7fe4780 140737354024832 r10 0x58 88 r11 0x7ffff6b9e7a0 140737332766624 r12 0x7fffffffc4a8 140737488340136 r13 0x7ffff4947000 140737296756736 r14 0x0 0 r15 0x7ffff486e028 140737295867944 rip 0xd67730 <CallingActivation()+144> => 0xd67730 <CallingActivation()+144>: movl $0x0,0x0 0xd6773b <CallingActivation()+155>: ud2 Not sure what this assert exactly means but it is jit-related and the stack doesn't have a lot of useful information either, marking s-s until investigated.
1,451,094
13,177,566
This bug was filed from the Socorro interface and is report bp-0f79c5b8-73e4-457a-b3bb-4dccf0180403. ============================================================= Top 10 frames of crashing thread: 0 xul.dll mozilla::net::HttpBaseChannel::RedirectTo netwerk/protocol/http/HttpBaseChannel.cpp:2221 1 xul.dll XPTC__InvokebyIndex xpcom/reflect/xptcall/md/win32/xptcinvoke_asm_x86_64.asm:97 2 @0x26564ddd65f 3 xul.dll XPCWrappedNative::CallMethod js/xpconnect/src/XPCWrappedNative.cpp:1234 4 xul.dll XPC_WN_CallMethod js/xpconnect/src/XPCWrappedNativeJSOps.cpp:913 5 xul.dll js::InternalCallOrConstruct js/src/vm/Interpreter.cpp:468 6 xul.dll Interpret js/src/vm/Interpreter.cpp:3086 7 xul.dll js::RunScript js/src/vm/Interpreter.cpp:418 8 xul.dll js::InternalCallOrConstruct js/src/vm/Interpreter.cpp:490 9 xul.dll JS_CallFunctionValue js/src/jsapi.cpp:2970 ============================================================= this signature is starting to show up in firefox 60 looking related to bug 1434357 - so far the crashes are occurring in a fairly low volume though.
1,457,929
13,243,444
In Bug 1279568 we noticed that the new tab page was setting cookies. We decided to load thumbnails in a special dedicated container. But that caused crashes debugged painfully and fixed in Bug 1289001 - during that process we put this feature behind the pref privacy.usercontext.about_newtab_segregation.enabled That pref has been enabled in Nightly since ~51. So there's probably (?) not any lingering crashes. But there are some things we should investigate before flipping this pref. 1) Do we want to? It seems like it would be beneficial to isolate the Thumbnail context from other stuff. 2) Do we (still) need to? Can thumbnails still set cookies or did something change in the past year or so to fix that. 3) Is there anything that prevents the chosen userContextId (seems like 5) from being used for a user container? 4) Is there any mechanism to clear this container's data so we don't just have a persistent tab thumbnail tracking storage?
1,458,999
13,253,004
This bug was filed from the Socorro interface and is report bp-4da7cc5a-4ce3-4125-b6df-fed540180503. ============================================================= Top 10 frames of crashing thread: 0 xul.dll nsXULWindow::SyncAttributesToWidget xpfe/appshell/nsXULWindow.cpp:1572 1 xul.dll nsXULWindow::OnChromeLoaded xpfe/appshell/nsXULWindow.cpp:1126 2 xul.dll nsWebShellWindow::OnStateChange xpfe/appshell/nsWebShellWindow.cpp:656 3 xul.dll nsDocLoader::DoFireOnStateChange uriloader/base/nsDocLoader.cpp:1315 4 xul.dll nsDocLoader::doStopDocumentLoad uriloader/base/nsDocLoader.cpp:869 5 xul.dll nsDocLoader::DocLoaderIsEmpty uriloader/base/nsDocLoader.cpp:747 6 xul.dll nsDocLoader::OnStopRequest uriloader/base/nsDocLoader.cpp:632 7 xul.dll mozilla::net::nsLoadGroup::RemoveRequest netwerk/base/nsLoadGroup.cpp:629 8 xul.dll nsIDocument::DoUnblockOnload dom/base/nsDocument.cpp:8422 9 xul.dll nsUnblockOnloadEvent::Run dom/base/nsDocument.cpp:8373 ============================================================= this signature is regressing in volume during the firefox 61 cycle. so far it's win10 only. the first crash was reported from 61.0a1 build 20180322220118. perhaps related to bug 1439875, 1447875 & 1446264?
1,459,568
13,259,208
The following testcase crashes on mozilla-central revision b1628ac71fcc (build with --enable-debug --enable-more-deterministic, run with --fuzzing-safe --no-threads --no-baseline --no-ion): // jsfunfuzz-generated gcparam("markStackLimit", 2); // Adapted from randomly chosen test: js/src/tests/non262/extensions/collect-gray.js (function() { grayRoot().x = 0; gc(); grayRoot().map = new (function(){}); })(); Backtrace: #0 js::CheckTargetIsNotGray<JSLinearString*> (v=<optimized out>) at js/src/gc/Barrier.h:342 #1 0x0000000000c2f216 in js::CheckTargetIsNotGray<js::Shape*> (v=<optimized out>) at js/src/gc/Barrier.h:339 #2 0x0000000000c6c237 in js::GCPtr<js::Shape*>::set (v=<synthetic pointer>, this=0x7ffffd398af0) at js/src/gc/Barrier.h:489 #3 js::GCPtr<js::Shape*>::operator= (p=<synthetic pointer>, this=0x7ffffd398af0) at js/src/gc/Barrier.h:485 #4 js::Shape::setParent (this=0x7ffffd398ad8, p=0x7ffffd3b03f8) at js/src/vm/Shape.h:799 /snip For detailed crash information, see attachment. Setting s-s as a start because gc is involved.
1,459,607
13,259,465
The following testcase crashes on mozilla-central revision fb435df9797a (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --enable-debug --enable-optimize, run with --fuzzing-safe --ion-eager --ion-offthread-compile=off): evaluate(` var p = Object.freeze([ - undefined + this ]); gc(); evaluate(\` p[0] \`); `); Backtrace: received signal SIGSEGV, Segmentation fault. 0x000000000073db9e in js::jit::IonBuilder::constant (this=0x7ffff5f911c0, v=...) at js/src/jit/IonBuilder.cpp:13623 #0 0x000000000073db9e in js::jit::IonBuilder::constant (this=0x7ffff5f911c0, v=...) at js/src/jit/IonBuilder.cpp:13623 #1 0x000000000073dbc1 in js::jit::IonBuilder::pushConstant (this=0x7ffff5f911c0, v=...) at js/src/jit/IonBuilder.cpp:3237 #2 0x0000000000742bbb in js::jit::IonBuilder::getElemTryCallSiteObject (this=this@entry=0x7ffff5f911c0, emitted=emitted@entry=0x7fffffff9f0e, obj=obj@entry=0x7ffff5f91b88, index=index@entry=0x7ffff5f91ca8) at js/src/jit/IonBuilder.cpp:8291 #3 0x0000000000770690 in js::jit::IonBuilder::jsop_getelem (this=0x7ffff5f911c0) at js/src/jit/IonBuilder.cpp:7801 #4 0x000000000078cec5 in js::jit::IonBuilder::inspectOpcode (this=this@entry=0x7ffff5f911c0, op=op@entry=JSOP_GETELEM) at js/src/jit/IonBuilder.cpp:2174 #5 0x000000000078eb18 in js::jit::IonBuilder::visitBlock (this=this@entry=0x7ffff5f911c0, cfgblock=cfgblock@entry=0x7ffff494b3a8, mblock=<optimized out>) at js/src/jit/IonBuilder.cpp:1563 #6 0x000000000078f4ed in js::jit::IonBuilder::traverseBytecode (this=this@entry=0x7ffff5f911c0) at js/src/jit/IonBuilder.cpp:1480 #7 0x00000000007902b2 in js::jit::IonBuilder::build (this=this@entry=0x7ffff5f911c0) at js/src/jit/IonBuilder.cpp:863 #8 0x000000000079d402 in js::jit::IonCompile (cx=<optimized out>, cx@entry=0x7ffff5f17000, script=<optimized out>, baselineFrame=baselineFrame@entry=0x0, osrPc=osrPc@entry=0x0, recompile=<optimized out>, optimizationLevel=<optimized out>) at js/src/jit/Ion.cpp:2101 #9 0x000000000079de97 in js::jit::Compile (cx=cx@entry=0x7ffff5f17000, script=script@entry=..., osrFrame=osrFrame@entry=0x0, osrPc=osrPc@entry=0x0, forceRecompile=forceRecompile@entry=false) at js/src/jit/Ion.cpp:2384 #10 0x000000000079dfbc in js::jit::CanEnterIon (cx=cx@entry=0x7ffff5f17000, state=...) at js/src/jit/Ion.cpp:2468 #11 0x00000000007c8959 in js::jit::MaybeEnterJit (cx=cx@entry=0x7ffff5f17000, state=...) at js/src/jit/Jit.cpp:140 [...] #18 0x00000000004706c3 in Evaluate (cx=<optimized out>, argc=<optimized out>, vp=<optimized out>) at js/src/shell/js.cpp:2014 #19 0x00000000005b4f01 in js::CallJSNative (cx=0x7ffff5f17000, native=0x46fb50 <Evaluate(JSContext*, unsigned int, JS::Value*)>, args=...) at js/src/vm/JSContext-inl.h:280 #20 0x00000000005a94bf in js::InternalCallOrConstruct (cx=<optimized out>, cx@entry=0x7ffff5f17000, args=..., construct=construct@entry=js::NO_CONSTRUCT) at js/src/vm/Interpreter.cpp:467 #21 0x00000000005a989d in InternalCall (cx=0x7ffff5f17000, args=...) at js/src/vm/Interpreter.cpp:516 #22 0x00000000005a99ea in js::CallFromStack (cx=<optimized out>, args=...) at js/src/vm/Interpreter.cpp:522 #23 0x0000000000690a63 in js::jit::DoCallFallback (cx=<optimized out>, frame=0x7fffffffb508, stub_=<optimized out>, argc=<optimized out>, vp=0x7fffffffb4b8, res=...) at js/src/jit/BaselineIC.cpp:2382 #24 0x0000328edd29f71c in ?? () [...] #46 0x0000000000000000 in ?? () rax 0x0 0 rbx 0x7ffff5f911c0 140737320128960 rcx 0x7ffff6c282ad 140737333330605 rdx 0x0 0 rsi 0x7ffff6ef7770 140737336276848 rdi 0x7ffff6ef6540 140737336272192 rbp 0x7fffffff9e80 140737488330368 rsp 0x7fffffff9e70 140737488330352 r8 0x7ffff6ef7770 140737336276848 r9 0x7ffff7fe4780 140737354024832 r10 0x58 88 r11 0x7ffff6b9e7a0 140737332766624 r12 0x7ffff4c990f0 140737300238576 r13 0x7ffff4c990c0 140737300238528 r14 0x7ffff5f91ca8 140737320131752 r15 0x7ffff5f911c0 140737320128960 rip 0x73db9e <js::jit::IonBuilder::constant(JS::Value const&)+222> => 0x73db9e <js::jit::IonBuilder::constant(JS::Value const&)+222>: movl $0x0,0x0 0x73dba9 <js::jit::IonBuilder::constant(JS::Value const&)+233>: ud2 Marking s-s because the test uses GC and the assertion also looks potentially s-s (type mismatch).
1,460,526
13,267,614
Filed by: ncsoregi [at] mozilla.com https://treeherder.mozilla.org/logviewer.html#?job_id=177806118&repo=mozilla-inbound https://queue.taskcluster.net/v1/task/PI2mtHzaRFChLOhkxiIPMQ/runs/0/artifacts/public/logs/live_backing.log [task 2018-05-10T04:29:54.339Z] 04:29:54 INFO - TEST-START | /html/semantics/embedded-content/image-maps/image-map-processing-model/hash-name-reference.html [task 2018-05-10T04:29:55.413Z] 04:29:55 INFO - PID 9184 | [Parent 9184, Gecko_IOThread] WARNING: pipe error (67): Connection reset by peer: file /builds/worker/workspace/build/src/ipc/chromium/src/chrome/common/ipc_channel_posix.cc, line 353 [task 2018-05-10T04:29:55.413Z] 04:29:55 INFO - PID 9184 | ###!!! [Parent][MessageChannel] Error: (msgtype=0x16007F,name=PBrowser::Msg_Destroy) Channel error: cannot send/recv [task 2018-05-10T04:29:55.414Z] 04:29:55 INFO - PID 9184 | ###!!! [Parent][MessageChannel] Error: (msgtype=0x16007F,name=PBrowser::Msg_Destroy) Channel error: cannot send/recv [task 2018-05-10T04:29:55.474Z] 04:29:55 INFO - PID 9184 | ###!!! [Parent][MessageChannel] Error: (msgtype=0x16007F,name=PBrowser::Msg_Destroy) Channel error: cannot send/recv [task 2018-05-10T04:29:55.523Z] 04:29:55 INFO - PID 9184 | A content process crashed and MOZ_CRASHREPORTER_SHUTDOWN is set, shutting down [task 2018-05-10T04:29:55.673Z] 04:29:55 INFO - mozcrash Downloading symbols from: https://queue.taskcluster.net/v1/task/CIeCQAHFSayVs8kf1PcGPQ/artifacts/public/build/target.crashreporter-symbols.zip [task 2018-05-10T04:29:55.750Z] 04:29:55 INFO - PID 9184 | *** UTM:SVC TimerManager:registerTimer called after profile-before-change notification. Ignoring timer registration for id: telemetry_modules_ping [task 2018-05-10T04:30:02.038Z] 04:30:02 INFO - mozcrash Copy/paste: /usr/local/bin/linux64-minidump_stackwalk /tmp/tmp1WkfEZ.mozrunner/minidumps/249a791f-2219-8c48-2efb-8c7fcd973073.dmp /tmp/tmpbmVSCB [task 2018-05-10T04:30:10.501Z] 04:30:10 INFO - mozcrash Saved minidump as /builds/worker/workspace/build/blobber_upload_dir/249a791f-2219-8c48-2efb-8c7fcd973073.dmp [task 2018-05-10T04:30:10.501Z] 04:30:10 INFO - mozcrash Saved app info as /builds/worker/workspace/build/blobber_upload_dir/249a791f-2219-8c48-2efb-8c7fcd973073.extra [task 2018-05-10T04:30:10.564Z] 04:30:10 INFO - PROCESS-CRASH | /html/semantics/embedded-content/image-maps/image-map-processing-model/hash-name-reference.html | application crashed [@ MOZ_CrashPrintf]
1,433,609
12,999,046
Created attachment 8945992 callstack.txt INFO: This is an IPC crash found by the fuzzer faulty - there is no test-case available which leads to an immediate crash for reproduction. The attached session.txt contains a trace of IPC messages which were sent and received during a session of visiting https://html5test.com *** Possible reproduction scenario: pip install git+https://github.com/mozillasecurity/fuzzfetch fuzzfetch -a --fuzzing -n firefox -o /tmp export FAULTY_PROBABILITY=50000 export FAULTY_LARGE_VALUES=1 export FAULTY_PARENT=1 export FAULTY_ENABLE_LOGGING=1 export FAULTY_PICKLE=1 export MOZ_IPC_MESSAGE_LOG=1 *** Messages which correlate with the stack: [time: 1517011604468329][6751->6821] [PBrowserParent] Sending PBrowser::Msg_LoadRemoteScript [time: 1517011604470821][6751->6821] [PBrowserParent] Sending PBrowser::Msg_AsyncMessage [time: 1517011604470925][6751->6821] [PBrowserParent] Sending PBrowser::Msg_RenderLayers [time: 1517011604470954][6751->6821] [PBrowserParent] Sending PBrowser::Msg_SetDocShellIsActive [time: 1517011604476341][6821<-6751] [PBrowserChild] Received PBrowser::Msg_LoadRemoteScript [time: 1517011604476489][6751->6821] [PBrowserParent] Sending PBrowser::Msg_UpdateDimensions [time: 1517011604476804][6821<-6751] [PBrowserChild] Received PBrowser::Msg_LoadRemoteScript [time: 1517011604477044][6751->6860] [PBrowserParent] Sending PBrowser::Msg_SynthMouseMoveEvent [time: 1517011604477224][6860<-6751] [PBrowserChild] Received PBrowser::Msg_SynthMouseMoveEvent [time: 1517011604477922][6860->6751] [PContentChild] Sending PContent::Msg_AccumulateChildHistograms [time: 1517011604477966][6821<-6751] [PBrowserChild] Received PBrowser::Msg_LoadRemoteScript [Faulty] pickle field {UInt32} of value: 0 changed to: 1 *** Source bool nsStandardURL::SegmentIs(const URLSegment &seg1, const char *val, const URLSegment &seg2, bool ignoreCase) { if (seg1.mLen != seg2.mLen) return false; if (seg1.mLen == -1 || (!val && mSpec.IsEmpty())) return true; // both are empty if (!val) return false; if (ignoreCase) return !PL_strncasecmp(mSpec.get() + seg1.mPos, val + seg2.mPos, seg1.mLen); else * return !strncmp(mSpec.get() + seg1.mPos, val + seg2.mPos, seg1.mLen); } https://searchfox.org/mozilla-central/rev/38bddf549db0f26d4d7575cf695958ff703a3ed7/netwerk/base/nsStandardURL.cpp#1007
1,433,636
12,999,254
This bug was filed from the Socorro interface and is report bp-30e684b7-fc2d-404c-9db7-3bad40180126. ============================================================= Top 10 frames of crashing thread: 0 xul.dll NS_ABORT_OOM xpcom/base/nsDebugImpl.cpp:620 1 xul.dll mozilla::safebrowsing::`anonymous namespace'::ReadValue<nsTSubstring<char> > toolkit/components/url-classifier/LookupCacheV4.cpp:472 2 xul.dll mozilla::safebrowsing::LookupCacheV4::LoadMetadata toolkit/components/url-classifier/LookupCacheV4.cpp:544 3 xul.dll mozilla::safebrowsing::LookupCacheV4::LoadFromFile toolkit/components/url-classifier/LookupCacheV4.cpp:169 4 xul.dll mozilla::safebrowsing::LookupCache::LoadPrefixSet toolkit/components/url-classifier/LookupCache.cpp:478 5 xul.dll mozilla::safebrowsing::LookupCache::Open toolkit/components/url-classifier/LookupCache.cpp:83 6 xul.dll mozilla::safebrowsing::Classifier::GetLookupCache toolkit/components/url-classifier/Classifier.cpp:1467 7 xul.dll mozilla::safebrowsing::Classifier::RegenActiveTables toolkit/components/url-classifier/Classifier.cpp:927 8 xul.dll mozilla::safebrowsing::Classifier::Open toolkit/components/url-classifier/Classifier.cpp:262 9 xul.dll nsUrlClassifierDBServiceWorker::OpenDb toolkit/components/url-classifier/nsUrlClassifierDBService.cpp:974 ============================================================= out of memory crashes at startup with this signature show up since firefox 58 on 32-bit and 64-bit builds on windows and they show particularly large memory allocation sizes. over all the crash volume is quite low though...
1,433,790
13,000,096
This bug was filed from the Socorro interface and is report bp-af1e6a31-292a-4f7c-aa44-d7edd0180124. ============================================================= content crashes on windows 7 64bit with this intel graphics driver in the signature started taking off in with firefox 58: https://crash-stats.mozilla.com/signature/?product=Firefox&process_type=content&submitted_from_infobar=%21__true__&signature=igd10umd64.dll&date=%3E%3D2017-12-24#graphs so far in the 58 roll-out it's the #3 top content crasher with 1.8% of all tab crashes. the spike seems to be mostly restricted to a particular driver version and one generation of intel gpus, so perhaps it would be possible to do something here with the help of a remote blocklist? Adapter driver version facet 1 8.15.10.2418 583 97.65 % Adapter device id facet 1 0x0116 225 37.69 % 2 0x0126 175 29.31 % 3 0x0102 158 26.47 % 4 0x0106 33 5.53 % 5 0x0112 3 0.50 %
1,434,252
13,004,928
User Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:57.0) Gecko/20100101 Firefox/57.0 Build ID: 20180103231032 Steps to reproduce: 1. Automatic upgrade from 57.0.4 to 58.0.1 (64bit) 2. Firefox requested a restart to finalise the upgrade. Actual results: The old session with all tabs was gone. Expected results: The old tabs should have been restored. I made a backup of the sessionstore-backups folder and in there had a recovery.jsonlz4, which seems to be corrupted (size of ~21kb) and a recovery.baklz4, which was fine. (size ~874kb) Every attempt at making FF58 load the recovery.baklz4 (from sessionstore-backups directly, by renaming it to sessionstore.jsonlz4 and by decoding it to plain JSON and then saving it as sessionstore.jsonlz4) failed. It always created a new session. I then downgraded to 57.0.4, deleted sessionstore.jsonlz4 and cleared sessionstore-backups. Then I copied recovery.baklz4 into that folder and FF57 successfully fired up and restored all tabs. Subsequently I started another update to 58.0.1 and it failed in the same way again. I was again able to restore the tabs with the same procedure as above.
1,434,384
13,005,993
The following testcase crashes on mozilla-central revision 8a2584063e19+ (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --enable-tests --enable-address-sanitizer --disable-jemalloc --enable-optimize=-O2 --enable-fuzzing --disable-debug, run with --fuzzing-safe): let data = new Uint8Array([ 0x0,0x0,0x0,0x0,0x0,0x2,0xff,0xff,0x0,0x0,0x0,0x0,0x0,0x0,0x4,0x0,0x2,0x0, 0x0,0x0,0x2,0x2,0xff,0xff,0x0,0x0,0x0,0x0,0x0,0x40,0x0,0x20,0x0,0x0,0x0,0x0, 0x0,0x0,0x0,0x0 ]); let cloneBuffer = serialize(null); cloneBuffer.clonebuffer = data.buffer; try { let obj = deserialize(cloneBuffer); print(uneval(obj)); } catch(exc1) { print(exc1); } Backtrace: ==15174==ERROR: AddressSanitizer: BUS on unknown address 0x000000000000 (pc 0x00000046a7ef bp 0x20003ffffffffff0 sp 0x7ffe32e839a0 T0) #0 0x46a7ee in __asan::asan_free(void*, __sanitizer::BufferedStackTrace*, __asan::AllocType) (js/src/opt64lf/js/src/shell/js+0x46a7ee) #1 0x52129c in __interceptor_cfree.localalias.0 (js/src/opt64lf/js/src/shell/js+0x52129c) #2 0x15a622d in js::Class::doFinalize(js::FreeOp*, JSObject*) const js/src/opt64lf/dist/include/js/Class.h:874:5 #3 0x15a622d in JSObject::finalize(js::FreeOp*) js/src/jsobjinlines.h:108 #4 0x15a622d in unsigned long js::gc::Arena::finalize<JSObject>(js::FreeOp*, js::gc::AllocKind, unsigned long) js/src/jsgc.cpp:552 #5 0x158ac45 in bool FinalizeTypedArenas<JSObject>(js::FreeOp*, js::gc::Arena**, js::gc::SortedArenaList&, js::gc::AllocKind, js::SliceBudget&, js::gc::ArenaLists::KeepArenasEnum) js/src/jsgc.cpp:610:33 #6 0x151f3b8 in FinalizeArenas(js::FreeOp*, js::gc::Arena**, js::gc::SortedArenaList&, js::gc::AllocKind, js::SliceBudget&, js::gc::ArenaLists::KeepArenasEnum) js/src/jsgc.cpp:644:1 #7 0x151c325 in js::gc::ArenaLists::backgroundFinalize(js::FreeOp*, js::gc::Arena*, js::gc::Arena**) js/src/jsgc.cpp:3041:5 #8 0x1527b6e in js::gc::GCRuntime::sweepBackgroundThings(js::gc::ZoneList&, js::LifoAlloc&) js/src/jsgc.cpp:3434:21 #9 0x154b70b in js::gc::GCRuntime::endSweepingSweepGroup(js::FreeOp*, js::SliceBudget&) js/src/jsgc.cpp:5671:9 #10 0x15c39bc in sweepaction::SweepActionSequence<js::gc::GCRuntime*, js::FreeOp*, js::SliceBudget&>::run(js::gc::GCRuntime*, js::FreeOp*, js::SliceBudget&) js/src/jsgc.cpp:6202:29 #11 0x15c493e in sweepaction::SweepActionRepeatFor<js::gc::SweepGroupsIter, JSRuntime*, js::gc::GCRuntime*, js::FreeOp*, js::SliceBudget&>::run(js::gc::GCRuntime*, js::FreeOp*, js::SliceBudget&) js/src/jsgc.cpp:6263:25 #12 0x1551527 in js::gc::GCRuntime::performSweepActions(js::SliceBudget&, js::AutoLockForExclusiveAccess&) js/src/jsgc.cpp:6418:26 #13 0x15588d5 in js::gc::GCRuntime::incrementalCollectSlice(js::SliceBudget&, JS::gcreason::Reason, js::AutoLockForExclusiveAccess&) js/src/jsgc.cpp:6980:13 #14 0x155c56a in js::gc::GCRuntime::gcCycle(bool, js::SliceBudget&, JS::gcreason::Reason) js/src/jsgc.cpp:7317:5 #15 0x1560255 in js::gc::GCRuntime::collect(bool, js::SliceBudget, JS::gcreason::Reason) js/src/jsgc.cpp:7460:25 #16 0x1525368 in js::gc::GCRuntime::gc(JSGCInvocationKind, JS::gcreason::Reason) js/src/jsgc.cpp:7530:5 [...] Another crash where the base pointer looks clobbered, so this might again be easily exploitable if it can be triggered by a child process. Marking sec-high due to potential sandbox escape.
1,434,528
13,007,481
[Affected versions]: - 60.0a1 [Affected platforms]: - Ubuntu 16.04 x32 - Ubuntu 16.04 x64 [Unaffected platforms]: - macOS 10.13 - Windows 7 x32 [Steps to reproduce]: 1. Start a Guest session 2. Open a recent Nightly version (eg. 60.0a1 – 2018-01-30) with a clean profile [Expected result]: - The browser is successfully opened [Actual result]: - The tab that firstly gets in focus crashes (any attempt to open a new tab also triggers this behavior) [Regression range]: - I was able to find a recent regression: * last good revision: * first bad revision: * pushlog: https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=8ad8d2f1649a76d6f62d823a81b4c6a7a08ca9eb&tochange=bd7ff5744eb29e105b7b3c37cb5f46164fa11ef4 - Note this issue also occurred starting with 2017-07-20, all the way back to 2017-07-26 Nightly build [Additional notes]: - On Ubuntu 14.04 x32, the browser is launched, no tab crash is occurred, but no page/tab can be loaded inside it
1,434,711
13,009,459
User Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:58.0) Gecko/20100101 Firefox/58.0 Build ID: 20180131010234 Steps to reproduce: On some website (Facebook with the chat window popup opened, Google Maps and some minor website) tab crash during load, and this happened right after the update to Firefox 58. the driver installed for the GPU is AMDGPU-PRO 17.50-511655 Actual results: This issue have generated a crash report you can find here (https://crash-stats.mozilla.com/report/index/33dda5a8-8ea5-468c-a15a-052b80180127) and i tested with the browser in safe mode and with a new profile and even with Noscript enabled to be sure isn't a script on the webpage , and the crash still happen. Opening the browser trough Bash and trying to reproduce the crash give this stdout: ivan@yang:~$ firefox MESA-LOADER: could not get parent device /opt/amdgpu/share/libdrm/amdgpu.ids: Permesso negato [Parent 6363, Gecko_IOThread] WARNING: pipe error (174): Connessione interrotta dal corrispondente: file /build/firefox-ox8TnP/firefox-58.0.1+build1/ipc/chromium/src/chrome/common/ipc_channel_posix.cc, line 353 [Parent 6363, Gecko_IOThread] WARNING: pipe error (47): Connessione interrotta dal corrispondente: file /build/firefox-ox8TnP/firefox-58.0.1+build1/ipc/chromium/src/chrome/common/ipc_channel_posix.cc, line 353 [Parent 6363, Gecko_IOThread] WARNING: pipe error (46): Connessione interrotta dal corrispondente: file /build/firefox-ox8TnP/firefox-58.0.1+build1/ipc/chromium/src/chrome/common/ipc_channel_posix.cc, line 353 ###!!! [Parent][MessageChannel] Error: (msgtype=0x150084,name=PBrowser::Msg_Destroy) Channel error: cannot send/recv ###!!! [Parent][MessageChannel] Error: (msgtype=0x150084,name=PBrowser::Msg_Destroy) Channel error: cannot send/recv
1,435,036
13,012,329
Found while fuzzing mozilla-central rev 5201997e7e01. Currently reducing the testcase. Will update once complete. ==7626==ERROR: AddressSanitizer: heap-use-after-free on address 0x606000443ec0 at pc 0x7f16838b7bf5 bp 0x7ffc1220f3b0 sp 0x7ffc1220f3a8 READ of size 1 at 0x606000443ec0 thread T0 (file:// Content) #0 0x7f16838b7bf4 in ChromeAffectingStateChanged /builds/worker/workspace/build/src/dom/media/MediaManager.cpp:4419:7 #1 0x7f16838b7bf4 in mozilla::SourceListener::StopTrack(int) /builds/worker/workspace/build/src/dom/media/MediaManager.cpp:3952 #2 0x7f1683908fbc in mozilla::GetUserMediaStreamRunnable::Run()::LocalTrackSource::Stop() /builds/worker/workspace/build/src/dom/media/MediaManager.cpp:1267:24 #3 0x7f16839573a9 in mozilla::dom::MediaStreamTrackSource::UnregisterSink(mozilla::dom::MediaStreamTrackSource::Sink*) /builds/worker/workspace/build/src/dom/media/MediaStreamTrack.h:229:7 #4 0x7f1683956bcf in mozilla::dom::MediaStreamTrack::Destroy() /builds/worker/workspace/build/src/dom/media/MediaStreamTrack.cpp:160:14 #5 0x7f16839579e5 in mozilla::dom::MediaStreamTrack::cycleCollection::Unlink(void*) /builds/worker/workspace/build/src/dom/media/MediaStreamTrack.cpp:181:8 #6 0x7f167db63a24 in nsCycleCollector::CollectWhite() /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3401:26 #7 0x7f167db666ad in nsCycleCollector::Collect(ccType, js::SliceBudget&, nsICycleCollectorListener*, bool) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3769:24 #8 0x7f167db6a2f0 in nsCycleCollector_collect(nsICycleCollectorListener*) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:4315:21 #9 0x7f1680fd324c in nsJSContext::CycleCollectNow(nsICycleCollectorListener*) /builds/worker/workspace/build/src/dom/base/nsJSEnvironment.cpp:1505:3 #10 0x7f1680b1747b in nsDOMWindowUtils::CycleCollect(nsICycleCollectorListener*) /builds/worker/workspace/build/src/dom/base/nsDOMWindowUtils.cpp:1298:3 #11 0x7f167dcfdb71 in NS_InvokeByIndex /builds/worker/workspace/build/src/xpcom/reflect/xptcall/md/unix/xptcinvoke_asm_x86_64_unix.S:106 #12 0x7f167f732da0 in Invoke /builds/worker/workspace/build/src/js/xpconnect/src/XPCWrappedNative.cpp:1948:12 #13 0x7f167f732da0 in Call /builds/worker/workspace/build/src/js/xpconnect/src/XPCWrappedNative.cpp:1267 #14 0x7f167f732da0 in XPCWrappedNative::CallMethod(XPCCallContext&, XPCWrappedNative::CallMode) /builds/worker/workspace/build/src/js/xpconnect/src/XPCWrappedNative.cpp:1234 #15 0x7f167f739603 in XPC_WN_CallMethod(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/js/xpconnect/src/XPCWrappedNativeJSOps.cpp:929:12 #16 0x7f1689793b74 in CallJSNative /builds/worker/workspace/build/src/js/src/jscntxtinlines.h:291:15 #17 0x7f1689793b74 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:473 #18 0x7f168977d59b in CallFromStack /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:528:12 #19 0x7f168977d59b in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3096 #20 0x7f168975fa39 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:423:12 #21 0x7f1689793d31 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:495:15 #22 0x7f16897949d3 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:541:10 #23 0x7f168a3975c5 in JS_CallFunctionValue(JSContext*, JS::Handle<JSObject*>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jsapi.cpp:2978:12 #24 0x7f167f64a350 in xpc::FunctionForwarder(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/js/xpconnect/src/ExportHelpers.cpp:315:18 #25 0x2a0ae118fde5 (<unknown module>) 0x606000443ec0 is located 32 bytes inside of 56-byte region [0x606000443ea0,0x606000443ed8) freed by thread T48 (MediaManager) here: #0 0x4c6fc2 in __interceptor_free /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:68:3 #1 0x7f1683907bd2 in operator delete /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/mozalloc.h:183:12 #2 0x7f1683907bd2 in Release /builds/worker/workspace/build/src/dom/media/MediaManager.cpp:488 #3 0x7f1683907bd2 in Release /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:41 #4 0x7f1683907bd2 in Release /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:398 #5 0x7f1683907bd2 in ~RefPtr /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:79 #6 0x7f1683907bd2 in mozilla::GetUserMediaStreamRunnable::~GetUserMediaStreamRunnable() /builds/worker/workspace/build/src/dom/media/MediaManager.cpp:1127 #7 0x7f1683907e8d in mozilla::GetUserMediaStreamRunnable::~GetUserMediaStreamRunnable() /builds/worker/workspace/build/src/dom/media/MediaManager.cpp:1127:33 #8 0x7f167dce9bec in mozilla::Runnable::Release() /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:50:1 #9 0x7f168390a6f0 in Release /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:41:11 #10 0x7f168390a6f0 in Release /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:398 #11 0x7f168390a6f0 in ~RefPtr /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:79 #12 0x7f168390a6f0 in ~ /builds/worker/workspace/build/src/dom/media/MediaManager.cpp:1378 #13 0x7f168390a6f0 in ~LambdaTask /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/media/MediaTaskUtils.h:24 #14 0x7f168390a6f0 in mozilla::media::LambdaTask<mozilla::GetUserMediaStreamRunnable::Run()::{lambda()#1}>::~LambdaTask() /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/media/MediaTaskUtils.h:24 #15 0x7f167dce9bec in mozilla::Runnable::Release() /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:50:1 #16 0x7f167dcd1707 in ~nsCOMPtr_base /builds/worker/workspace/build/src/obj-firefox/dist/include/nsCOMPtr.h:313:7 #17 0x7f167dcd1707 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1046 #18 0x7f167dced5a0 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:517:10 #19 0x7f167eb7f6af in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:334:20 #20 0x7f167ead15f9 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:326:10 #21 0x7f167ead15f9 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:319 #22 0x7f167ead15f9 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:299 #23 0x7f167eaf0b5f in base::Thread::ThreadMain() /builds/worker/workspace/build/src/ipc/chromium/src/base/thread.cc:181:16 #24 0x7f167eae25cc in ThreadFunc(void*) /builds/worker/workspace/build/src/ipc/chromium/src/base/platform_thread_posix.cc:38:13 #25 0x7f169df906b9 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76b9) previously allocated by thread T0 (file:// Content) here: #0 0x4c7303 in malloc /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:88:3 #1 0x4f7dcd in moz_xmalloc /builds/worker/workspace/build/src/memory/mozalloc/mozalloc.cpp:70:17 #2 0x7f16838a16c7 in operator new /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/mozalloc.h:159:12 #3 0x7f16838a16c7 in mozilla::MediaManager::GetUserMedia(nsPIDOMWindowInner*, mozilla::dom::MediaStreamConstraints const&, nsIDOMGetUserMediaSuccessCallback*, nsIDOMGetUserMediaErrorCallback*, mozilla::dom::CallerType) /builds/worker/workspace/build/src/dom/media/MediaManager.cpp:2620 #4 0x7f1683775948 in mozilla::dom::MediaDevices::GetUserMedia(mozilla::dom::MediaStreamConstraints const&, mozilla::dom::CallerType, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/media/MediaDevices.cpp:194:30 #5 0x7f168148bea2 in getUserMedia /builds/worker/workspace/build/src/obj-firefox/dom/bindings/MediaDevicesBinding.cpp:192:45 #6 0x7f168148bea2 in mozilla::dom::MediaDevicesBinding::getUserMedia_promiseWrapper(JSContext*, JS::Handle<JSObject*>, mozilla::dom::MediaDevices*, JSJitMethodCallArgs const&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/MediaDevicesBinding.cpp:209 #7 0x7f1682cf2f0a in mozilla::dom::GenericPromiseReturningBindingMethod(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:3083:13 #8 0x7f1689793b74 in CallJSNative /builds/worker/workspace/build/src/js/src/jscntxtinlines.h:291:15 #9 0x7f1689793b74 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:473 #10 0x7f16897949d3 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:541:10 #11 0x7f168a750b4c in js::ForwardingProxyHandler::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) const /builds/worker/workspace/build/src/js/src/proxy/Wrapper.cpp:176:12 #12 0x7f168a6e1ef6 in js::CrossCompartmentWrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) const /builds/worker/workspace/build/src/js/src/proxy/CrossCompartmentWrapper.cpp:359:23 #13 0x7f168a6f8a06 in js::Proxy::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) /builds/worker/workspace/build/src/js/src/proxy/Proxy.cpp:511:21 #14 0x7f168a6fb7f3 in js::proxy_Call(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/js/src/proxy/Proxy.cpp:770:12 #15 0x7f1689794192 in CallJSNative /builds/worker/workspace/build/src/js/src/jscntxtinlines.h:291:15 #16 0x7f1689794192 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:455 #17 0x7f1689a281cf in js::jit::DoCallFallback(JSContext*, js::jit::BaselineFrame*, js::jit::ICCall_Fallback*, unsigned int, JS::Value*, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jit/BaselineIC.cpp:2375:14 #18 0x2a0ae115460a (<unknown module>) #19 0x621000ef3c1f (<unknown module>) #20 0x2a0ae114e4e7 (<unknown module>) #21 0x7f1689a54cc0 in EnterBaseline /builds/worker/workspace/build/src/js/src/jit/BaselineJIT.cpp:150:9 #22 0x7f1689a54cc0 in js::jit::EnterBaselineAtBranch(JSContext*, js::InterpreterFrame*, unsigned char*) /builds/worker/workspace/build/src/js/src/jit/BaselineJIT.cpp:227 #23 0x7f1689788d8e in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:2049:28 #24 0x7f168975fa39 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:423:12 #25 0x7f1689796d25 in js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value const&, js::AbstractFramePtr, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:706:15 #26 0x7f168979751d in js::Execute(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:738:12 #27 0x7f168a3b401b in ExecuteScript(JSContext*, JS::AutoObjectVector&, JS::Handle<JSScript*>, JS::Value*) /builds/worker/workspace/build/src/js/src/jsapi.cpp:4734:12 #28 0x7f1680fea956 in nsJSUtils::ExecutionContext::CompileAndExec(JS::CompileOptions&, JS::SourceBufferHolder&, JS::MutableHandle<JSScript*>) /builds/worker/workspace/build/src/dom/base/nsJSUtils.cpp:266:8 #29 0x7f1684b5d6dd in mozilla::dom::ScriptLoader::EvaluateScript(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:2286:25 #30 0x7f1684b57919 in mozilla::dom::ScriptLoader::ProcessRequest(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1929:10 #31 0x7f1684b54c63 in mozilla::dom::ScriptLoader::ProcessInlineScript(nsIScriptElement*, mozilla::dom::ScriptKind) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1572:10 #32 0x7f1684b394be in mozilla::dom::ScriptLoader::ProcessScriptElement(nsIScriptElement*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1307:10 #33 0x7f1684b385d9 in mozilla::dom::ScriptElement::MaybeProcessScript() /builds/worker/workspace/build/src/dom/script/ScriptElement.cpp:147:18 #34 0x7f167fde934b in AttemptToExecute /builds/worker/workspace/build/src/obj-firefox/dist/include/nsIScriptElement.h:247:18 #35 0x7f167fde934b in nsHtml5TreeOpExecutor::RunScript(nsIContent*) /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:736 Thread T48 (MediaManager) created by T0 (file:// Content) here: #0 0x4b065d in __interceptor_pthread_create /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cc:204:3 #1 0x7f167eadff2f in CreateThread /builds/worker/workspace/build/src/ipc/chromium/src/base/platform_thread_posix.cc:135:14 #2 0x7f167eadff2f in PlatformThread::Create(unsigned long, PlatformThread::Delegate*, unsigned long*) /builds/worker/workspace/build/src/ipc/chromium/src/base/platform_thread_posix.cc:146 #3 0x7f167eaf04ff in base::Thread::StartWithOptions(base::Thread::Options const&) /builds/worker/workspace/build/src/ipc/chromium/src/base/thread.cc:99:8 #4 0x7f168389c542 in mozilla::MediaManager::Get() /builds/worker/workspace/build/src/dom/media/MediaManager.cpp:2025:36 #5 0x7f168377592e in mozilla::dom::MediaDevices::GetUserMedia(mozilla::dom::MediaStreamConstraints const&, mozilla::dom::CallerType, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/media/MediaDevices.cpp:194:9 #6 0x7f168148bea2 in getUserMedia /builds/worker/workspace/build/src/obj-firefox/dom/bindings/MediaDevicesBinding.cpp:192:45 #7 0x7f168148bea2 in mozilla::dom::MediaDevicesBinding::getUserMedia_promiseWrapper(JSContext*, JS::Handle<JSObject*>, mozilla::dom::MediaDevices*, JSJitMethodCallArgs const&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/MediaDevicesBinding.cpp:209 #8 0x7f1682cf2f0a in mozilla::dom::GenericPromiseReturningBindingMethod(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:3083:13 #9 0x7f1689793b74 in CallJSNative /builds/worker/workspace/build/src/js/src/jscntxtinlines.h:291:15 #10 0x7f1689793b74 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:473 #11 0x7f16897949d3 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:541:10 #12 0x7f168a750b4c in js::ForwardingProxyHandler::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) const /builds/worker/workspace/build/src/js/src/proxy/Wrapper.cpp:176:12 #13 0x7f168a6e1ef6 in js::CrossCompartmentWrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) const /builds/worker/workspace/build/src/js/src/proxy/CrossCompartmentWrapper.cpp:359:23 #14 0x7f168a6f8a06 in js::Proxy::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) /builds/worker/workspace/build/src/js/src/proxy/Proxy.cpp:511:21 #15 0x7f168a6fb7f3 in js::proxy_Call(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/js/src/proxy/Proxy.cpp:770:12 #16 0x7f1689794192 in CallJSNative /builds/worker/workspace/build/src/js/src/jscntxtinlines.h:291:15 #17 0x7f1689794192 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:455 #18 0x7f1689a281cf in js::jit::DoCallFallback(JSContext*, js::jit::BaselineFrame*, js::jit::ICCall_Fallback*, unsigned int, JS::Value*, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jit/BaselineIC.cpp:2375:14 #19 0x2a0ae115460a (<unknown module>) #20 0x621001e5541f (<unknown module>) #21 0x2a0ae114e4e7 (<unknown module>) #22 0x7f1689a54cc0 in EnterBaseline /builds/worker/workspace/build/src/js/src/jit/BaselineJIT.cpp:150:9 #23 0x7f1689a54cc0 in js::jit::EnterBaselineAtBranch(JSContext*, js::InterpreterFrame*, unsigned char*) /builds/worker/workspace/build/src/js/src/jit/BaselineJIT.cpp:227 #24 0x7f1689788d8e in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:2049:28 #25 0x7f168975fa39 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:423:12 #26 0x7f1689796d25 in js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value const&, js::AbstractFramePtr, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:706:15 #27 0x7f168979751d in js::Execute(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:738:12 #28 0x7f168a3b401b in ExecuteScript(JSContext*, JS::AutoObjectVector&, JS::Handle<JSScript*>, JS::Value*) /builds/worker/workspace/build/src/js/src/jsapi.cpp:4734:12 #29 0x7f1680fea956 in nsJSUtils::ExecutionContext::CompileAndExec(JS::CompileOptions&, JS::SourceBufferHolder&, JS::MutableHandle<JSScript*>) /builds/worker/workspace/build/src/dom/base/nsJSUtils.cpp:266:8 #30 0x7f1684b5d6dd in mozilla::dom::ScriptLoader::EvaluateScript(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:2286:25 #31 0x7f1684b57919 in mozilla::dom::ScriptLoader::ProcessRequest(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1929:10 #32 0x7f1684b54c63 in mozilla::dom::ScriptLoader::ProcessInlineScript(nsIScriptElement*, mozilla::dom::ScriptKind) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1572:10 #33 0x7f1684b394be in mozilla::dom::ScriptLoader::ProcessScriptElement(nsIScriptElement*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1307:10 #34 0x7f1684b385d9 in mozilla::dom::ScriptElement::MaybeProcessScript() /builds/worker/workspace/build/src/dom/script/ScriptElement.cpp:147:18 #35 0x7f167fde934b in AttemptToExecute /builds/worker/workspace/build/src/obj-firefox/dist/include/nsIScriptElement.h:247:18 #36 0x7f167fde934b in nsHtml5TreeOpExecutor::RunScript(nsIContent*) /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:736 #37 0x7f167fde25b4 in nsHtml5TreeOpExecutor::RunFlushLoop() /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:540:7 #38 0x7f167fdef96f in nsHtml5ExecutorReflusher::Run() /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:57:18 #39 0x7f167dca9420 in mozilla::SchedulerGroup::Runnable::Run() /builds/worker/workspace/build/src/xpcom/threads/SchedulerGroup.cpp:395:25 #40 0x7f167dcd156b in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1040:14 #41 0x7f167dced5a0 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:517:10 #42 0x7f167eb7e2aa in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:97:21 #43 0x7f167ead15f9 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:326:10 #44 0x7f167ead15f9 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:319 #45 0x7f167ead15f9 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:299 #46 0x7f1684d9b68a in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:157:27 #47 0x7f16894732eb in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:873:22 #48 0x7f167ead15f9 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:326:10 #49 0x7f167ead15f9 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:319 #50 0x7f167ead15f9 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:299 #51 0x7f1689472cd1 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:699:34 #52 0x4f6f2c in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:63:30 #53 0x4f6f2c in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:280 #54 0x7f169cf2b82f in __libc_start_main /build/glibc-Cl5G7W/glibc-2.23/csu/../csu/libc-start.c:291 SUMMARY: AddressSanitizer: heap-use-after-free /builds/worker/workspace/build/src/dom/media/MediaManager.cpp:4419:7 in ChromeAffectingStateChanged Shadow bytes around the buggy address: 0x0c0c80080780: 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa 0x0c0c80080790: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c800807a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c800807b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c800807c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c0c800807d0: fa fa fa fa fd fd fd fd[fd]fd fd fa fa fa fa fa 0x0c0c800807e0: 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 00 00 0x0c0c800807f0: 00 00 00 00 fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c80080800: fa fa fa fa 00 00 00 00 00 00 00 00 fa fa fa fa 0x0c0c80080810: 00 00 00 00 00 00 01 fa fa fa fa fa 00 00 00 00 0x0c0c80080820: 00 00 04 fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==7626==ABORTING
1,435,446
13,015,484
This bug was filed from the Socorro interface and is report bp-9e673c3c-f891-4a43-927f-60ce90180202. ============================================================= Top 10 frames of crashing thread: 0 mozglue.dll mozalloc_abort memory/mozalloc/mozalloc_abort.cpp:33 1 xul.dll Abort xpcom/base/nsDebugImpl.cpp:457 2 xul.dll NS_DebugBreak xpcom/base/nsDebugImpl.cpp:413 3 xul.dll nsDebugImpl::Abort xpcom/base/nsDebugImpl.cpp:146 4 xul.dll XPTC__InvokebyIndex xpcom/reflect/xptcall/md/win32/xptcinvoke_asm_x86_64.asm:97 5 @0x27852481e7f 6 xul.dll XPCWrappedNative::CallMethod js/xpconnect/src/XPCWrappedNative.cpp:1234 7 xul.dll XPC_WN_CallMethod js/xpconnect/src/XPCWrappedNativeJSOps.cpp:929 8 xul.dll js::InternalCallOrConstruct js/src/vm/Interpreter.cpp:473 9 xul.dll Interpret js/src/vm/Interpreter.cpp:3096 ============================================================= Prerequisite: 1. About:sync addon installed 2. services.sync.engine.bookmarks.buffer is set to true STR: 1. Sign in to sync account (~1000 bookmarks) 2. Sync doesn't start automatically with About:sync addon(known bug 1332698) 3. Trigger sync 4. Open browser console and enter Weave.Service.enabled = false to disable sync Observations: Sync get disabled but Sync icon is still spinning as syncing and last sync time shows wrong time. 5. Enter Weave.Service.enabled = true to enable sync. Observation: I don't see any bookmark in library 6. I disconnect sync from about:preferences?entrypoint=menupanel#sync 7. Sign in to sync on another new profile, trigger sync Observations: I see bookmarks in library without favicon and last sync still shows wrong time. After few seconds/a minute browser crashed I didn't see any error log in about:sync Restarting the browser brought things to normal/as expected.
1,435,715
13,018,785
Created attachment 8948379 Client-2018-02-05-161928.ips.beta Build: 11.0 (8861) Device: iPad Air 2 iOS: 11.2.5 Steps to reproduce: 1. Open two tabs 2. In the second tab go to youtube.com 3. Long tap on the youtube.com tab and move it in the 1st position 4. While still holding the finger on the youtube.com tab, close the empty tab. Actual results: - Firefox will crash. Expected results: - Safari disables all buttons when holding the finger on a tab while re-arranging. We should do the same. Note: - Firefox also crashes when performing other actions (e.g. switching to private browsing, opening tabs) when holding the finger on a tab while re-arranging the tab. - See video here: https://www.youtube.com/watch?v=k0bZhMSz0xE
1,435,859
13,020,045
This bug was filed from the Socorro interface and is report bp-0086eab2-59ed-42a3-bf7a-8cfd60180205. ============================================================= Top 10 frames of crashing thread: 0 xul.dll NS_ABORT_OOM xpcom/base/nsDebugImpl.cpp:614 1 xul.dll mozilla::safebrowsing::Classifier::DeleteTables toolkit/components/url-classifier/Classifier.cpp:362 2 xul.dll mozilla::safebrowsing::Classifier::ResetTables toolkit/components/url-classifier/Classifier.cpp:326 3 xul.dll mozilla::safebrowsing::Classifier::ApplyUpdatesForeground toolkit/components/url-classifier/Classifier.cpp:872 4 xul.dll <lambda_506e6a83a22d85e62e5b05da709b58c7>::operator toolkit/components/url-classifier/Classifier.cpp:755 5 xul.dll mozilla::detail::RunnableFunction<<lambda_506e6a83a22d85e62e5b05da709b58c7> >::Run xpcom/threads/nsThreadUtils.h:529 6 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1040 7 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:517 8 xul.dll mozilla::ipc::MessagePumpForNonMainThreads::Run ipc/glue/MessagePump.cpp:364 9 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:319 ============================================================= these oom crash reports on windows are regressing in firefox 58 & happen both on 32bit and win64 builds. the recorded memory allocation size always seems to be exactly 4 .GiB
1,437,087
13,030,881
Found with version 20180208-c5120bcaf7bd I am trying to get a reliable testcase but I'm not having much luck. ==7952==ERROR: AddressSanitizer: heap-use-after-free on address 0x619000993980 at pc 0x7f190cbf17c3 bp 0x7ffcf6e6b470 sp 0x7ffcf6e6b468 READ of size 8 at 0x619000993980 thread T0 #0 0x7f190cbf17c2 in mozilla::EditorEventListener::UninstallFromEditor() /src/editor/libeditor/EditorEventListener.cpp:243:49 #1 0x7f190cba7251 in mozilla::EditorEventListener::Disconnect() /src/editor/libeditor/EditorEventListener.cpp:221:3 #2 0x7f190cbedeb4 in mozilla::EditorEventListener::~EditorEventListener() /src/editor/libeditor/EditorEventListener.cpp:115:5 #3 0x7f190cd6d8dd in mozilla::HTMLEditorEventListener::~HTMLEditorEventListener() /src/editor/libeditor/HTMLEditorEventListener.h:24:3 #4 0x7f190cbf1b55 in mozilla::EditorEventListener::Release() /src/editor/libeditor/EditorEventListener.cpp:347:1 #5 0x7f190aeb4264 in UnlinkSelf /src/obj-firefox/dist/include/mozilla/dom/CallbackObject.h:545:5 #6 0x7f190aeb4264 in ~CallbackObjectHolder /src/obj-firefox/dist/include/mozilla/dom/CallbackObject.h:411 #7 0x7f190aeb4264 in ~Listener /src/obj-firefox/dist/include/mozilla/EventListenerManager.h:250 #8 0x7f190aeb4264 in Destruct /src/obj-firefox/dist/include/nsTArray.h:541 #9 0x7f190aeb4264 in DestructRange /src/obj-firefox/dist/include/nsTArray.h:2060 #10 0x7f190aeb4264 in ClearAndRetainStorage /src/obj-firefox/dist/include/nsTArray.h:1293 #11 0x7f190aeb4264 in nsTArray_Impl<mozilla::EventListenerManager::Listener, nsTArrayInfallibleAllocator>::Clear() /src/obj-firefox/dist/include/nsTArray.h:1784 #12 0x7f190ae5251e in Clear /src/obj-firefox/dist/include/nsTObserverArray.h:286:12 #13 0x7f190ae5251e in RemoveAllListeners /src/dom/events/EventListenerManager.cpp:173 #14 0x7f190ae5251e in mozilla::EventListenerManager::Disconnect() /src/dom/events/EventListenerManager.cpp:1371 #15 0x7f1908ba40f9 in nsDocument::cycleCollection::Unlink(void*) /src/dom/base/nsDocument.cpp:2089:28 #16 0x7f190b265acd in nsHTMLDocument::cycleCollection::Unlink(void*) /src/dom/html/nsHTMLDocument.cpp:196:1 #17 0x7f19057fd764 in nsCycleCollector::CollectWhite() /src/xpcom/base/nsCycleCollector.cpp:3401:26 #18 0x7f19058003ed in nsCycleCollector::Collect(ccType, js::SliceBudget&, nsICycleCollectorListener*, bool) /src/xpcom/base/nsCycleCollector.cpp:3769:24 #19 0x7f1905804086 in nsCycleCollector_collect(nsICycleCollectorListener*) /src/xpcom/base/nsCycleCollector.cpp:4315:21 #20 0x7f1908cd954b in nsJSContext::CycleCollectNow(nsICycleCollectorListener*) /src/dom/base/nsJSEnvironment.cpp:1505:3 #21 0x7f19088209db in nsDOMWindowUtils::CycleCollect(nsICycleCollectorListener*) /src/dom/base/nsDOMWindowUtils.cpp:1298:3 #22 0x7f190599c841 in NS_InvokeByIndex /src/xpcom/reflect/xptcall/md/unix/xptcinvoke_asm_x86_64_unix.S:106 #23 0x7f190742f5d0 in Invoke /src/js/xpconnect/src/XPCWrappedNative.cpp:1948:12 #24 0x7f190742f5d0 in Call /src/js/xpconnect/src/XPCWrappedNative.cpp:1267 #25 0x7f190742f5d0 in XPCWrappedNative::CallMethod(XPCCallContext&, XPCWrappedNative::CallMode) /src/js/xpconnect/src/XPCWrappedNative.cpp:1234 #26 0x7f1907435e33 in XPC_WN_CallMethod(JSContext*, unsigned int, JS::Value*) /src/js/xpconnect/src/XPCWrappedNativeJSOps.cpp:929:12 #27 0x7f191145ffc4 in CallJSNative /src/js/src/jscntxtinlines.h:291:15 #28 0x7f191145ffc4 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:473 #29 0x7f1911449c34 in CallFromStack /src/js/src/vm/Interpreter.cpp:528:12 #30 0x7f1911449c34 in Interpret(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:3096 #31 0x7f191142be37 in js::RunScript(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:423:12 #32 0x7f1911460181 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:495:15 #33 0x7f1911460e23 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /src/js/src/vm/Interpreter.cpp:541:10 #34 0x7f1912068025 in JS_CallFunctionValue(JSContext*, JS::Handle<JSObject*>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /src/js/src/jsapi.cpp:2978:12 #35 0x7f1907346f70 in xpc::FunctionForwarder(JSContext*, unsigned int, JS::Value*) /src/js/xpconnect/src/ExportHelpers.cpp:315:18 #36 0x7f191145ffc4 in CallJSNative /src/js/src/jscntxtinlines.h:291:15 #37 0x7f191145ffc4 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:473 #38 0x7f1911449c34 in CallFromStack /src/js/src/vm/Interpreter.cpp:528:12 #39 0x7f1911449c34 in Interpret(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:3096 #40 0x7f191142be37 in js::RunScript(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:423:12 #41 0x7f1911460181 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:495:15 #42 0x7f1911460e23 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /src/js/src/vm/Interpreter.cpp:541:10 #43 0x7f191206a99f in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /src/js/src/jsapi.cpp:3037:12 #44 0x7f190a2e77ef in mozilla::dom::EventListener::HandleEvent(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, mozilla::ErrorResult&) /src/obj-firefox/dom/bindings/EventListenerBinding.cpp:47:8 #45 0x7f190ae5ced3 in HandleEvent<mozilla::dom::EventTarget *> /src/obj-firefox/dist/include/mozilla/dom/EventListenerBinding.h:65:12 #46 0x7f190ae5ced3 in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, nsIDOMEvent*, mozilla::dom::EventTarget*) /src/dom/events/EventListenerManager.cpp:1108 #47 0x7f190ae5ee26 in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, nsIDOMEvent**, mozilla::dom::EventTarget*, nsEventStatus*) /src/dom/events/EventListenerManager.cpp:1286:20 #48 0x7f190ae48642 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /src/dom/events/EventDispatcher.cpp:490:16 #49 0x7f190ae4c073 in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, nsIDOMEvent*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /src/dom/events/EventDispatcher.cpp:859:9 #50 0x7f190ae4deac in mozilla::EventDispatcher::DispatchDOMEvent(nsISupports*, mozilla::WidgetEvent*, nsIDOMEvent*, nsPresContext*, nsEventStatus*) /src/dom/events/EventDispatcher.cpp:926:12 #51 0x7f1908cbe56f in nsINode::DispatchEvent(nsIDOMEvent*, bool*) /src/dom/base/nsINode.cpp:1275:5 #52 0x7f19087d066e in nsContentUtils::DispatchEvent(nsIDocument*, nsISupports*, nsTSubstring<char16_t> const&, bool, bool, bool, bool*, bool) /src/dom/base/nsContentUtils.cpp:4534:18 #53 0x7f19087d0424 in nsContentUtils::DispatchTrustedEvent(nsIDocument*, nsISupports*, nsTSubstring<char16_t> const&, bool, bool, bool*) /src/dom/base/nsContentUtils.cpp:4502:10 #54 0x7f1908bce5e1 in nsDocument::DispatchContentLoadedEvents() /src/dom/base/nsDocument.cpp:5376:3 #55 0x7f1908c342f4 in applyImpl<nsDocument, void (nsDocument::*)()> /src/obj-firefox/dist/include/nsThreadUtils.h:1149:12 #56 0x7f1908c342f4 in apply<nsDocument, void (nsDocument::*)()> /src/obj-firefox/dist/include/nsThreadUtils.h:1155 #57 0x7f1908c342f4 in mozilla::detail::RunnableMethodImpl<nsDocument*, void (nsDocument::*)(), true, (mozilla::RunnableKind)0>::Run() /src/obj-firefox/dist/include/nsThreadUtils.h:1200 #58 0x7f19059700db in nsThread::ProcessNextEvent(bool, bool*) /src/xpcom/threads/nsThread.cpp:1040:14 #59 0x7f190598c1e0 in NS_ProcessNextEvent(nsIThread*, bool) /src/xpcom/threads/nsThreadUtils.cpp:517:10 #60 0x7f19068229aa in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /src/ipc/glue/MessagePump.cpp:97:21 #61 0x7f1906773979 in RunInternal /src/ipc/chromium/src/base/message_loop.cc:326:10 #62 0x7f1906773979 in RunHandler /src/ipc/chromium/src/base/message_loop.cc:319 #63 0x7f1906773979 in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:299 #64 0x7f190ca6821a in nsBaseAppShell::Run() /src/widget/nsBaseAppShell.cpp:157:27 #65 0x7f1910f294bb in nsAppStartup::Run() /src/toolkit/components/startup/nsAppStartup.cpp:288:30 #66 0x7f19111367f5 in XREMain::XRE_mainRun() /src/toolkit/xre/nsAppRunner.cpp:4676:22 #67 0x7f191113976c in XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&) /src/toolkit/xre/nsAppRunner.cpp:4811:8 #68 0x7f191113abb4 in XRE_main(int, char**, mozilla::BootstrapConfig const&) /src/toolkit/xre/nsAppRunner.cpp:4903:21 #69 0x4f6d45 in do_main /src/browser/app/nsBrowserApp.cpp:231:22 #70 0x4f6d45 in main /src/browser/app/nsBrowserApp.cpp:304 #71 0x7f19247c782f in __libc_start_main /build/glibc-Cl5G7W/glibc-2.23/csu/../csu/libc-start.c:291 #72 0x4265bc in _start (/home/ubuntu/firefox/firefox+0x4265bc) 0x619000993980 is located 0 bytes inside of 952-byte region [0x619000993980,0x619000993d38) freed by thread T0 here: #0 0x4c6fc2 in __interceptor_free /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:68:3 #1 0x7f19057f9210 in SnowWhiteKiller::~SnowWhiteKiller() /src/xpcom/base/nsCycleCollector.cpp:2729:25 #2 0x7f1905800def in FreeSnowWhite /src/xpcom/base/nsCycleCollector.cpp:2917:3 #3 0x7f1905800def in nsCycleCollector::BeginCollection(ccType, nsICycleCollectorListener*) /src/xpcom/base/nsCycleCollector.cpp:3925 #4 0x7f19058003b4 in nsCycleCollector::Collect(ccType, js::SliceBudget&, nsICycleCollectorListener*, bool) /src/xpcom/base/nsCycleCollector.cpp:3746:9 #5 0x7f1905804086 in nsCycleCollector_collect(nsICycleCollectorListener*) /src/xpcom/base/nsCycleCollector.cpp:4315:21 #6 0x7f1908cd954b in nsJSContext::CycleCollectNow(nsICycleCollectorListener*) /src/dom/base/nsJSEnvironment.cpp:1505:3 #7 0x7f19088209db in nsDOMWindowUtils::CycleCollect(nsICycleCollectorListener*) /src/dom/base/nsDOMWindowUtils.cpp:1298:3 #8 0x7f190599c841 in NS_InvokeByIndex /src/xpcom/reflect/xptcall/md/unix/xptcinvoke_asm_x86_64_unix.S:106 #9 0x7f190742f5d0 in Invoke /src/js/xpconnect/src/XPCWrappedNative.cpp:1948:12 #10 0x7f190742f5d0 in Call /src/js/xpconnect/src/XPCWrappedNative.cpp:1267 #11 0x7f190742f5d0 in XPCWrappedNative::CallMethod(XPCCallContext&, XPCWrappedNative::CallMode) /src/js/xpconnect/src/XPCWrappedNative.cpp:1234 #12 0x7f1907435e33 in XPC_WN_CallMethod(JSContext*, unsigned int, JS::Value*) /src/js/xpconnect/src/XPCWrappedNativeJSOps.cpp:929:12 #13 0x7f191145ffc4 in CallJSNative /src/js/src/jscntxtinlines.h:291:15 #14 0x7f191145ffc4 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:473 #15 0x7f1911449c34 in CallFromStack /src/js/src/vm/Interpreter.cpp:528:12 #16 0x7f1911449c34 in Interpret(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:3096 #17 0x7f191142be37 in js::RunScript(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:423:12 #18 0x7f1911460181 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:495:15 #19 0x7f1911460e23 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /src/js/src/vm/Interpreter.cpp:541:10 #20 0x7f1912068025 in JS_CallFunctionValue(JSContext*, JS::Handle<JSObject*>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /src/js/src/jsapi.cpp:2978:12 #21 0x7f1907346f70 in xpc::FunctionForwarder(JSContext*, unsigned int, JS::Value*) /src/js/xpconnect/src/ExportHelpers.cpp:315:18 #22 0x7f191145ffc4 in CallJSNative /src/js/src/jscntxtinlines.h:291:15 #23 0x7f191145ffc4 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:473 #24 0x7f1911449c34 in CallFromStack /src/js/src/vm/Interpreter.cpp:528:12 #25 0x7f1911449c34 in Interpret(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:3096 #26 0x7f191142be37 in js::RunScript(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:423:12 #27 0x7f1911460181 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:495:15 #28 0x7f1911460e23 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /src/js/src/vm/Interpreter.cpp:541:10 #29 0x7f191206a99f in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /src/js/src/jsapi.cpp:3037:12 #30 0x7f190a2e77ef in mozilla::dom::EventListener::HandleEvent(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, mozilla::ErrorResult&) /src/obj-firefox/dom/bindings/EventListenerBinding.cpp:47:8 #31 0x7f190ae5ced3 in HandleEvent<mozilla::dom::EventTarget *> /src/obj-firefox/dist/include/mozilla/dom/EventListenerBinding.h:65:12 #32 0x7f190ae5ced3 in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, nsIDOMEvent*, mozilla::dom::EventTarget*) /src/dom/events/EventListenerManager.cpp:1108 #33 0x7f190ae5ee26 in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, nsIDOMEvent**, mozilla::dom::EventTarget*, nsEventStatus*) /src/dom/events/EventListenerManager.cpp:1286:20 #34 0x7f190ae48642 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /src/dom/events/EventDispatcher.cpp:490:16 #35 0x7f190ae4c073 in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, nsIDOMEvent*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /src/dom/events/EventDispatcher.cpp:859:9 #36 0x7f190ae4deac in mozilla::EventDispatcher::DispatchDOMEvent(nsISupports*, mozilla::WidgetEvent*, nsIDOMEvent*, nsPresContext*, nsEventStatus*) /src/dom/events/EventDispatcher.cpp:926:12 #37 0x7f1908cbe56f in nsINode::DispatchEvent(nsIDOMEvent*, bool*) /src/dom/base/nsINode.cpp:1275:5 previously allocated by thread T0 here: #0 0x4c7303 in malloc /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:88:3 #1 0x4f7dcd in moz_xmalloc /src/memory/mozalloc/mozalloc.cpp:70:17 #2 0x7f190cdf6f39 in operator new /src/obj-firefox/dist/include/mozilla/mozalloc.h:159:12 #3 0x7f190cdf6f39 in nsEditingSession::SetupEditorOnWindow(mozIDOMWindowProxy*) /src/editor/composer/nsEditingSession.cpp:424 #4 0x7f190cdf435f in nsEditingSession::MakeWindowEditable(mozIDOMWindowProxy*, char const*, bool, bool, bool) /src/editor/composer/nsEditingSession.cpp:178:10 #5 0x7f190b26ec36 in nsHTMLDocument::EditingStateChanged() /src/dom/html/nsHTMLDocument.cpp:2618:25 #6 0x7f190b27d6be in nsHTMLDocument::MaybeEditingStateChanged() /src/dom/html/nsHTMLDocument.cpp:2259:7 #7 0x7f1908b35d87 in nsContentSink::StartLayout(bool) /src/dom/base/nsContentSink.cpp:1259:14 #8 0x7f1907aeaa85 in nsHtml5TreeOpExecutor::StartLayout(bool*) /src/parser/html/nsHtml5TreeOpExecutor.cpp:673:18 #9 0x7f1907ae595e in nsHtml5TreeOperation::Perform(nsHtml5TreeOpExecutor*, nsIContent**, bool*, bool*) /src/parser/html/nsHtml5TreeOperation.cpp:1215:17 #10 0x7f1907ae2d26 in nsHtml5TreeOpExecutor::RunFlushLoop() /src/parser/html/nsHtml5TreeOpExecutor.cpp:493:29 #11 0x7f1907af024f in nsHtml5ExecutorReflusher::Run() /src/parser/html/nsHtml5TreeOpExecutor.cpp:57:18 #12 0x7f19059700db in nsThread::ProcessNextEvent(bool, bool*) /src/xpcom/threads/nsThread.cpp:1040:14 #13 0x7f190598c1e0 in NS_ProcessNextEvent(nsIThread*, bool) /src/xpcom/threads/nsThreadUtils.cpp:517:10 #14 0x7f19068229aa in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /src/ipc/glue/MessagePump.cpp:97:21 #15 0x7f1906773979 in RunInternal /src/ipc/chromium/src/base/message_loop.cc:326:10 #16 0x7f1906773979 in RunHandler /src/ipc/chromium/src/base/message_loop.cc:319 #17 0x7f1906773979 in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:299 #18 0x7f190ca6821a in nsBaseAppShell::Run() /src/widget/nsBaseAppShell.cpp:157:27 #19 0x7f1910f294bb in nsAppStartup::Run() /src/toolkit/components/startup/nsAppStartup.cpp:288:30 #20 0x7f19111367f5 in XREMain::XRE_mainRun() /src/toolkit/xre/nsAppRunner.cpp:4676:22 #21 0x7f191113976c in XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&) /src/toolkit/xre/nsAppRunner.cpp:4811:8 #22 0x7f191113abb4 in XRE_main(int, char**, mozilla::BootstrapConfig const&) /src/toolkit/xre/nsAppRunner.cpp:4903:21 #23 0x4f6d45 in do_main /src/browser/app/nsBrowserApp.cpp:231:22 #24 0x4f6d45 in main /src/browser/app/nsBrowserApp.cpp:304 #25 0x7f19247c782f in __libc_start_main /build/glibc-Cl5G7W/glibc-2.23/csu/../csu/libc-start.c:291
1,437,450
13,035,287
The following testcase crashes on mozilla-central revision 2b7d42d527af (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --enable-debug --enable-optimize, run with --fuzzing-safe --cpu-count=2 --disable-oom-functions --ion-eager): function testBug507425() { var r = /x/; for (var i = 0; i < 3; i++) r.lastIndex = 0; var s = ';'; try { for (i = 0; i < 80; testBug507425(s)) s = s; } catch (exc) { r.DateTimeFormat = 0; } } testBug507425(); Backtrace: received signal SIGSEGV, Segmentation fault. #0 0x0000000000824aa5 in js::jit::MacroAssembler::initGCSlots (this=this@entry=0x7ffff5fbe048, obj=obj@entry=..., temp=..., temp@entry=..., templateObj=templateObj@entry=0x7ffff5899080, initContents=initContents@entry=true) at js/src/jit/MacroAssembler.cpp:1163 #1 0x0000000000824e77 in js::jit::MacroAssembler::initGCThing (this=0x7ffff5fbe048, obj=..., temp=..., templateObj=templateObj@entry=0x7ffff5899080, initContents=initContents@entry=false, convertDoubleElements=convertDoubleElements@entry=false) at js/src/jit/MacroAssembler.cpp:1257 #2 0x000000000082a12f in js::jit::MacroAssembler::createGCObject (this=<optimized out>, obj=..., obj@entry=..., temp=..., temp@entry=..., templateObj=templateObj@entry=0x7ffff5899080, initialHeap=initialHeap@entry=js::gc::DefaultHeap, fail=fail@entry=0x7ffff5fceee8, initContents=true, convertDoubleElements=false) at js/src/jit/MacroAssembler.cpp:921 #3 0x000000000068b435 in js::jit::CodeGenerator::visitRegExp (this=0x7ffff5fbe000, lir=0x7ffff5fb6fa8) at js/src/jit/CodeGenerator.cpp:1239 #4 0x00000000006cbcef in js::jit::CodeGenerator::generateBody (this=this@entry=0x7ffff5fbe000) at js/src/jit/CodeGenerator.cpp:5568 #5 0x00000000006cc815 in js::jit::CodeGenerator::generate (this=this@entry=0x7ffff5fbe000) at js/src/jit/CodeGenerator.cpp:9748 #6 0x00000000006f83a6 in js::jit::GenerateCode (mir=mir@entry=0x7ffff5fc4270, lir=0x7ffff5fb6230) at js/src/jit/Ion.cpp:1966 #7 0x0000000000751949 in js::jit::CompileBackEnd (mir=mir@entry=0x7ffff5fc4270) at js/src/jit/Ion.cpp:1988 #8 0x0000000000bb8db8 in js::HelperThread::handleIonWorkload (this=this@entry=0x7ffff5f28098, locked=...) at js/src/vm/HelperThreads.cpp:1838 [...] #14 0x00007ffff6c383dd in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:109 rax 0x0 0 rbx 0x1 1 rcx 0x7ffff6c282ad 140737333330605 rdx 0x0 0 rsi 0x7ffff6ef7770 140737336276848 rdi 0x7ffff6ef6540 140737336272192 rbp 0x7ffff5cfcb90 140737317424016 rsp 0x7ffff5cfcb20 140737317423904 r8 0x7ffff6ef7770 140737336276848 r9 0x7ffff5cfe700 140737317431040 r10 0x58 88 r11 0x7ffff6b9e7a0 140737332766624 r12 0x3 3 r13 0x4 4 r14 0x7ffff5899080 140737312821376 r15 0xfff9800000000000 -1829587348619264 rip 0x824aa5 <js::jit::MacroAssembler::initGCSlots(js::jit::Register, js::jit::Register, js::NativeObject*, bool)+997> => 0x824aa5 <js::jit::MacroAssembler::initGCSlots(js::jit::Register, js::jit::Register, js::NativeObject*, bool)+997>: movl $0x0,0x0 0x824ab0 <js::jit::MacroAssembler::initGCSlots(js::jit::Register, js::jit::Register, js::NativeObject*, bool)+1008>: ud2 Marking s-s because violating this assertion looks bad.
1,437,500
13,035,625
Created attachment 8950188 Client-2018-02-12-144147.ips.beta Build: 11.0 (9002) Device: iPad Pro iOS: 10.3.2 Steps to reproduce: 1. Launch Firefox 2. Go to Settings 3. Tap "Show Tour" Actual results: - Firefox will crash. Reproducible on all tested devices.
1,426,174
12,926,944
This bug was filed from the Socorro interface and is report bp-a56af819-4c28-43a4-a2e3-b5ac30171219. ============================================================= Seen while looking at nightly crash data - 20171218220523 is the starting point for these crashes: http://bit.ly/2D4Z0mU Crash reason: MOZ_RELEASE_ASSERT(stm->output_stream_params.layout == CUBEB_LAYOUT_UNDEFINED || stm->output_stream_params.channels == CUBEB_CHANNEL_LAYOUT_MAPS[stm->output_stream_params.layout].channels) Possible regression range based on Build ID: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=5d203926da51a7e949a20818664b19d5b115572d&tochange=7c4579e705c4a3a3610183fe6f44affff3ad57ef Top 10 frames of crashing thread: 0 xul.dll xul.dll@0x28145fa 1 xul.dll xul.dll@0x3c748ff 2 mozglue.dll mozglue.dll@0xc7d6 3 xul.dll xul.dll@0x38d1c2f 4 xul.dll xul.dll@0x280a882 5 xul.dll xul.dll@0x24f72cd 6 xul.dll xul.dll@0x1fd3b3f 7 xul.dll xul.dll@0x1fd8fb7 8 xul.dll xul.dll@0x1fd5383 9 xul.dll xul.dll@0x1fd3b3f =============================================================
1,426,449
12,929,604
This bug was filed from the Socorro interface and is report bp-3c4447e1-962c-4aa2-9e48-356a90171220. ============================================================= Top 10 frames of crashing thread: 0 XUL webrtc::SimulcastRateAllocator::GetAllocation media/webrtc/trunk/webrtc/modules/video_coding/utility/simulcast_rate_allocator.cc:131 1 XUL webrtc::vcm::VideoSender::UpdateEncoderParameters media/webrtc/trunk/webrtc/modules/video_coding/video_sender.cc:203 2 XUL webrtc::vcm::VideoSender::UpdateChannelParemeters media/webrtc/trunk/webrtc/modules/video_coding/video_sender.cc:222 3 XUL webrtc::ViEEncoder::ReconfigureEncoder media/webrtc/trunk/webrtc/video/vie_encoder.cc:427 4 XUL webrtc::ViEEncoder::EncodeVideoFrame media/webrtc/trunk/webrtc/video/vie_encoder.cc:553 5 XUL webrtc::ViEEncoder::EncodeTask::Run media/webrtc/trunk/webrtc/video/vie_encoder.cc:105 6 XUL rtc::TaskQueue::TaskContext::RunTask media/webrtc/trunk/webrtc/base/task_queue_gcd.cc:53 7 @0x7fff5c91ee87 8 @0x7fff5c933355 9 @0x7fff5c926238 ============================================================= This just happened to me 3 times in a row before I gave up on screen-sharing in hangouts. STR: 1. open hangouts.google.com, and start a video chat with someone 2. initiate a screen-sharing session 3. wait a few seconds I had one hard browser crash, and 2 tab crashes doing this. I'm also connected to an external monitor if it makes a difference. (not sure if this counts as a regression, since webrtc hangouts was just enabled for Firefox like today...)
1,426,574
12,930,691
This bug was filed from the Socorro interface and is report bp-b242dca7-5f3b-4d81-a950-bee950171221. ============================================================= Top 10 frames of crashing thread: 0 xul.dll js::AutoEnterOOMUnsafeRegion::crash js/src/jscntxt.cpp:1651 1 xul.dll js::SparseBitmap::createBlock js/src/ds/Bitmap.cpp:35 2 xul.dll js::Atomize js/src/jsatom.cpp:491 3 xul.dll js::SavedStacks::getLocation js/src/vm/SavedStacks.cpp:1576 4 xul.dll js::SavedStacks::insertFrames js/src/vm/SavedStacks.cpp:1340 5 xul.dll js::SavedStacks::saveCurrentStack js/src/vm/SavedStacks.cpp:1175 6 xul.dll JS::CaptureCurrentStack js/src/jsapi.cpp:7651 7 xul.dll mozilla::dom::exceptions::CreateStack dom/bindings/Exceptions.cpp:681 8 xul.dll mozilla::dom::GetCurrentJSStack dom/bindings/Exceptions.cpp:231 9 xul.dll nsXPCComponents_Utils::ReportError js/xpconnect/src/XPCComponents.cpp:2143 ============================================================= 138 crashes in the last week.
1,426,807
12,933,373
This bug was filed from the Socorro interface and is report bp-0b61c4cb-8ee1-4d06-9369-002700171222. ============================================================= Top 10 frames of crashing thread: 0 xul.dll mozilla::gfx::RecordedSetTransform::PlayEvent gfx/2d/RecordedEventImpl.h:2185 1 xul.dll mozilla::layout::PrintTranslator::TranslateRecording layout/printing/PrintTranslator.cpp:60 2 xul.dll mozilla::layout::RemotePrintJobParent::PrintPage layout/printing/ipc/RemotePrintJobParent.cpp:142 3 xul.dll mozilla::layout::RemotePrintJobParent::RecvProcessPage layout/printing/ipc/RemotePrintJobParent.cpp:123 4 xul.dll mozilla::layout::PRemotePrintJobParent::OnMessageReceived ipc/ipdl/PRemotePrintJobParent.cpp:240 5 xul.dll mozilla::dom::PContentParent::OnMessageReceived ipc/ipdl/PContentParent.cpp:3286 6 xul.dll mozilla::ipc::MessageChannel::DispatchAsyncMessage ipc/glue/MessageChannel.cpp:2110 7 xul.dll mozilla::ipc::MessageChannel::DispatchMessageW ipc/glue/MessageChannel.cpp:2040 8 xul.dll mozilla::ipc::MessageChannel::RunMessage ipc/glue/MessageChannel.cpp:1886 9 xul.dll mozilla::ipc::MessageChannel::MessageTask::Run ipc/glue/MessageChannel.cpp:1919 ============================================================= I can reproduce the crash on Nightly59.0a1 x64 windows10. Reproducible: always Steps To Reproduce: 1. Open twitter e.g. https://twitter.com/d_toybox not need login 2. Print with Microsoft Print to PDF. 3. Input file name, then click on Save button Actual Results: Browser crashes Regression window: https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=c7633e5266c0da789ce4503fb0a09979efa2580d&tochange=87f5eb24ef4b510fa73db427e80bc011f6160bde Regressed by: 87f5eb24ef4b Alex Gaynor — Bug 1414834 - re-land print IPC changes from bug 1319423; r=bobowen @:Alex_Gaynor Your patch seems to cause crash regression. Can you look into this?
1,427,273
12,937,384
Steps to reproduce: 1. Navigate to <about:profiles>. 2. Click [Create a New Profile] to open [Create Profile Wizard]. 3. Click [Next >]. 4. Type a non-ASCII characters that IS contained in the current ANSI code page into the [Enter new profile name:] text box. For example, "1÷1" for English locales. 5. Click [Finish]. 6. Click [Set as default profile] to make the created profile default. 7. Restart Nightly. 8. Navagate to <https://www.cacert.org/>. 9. Click [Advanced]. 10. Click [Add Exception...] to open [Add Security Exception] dialog. 11. Make sure [Permanently store this exception] is checked. 12. Click [Confirm Security Exception]. Actual result: Nothing happens. If you open Browser Console, you will see the following error: NS_ERROR_FAILURE: Component returned failure code: 0x80004005 (NS_ERROR_FAILURE) [nsICertOverrideService.rememberValidityOverride] Expected result: The [Add Security Exception] dialog closes and CAcert loads normally.
1,431,370
12,978,838
This bug was filed from the Socorro interface and is report bp-898cc5c2-de34-4fe2-908e-63c630180117. ============================================================= Top 10 frames of crashing thread: 0 mozglue.dll mozalloc_abort memory/mozalloc/mozalloc_abort.cpp:33 1 mozglue.dll mozalloc_handle_oom memory/mozalloc/mozalloc_oom.cpp:54 2 mozglue.dll moz_xmalloc memory/mozalloc/mozalloc.cpp:86 3 xul.dll nsTArray_base<nsTArrayInfallibleAllocator, nsTArray_CopyWithMemutils>::EnsureCapacity<nsTArrayInfallibleAllocator> xpcom/ds/nsTArray-inl.h:136 4 xul.dll nsTArray_base<nsTArrayInfallibleAllocator, nsTArray_CopyWithMemutils>::InsertSlotsAt<nsTArrayInfallibleAllocator> xpcom/ds/nsTArray-inl.h:289 5 xul.dll nsTArray_Impl<unsigned int, nsTArrayInfallibleAllocator>::SetLength<nsTArrayInfallibleAllocator> xpcom/ds/nsTArray.h:1859 6 xul.dll mozilla::safebrowsing::DoRiceDeltaDecode toolkit/components/url-classifier/ProtocolParser.cpp:1002 7 xul.dll mozilla::safebrowsing::ProtocolParserProtobuf::ProcessEncodedAddition toolkit/components/url-classifier/ProtocolParser.cpp:1025 8 xul.dll mozilla::safebrowsing::ProtocolParserProtobuf::ProcessAdditionOrRemoval toolkit/components/url-classifier/ProtocolParser.cpp:902 9 xul.dll mozilla::safebrowsing::ProtocolParserProtobuf::ProcessOneResponse toolkit/components/url-classifier/ProtocolParser.cpp:866 ============================================================= this out of memory crash signature on windows seems to be introduced with v4 of safebrowsing shipping with firefox. it's a low volume crash after all though.
1,431,963
12,983,651
This bug was filed from the Socorro interface and is report bp-a111931e-ccd0-4d70-b81a-e5bf70180121. ============================================================= Top 10 frames of crashing thread: 0 libmozglue.dylib mozalloc_abort memory/mozalloc/mozalloc_abort.cpp:33 1 libmozglue.dylib abort memory/mozalloc/mozalloc_abort.cpp:80 2 XUL std::panicking::rust_panic src/libpanic_abort/lib.rs:59 3 XUL std::panicking::rust_panic_with_hook src/libstd/panicking.rs:593 4 XUL std::panicking::begin_panic<alloc::string::String> src/libstd/panicking.rs:538 5 XUL std::panicking::begin_panic_fmt src/libstd/panicking.rs:522 6 XUL core::panicking::panic_fmt src/libstd/panicking.rs:498 7 XUL core::panicking::panic_bounds_check src/libcore/panicking.rs:58 8 XUL webrender::renderer::{{impl}}::render_impl::{{closure}} src/liballoc/vec.rs:1552 9 XUL webrender::renderer::{{impl}}::render_impl gfx/webrender/src/profiler.rs:190 ============================================================= I ran into this issue repeatedly when attempting to load https://www.youtube.com/watch?v=63GiUMI1f7I See also: https://crash-stats.mozilla.com/report/index/255f9d54-6099-4cac-9c94-375b70180121 https://crash-stats.mozilla.com/report/index/00947bac-eb0b-40da-b6ee-85f480180121
1,433,046
12,993,801
This bug was filed from the Socorro interface and is report bp-44504d30-e078-415f-937b-20cdc0180125. ============================================================= Top 10 frames of crashing thread: 0 @0x0 1 xul.dll nsCOMPtr<nsIDOMXULLabelElement>::~nsCOMPtr<nsIDOMXULLabelElement> 2 xul.dll mozilla::mscom::Interceptor::GetInterceptorForIID ipc/mscom/Interceptor.cpp:720 3 xul.dll mozilla::mscom::Interceptor::WeakRefQueryInterface ipc/mscom/Interceptor.cpp:826 4 xul.dll mozilla::mscom::WeakReferenceSupport::QueryInterface ipc/mscom/WeakRef.cpp:121 5 ole32.dll CStdMarshal::CreateStub 6 ole32.dll CStdMarshal::ConnectSrvIPIDEntry 7 ole32.dll CStdMarshal::MarshalServerIPID 8 ole32.dll CStdMarshal::MarshalObjRef 9 ole32.dll CStdMarshal::MarshalInterface ============================================================= There are 2 crashes (from 1 installation) in nightly 60 with buildid 20180124220129. In analyzing the backtrace, the regression may have been introduced by patch [1] to fix bug 1428759. [1] https://hg.mozilla.org/mozilla-central/rev?node=06e5dd66fb82
1,442,722
13,083,920
I've prototyped a new libfuzzer-based fuzzing target that uses dom::ipc::StructuredCloneData as its entry point to cover the StructuredCloneReader code that is browser-only. The target code has not landed on mozilla-central yet, if you need it to reproduce (in case stack + test attached do not suffice), please let me know. The attached testcase crashes on mozilla-central revision 8a2584063e19+: Backtrace: ==20305==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7ff2c6ba5f93 bp 0x7ffd5c2f2340 sp 0x7ffd5c2f21e0 T0) ==20305==The signal is caused by a WRITE memory access. ==20305==Hint: address points to the zero page. #0 0x7ff2c6ba5f92 in void DiscardTransferables<js::SystemAllocPolicy>(mozilla::BufferList<js::SystemAllocPolicy>&, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:675:5 #1 0x7ff2c6bbe694 in JSAutoStructuredCloneBuffer::clear(JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:2814:9 #2 0x7ff2b8383031 in ~JSAutoStructuredCloneBuffer objdir-ff-libfuzzer/dist/include/js/StructuredClone.h:303:38 #3 0x7ff2b8383031 in operator() objdir-ff-libfuzzer/dist/include/mozilla/UniquePtr.h:528 #4 0x7ff2b8383031 in reset objdir-ff-libfuzzer/dist/include/mozilla/UniquePtr.h:343 #5 0x7ff2b8383031 in operator= objdir-ff-libfuzzer/dist/include/mozilla/UniquePtr.h:313 #6 0x7ff2b8383031 in Clear dom/base/StructuredCloneHolder.cpp:167 #7 0x7ff2b8383031 in mozilla::dom::StructuredCloneHolder::~StructuredCloneHolder() dom/base/StructuredCloneHolder.cpp:259 #8 0x7ff2b8384378 in ~StructuredCloneBlob dom/base/StructuredCloneBlob.cpp:29:1 #9 0x7ff2b8384378 in mozilla::dom::StructuredCloneBlob::~StructuredCloneBlob() dom/base/StructuredCloneBlob.cpp:27 #10 0x7ff2b8386728 in Release dom/base/StructuredCloneBlob.cpp:206:1 #11 0x7ff2b8386728 in Release objdir-ff-libfuzzer/dist/include/mozilla/RefPtr.h:41 #12 0x7ff2b8386728 in Release objdir-ff-libfuzzer/dist/include/mozilla/RefPtr.h:398 #13 0x7ff2b8386728 in ~RefPtr objdir-ff-libfuzzer/dist/include/mozilla/RefPtr.h:79 #14 0x7ff2b8386728 in mozilla::dom::StructuredCloneBlob::ReadStructuredClone(JSContext*, JSStructuredCloneReader*, mozilla::dom::StructuredCloneHolder*) dom/base/StructuredCloneBlob.cpp:117 #15 0x7ff2b838cc0a in mozilla::dom::StructuredCloneHolder::CustomReadHandler(JSContext*, JSStructuredCloneReader*, unsigned int, unsigned int) dom/base/StructuredCloneHolder.cpp:1021:12 #16 0x7ff2c6bb5f7c in JSStructuredCloneReader::startRead(JS::MutableHandle<JS::Value>) js/src/vm/StructuredClone.cpp:2358:25 #17 0x7ff2c6b9ebca in JSStructuredCloneReader::read(JS::MutableHandle<JS::Value>) js/src/vm/StructuredClone.cpp:2596:10 #18 0x7ff2c6b9e7ac in ReadStructuredClone(JSContext*, JSStructuredCloneData&, JS::StructuredCloneScope, JS::MutableHandle<JS::Value>, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:632:14 #19 0x7ff2b8389799 in ReadFromBuffer dom/base/StructuredCloneHolder.cpp:344:8 #20 0x7ff2b8389799 in mozilla::dom::StructuredCloneHolder::ReadFromBuffer(nsISupports*, JSContext*, JSStructuredCloneData&, JS::MutableHandle<JS::Value>, mozilla::ErrorResult&) dom/base/StructuredCloneHolder.cpp:324 #21 0x7ff2c4a9b17b in FuzzingRunDomSC(unsigned char const*, unsigned long) dom/base/fuzztest/FuzzStructuredClone.cpp:53:10 #22 0x5c0b67 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) tools/fuzzing/libfuzzer/FuzzerLoop.cpp:458:13 #23 0x5c0d83 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long) tools/fuzzing/libfuzzer/FuzzerLoop.cpp:397:3 #24 0x5c15ca in fuzzer::Fuzzer::MutateAndTestOne() tools/fuzzing/libfuzzer/FuzzerLoop.cpp:596:30 #25 0x5c1787 in fuzzer::Fuzzer::Loop() tools/fuzzing/libfuzzer/FuzzerLoop.cpp:624:5 #26 0x5bafd1 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) tools/fuzzing/libfuzzer/FuzzerDriver.cpp:744:6 #27 0x7ff2c37b2bda in mozilla::FuzzerRunner::Run(int*, char***) tools/fuzzing/interface/harness/FuzzerRunner.cpp:60:10 #28 0x7ff2c36f2dd4 in XREMain::XRE_mainStartup(bool*) toolkit/xre/nsAppRunner.cpp:3865:35 #29 0x7ff2c37029de in XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&) toolkit/xre/nsAppRunner.cpp:4793:12 #30 0x7ff2c3704112 in XRE_main(int, char**, mozilla::BootstrapConfig const&) toolkit/xre/nsAppRunner.cpp:4900:21 #31 0x519f50 in do_main browser/app/nsBrowserApp.cpp:231:22 #32 0x519f50 in main browser/app/nsBrowserApp.cpp:304 #33 0x7ff2d897182f in __libc_start_main /build/glibc-bfm8X4/glibc-2.23/csu/../csu/libc-start.c:291 #34 0x4235d8 in _start (objdir-ff-libfuzzer/dist/bin/firefox+0x4235d8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV js/src/vm/StructuredClone.cpp:675:5 in void DiscardTransferables<js::SystemAllocPolicy>(mozilla::BufferList<js::SystemAllocPolicy>&, JSStructuredCloneCallbacks const*, void*) ==20305==ABORTING This bug itself might not be security-sensitive, but the fuzzing efforts around this target in general are, until we have found and fixed the most common bugs, so I would request to keep this concealed for the moment.
1,442,921
13,100,714
bp-dd89a5ef-6190-4988-8fc9-3fec40180303 > assertion failed: `(left == right)` > |[G0][GFX1-]: WR: Attempting to allocate a texture of size 22140x2048 above the limit, trimming (t=432.375)
1,443,748
13,110,538
This bug was filed from the Socorro interface and is report bp-e468b93b-cfe9-4200-b1f2-b6b490180307. ============================================================= Top 10 frames of crashing thread: 0 XUL mozilla::ipc::IPDLParamTraits<mozilla::ipc::FileDescriptor>::Write ipc/glue/FileDescriptor.cpp:235 1 XUL std::__1::__function::__func<mozilla::net::PNeckoParent::OnMessageReceived ipc/glue/IPDLParamTraits.h:60 2 XUL mozilla::net::ExtensionJARFileOpener::SendBackFD clang/include/c++/v1/functional:1916 3 XUL mozilla::detail::RunnableMethodImpl<mozilla::net::ExtensionJARFileOpener*, nsresult xpcom/threads/nsThreadUtils.h:1149 4 XUL nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1040 5 XUL NS_ProcessPendingEvents xpcom/threads/nsThreadUtils.cpp:459 6 XUL nsBaseAppShell::NativeEventCallback widget/nsBaseAppShell.cpp:98 7 XUL nsAppShell::ProcessGeckoEvents widget/cocoa/nsAppShell.mm:436 8 CoreFoundation CoreFoundation@0xa7320 9 CoreFoundation CoreFoundation@0x8821c ============================================================= There is 1 crash in nightly 60 with buildid 20180306100123. In analyzing the backtrace, the regression may have been introduced by patch [1] to fix bug 1440511. [1] https://hg.mozilla.org/mozilla-central/rev?node=5467d67a2577
1,428,612
12,949,533
This bug was filed from the Socorro interface and is report bp-b64045fe-3046-426d-ae81-59cbc0180106. ============================================================= Top 10 frames of crashing thread: 0 xul.dll NS_ABORT_OOM xpcom/base/nsDebugImpl.cpp:620 1 xul.dll nsTHashtable<nsBaseHashtableET<nsCStringHashKey, mozilla::Telemetry::HistogramID> >::s_InitEntry xpcom/ds/nsTHashtable.h:456 2 xul.dll PLDHashTable::Add xpcom/ds/PLDHashTable.cpp:590 3 xul.dll TelemetryHistogram::InitializeGlobalState toolkit/components/telemetry/TelemetryHistogram.cpp:1719 4 xul.dll `anonymous namespace'::TelemetryImpl::CreateTelemetryInstance toolkit/components/telemetry/Telemetry.cpp:1202 5 xul.dll `anonymous namespace'::nsITelemetryConstructor toolkit/components/telemetry/Telemetry.cpp:1572 6 xul.dll nsComponentManagerImpl::CreateInstanceByContractID xpcom/components/nsComponentManager.cpp:1086 7 xul.dll nsComponentManagerImpl::GetServiceByContractID xpcom/components/nsComponentManager.cpp:1446 8 xul.dll nsCOMPtr_base::assign_from_gs_contractid xpcom/base/nsCOMPtr.cpp:95 9 xul.dll mozilla::Telemetry::Init toolkit/components/telemetry/Telemetry.cpp:1968 ============================================================= these seem to be persistent crashes on startup that hit individual users repeatedly. some user comments: http://bit.ly/2CQzwxm
1,429,666
12,960,296
https://github.com/kinetiknz/cubeb/pull/398 +++ This bug was initially created as a clone of Bug #1418820 +++ Filing a separate bug from 1418820 because patches have already landed for 1418820. This is a suspected common cause of crashes reported in bug 1418820 and possibly many other MSG crashes on NT and Android. The bug was reproduced with a gtest in the pull request.
1,440,255
13,060,628
Created attachment 8953012 tokbox crash logcat.txt build: Nightly 60.0a1 (2018-02-21). Devices: Huawei Nexus 6P (Android 8.0) Google Pixel (Android 8.0) LG G4 (Android 5.1) Oneplus Two (Android 6.0.1) STR: 1. Go to opentokrtc.com 2. Enter a room and allow to share camera & mic. 3. A second permission request will be displayed, share again. Expected result: Permission request to access camera & mic should be displayed only once. No crash. Actual results: The permission to share camera & mic is requested twice before entering the chat room. A crash occurs after the second permission request is allowed. If you are able to enter the room, the permission will be displayed again.
1,440,592
13,063,462
This bug was filed from the Socorro interface and is report bp-b4d8b827-a05f-418d-830f-2e5d70180223. ============================================================= java.lang.IllegalStateException: Unexpected new session at org.mozilla.gecko.customtabs.CustomTabsActivity.onNewSession(CustomTabsActivity.java:656) at org.mozilla.geckoview.GeckoSession$2.handleMessage(GeckoSession.java:150) at org.mozilla.geckoview.GeckoSession$2.handleMessage(GeckoSession.java:127) at org.mozilla.geckoview.GeckoSessionHandler.handleMessage(GeckoSessionHandler.java:91) at org.mozilla.gecko.EventDispatcher$2.run(EventDispatcher.java:341) at android.os.Handler.handleCallback(Handler.java:751) at android.os.Handler.dispatchMessage(Handler.java:95) at android.os.Looper.loop(Looper.java:154) at android.app.ActivityThread.main(ActivityThread.java:6316) at java.lang.reflect.Method.invoke(Native Method) at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:872) at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:762) ============================================================= There are 16 crashes (from 12 installations) in nightly 60 with buildid 20180223001836. In analyzing the backtrace, the regression may have been introduced by patch [1] to fix bug 1432485. [1] https://hg.mozilla.org/mozilla-central/rev?node=d39e77de7c54
1,441,006
13,066,742
The following testcase crashes on mozilla-central revision bfe62272d2a2 (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --enable-debug --enable-optimize, run with --fuzzing-safe --ion-eager): var length = 100000; var array = new Array(length); array.fill(null); minorgc(); for (var i = 0; i < length; i++) array[x = 2147483647] = {}; Backtrace: received signal SIGSEGV, Segmentation fault. 0x0000000000e76802 in js::gc::StoreBuffer::SlotsEdge::trace (this=this@entry=0x7ffff5f07068, mover=...) at js/src/gc/Marking.cpp:2793 #0 0x0000000000e76802 in js::gc::StoreBuffer::SlotsEdge::trace (this=this@entry=0x7ffff5f07068, mover=...) at js/src/gc/Marking.cpp:2793 #1 0x0000000000eb4734 in js::gc::StoreBuffer::MonoTypeBuffer<js::gc::StoreBuffer::SlotsEdge>::trace (this=this@entry=0x7ffff5f1d258, owner=owner@entry=0x7ffff5f1d1a8, mover=...) at js/src/gc/Marking.cpp:2760 #2 0x0000000000ec8471 in js::gc::StoreBuffer::traceSlots (mover=..., this=0x7ffff5f1d1a8) at js/src/gc/StoreBuffer.h:439 #3 js::Nursery::doCollection (this=this@entry=0x7ffff5f1cdd0, reason=reason@entry=JS::gcreason::OUT_OF_NURSERY, tenureCounts=...) at js/src/gc/Nursery.cpp:860 #4 0x0000000000ec8cce in js::Nursery::collect (this=0x7ffff5f1cdd0, reason=reason@entry=JS::gcreason::OUT_OF_NURSERY) at js/src/gc/Nursery.cpp:722 #5 0x0000000000e5fa4a in js::gc::GCRuntime::minorGC (this=0x7ffff5f1a780, reason=JS::gcreason::OUT_OF_NURSERY, phase=<optimized out>) at js/src/gc/GC.cpp:7718 #6 0x0000000000e8ee3a in js::gc::GCRuntime::tryNewNurseryObject<(js::AllowGC)1> (this=this@entry=0x7ffff5f1a780, cx=cx@entry=0x7ffff5f16000, thingSize=thingSize@entry=32, nDynamicSlots=nDynamicSlots@entry=0, clasp=clasp@entry=0x1ff4ae0 <js::PlainObject::class_>) at js/src/gc/Allocator.cpp:93 #7 0x0000000000eb70c8 in js::Allocate<JSObject, (js::AllowGC)1> (cx=cx@entry=0x7ffff5f16000, kind=kind@entry=js::gc::AllocKind::OBJECT0_BACKGROUND, nDynamicSlots=nDynamicSlots@entry=0, heap=heap@entry=js::gc::DefaultHeap, clasp=clasp@entry=0x1ff4ae0 <js::PlainObject::class_>) at js/src/gc/Allocator.cpp:55 #8 0x0000000000a21412 in js::NativeObject::create (cx=0x7ffff5f16000, kind=<optimized out>, heap=js::gc::DefaultHeap, shape=..., group=...) at js/src/vm/NativeObject-inl.h:538 #9 0x0000000000b3fda4 in NewObject (cx=0x7ffff5f16000, group=..., kind=<optimized out>, newKind=js::GenericObject, initialShapeFlags=<optimized out>) at js/src/vm/JSObject.cpp:728 #10 0x0000000000b405c2 in js::NewObjectWithClassProtoCommon (cx=cx@entry=0x7ffff5f16000, clasp=0x1ff4ae0 <js::PlainObject::class_>, protoArg=..., protoArg@entry=..., allocKind=allocKind@entry=js::gc::AllocKind::OBJECT0_BACKGROUND, newKind=newKind@entry=js::GenericObject) at js/src/vm/JSObject.cpp:849 #11 0x000000000055ac62 in js::NewObjectWithClassProto (newKind=js::GenericObject, allocKind=js::gc::AllocKind::OBJECT0_BACKGROUND, proto=..., clasp=<optimized out>, cx=0x7ffff5f16000) at js/src/vm/JSObject-inl.h:677 #12 js::NewBuiltinClassInstance (newKind=js::GenericObject, allocKind=js::gc::AllocKind::OBJECT0_BACKGROUND, clasp=<optimized out>, cx=0x7ffff5f16000) at js/src/vm/JSObject-inl.h:714 #13 js::NewBuiltinClassInstance<js::PlainObject> (newKind=js::GenericObject, allocKind=js::gc::AllocKind::OBJECT0_BACKGROUND, cx=0x7ffff5f16000) at js/src/vm/JSObject-inl.h:736 #14 js::CopyInitializerObject (cx=0x7ffff5f16000, baseobj=..., newKind=js::GenericObject) at js/src/vm/NativeObject-inl.h:706 #15 0x000000000056defb in js::NewObjectOperationWithTemplate (cx=0x7ffff5f16000, templateObject=...) at js/src/vm/Interpreter.cpp:5014 #16 0x00001fe038e1e0a1 in ?? () [...] #26 0x0000000000000000 in ?? () rax 0x0 0 rbx 0x7ffff4c91120 140737300205856 rcx 0x7ffff6c282ad 140737333330605 rdx 0x0 0 rsi 0x7ffff6ef7770 140737336276848 rdi 0x7ffff6ef6540 140737336272192 rbp 0x7fffffffc300 140737488339712 rsp 0x7fffffffc2b0 140737488339632 r8 0x7ffff6ef7770 140737336276848 r9 0x7ffff7fe4780 140737354024832 r10 0x58 88 r11 0x7ffff6b9e7a0 140737332766624 r12 0x7ffff5f07068 140737319563368 r13 0x7fffffffc400 140737488339968 r14 0x7ffff5f07060 140737319563360 r15 0x7ffff5f1d258 140737319653976 rip 0xe76802 <js::gc::StoreBuffer::SlotsEdge::trace(js::TenuringTracer&) const+562> => 0xe76802 <js::gc::StoreBuffer::SlotsEdge::trace(js::TenuringTracer&) const+562>: movl $0x0,0x0 0xe7680d <js::gc::StoreBuffer::SlotsEdge::trace(js::TenuringTracer&) const+573>: ud2 Marking s-s both because it is a GC and a range assertion.
1,546,331
14,070,128
Created attachment 9060048 UAF_RegisterDebuggerMainThread_PoC.js Prove of Concept test case (full server code in attached file UAF_RegisterDebuggerMainThread_PoC.js): Main Page code: <script type="text/javascript"> gc = function() { for (var i = 0; i < 0x20000; ++i) var s = new String('AAAA'); }; worker0 = new Worker("worker0.js"); worker0.onerror=function(){ gc();}; worker1 = new Worker("worker1.js"); setTimeout(function(){location.reload()},200); </script> Worker 0: var embedworker1 = new Worker("embedworker1.js"); yes = no; Worker 1: self.onerror = function () { embedworker0.terminate(); }; var embedworker0 = new Worker("embedworker0.js"); yes = no; Steps to reproduce: 1. Run server side script UAF_RegisterDebuggerMainThread_PoC.js with Node.js (node UAF_RegisterDebuggerMainThread_PoC.js). 2. Enter http://localhost:12345 in Firefox ASAN build. 3. ASAN reports a Use After Free in RegisterDebuggerMainThread(): ==3247==ERROR: AddressSanitizer: heap-use-after-free on address 0x61b00017b210 at pc 0x7fe791ea90ce bp 0x7ffe59b72f10 sp 0x7ffe59b72f08 WRITE of size 8 at 0x61b00017b210 thread T0 (Web Content) #0 0x7fe791ea90cd in SetDebugger /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.h:188:15 #1 0x7fe791ea90cd in mozilla::dom::WorkerDebuggerManager::RegisterDebuggerMainThread(mozilla::dom::WorkerPrivate*, bool) Firefox version: 68.0a1 (2019-04-22) (64-bit) OS: Ubuntu 16.04 LTS Stack trace: ================================================================= ==3247==ERROR: AddressSanitizer: heap-use-after-free on address 0x61b00017b210 at pc 0x7fe791ea90ce bp 0x7ffe59b72f10 sp 0x7ffe59b72f08 WRITE of size 8 at 0x61b00017b210 thread T0 (Web Content) #0 0x7fe791ea90cd in SetDebugger /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.h:188:15 #1 0x7fe791ea90cd in mozilla::dom::WorkerDebuggerManager::RegisterDebuggerMainThread(mozilla::dom::WorkerPrivate*, bool) /builds/worker/workspace/build/src/dom/workers/WorkerDebuggerManager.cpp:277 #2 0x7fe791ed28de in mozilla::dom::(anonymous namespace)::RegisterDebuggerMainThreadRunnable::Run() /builds/worker/workspace/build/src/dom/workers/WorkerDebuggerManager.cpp:41:14 #3 0x7fe78a2b22c1 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1180:14 #4 0x7fe78a2b83d8 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #5 0x7fe78b2f7caa in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:88:21 #6 0x7fe78b227fd2 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #7 0x7fe78b227fd2 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308 #8 0x7fe78b227fd2 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290 #9 0x7fe7926bf749 in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:137:27 #10 0x7fe7962dd4df in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:919:20 #11 0x7fe78b227fd2 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #12 0x7fe78b227fd2 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308 #13 0x7fe78b227fd2 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290 #14 0x7fe7962dce86 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:757:34 #15 0x5604aa4e53a7 in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28 #16 0x5604aa4e53a7 in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:263 #17 0x7fe7a9c4282f in __libc_start_main /build/glibc-Cl5G7W/glibc-2.23/csu/../csu/libc-start.c:291 #18 0x5604aa406af8 in _start (/home/thecoder/FirefoxBuilds/firefox/firefox+0x2aaf8) 0x61b00017b210 is located 912 bytes inside of 1440-byte region [0x61b00017ae80,0x61b00017b420) freed by thread T22 (DOM Worker) here: #0 0x5604aa4b2182 in free /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:124:3 #1 0x7fe791f1e110 in operator delete /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/mozalloc.h:151:10 #2 0x7fe791f1e110 in Release /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.h:102 #3 0x7fe791f1e110 in Release /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:46 #4 0x7fe791f1e110 in Release /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:363 #5 0x7fe791f1e110 in assign_assuming_AddRef /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:65 #6 0x7fe791f1e110 in operator= /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:156 #7 0x7fe791f1e110 in ClearSelfAndParentEventTargetRef /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.h:125 #8 0x7fe791f1e110 in mozilla::dom::(anonymous namespace)::WorkerFinishedRunnable::WorkerRun(JSContext*, mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:238 #9 0x7fe791f09842 in mozilla::dom::WorkerRunnable::Run() /builds/worker/workspace/build/src/dom/workers/WorkerRunnable.cpp:363:12 #10 0x7fe791eef44c in ProcessAllControlRunnablesLocked /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:3276:9 #11 0x7fe791eef44c in mozilla::dom::WorkerPrivate::DoRunLoop(JSContext*) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:2646 #12 0x7fe791eb82cb in mozilla::dom::workerinternals::(anonymous namespace)::WorkerThreadPrimaryRunnable::Run() /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:2305:40 #13 0x7fe78a2b22c1 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1180:14 #14 0x7fe78a2b83d8 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #15 0x7fe78b2f8eb0 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:333:5 #16 0x7fe78b227fd2 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #17 0x7fe78b227fd2 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308 #18 0x7fe78b227fd2 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290 #19 0x7fe78a2ac21a in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:454:11 #20 0x7fe7ab05905d in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #21 0x7fe7aaca06b9 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76b9) previously allocated by thread T22 (DOM Worker) here: #0 0x5604aa4b2503 in __interceptor_malloc /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:146:3 #1 0x5604aa4e6f9d in moz_xmalloc /builds/worker/workspace/build/src/memory/mozalloc/mozalloc.cpp:68:15 #2 0x7fe791ee9c29 in operator new /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/mozalloc.h:131:10 #3 0x7fe791ee9c29 in mozilla::dom::WorkerPrivate::Constructor(JSContext*, nsTSubstring<char16_t> const&, bool, mozilla::dom::WorkerType, nsTSubstring<char16_t> const&, nsTSubstring<char> const&, mozilla::dom::WorkerLoadInfo*, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:2235 #4 0x7fe791e9ba17 in mozilla::dom::Worker::Constructor(mozilla::dom::GlobalObject const&, nsTSubstring<char16_t> const&, mozilla::dom::WorkerOptions const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/workers/Worker.cpp:30:41 #5 0x7fe78f4ae630 in mozilla::dom::Worker_Binding::_constructor(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/WorkerBinding.cpp:1112:52 #6 0x7fe796569595 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:442:13 #7 0x7fe796569595 in CallJSNativeConstructor /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:458 #8 0x7fe796569595 in InternalConstruct(JSContext*, js::AnyConstructArgs const&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:651 #9 0x7fe796546916 in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3070:16 #10 0x7fe796530528 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:422:10 #11 0x7fe79656bb7c in js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value const&, js::AbstractFramePtr, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:781:13 #12 0x7fe79656c329 in js::Execute(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:814:10 #13 0x7fe7967ed334 in bool Evaluate<char16_t>(JSContext*, js::ScopeKind, JS::Handle<JSObject*>, JS::ReadOnlyCompileOptions const&, JS::SourceText<char16_t>&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/CompilationAndEvaluation.cpp:539:10 #14 0x7fe7967ec6aa in JS::Evaluate(JSContext*, JS::ReadOnlyCompileOptions const&, JS::SourceText<char16_t>&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/CompilationAndEvaluation.cpp:557:10 #15 0x7fe791ec98d6 in mozilla::dom::(anonymous namespace)::ScriptExecutorRunnable::WorkerRun(JSContext*, mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/ScriptLoader.cpp:1989:10 #16 0x7fe791f09842 in mozilla::dom::WorkerRunnable::Run() /builds/worker/workspace/build/src/dom/workers/WorkerRunnable.cpp:363:12 #17 0x7fe78a2b22c1 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1180:14 #18 0x7fe78a2b83d8 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #19 0x7fe791ef859e in mozilla::dom::WorkerPrivate::RunCurrentSyncLoop() /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:3646:7 #20 0x7fe791e9a7b5 in Run /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.h:1173:27 #21 0x7fe791e9a7b5 in mozilla::dom::(anonymous namespace)::LoadAllScripts(mozilla::dom::WorkerPrivate*, nsTArray<mozilla::dom::(anonymous namespace)::ScriptLoadInfo>&, bool, mozilla::dom::WorkerScriptType, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/workers/ScriptLoader.cpp:2149 #22 0x7fe791e99bd2 in mozilla::dom::workerinternals::LoadMainScript(mozilla::dom::WorkerPrivate*, nsTSubstring<char16_t> const&, mozilla::dom::WorkerScriptType, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/workers/ScriptLoader.cpp:2259:3 #23 0x7fe791f1ca85 in mozilla::dom::(anonymous namespace)::CompileScriptRunnable::WorkerRun(JSContext*, mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:340:5 #24 0x7fe791f09842 in mozilla::dom::WorkerRunnable::Run() /builds/worker/workspace/build/src/dom/workers/WorkerRunnable.cpp:363:12 #25 0x7fe78a2b22c1 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1180:14 #26 0x7fe78a2b83d8 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #27 0x7fe791eefd3a in mozilla::dom::WorkerPrivate::DoRunLoop(JSContext*) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:2748:7 #28 0x7fe791eb82cb in mozilla::dom::workerinternals::(anonymous namespace)::WorkerThreadPrimaryRunnable::Run() /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:2305:40 #29 0x7fe78a2b22c1 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1180:14 #30 0x7fe78a2b83d8 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #31 0x7fe78b2f8eb0 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:333:5 #32 0x7fe78b227fd2 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #33 0x7fe78b227fd2 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308 #34 0x7fe78b227fd2 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290 #35 0x7fe78a2ac21a in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:454:11 Thread T22 (DOM Worker) created by T0 (Web Content) here: #0 0x5604aa49aadd in pthread_create /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cc:210:3 #1 0x7fe7ab04b158 in _PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:433:14 #2 0x7fe7ab034d3e in PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:518:12 #3 0x7fe78a2ae529 in nsThread::Init(nsTSubstring<char> const&) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:661:8 #4 0x7fe791f18c48 in mozilla::dom::WorkerThread::Create(mozilla::dom::WorkerThreadFriendKey const&) /builds/worker/workspace/build/src/dom/workers/WorkerThread.cpp:93:7 #5 0x7fe791e8d1d9 in mozilla::dom::workerinternals::RuntimeService::ScheduleWorker(mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:1433:14 #6 0x7fe791e8b7f5 in mozilla::dom::workerinternals::RuntimeService::RegisterWorker(mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:1298:19 #7 0x7fe791ee9d49 in mozilla::dom::WorkerPrivate::Constructor(JSContext*, nsTSubstring<char16_t> const&, bool, mozilla::dom::WorkerType, nsTSubstring<char16_t> const&, nsTSubstring<char> const&, mozilla::dom::WorkerLoadInfo*, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:2250:24 #8 0x7fe791e9ba17 in mozilla::dom::Worker::Constructor(mozilla::dom::GlobalObject const&, nsTSubstring<char16_t> const&, mozilla::dom::WorkerOptions const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/workers/Worker.cpp:30:41 #9 0x7fe78f4ae630 in mozilla::dom::Worker_Binding::_constructor(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/WorkerBinding.cpp:1112:52 #10 0x7fe796569595 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:442:13 #11 0x7fe796569595 in CallJSNativeConstructor /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:458 #12 0x7fe796569595 in InternalConstruct(JSContext*, js::AnyConstructArgs const&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:651 #13 0x7fe796546916 in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3070:16 #14 0x7fe796530528 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:422:10 #15 0x7fe79656bb7c in js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value const&, js::AbstractFramePtr, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:781:13 #16 0x7fe79656c329 in js::Execute(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:814:10 #17 0x7fe7967ea5ca in ExecuteScript(JSContext*, JS::Handle<JS::StackGCVector<JSObject*, js::TempAllocPolicy> >, JS::Handle<JSScript*>, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/CompilationAndEvaluation.cpp:455:10 #18 0x7fe78dab2254 in nsJSUtils::ExecutionContext::ExecScript() /builds/worker/workspace/build/src/dom/base/nsJSUtils.cpp:386:8 #19 0x7fe792360e33 in mozilla::dom::ExecuteCompiledScript(JSContext*, mozilla::dom::ScriptLoadRequest*, nsJSUtils::ExecutionContext&) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:2495:16 #20 0x7fe79235def1 in mozilla::dom::ScriptLoader::EvaluateScript(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:2715:20 #21 0x7fe79235688c in mozilla::dom::ScriptLoader::ProcessRequest(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:2222:10 #22 0x7fe792353262 in mozilla::dom::ScriptLoader::ProcessInlineScript(nsIScriptElement*, mozilla::dom::ScriptKind) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1803:10 #23 0x7fe79232d67e in mozilla::dom::ScriptLoader::ProcessScriptElement(nsIScriptElement*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1526:10 #24 0x7fe79232c94e in mozilla::dom::ScriptElement::MaybeProcessScript() /builds/worker/workspace/build/src/dom/script/ScriptElement.cpp:118:18 #25 0x7fe78c6218fa in AttemptToExecute /builds/worker/workspace/build/src/obj-firefox/dist/include/nsIScriptElement.h:224:18 #26 0x7fe78c6218fa in nsHtml5TreeOpExecutor::RunScript(nsIContent*) /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:727 #27 0x7fe78c61b5a3 in nsHtml5TreeOpExecutor::RunFlushLoop() /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:530:7 #28 0x7fe78c627720 in nsHtml5ExecutorFlusher::Run() /builds/worker/workspace/build/src/parser/html/nsHtml5StreamParser.cpp:133:18 #29 0x7fe78a2811f1 in mozilla::SchedulerGroup::Runnable::Run() /builds/worker/workspace/build/src/xpcom/threads/SchedulerGroup.cpp:295:32 #30 0x7fe78a2b22c1 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1180:14 #31 0x7fe78a2b83d8 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #32 0x7fe78b2f7caa in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:88:21 #33 0x7fe78b227fd2 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #34 0x7fe78b227fd2 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308 #35 0x7fe78b227fd2 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290 #36 0x7fe7926bf749 in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:137:27 #37 0x7fe7962dd4df in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:919:20 #38 0x7fe78b227fd2 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #39 0x7fe78b227fd2 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308 #40 0x7fe78b227fd2 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290 #41 0x7fe7962dce86 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:757:34 #42 0x5604aa4e53a7 in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28 #43 0x5604aa4e53a7 in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:263 #44 0x7fe7a9c4282f in __libc_start_main /build/glibc-Cl5G7W/glibc-2.23/csu/../csu/libc-start.c:291 SUMMARY: AddressSanitizer: heap-use-after-free /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.h:188:15 in SetDebugger Shadow bytes around the buggy address: 0x0c36800275f0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3680027600: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3680027610: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3680027620: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3680027630: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd =>0x0c3680027640: fd fd[fd]fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3680027650: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3680027660: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3680027670: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c3680027680: fd fd fd fd fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3680027690: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3247==ABORTING
1,546,397
14,072,207
This bug is for crash report bp-8a309548-c8ff-43c6-ad38-72fbe0190412. Seen while looking at beta crash stats for 67. Although this has been present in other releases, it appears as #3 overall on b11: https://bit.ly/2IBSIkP Correlations: (97.85% in signature vs 05.85% overall) android_version = 17 (REL) (54.84% in signature vs 02.37% overall) adapter_device_id = Adreno (TM) 305 ``` Top 10 frames of crashing thread: 0 libc.so libc.so@0x19848 1 libEGL.so libEGL.so@0x426a6 2 libEGL.so libEGL.so@0xc909 3 libEGL.so libEGL.so@0xc5d9 4 libEGL.so libEGL.so@0x426ca 5 libEGL.so libEGL.so@0x426a6 6 libEGL.so libEGL.so@0xe8d5 7 libEGL.so libEGL.so@0x426a6 8 libEGL.so libEGL.so@0xe7e7 9 libxul.so mozilla::gl::GLLibraryEGL::fMakeCurrent const gfx/gl/GLLibraryEGL.h:165 ```
1,546,836
14,076,277
We've received a report that Firefox on the (yet to be released) macOS 10.14.5 is not displaying video correctly due to our sandbox rules not allowing access to com.apple.MTLCompilerService. Specifically: 1. Launch Firefox (latest) on 10.14.5 latest build 2. Head to Netflix, cnn.com or YouTube.com. We used https://www.cnn.com/2019/04/23/us/brooklyn-man-sentenced-in-joggers-death/index.html but it shouldn’t matter. 3. Playback a video, see green or orange depending on the hardware used
1,547,757
14,084,287
Found while fuzzing mozilla-central rev 420e18a75314. I'm currently reducing the testcase and will update once complete.
1,552,609
14,125,062
Created attachment 9065828 Flow on Perfetto ## What were you doing? (see video) 1. Inspected event location in https://ui.perfetto.dev/#!/viewer 2. Set a Breakpoint somewhere in https://ui.perfetto.dev/frontend_bundle.js 3. Set a logpoint on the BP ## What happened? Debugger jumps and afterwards does not show any added breakpoints in the gutter. After the STR, breakpoints are broken throughout Debugger, any file, until it gets closed and re-opened. After the STR, jumping to sources from the events bubble is also broken and jumps to the wrong line. ## What should have happened? Logpoints and Debugger work.
1,553,213
14,130,722
Created attachment 9066448 testcase.html Testcase found while fuzzing mozilla-central rev b74e5737da64. ==24512==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000010 (pc 0x7f3d15ae9ce6 bp 0x7ffcf9892fb0 sp 0x7ffcf9892ec0 T0) ==24512==The signal is caused by a READ memory access. ==24512==Hint: address points to the zero page. #0 0x7f3d15ae9ce5 in get /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:268:27 #1 0x7f3d15ae9ce5 in operator mozilla::dom::Document * /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:281 #2 0x7f3d15ae9ce5 in GetExtantDoc /builds/worker/workspace/build/src/obj-firefox/dist/include/nsPIDOMWindow.h:355 #3 0x7f3d15ae9ce5 in mozilla::dom::MediaDevices::GetDisplayMedia(mozilla::dom::DisplayMediaStreamConstraints const&, mozilla::dom::CallerType, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/media/MediaDevices.cpp:175 #4 0x7f3d12153409 in getDisplayMedia /builds/worker/workspace/build/src/obj-firefox/dom/bindings/MediaDevicesBinding.cpp:269:45 #5 0x7f3d12153409 in mozilla::dom::MediaDevices_Binding::getDisplayMedia_promiseWrapper(JSContext*, JS::Handle<JSObject*>, mozilla::dom::MediaDevices*, JSJitMethodCallArgs const&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/MediaDevicesBinding.cpp:284 #6 0x7f3d14a151de in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ConvertExceptionsToPromises>(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:3165:13 #7 0x7f3d1c2acaf0 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:443:13 #8 0x7f3d1c2acaf0 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:535 #9 0x7f3d1c28d390 in CallFromStack /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:594:10 #10 0x7f3d1c28d390 in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3082 #11 0x7f3d1c276f68 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:423:10 #12 0x7f3d1c2ad463 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:563:13 #13 0x7f3d1c2af0e2 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:606:8 #14 0x7f3d1cfe9dee in js::ForwardingProxyHandler::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) const /builds/worker/workspace/build/src/js/src/proxy/Wrapper.cpp:162:10 #15 0x7f3d1cfa3a21 in js::CrossCompartmentWrapper::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) const /builds/worker/workspace/build/src/js/src/proxy/CrossCompartmentWrapper.cpp:237:19 #16 0x7f3d0f448e30 in xpc::JSXrayTraits::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&, js::Wrapper const&) /builds/worker/workspace/build/src/js/xpconnect/wrappers/XrayWrapper.h:213:27 #17 0x7f3d1cfc9d5d in js::Proxy::call(JSContext*, JS::Handle<JSObject*>, JS::CallArgs const&) /builds/worker/workspace/build/src/js/src/proxy/Proxy.cpp:504:19 #18 0x7f3d1c2adb5a in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:509:14 #19 0x7f3d1c28d390 in CallFromStack /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:594:10 #20 0x7f3d1c28d390 in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3082 #21 0x7f3d1c276f68 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:423:10 #22 0x7f3d1c2ad463 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:563:13 #23 0x7f3d1c2af0e2 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:606:8 #24 0x7f3d1cb36be0 in js::CallSelfHostedFunction(JSContext*, JS::Handle<js::PropertyName*>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/SelfHosting.cpp:1966:10 #25 0x7f3d1d52b594 in js::jit::InterpretResume(JSContext*, JS::Handle<JSObject*>, JS::Handle<JS::Value>, JS::Handle<js::PropertyName*>, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jit/VMFunctions.cpp:992:10 #26 0x282897cb27b3 (<unknown module>) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:268:27 in get
1,554,336
14,138,871
Created attachment 9067489 slow_crypto.html User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0 Steps to reproduce: Due to a bug in how NSS implements the modular inverse (mp_invmod) it is possible to trigger an essentially infinite loop. As this method handles untrusted data via (EC)DSA signature verification and potentially other cryptographic algorithms, this DoS may be remotely exploited. The core bug is in how s_mp_almost_inverse() allows `c` to grow essentially without bound causing the loop on (approximately) line 2052 "while (MP_SIGN(c) != MP_ZPOS) {" to run for an exceedingly long time. For the examples below we estimate that this loop is executed approximately 2^34 times. If you use calculate the inverse of the following number rather than the number in the examples, the loop should execute approximately 2^82 times. 52dbe34571c0a3944e11a0de96b9bac7d03833d2e852447a9a4b0d02a39d265ecd69aa39c40b91c89dd0324808e77101 Repro 1: Use mp_invmod to calculate the inverse of 3e10b9f4859fb9e8150cc0d94e83ef428d655702a0b6fb1e684f4755eb6be65ac6048cdfc533f73a9bad76125801051f modulo ffffffffffffffffffffffffffffffffffffffffffffffffc7634d81f4372ddf581a0db248b0a77aecec196accc52973. Repro 2: Embeds the prime and value in an ECDSA signature. 1. Load the attached file "slow_crypto.html" in Firefox 2. Click "Generate ECDSA key" 3. Click "Verify evil signature" 4. Click "OK" Repro 3: Embeds the prime and value in the ECDSA signature of an (invalid) certificate. 1. Extract bad_math_server.tgz to a directory on a standard Linux host 2. Install gunicorn (https://gunicorn.org/ just to serve as a simple HTTPS server) 3. Run ./bad_math_server.sh 4. Access https://SERVER-NAME-HERE:4433 in Firefox Actual results: Repro 1: Hangs for an excessively long time. Repro 2: Signature verification will not complete and a background thread will consume CPU resources until the tab is closed. Repro 3: Browser will not complete TLS handshake. Background thread will spin consuming excessive CPU resource and will not terminate even upon program exit. (Firefox crash reporter eventually detects that this thread does not terminate and kills it.) Expected results: Repro 1: Should return 12302214814361c15ab6c0f2131150af186099f8c22f6c9d6e77ad496b551c7c8039e61098bfe2af66474420659435c6 Repro 2: Should complete verification and reject the invalid signature Repro 3: Should correctly fail the TLS handshake Note: While the signatures and general TLS setup in these repros are invalid, it is possible to create valid signatures and TLS set-ups with these malicious numbers.
1,544,023
14,051,034
Found while fuzzing mozilla-central rev c77962add953. I don't currently have a working testcase but will update if one becomes available. ==1902==ERROR: AddressSanitizer: heap-use-after-free on address 0x614000d084d0 at pc 0x7fafbe3e9746 bp 0x7faf01506a90 sp 0x7faf01506a88 WRITE of size 8 at 0x614000d084d0 thread T20144 (MediaStreamGrph) #0 0x7fafbe3e9745 in mozilla::MediaStreamGraphImpl::UpdateGraph(long) /src/dom/media/MediaStreamGraph.cpp:1257:28 #1 0x7fafbe3eced2 in mozilla::MediaStreamGraphImpl::OneIterationImpl(long) /src/dom/media/MediaStreamGraph.cpp:1399:3 #2 0x7fafbe0a257a in mozilla::ThreadedDriver::RunThread() /src/dom/media/GraphDriver.cpp:311:41 #3 0x7fafbe0b6a0d in mozilla::MediaStreamGraphInitThreadRunnable::Run() /src/dom/media/GraphDriver.cpp:208:14 #4 0x7fafb586d496 in nsThread::ProcessNextEvent(bool, bool*) /src/xpcom/threads/nsThread.cpp:1180:14 #5 0x7fafb587515d in NS_ProcessNextEvent(nsIThread*, bool) /src/xpcom/threads/nsThreadUtils.cpp:486:10 #6 0x7fafb6bd7421 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /src/ipc/glue/MessagePump.cpp:303:20 #7 0x7fafb6aab79e in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10 #8 0x7fafb6aab79e in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308 #9 0x7fafb6aab79e in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290 #10 0x7fafb58655f3 in nsThread::ThreadFunc(void*) /src/xpcom/threads/nsThread.cpp:454:11 #11 0x7fafdab8c5ad in _pt_root /src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #12 0x7fafda7ce6da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da) #13 0x7fafd97ac88e in clone /build/glibc-OTsEL5/glibc-2.27/misc/../sysdeps/unix/sysv/linux/x86_64/clone.S:95 0x614000d084d0 is located 144 bytes inside of 432-byte region [0x614000d08440,0x614000d085f0) freed by thread T20144 (MediaStreamGrph) here: #0 0x55786091d9e2 in free /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:124:3 #1 0x7fafbe3e7f0a in mozilla::MediaStreamGraphImpl::RunMessagesInQueue() /src/dom/media/MediaStreamGraph.cpp:1169:20 #2 0x7fafbe3ece88 in mozilla::MediaStreamGraphImpl::OneIterationImpl(long) /src/dom/media/MediaStreamGraph.cpp:1396:3 #3 0x7fafbe0a257a in mozilla::ThreadedDriver::RunThread() /src/dom/media/GraphDriver.cpp:311:41 #4 0x7fafbe0b6a0d in mozilla::MediaStreamGraphInitThreadRunnable::Run() /src/dom/media/GraphDriver.cpp:208:14 #5 0x7fafb586d496 in nsThread::ProcessNextEvent(bool, bool*) /src/xpcom/threads/nsThread.cpp:1180:14 #6 0x7fafb587515d in NS_ProcessNextEvent(nsIThread*, bool) /src/xpcom/threads/nsThreadUtils.cpp:486:10 #7 0x7fafb6bd7421 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /src/ipc/glue/MessagePump.cpp:303:20 #8 0x7fafb6aab79e in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10 #9 0x7fafb6aab79e in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308 #10 0x7fafb6aab79e in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290 #11 0x7fafb58655f3 in nsThread::ThreadFunc(void*) /src/xpcom/threads/nsThread.cpp:454:11 #12 0x7fafdab8c5ad in _pt_root /src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #13 0x7fafda7ce6da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da) previously allocated by thread T0 (file:// Content) here: #0 0x55786091dd63 in __interceptor_malloc /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:146:3 #1 0x5578609525fd in moz_xmalloc /src/memory/mozalloc/mozalloc.cpp:68:15 #2 0x7fafbeae7c47 in operator new /src/obj-firefox/dist/include/mozilla/mozalloc.h:131:10 #3 0x7fafbeae7c47 in mozilla::AudioNodeStream::Create(mozilla::dom::AudioContext*, mozilla::AudioNodeEngine*, unsigned int, mozilla::MediaStreamGraph*) /src/dom/media/webaudio/AudioNodeStream.cpp:76 #4 0x7fafbeb31de5 in mozilla::dom::AudioParam::Stream() /src/dom/media/webaudio/AudioParam.cpp:83:13 #5 0x7fafbeb3170c in mozilla::dom::AudioNode::Connect(mozilla::dom::AudioParam&, unsigned int, mozilla::ErrorResult&) /src/dom/media/webaudio/AudioNode.cpp:262:38 #6 0x7fafba393e1b in mozilla::dom::AudioNode_Binding::connect(JSContext*, JS::Handle<JSObject*>, mozilla::dom::AudioNode*, JSJitMethodCallArgs const&) /src/obj-firefox/dom/bindings/AudioNodeBinding.cpp:384:17 #7 0x7fafbd150a81 in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*) /src/dom/bindings/BindingUtils.cpp:3150:13 #8 0x7fafc4968c77 in CallJSNative /src/js/src/vm/Interpreter.cpp:442:13 #9 0x7fafc4968c77 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:534 #10 0x7fafc4951491 in CallFromStack /src/js/src/vm/Interpreter.cpp:593:10 #11 0x7fafc4951491 in Interpret(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:3072 #12 0x7fafc49330f8 in js::RunScript(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:422:10 #13 0x7fafc49695e8 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:562:13 #14 0x7fafc496b232 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /src/js/src/vm/Interpreter.cpp:605:8 #15 0x7fafc4b26920 in Call /src/js/src/vm/Interpreter.h:98:10 #16 0x7fafc4b26920 in PromiseReactionJob(JSContext*, unsigned int, JS::Value*) /src/js/src/builtin/Promise.cpp:1697 #17 0x7fafc4968c77 in CallJSNative /src/js/src/vm/Interpreter.cpp:442:13 #18 0x7fafc4968c77 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:534 #19 0x7fafc496b232 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /src/js/src/vm/Interpreter.cpp:605:8 #20 0x7fafc55b7ba9 in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /src/js/src/jsapi.cpp:2621:10 #21 0x7fafbafad4bc in mozilla::dom::PromiseJobCallback::Call(JSContext*, JS::Handle<JS::Value>, mozilla::ErrorResult&) /src/obj-firefox/dom/bindings/PromiseBinding.cpp:26:8 #22 0x7fafb5606079 in Call /src/obj-firefox/dist/include/mozilla/dom/PromiseBinding.h:91:12 #23 0x7fafb5606079 in Call /src/obj-firefox/dist/include/mozilla/dom/PromiseBinding.h:104 #24 0x7fafb5606079 in mozilla::PromiseJobRunnable::Run(mozilla::AutoSlowOperation&) /src/xpcom/base/CycleCollectedJSContext.cpp:236 #25 0x7fafb55d861e in mozilla::CycleCollectedJSContext::PerformMicroTaskCheckPoint(bool) /src/xpcom/base/CycleCollectedJSContext.cpp:599:17 #26 0x7fafbd9d044b in LeaveMicroTask /src/obj-firefox/dist/include/mozilla/CycleCollectedJSContext.h:212:7 #27 0x7fafbd9d044b in ~nsAutoMicroTask /src/obj-firefox/dist/include/mozilla/CycleCollectedJSContext.h:315 #28 0x7fafbd9d044b in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /src/dom/events/EventListenerManager.cpp:1047 Thread T20144 (MediaStreamGrph) created by T3718 (CubebOp~tion #2) here: #0 0x55786090667d in pthread_create /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cc:210:3 #1 0x7fafdab7e613 in _PR_CreateThread /src/nsprpub/pr/src/pthreads/ptthread.c:433:14 #2 0x7fafdab6809e in PR_CreateThread /src/nsprpub/pr/src/pthreads/ptthread.c:518:12 #3 0x7fafb5868569 in nsThread::Init(nsTSubstring<char> const&) /src/xpcom/threads/nsThread.cpp:661:8 #4 0x7fafb5873e15 in nsThreadManager::NewNamedThread(nsTSubstring<char> const&, unsigned int, nsIThread**) /src/xpcom/threads/nsThreadManager.cpp:416:12 #5 0x7fafb5878fa4 in NS_NewNamedThread(nsTSubstring<char> const&, nsIThread**, nsIRunnable*, unsigned int) /src/xpcom/threads/nsThreadUtils.cpp:139:57 #6 0x7fafbe0a0d9e in NS_NewNamedThread<16> /src/obj-firefox/dist/include/nsThreadUtils.h:71:10 #7 0x7fafbe0a0d9e in mozilla::ThreadedDriver::Start() /src/dom/media/GraphDriver.cpp:226 #8 0x7fafbe0a7b66 in SwitchToNextDriver /src/dom/media/GraphDriver.cpp:108:17 #9 0x7fafbe0a7b66 in mozilla::AudioCallbackDriver::FallbackToSystemClockDriver() /src/dom/media/GraphDriver.cpp:1114 #10 0x7fafbe0a4fd0 in mozilla::AudioCallbackDriver::Init() /src/dom/media/GraphDriver.cpp:580:5 #11 0x7fafbe0a4599 in mozilla::AsyncCubebTask::Run() /src/dom/media/GraphDriver.cpp:436:21 #12 0x7fafb587a061 in nsThreadPool::Run() /src/xpcom/threads/nsThreadPool.cpp:244:14 #13 0x7fafb587af24 in non-virtual thunk to nsThreadPool::Run() /src/xpcom/threads/nsThreadPool.cpp #14 0x7fafb586d496 in nsThread::ProcessNextEvent(bool, bool*) /src/xpcom/threads/nsThread.cpp:1180:14 #15 0x7fafb587515d in NS_ProcessNextEvent(nsIThread*, bool) /src/xpcom/threads/nsThreadUtils.cpp:486:10 #16 0x7fafb6bd7421 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /src/ipc/glue/MessagePump.cpp:303:20 #17 0x7fafb6aab79e in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10 #18 0x7fafb6aab79e in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308 #19 0x7fafb6aab79e in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290 #20 0x7fafb58655f3 in nsThread::ThreadFunc(void*) /src/xpcom/threads/nsThread.cpp:454:11 #21 0x7fafdab8c5ad in _pt_root /src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #22 0x7fafda7ce6da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da) Thread T3718 (CubebOp~tion #2) created by T3717 (MediaStreamGrph) here: #0 0x55786090667d in pthread_create /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cc:210:3 #1 0x7fafdab7e613 in _PR_CreateThread /src/nsprpub/pr/src/pthreads/ptthread.c:433:14 #2 0x7fafdab6809e in PR_CreateThread /src/nsprpub/pr/src/pthreads/ptthread.c:518:12 #3 0x7fafb5868569 in nsThread::Init(nsTSubstring<char> const&) /src/xpcom/threads/nsThread.cpp:661:8 #4 0x7fafb5873e15 in nsThreadManager::NewNamedThread(nsTSubstring<char> const&, unsigned int, nsIThread**) /src/xpcom/threads/nsThreadManager.cpp:416:12 #5 0x7fafb5878fa4 in NS_NewNamedThread(nsTSubstring<char> const&, nsIThread**, nsIRunnable*, unsigned int) /src/xpcom/threads/nsThreadUtils.cpp:139:57 #6 0x7fafb587883d in nsThreadPool::PutEvent(already_AddRefed<nsIRunnable>, unsigned int) /src/xpcom/threads/nsThreadPool.cpp:111:17 #7 0x7fafb587b1d5 in nsThreadPool::Dispatch(already_AddRefed<nsIRunnable>, unsigned int) /src/xpcom/threads/nsThreadPool.cpp:290:5 #8 0x7fafbe0a8825 in Dispatch /src/obj-firefox/dist/include/nsIEventTarget.h:37:14 #9 0x7fafbe0a8825 in Dispatch /src/dom/media/GraphDriver.h:545 #10 0x7fafbe0a8825 in mozilla::AudioCallbackDriver::Start() /src/dom/media/GraphDriver.cpp:696 #11 0x7fafbe0a290b in SwitchToNextDriver /src/dom/media/GraphDriver.cpp:108:17 #12 0x7fafbe0a290b in mozilla::ThreadedDriver::RunThread() /src/dom/media/GraphDriver.cpp:324 #13 0x7fafbe0b6a0d in mozilla::MediaStreamGraphInitThreadRunnable::Run() /src/dom/media/GraphDriver.cpp:208:14 #14 0x7fafb586d496 in nsThread::ProcessNextEvent(bool, bool*) /src/xpcom/threads/nsThread.cpp:1180:14 #15 0x7fafb587515d in NS_ProcessNextEvent(nsIThread*, bool) /src/xpcom/threads/nsThreadUtils.cpp:486:10 #16 0x7fafb6bd7421 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /src/ipc/glue/MessagePump.cpp:303:20 #17 0x7fafb6aab79e in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10 #18 0x7fafb6aab79e in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308 #19 0x7fafb6aab79e in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290 #20 0x7fafb58655f3 in nsThread::ThreadFunc(void*) /src/xpcom/threads/nsThread.cpp:454:11 #21 0x7fafdab8c5ad in _pt_root /src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #22 0x7fafda7ce6da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da) Thread T3717 (MediaStreamGrph) created by T3716 (CubebOp~tion #1) here: #0 0x55786090667d in pthread_create /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cc:210:3 #1 0x7fafdab7e613 in _PR_CreateThread /src/nsprpub/pr/src/pthreads/ptthread.c:433:14 #2 0x7fafdab6809e in PR_CreateThread /src/nsprpub/pr/src/pthreads/ptthread.c:518:12 #3 0x7fafb5868569 in nsThread::Init(nsTSubstring<char> const&) /src/xpcom/threads/nsThread.cpp:661:8 #4 0x7fafb5873e15 in nsThreadManager::NewNamedThread(nsTSubstring<char> const&, unsigned int, nsIThread**) /src/xpcom/threads/nsThreadManager.cpp:416:12 #5 0x7fafb5878fa4 in NS_NewNamedThread(nsTSubstring<char> const&, nsIThread**, nsIRunnable*, unsigned int) /src/xpcom/threads/nsThreadUtils.cpp:139:57 #6 0x7fafbe0a0d9e in NS_NewNamedThread<16> /src/obj-firefox/dist/include/nsThreadUtils.h:71:10 #7 0x7fafbe0a0d9e in mozilla::ThreadedDriver::Start() /src/dom/media/GraphDriver.cpp:226 #8 0x7fafbe0a7b66 in SwitchToNextDriver /src/dom/media/GraphDriver.cpp:108:17 #9 0x7fafbe0a7b66 in mozilla::AudioCallbackDriver::FallbackToSystemClockDriver() /src/dom/media/GraphDriver.cpp:1114 #10 0x7fafbe0a4fd0 in mozilla::AudioCallbackDriver::Init() /src/dom/media/GraphDriver.cpp:580:5 #11 0x7fafbe0a4599 in mozilla::AsyncCubebTask::Run() /src/dom/media/GraphDriver.cpp:436:21 #12 0x7fafb587a061 in nsThreadPool::Run() /src/xpcom/threads/nsThreadPool.cpp:244:14 #13 0x7fafb587af24 in non-virtual thunk to nsThreadPool::Run() /src/xpcom/threads/nsThreadPool.cpp #14 0x7fafb586d496 in nsThread::ProcessNextEvent(bool, bool*) /src/xpcom/threads/nsThread.cpp:1180:14 #15 0x7fafb587515d in NS_ProcessNextEvent(nsIThread*, bool) /src/xpcom/threads/nsThreadUtils.cpp:486:10 #16 0x7fafb6bd7421 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /src/ipc/glue/MessagePump.cpp:303:20 #17 0x7fafb6aab79e in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10 #18 0x7fafb6aab79e in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308 #19 0x7fafb6aab79e in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290 #20 0x7fafb58655f3 in nsThread::ThreadFunc(void*) /src/xpcom/threads/nsThread.cpp:454:11 #21 0x7fafdab8c5ad in _pt_root /src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #22 0x7fafda7ce6da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da) Thread T3716 (CubebOp~tion #1) created by T0 (file:// Content) here: #0 0x55786090667d in pthread_create /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cc:210:3 #1 0x7fafdab7e613 in _PR_CreateThread /src/nsprpub/pr/src/pthreads/ptthread.c:433:14 #2 0x7fafdab6809e in PR_CreateThread /src/nsprpub/pr/src/pthreads/ptthread.c:518:12 #3 0x7fafb5868569 in nsThread::Init(nsTSubstring<char> const&) /src/xpcom/threads/nsThread.cpp:661:8 #4 0x7fafb5873e15 in nsThreadManager::NewNamedThread(nsTSubstring<char> const&, unsigned int, nsIThread**) /src/xpcom/threads/nsThreadManager.cpp:416:12 #5 0x7fafb5878fa4 in NS_NewNamedThread(nsTSubstring<char> const&, nsIThread**, nsIRunnable*, unsigned int) /src/xpcom/threads/nsThreadUtils.cpp:139:57 #6 0x7fafb587883d in nsThreadPool::PutEvent(already_AddRefed<nsIRunnable>, unsigned int) /src/xpcom/threads/nsThreadPool.cpp:111:17 #7 0x7fafb587b1d5 in nsThreadPool::Dispatch(already_AddRefed<nsIRunnable>, unsigned int) /src/xpcom/threads/nsThreadPool.cpp:290:5 #8 0x7fafbe0a8825 in Dispatch /src/obj-firefox/dist/include/nsIEventTarget.h:37:14 #9 0x7fafbe0a8825 in Dispatch /src/dom/media/GraphDriver.h:545 #10 0x7fafbe0a8825 in mozilla::AudioCallbackDriver::Start() /src/dom/media/GraphDriver.cpp:696 #11 0x7fafbe3ef554 in mozilla::MediaStreamGraphImpl::RunInStableState(bool) /src/dom/media/MediaStreamGraph.cpp:1727:17 #12 0x7fafbe41d46e in mozilla::(anonymous namespace)::MediaStreamGraphStableStateRunnable::Run() /src/dom/media/MediaStreamGraph.cpp:1591:15 #13 0x7fafb55d6097 in mozilla::CycleCollectedJSContext::ProcessStableStateQueue() /src/xpcom/base/CycleCollectedJSContext.cpp:382:12 #14 0x7fafb55d91c2 in mozilla::CycleCollectedJSContext::AfterProcessTask(unsigned int) /src/xpcom/base/CycleCollectedJSContext.cpp:441:3 #15 0x7fafb7d46465 in XPCJSContext::AfterProcessTask(unsigned int) /src/js/xpconnect/src/XPCJSContext.cpp:1273:28 #16 0x7fafb586e159 in nsThread::ProcessNextEvent(bool, bool*) /src/xpcom/threads/nsThread.cpp:1240:24 #17 0x7fafb587515d in NS_ProcessNextEvent(nsIThread*, bool) /src/xpcom/threads/nsThreadUtils.cpp:486:10 #18 0x7fafbfbc1cc3 in SpinEventLoopUntil<mozilla::ProcessFailureBehavior::ReportToCaller, (lambda at /builds/worker/workspace/build/src/dom/xhr/XMLHttpRequestMainThread.cpp:2910:31)> /src/obj-firefox/dist/include/nsThreadUtils.h:348:25 #19 0x7fafbfbc1cc3 in mozilla::dom::XMLHttpRequestMainThread::SendInternal(mozilla::dom::BodyExtractorBase const*, bool) /src/dom/xhr/XMLHttpRequestMainThread.cpp:2910 #20 0x7fafbfbbf53d in mozilla::dom::XMLHttpRequestMainThread::Send(JSContext*, mozilla::dom::Nullable<mozilla::dom::DocumentOrBlobOrArrayBufferViewOrArrayBufferOrFormDataOrURLSearchParamsOrUSVString> const&, mozilla::ErrorResult&) /src/dom/xhr/XMLHttpRequestMainThread.cpp:2684:11 #21 0x7fafbc3cbcba in mozilla::dom::XMLHttpRequest_Binding::send(JSContext*, JS::Handle<JSObject*>, mozilla::dom::XMLHttpRequest*, JSJitMethodCallArgs const&) /src/obj-firefox/dom/bindings/XMLHttpRequestBinding.cpp:1345:9 #22 0x7fafbd150a81 in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*) /src/dom/bindings/BindingUtils.cpp:3150:13 #23 0x7fafc4968c77 in CallJSNative /src/js/src/vm/Interpreter.cpp:442:13 #24 0x7fafc4968c77 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:534 #25 0x7fafc5b3b02b in js::jit::DoCallFallback(JSContext*, js::jit::BaselineFrame*, js::jit::ICCall_Fallback*, unsigned int, JS::Value*, JS::MutableHandle<JS::Value>) /src/js/src/jit/BaselineIC.cpp:3879:10 #26 0x7faf6b8e8887 (<unknown module>) #27 0x6290016aa2cf (<unknown module>) #28 0x7faf6b8e64de (<unknown module>) #29 0x7fafc5d310e1 in EnterBaseline /src/js/src/jit/BaselineJIT.cpp:111:5 #30 0x7fafc5d310e1 in js::jit::EnterBaselineAtBranch(JSContext*, js::InterpreterFrame*, unsigned char*) /src/js/src/jit/BaselineJIT.cpp:189 #31 0x7fafc495d20d in Interpret(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:1979:24 #32 0x7fafc49330f8 in js::RunScript(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:422:10 #33 0x7fafc49695e8 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:562:13 #34 0x7fafc496b232 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /src/js/src/vm/Interpreter.cpp:605:8 #35 0x7fafc55b7ba9 in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /src/js/src/jsapi.cpp:2621:10 #36 0x7fafbc754770 in mozilla::dom::EventListener::HandleEvent(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, mozilla::ErrorResult&) /src/obj-firefox/dom/bindings/EventListenerBinding.cpp:52:8 #37 0x7fafbd9d0202 in HandleEvent<mozilla::dom::EventTarget *> /src/obj-firefox/dist/include/mozilla/dom/EventListenerBinding.h:66:12 #38 0x7fafbd9d0202 in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /src/dom/events/EventListenerManager.cpp:1039 #39 0x7fafbd9d2833 in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event**, mozilla::dom::EventTarget*, nsEventStatus*, bool) /src/dom/events/EventListenerManager.cpp:1240:17 #40 0x7fafbd9b2a00 in HandleEvent /src/obj-firefox/dist/include/mozilla/EventListenerManager.h:355:5 #41 0x7fafbd9b2a00 in mozilla::EventTargetChainItem::HandleEvent(mozilla::EventChainPostVisitor&, mozilla::ELMCreationDetector&) /src/dom/events/EventDispatcher.cpp:349 #42 0x7fafbd9b0c28 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /src/dom/events/EventDispatcher.cpp:551:16 #43 0x7fafbd9b7993 in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /src/dom/events/EventDispatcher.cpp:1046:11 #44 0x7fafc096b56a in nsDocumentViewer::LoadComplete(nsresult) /src/layout/base/nsDocumentViewer.cpp:1098:7 #45 0x7fafc37dda5c in nsDocShell::EndPageLoad(nsIWebProgress*, nsIChannel*, nsresult) /src/docshell/base/nsDocShell.cpp:6594:21 #46 0x7fafc37dcb88 in nsDocShell::OnStateChange(nsIWebProgress*, nsIRequest*, unsigned int, nsresult) /src/docshell/base/nsDocShell.cpp:6395:7 #47 0x7fafc37e26f7 in non-virtual thunk to nsDocShell::OnStateChange(nsIWebProgress*, nsIRequest*, unsigned int, nsresult) /src/docshell/base/nsDocShell.cpp #48 0x7fafb84503a5 in nsDocLoader::DoFireOnStateChange(nsIWebProgress*, nsIRequest*, int&, nsresult) /src/uriloader/base/nsDocLoader.cpp:1313:3 #49 0x7fafb844ef8c in nsDocLoader::doStopDocumentLoad(nsIRequest*, nsresult) /src/uriloader/base/nsDocLoader.cpp:872:14 #50 0x7fafb844a0d7 in nsDocLoader::DocLoaderIsEmpty(bool) /src/uriloader/base/nsDocLoader.cpp:710:9 #51 0x7fafb844d1d5 in nsDocLoader::OnStopRequest(nsIRequest*, nsresult) /src/uriloader/base/nsDocLoader.cpp:598:5 #52 0x7fafb844eab4 in non-virtual thunk to nsDocLoader::OnStopRequest(nsIRequest*, nsresult) /src/uriloader/base/nsDocLoader.cpp #53 0x7fafb5b162b2 in mozilla::net::nsLoadGroup::RemoveRequest(nsIRequest*, nsISupports*, nsresult) /src/netwerk/base/nsLoadGroup.cpp:568:22 #54 0x7fafb9cfccda in DoUnblockOnload /src/dom/base/Document.cpp:7831:18 #55 0x7fafb9cfccda in mozilla::dom::Document::UnblockOnload(bool) /src/dom/base/Document.cpp:7763 #56 0x7fafb9cfb73f in mozilla::dom::Document::DispatchContentLoadedEvents() /src/dom/base/Document.cpp:4891:3 #57 0x7fafb9e004eb in applyImpl<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /src/obj-firefox/dist/include/nsThreadUtils.h:1122:12 #58 0x7fafb9e004eb in apply<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /src/obj-firefox/dist/include/nsThreadUtils.h:1128 #59 0x7fafb9e004eb in mozilla::detail::RunnableMethodImpl<mozilla::dom::Document*, void (mozilla::dom::Document::*)(), true, (mozilla::RunnableKind)0>::Run() /src/obj-firefox/dist/include/nsThreadUtils.h:1174 #60 0x7fafb582d455 in mozilla::SchedulerGroup::Runnable::Run() /src/xpcom/threads/SchedulerGroup.cpp:295:32 #61 0x7fafb586d496 in nsThread::ProcessNextEvent(bool, bool*) /src/xpcom/threads/nsThread.cpp:1180:14 #62 0x7fafb587515d in NS_ProcessNextEvent(nsIThread*, bool) /src/xpcom/threads/nsThreadUtils.cpp:486:10 #63 0x7fafb6bd5cbf in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /src/ipc/glue/MessagePump.cpp:88:21 #64 0x7fafb6aab79e in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10 #65 0x7fafb6aab79e in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308 #66 0x7fafb6aab79e in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290 #67 0x7fafc00bfcb3 in nsBaseAppShell::Run() /src/widget/nsBaseAppShell.cpp:137:27 #68 0x7fafc46820fe in XRE_RunAppShell() /src/toolkit/xre/nsEmbedFunctions.cpp:919:20 #69 0x7fafb6aab79e in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10 #70 0x7fafb6aab79e in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308 #71 0x7fafb6aab79e in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290 #72 0x7fafc468128c in XRE_InitChildProcess(int, char**, XREChildData const*) /src/toolkit/xre/nsEmbedFunctions.cpp:757:34 #73 0x557860950834 in content_process_main /src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28 #74 0x557860950834 in main /src/browser/app/nsBrowserApp.cpp:263 #75 0x7fafd96acb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-use-after-free /src/dom/media/MediaStreamGraph.cpp:1257:28 in mozilla::MediaStreamGraphImpl::UpdateGraph(long) Shadow bytes around the buggy address: 0x0c2880199040: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c2880199050: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c2880199060: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c2880199070: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fa fa 0x0c2880199080: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd =>0x0c2880199090: fd fd fd fd fd fd fd fd fd fd[fd]fd fd fd fd fd 0x0c28801990a0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c28801990b0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fa fa 0x0c28801990c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c28801990d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c28801990e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1902==ABORTING
1,545,345
14,061,999
Created attachment 9059182 UAF_NoteXPCOMChild_Repro.js Reproduction test case (full server code in attached file UAF_NoteXPCOMChild_Repro.js): Main Page code: <script type="text/javascript"> var worker = new Worker("worker0.js"); var bc0 = new BroadcastChannel("test_channel"); setInterval(function(){ bc0.postMessage("AAAA");}, 10); setTimeout(function(){location.reload();},800); </script> Worker code: var bc0 = new BroadcastChannel("test_channel"); bc0.onmessage = function(e) { xmlReq0.send(); xmlReq0.abort(); } var fileReader1 = new FileReader(); fileReader1.onloadend = function(e) { xmlReq0.open("get", "nofile.js", false); } var xmlReq0 = new XMLHttpRequest(); close(); fileReader1.readAsArrayBuffer(new Blob(["AAAA"], {type : "text/html"})); fileReader1.abort(); Steps to reproduce: 1. Run server side script UAF_NoteXPCOMChild_Repro.js with Node.js (node UAF_NoteXPCOMChild_Repro.js). 2. Enter http://localhost:12345 in Firefox asan build. 3. ASAN reports a Use After Free with XMLHttpRequest: ================================================================= ==7061==ERROR: AddressSanitizer: heap-use-after-free on address 0x6120000d0540 at pc 0x7faee9713b6f bp 0x7faed52472b0 sp 0x7faed52472a8 READ of size 8 at 0x6120000d0540 thread T22 (DOM Worker) Firefox version: 68.0a1 (2019-04-17) (64-bit) OS: Ubuntu 16.04 LTS 64bit Stack trace: ================================================================= ==7061==ERROR: AddressSanitizer: heap-use-after-free on address 0x6120000d0540 at pc 0x7faee9713b6f bp 0x7faed52472b0 sp 0x7faed52472a8 READ of size 8 at 0x6120000d0540 thread T22 (DOM Worker) #0 0x7faee9713b6e in ~nsCOMPtr_base /builds/worker/workspace/build/src/obj-firefox/dist/include/nsCOMPtr.h:331:7 #1 0x7faee9713b6e in mozilla::WidgetEvent::~WidgetEvent() /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/BasicEvents.h:500 #2 0x7faef0173e9d in mozilla::WidgetEvent::~WidgetEvent() /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/BasicEvents.h:500:26 #3 0x7faeee23825b in mozilla::dom::Event::~Event() /builds/worker/workspace/build/src/dom/events/Event.cpp:113:5 #4 0x7faeee1c9a3d in mozilla::dom::Event::~Event() /builds/worker/workspace/build/src/dom/events/Event.cpp:109:17 #5 0x7faee7bf5ba6 in SnowWhiteKiller::~SnowWhiteKiller() /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:2416:7 #6 0x7faee7bf488e in nsCycleCollector::FreeSnowWhite(bool) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:2607:3 #7 0x7faee7bfe048 in nsCycleCollector::BeginCollection(ccType, nsICycleCollectorListener*) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3582:3 #8 0x7faee7bfd630 in nsCycleCollector::Collect(ccType, js::SliceBudget&, nsICycleCollectorListener*, bool) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3411:9 #9 0x7faee7c0119c in nsCycleCollector_collect(nsICycleCollectorListener*) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3947:21 #10 0x7faef5088dc7 in callGCCallback /builds/worker/workspace/build/src/js/src/gc/GC.cpp:1840:3 #11 0x7faef5088dc7 in js::gc::GCRuntime::maybeCallGCCallback(JSGCStatus) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7375 #12 0x7faef5089eff in ~AutoCallGCCallbacks /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7354:32 #13 0x7faef5089eff in js::gc::GCRuntime::gcCycle(bool, js::SliceBudget, JS::GCReason) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7464 #14 0x7faef508d423 in js::gc::GCRuntime::collect(bool, js::SliceBudget, JS::GCReason) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7622:9 #15 0x7faef502347d in js::gc::GCRuntime::gc(JSGCInvocationKind, JS::GCReason) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7710:3 #16 0x7faeef978f39 in mozilla::dom::workerinternals::(anonymous namespace)::WorkerThreadPrimaryRunnable::Run() /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:2325:5 #17 0x7faee7db73a1 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1180:14 #18 0x7faee7dbd4b8 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #19 0x7faee8e01e40 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:333:5 #20 0x7faee8d2e5b2 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #21 0x7faee8d2e5b2 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308 #22 0x7faee8d2e5b2 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290 #23 0x7faee7db12fa in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:454:11 #24 0x7faf0884e05d in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #25 0x7faf084946b9 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76b9) #26 0x7faf0751d41c in clone /build/glibc-Cl5G7W/glibc-2.23/misc/../sysdeps/unix/sysv/linux/x86_64/clone.S:109 0x6120000d0540 is located 0 bytes inside of 272-byte region [0x6120000d0540,0x6120000d0650) freed by thread T22 (DOM Worker) here: #0 0x55c5c6461182 in free /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:124:3 #1 0x7faee7bf5ba6 in SnowWhiteKiller::~SnowWhiteKiller() /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:2416:7 #2 0x7faee7bf488e in nsCycleCollector::FreeSnowWhite(bool) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:2607:3 #3 0x7faee7bfe048 in nsCycleCollector::BeginCollection(ccType, nsICycleCollectorListener*) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3582:3 #4 0x7faee7bfd630 in nsCycleCollector::Collect(ccType, js::SliceBudget&, nsICycleCollectorListener*, bool) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3411:9 #5 0x7faee7c0119c in nsCycleCollector_collect(nsICycleCollectorListener*) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3947:21 #6 0x7faef5088dc7 in callGCCallback /builds/worker/workspace/build/src/js/src/gc/GC.cpp:1840:3 #7 0x7faef5088dc7 in js::gc::GCRuntime::maybeCallGCCallback(JSGCStatus) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7375 #8 0x7faef5089eff in ~AutoCallGCCallbacks /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7354:32 #9 0x7faef5089eff in js::gc::GCRuntime::gcCycle(bool, js::SliceBudget, JS::GCReason) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7464 #10 0x7faef508d423 in js::gc::GCRuntime::collect(bool, js::SliceBudget, JS::GCReason) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7622:9 #11 0x7faef502347d in js::gc::GCRuntime::gc(JSGCInvocationKind, JS::GCReason) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7710:3 #12 0x7faeef978f39 in mozilla::dom::workerinternals::(anonymous namespace)::WorkerThreadPrimaryRunnable::Run() /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:2325:5 #13 0x7faee7db73a1 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1180:14 #14 0x7faee7dbd4b8 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #15 0x7faee8e01e40 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:333:5 #16 0x7faee8d2e5b2 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #17 0x7faee8d2e5b2 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308 #18 0x7faee8d2e5b2 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290 #19 0x7faee7db12fa in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:454:11 #20 0x7faf0884e05d in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #21 0x7faf084946b9 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76b9) previously allocated by thread T22 (DOM Worker) here: #0 0x55c5c6461503 in __interceptor_malloc /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:146:3 #1 0x55c5c6495f9d in moz_xmalloc /builds/worker/workspace/build/src/memory/mozalloc/mozalloc.cpp:68:15 #2 0x7faeefd8af22 in operator new /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/mozalloc.h:131:10 #3 0x7faeefd8af22 in mozilla::dom::XMLHttpRequestWorker::Construct(mozilla::dom::GlobalObject const&, mozilla::dom::MozXMLHttpRequestParameters const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/xhr/XMLHttpRequestWorker.cpp:1482 #4 0x7faeefd8a049 in mozilla::dom::XMLHttpRequest::Constructor(mozilla::dom::GlobalObject const&, mozilla::dom::MozXMLHttpRequestParameters const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/xhr/XMLHttpRequest.cpp:51:10 #5 0x7faeecffb4f7 in mozilla::dom::XMLHttpRequest_Binding::_constructor(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/XMLHttpRequestBinding.cpp:2557:64 #6 0x7faef4007905 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:442:13 #7 0x7faef4007905 in CallJSNativeConstructor /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:458 #8 0x7faef4007905 in InternalConstruct(JSContext*, js::AnyConstructArgs const&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:651 #9 0x7faef3fe4f1c in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3063:16 #10 0x7faef3fced88 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:422:10 #11 0x7faef4009ef9 in js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value const&, js::AbstractFramePtr, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:781:13 #12 0x7faef400a66c in js::Execute(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:814:10 #13 0x7faef4287694 in bool Evaluate<char16_t>(JSContext*, js::ScopeKind, JS::Handle<JSObject*>, JS::ReadOnlyCompileOptions const&, JS::SourceText<char16_t>&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/CompilationAndEvaluation.cpp:539:10 #14 0x7faef4286a0a in JS::Evaluate(JSContext*, JS::ReadOnlyCompileOptions const&, JS::SourceText<char16_t>&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/CompilationAndEvaluation.cpp:557:10 #15 0x7faeef98a456 in mozilla::dom::(anonymous namespace)::ScriptExecutorRunnable::WorkerRun(JSContext*, mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/ScriptLoader.cpp:1989:10 #16 0x7faeef9c9f82 in mozilla::dom::WorkerRunnable::Run() /builds/worker/workspace/build/src/dom/workers/WorkerRunnable.cpp:363:12 #17 0x7faee7db73a1 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1180:14 #18 0x7faee7dbd4b8 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #19 0x7faeef9b904e in mozilla::dom::WorkerPrivate::RunCurrentSyncLoop() /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:3646:7 #20 0x7faeef95b555 in Run /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.h:1169:27 #21 0x7faeef95b555 in mozilla::dom::(anonymous namespace)::LoadAllScripts(mozilla::dom::WorkerPrivate*, nsTArray<mozilla::dom::(anonymous namespace)::ScriptLoadInfo>&, bool, mozilla::dom::WorkerScriptType, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/workers/ScriptLoader.cpp:2149 #22 0x7faeef95a972 in mozilla::dom::workerinternals::LoadMainScript(mozilla::dom::WorkerPrivate*, nsTSubstring<char16_t> const&, mozilla::dom::WorkerScriptType, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/workers/ScriptLoader.cpp:2259:3 #23 0x7faeef9dd1c5 in mozilla::dom::(anonymous namespace)::CompileScriptRunnable::WorkerRun(JSContext*, mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:340:5 #24 0x7faeef9c9f82 in mozilla::dom::WorkerRunnable::Run() /builds/worker/workspace/build/src/dom/workers/WorkerRunnable.cpp:363:12 #25 0x7faee7db73a1 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1180:14 #26 0x7faee7dbd4b8 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #27 0x7faeef9b07ea in mozilla::dom::WorkerPrivate::DoRunLoop(JSContext*) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:2748:7 #28 0x7faeef978f0b in mozilla::dom::workerinternals::(anonymous namespace)::WorkerThreadPrimaryRunnable::Run() /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:2305:40 #29 0x7faee7db73a1 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1180:14 #30 0x7faee7dbd4b8 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #31 0x7faee8e01e40 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:333:5 #32 0x7faee8d2e5b2 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #33 0x7faee8d2e5b2 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308 #34 0x7faee8d2e5b2 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290 #35 0x7faee7db12fa in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:454:11 Thread T22 (DOM Worker) created by T0 (Web Content) here: #0 0x55c5c6449add in pthread_create /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cc:210:3 #1 0x7faf08840158 in _PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:433:14 #2 0x7faf08829d3e in PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:518:12 #3 0x7faee7db3609 in nsThread::Init(nsTSubstring<char> const&) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:661:8 #4 0x7faeef9d9388 in mozilla::dom::WorkerThread::Create(mozilla::dom::WorkerThreadFriendKey const&) /builds/worker/workspace/build/src/dom/workers/WorkerThread.cpp:93:7 #5 0x7faeef94df79 in mozilla::dom::workerinternals::RuntimeService::ScheduleWorker(mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:1433:14 #6 0x7faeef94c595 in mozilla::dom::workerinternals::RuntimeService::RegisterWorker(mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:1298:19 #7 0x7faeef9aa8a3 in mozilla::dom::WorkerPrivate::Constructor(JSContext*, nsTSubstring<char16_t> const&, bool, mozilla::dom::WorkerType, nsTSubstring<char16_t> const&, nsTSubstring<char> const&, mozilla::dom::WorkerLoadInfo*, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:2250:24 #8 0x7faeef95c7b7 in mozilla::dom::Worker::Constructor(mozilla::dom::GlobalObject const&, nsTSubstring<char16_t> const&, mozilla::dom::WorkerOptions const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/workers/Worker.cpp:30:41 #9 0x7faeecfab3d0 in mozilla::dom::Worker_Binding::_constructor(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/WorkerBinding.cpp:1112:52 #10 0x7faef4007905 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:442:13 #11 0x7faef4007905 in CallJSNativeConstructor /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:458 #12 0x7faef4007905 in InternalConstruct(JSContext*, js::AnyConstructArgs const&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:651 #13 0x7faef3fe4f1c in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3063:16 #14 0x7faef3fced88 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:422:10 #15 0x7faef4009ef9 in js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value const&, js::AbstractFramePtr, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:781:13 #16 0x7faef400a66c in js::Execute(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:814:10 #17 0x7faef428491d in ExecuteScript(JSContext*, JS::Handle<JS::StackGCVector<JSObject*, js::TempAllocPolicy> >, JS::Handle<JSScript*>, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/CompilationAndEvaluation.cpp:455:10 #18 0x7faeeb5b26a4 in nsJSUtils::ExecutionContext::ExecScript() /builds/worker/workspace/build/src/dom/base/nsJSUtils.cpp:386:8 #19 0x7faeefe21ef3 in mozilla::dom::ExecuteCompiledScript(JSContext*, mozilla::dom::ScriptLoadRequest*, nsJSUtils::ExecutionContext&) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:2495:16 #20 0x7faeefe1efb1 in mozilla::dom::ScriptLoader::EvaluateScript(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:2715:20 #21 0x7faeefe1794c in mozilla::dom::ScriptLoader::ProcessRequest(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:2222:10 #22 0x7faeefe14322 in mozilla::dom::ScriptLoader::ProcessInlineScript(nsIScriptElement*, mozilla::dom::ScriptKind) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1803:10 #23 0x7faeefdee73e in mozilla::dom::ScriptLoader::ProcessScriptElement(nsIScriptElement*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1526:10 #24 0x7faeefdeda0e in mozilla::dom::ScriptElement::MaybeProcessScript() /builds/worker/workspace/build/src/dom/script/ScriptElement.cpp:118:18 #25 0x7faeea1249ba in AttemptToExecute /builds/worker/workspace/build/src/obj-firefox/dist/include/nsIScriptElement.h:224:18 #26 0x7faeea1249ba in nsHtml5TreeOpExecutor::RunScript(nsIContent*) /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:727 #27 0x7faeea11e663 in nsHtml5TreeOpExecutor::RunFlushLoop() /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:530:7 #28 0x7faeea12a7e0 in nsHtml5ExecutorFlusher::Run() /builds/worker/workspace/build/src/parser/html/nsHtml5StreamParser.cpp:133:18 #29 0x7faee7d86141 in mozilla::SchedulerGroup::Runnable::Run() /builds/worker/workspace/build/src/xpcom/threads/SchedulerGroup.cpp:295:32 #30 0x7faee7db73a1 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1180:14 #31 0x7faee7dbd4b8 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #32 0x7faee8e00c3a in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:88:21 #33 0x7faee8d2e5b2 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #34 0x7faee8d2e5b2 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308 #35 0x7faee8d2e5b2 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290 #36 0x7faef0180599 in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:137:27 #37 0x7faef3d7bc9f in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:919:20 #38 0x7faee8d2e5b2 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #39 0x7faee8d2e5b2 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308 #40 0x7faee8d2e5b2 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290 #41 0x7faef3d7b646 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:757:34 #42 0x55c5c64943a7 in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28 #43 0x55c5c64943a7 in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:263 #44 0x7faf0743682f in __libc_start_main /build/glibc-Cl5G7W/glibc-2.23/csu/../csu/libc-start.c:291 SUMMARY: AddressSanitizer: heap-use-after-free /builds/worker/workspace/build/src/obj-firefox/dist/include/nsCOMPtr.h:331:7 in ~nsCOMPtr_base Shadow bytes around the buggy address: 0x0c2480012050: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c2480012060: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c2480012070: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c2480012080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2480012090: 00 00 00 00 00 00 00 00 00 00 00 00 00 fa fa fa =>0x0c24800120a0: fa fa fa fa fa fa fa fa[fd]fd fd fd fd fd fd fd 0x0c24800120b0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c24800120c0: fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa fa 0x0c24800120d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c24800120e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c24800120f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==7061==ABORTING
1,545,473
14,062,835
**Affected versions** * Firefox 66.0.3 * Firefox 67.0b11 * Latest Nightly 68.0a1 **Affected platforms** * macOS 10.13 **Unaffected platforms** * Windows 10 * Ubuntu 18.04 **Steps to reproduce** 1. Start Firefox 2. Visit the following url: https://www.khronos.org/registry/webgl/sdk/tests/conformance/attribs/gl-vertex-attrib-unconsumed-out-of-bounds.html?webglVersion=1&quiet=0&quick=1 **Expected result** * Test passes. **Actual result** * The tab crashes. **Regression range** * First bad: 6ebc251bd288c268b020815025b05854ccde5c08 (2017-08-16) * Last good: d25db0546c92afa72d61685c9310104ef28235bd (2017-08-15) * Pushlog: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=d25db0546c92afa72d61685c9310104ef28235bd&tochange=6ebc251bd288c268b020815025b05854ccde5c08 * Potential regressor: Not sure what is the regressor here. **Additional notes** * For 67 Beta and 66 RC I get the following crash signature: [@mozilla::gl::GLContext::GetError ] https://crash-stats.mozilla.org/report/index/25d6604d-76e4-43cf-9c15-2abda0190418 * For 68 Nightly I get a different crash signature: [@XUL@0x19dc6c0 | XUL@0x2dc902d | XUL@0x2851e7f | XUL@0x2d16381 | XUL@0x539e16f | XUL@0x53968bc | XUL@0x5388a1f | XUL@0x539f987 | XUL@0x539fbb3 | XUL@0x5463967 | XUL@0x3a997e1 | XUL@0x3a98e7b | XUL@0x3a969d5 | XUL@0x3a88e38 | XUL@0x3a86ed8 | XUL@0x18e0c8... ] https://crash-stats.mozilla.org/report/index/79b4701e-821d-4986-9e5e-b48b70190418 * The crash happens on both 1.0.4 and 2.0.1
1,555,640
14,149,062
This bug is for crash report bp-2cb8af30-ad3c-4a43-82d0-e64400190529. ``` Top 10 frames of crashing thread: 0 xul.dll mozilla::WSRunObject::InsertText editor/libeditor/WSRunObject.cpp:381 1 xul.dll nsresult mozilla::HTMLEditRules::WillInsertText editor/libeditor/HTMLEditRules.cpp:1390 2 xul.dll nsresult mozilla::HTMLEditRules::WillDoAction editor/libeditor/HTMLEditRules.cpp:702 3 xul.dll mozilla::TextEditor::InsertTextAsSubAction editor/libeditor/TextEditor.cpp:1023 4 xul.dll mozilla::TextEditor::OnCompositionChange editor/libeditor/TextEditor.cpp:1353 5 xul.dll nsresult mozilla::EditorEventListener::HandleChangeComposition editor/libeditor/EditorEventListener.cpp:960 6 xul.dll nsresult mozilla::HTMLEditorEventListener::HandleEvent editor/libeditor/HTMLEditorEventListener.cpp:98 7 xul.dll nsresult mozilla::EventListenerManager::HandleEventSubType dom/events/EventListenerManager.cpp:1040 8 xul.dll void mozilla::EventListenerManager::HandleEventInternal dom/events/EventListenerManager.cpp:1235 9 xul.dll void mozilla::EventTargetChainItem::HandleEvent dom/events/EventDispatcher.cpp:349 ``` this crash signature is showing up cross-platform in 69.0a1 and 68.0b5 after the changes from bug 1534394 have landed.
1,556,076
14,152,983
This bug is for crash report bp-a6c2d644-99fe-4d04-9359-a67730190531. Seen while looking at Mac nightly crash stats: https://bit.ly/2JORAeg So far the crashes are all on 10.15.0, and crashes are showing up for 67 and 69 so far. Some code was touched in Bug 1520868. ni on :jkt for any ideas. ``` Top 10 frames of crashing thread: 0 XUL nsInputStreamPump::AsyncRead netwerk/base/nsInputStreamPump.cpp:300 1 XUL nsIconChannel::AsyncOpen image/decoders/icon/mac/nsIconChannelCocoa.mm:204 2 XUL imgLoader::LoadImage image/imgLoader.cpp:2271 3 XUL nsImageBoxFrame::UpdateImage dom/base/nsContentUtils.cpp:3321 4 XUL nsImageBoxFrame::AttributeChanged layout/xul/nsImageBoxFrame.cpp:139 5 XUL mozilla::RestyleManager::AttributeChanged layout/base/RestyleManager.cpp:3408 6 XUL nsNodeUtils::AttributeChanged layout/base/PresShell.cpp:4333 7 XUL mozilla::dom::Element::SetAttrAndNotify dom/base/Element.cpp:2544 8 XUL mozilla::dom::Element::SetAttr dom/base/Element.cpp:2392 9 XUL mozilla::dom::Element::SetAttribute dom/base/Element.cpp:1397 ```
1,556,220
14,153,931
The following testcase crashes on mozilla-central revision c143aa387e91 (build with --enable-debug, run with --fuzzing-safe --no-threads --ion-eager): function f(x) { x[0] = 1; } for (let y of [[], [], [], [], [], [], [], new BigUint64Array]) { try { f(y); } catch (e) {} } Backtrace: #0 js::jit::MacroAssembler::storeToTypedIntArray<js::jit::Register, js::jit::BaseIndex> (this=<optimized out>, arrayType=js::Scalar::BigUint64, value=..., dest=...) at js/src/jit/MacroAssembler.h:2715 #1 js::jit::IonCacheIRCompiler::emitStoreTypedElement (this=0x7fff7aacbad0) at js/src/jit/IonCacheIRCompiler.cpp:2034 #2 0x000055a9e85589da in js::jit::IonCacheIRCompiler::compile (this=0x7fff7aacbad0) at js/src/jit/IonCacheIRCompiler.cpp:607 #3 0x000055a9e8568fca in js::jit::IonIC::attachCacheIRStub (this=0x7fd80c3fe120, cx=0x7fd80cb19000, writer=..., kind=<optimized out>, ionScript=0x7fd80c3fe000, attached=0x7fff7aaccbcf, typeCheckInfo=0x7fff7aaccdc8) at js/src/jit/IonCacheIRCompiler.cpp:2566 #4 0x000055a9e85a37d2 in js::jit::IonSetPropertyIC::update (cx=<optimized out>, outerScript=..., ic=<optimized out>, obj=..., idVal=..., rhs=...) at js/src/jit/IonIC.cpp:302 /snip For detailed crash information, see attachment. Setting s-s as a start as this involves TypedArrays.
1,556,491
14,157,288
This bug is for crash report bp-6584daaa-a299-4054-9b2c-684b90190528. ``` Top 10 frames of crashing thread: 0 libnss3.dylib ssl3_SendClientHello security/nss/lib/ssl/ssl3con.c:4977 1 libnss3.dylib ssl_BeginClientHandshake security/nss/lib/ssl/sslcon.c:200 2 libnss3.dylib ssl_SecureRecv security/nss/lib/ssl/sslsecur.c:41 3 libnss3.dylib ssl_Recv security/nss/lib/ssl/sslsock.c:2940 4 XUL PSMRecv security/manager/ssl/nsNSSIOLayer.cpp:1365 5 XUL mozilla::net::nsSocketTransport::IsAlive netwerk/base/nsSocketTransport2.cpp:2671 6 XUL non-virtual thunk to mozilla::net::nsSocketTransport::IsAlive netwerk/base/nsSocketTransport2.cpp 7 XUL mozilla::net::nsHttpConnection::CanReuse netwerk/protocol/http/nsHttpConnection.cpp:1117 8 XUL mozilla::net::nsHttpConnection::StartSpdy netwerk/protocol/http/nsHttpConnection.cpp:345 9 XUL mozilla::net::nsHttpConnection::EnsureNPNComplete netwerk/protocol/http/nsHttpConnection.cpp ``` Crashing here: [mozilla-beta: security/nss/lib/ssl/ssl3con.c@6ec3cb391f03a3d02c47e3cb4525fe9eb6abd242 (annotated)](https://hg.mozilla.org/releases/mozilla-beta/annotate/6ec3cb391f03a3d02c47e3cb4525fe9eb6abd242/security/nss/lib/ssl/ssl3con.c#l4977) This was reported by Andrew Sun in bug 1556005. It's a relatively low rate crash. Filing in PSM, but this is more likely an NSS crash, please move at will.
1,559,858
14,185,889
A successful exploit in the child process may use the messageManager to request itself (or really any URL) being opened in the parent process with the `Prompt:Open` message. This allows for running the exploit again and thus bypassing the sandbox.
1,561,404
14,198,229
The attached crash information was submitted via the ASan Nightly Reporter on mozilla-central-asan-nightly revision 69.0a1-20190618041042-https://hg.mozilla.org/mozilla-central/rev/9b4c8fb46d850db196b0ed6aad0a35b85b178745. For detailed crash information, see attachment.
1,550,531
14,108,238
STR: 1. Open few browser windows 2. Start long browsing session 3. Close one window and enjoy browser hang for few seconds and in some cases even many minutes Regression range: TODO - started few days ago I will try to catch profile with Gecko Profiler extension.
1,551,990
14,120,295
Originally reported here: https://bugzilla.mozilla.org/show_bug.cgi?id=1540736#c19 and on (In reply to Honza Bambas (:mayhemer) from bug 1540736 comment #30) > (In reply to Florian Quèze [:florian] from bug 1540736 comment #28) > > > **I think this bug is specifically related to how Firefox handles (or rather doesn't handle) the Apple Power Nap feature which is in the middle between having a machine asleep or working.** > > Sounds like a very good theory! Reading about the feature (never heard about it before, me not having any osx device) it seems like OSX is leaving some services running, so that the CPU is not in S3/5 at all but still in S1. When the parent process is trapped and other processes still go, then this can happen, yes. Captured profiles: https://perfht.ml/2DYjY94 https://perfht.ml/2EalQvx (probably more interesting to look at first) Sev:crit because this can kill/DoS the machine on waking up. Please fix the component if this should be elsewhere, but this is really OSX specific.
1,557,655
14,166,618
The following testcase crashes on mozilla-central revision 155a7e2117e5 (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --enable-debug --without-intl-api --enable-optimize --target=i686-pc-linux-gnu, run with --fuzzing-safe --cpu-count=2 --ion-offthread-compile=off): const MaxStringLength = 2**30 - 2; var s = "\u0390".repeat(MaxStringLength); var x = BigInt(-1); x > s; Backtrace: received signal SIGSEGV, Segmentation fault. #0 JS::BigInt::calculateMaximumDigitsRequired (cx=0xf6e1f800, radix=10 '\n', charcount=1073741822, result=0xffffbc58) at js/src/vm/BigIntType.cpp:1417 #1 0x568cfec6 in JS::BigInt::parseLiteralDigits<char16_t> (cx=<optimized out>, chars=..., radix=10, isNegative=false, haveParseError=0xffffbd93) at js/src/vm/BigIntType.cpp:1452 #2 0x568d0180 in JS::BigInt::parseLiteral<char16_t> (cx=0xf6e1f800, chars=..., haveParseError=0xffffbd93) at js/src/vm/BigIntType.cpp:1507 #3 0x568bc993 in ParseStringBigIntLiteral<char16_t> (haveParseError=0xffffbd93, range=..., cx=0xf6e1f800) at js/src/vm/BigIntType.cpp:3191 #4 js::StringToBigInt (cx=0xf6e1f800, str=...) at js/src/vm/BigIntType.cpp:3212 #5 0x568bd977 in JS::BigInt::lessThan (cx=<optimized out>, lhs=..., rhs=..., res=...) at js/src/vm/BigIntType.cpp:3082 #6 0x568bdc0f in JS::BigInt::lessThan (cx=<optimized out>, lhs=..., rhs=..., res=...) at js/src/vm/BigIntType.cpp:3114 #7 0x567d3cfe in js::LessThanImpl (cx=0xf6e1f800, lhs=..., rhs=..., res=...) at js/src/vm/Interpreter-inl.h:735 #8 0x567dbedc in js::GreaterThanOperation (res=<optimized out>, rhs=..., lhs=..., cx=<optimized out>) at js/src/vm/Interpreter-inl.h:820 #9 Interpret (cx=0xf6e1f800, state=...) at js/src/vm/Interpreter.cpp:2470 #10 0x567e75f3 in js::RunScript (cx=<optimized out>, state=...) at js/src/vm/Interpreter.cpp:425 [...] #19 main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at js/src/shell/js.cpp:11406 eax 0x57d25934 1473403188 ebx 0x57d24ff4 1473400820 ecx 0xf7d90864 -136771484 edx 0x577cb710 1467791120 esi 0x3ffffffe 1073741822 edi 0x57d24ff4 1473400820 ebp 0xffffbc18 4294949912 esp 0xffffbc10 4294949904 eip 0x568b4164 <JS::BigInt::calculateMaximumDigitsRequired(JSContext*, unsigned char, unsigned int, unsigned int*)+308> => 0x568b4164 <JS::BigInt::calculateMaximumDigitsRequired(JSContext*, unsigned char, unsigned int, unsigned int*)+308>: movl $0x0,0x0 0x568b416e <JS::BigInt::calculateMaximumDigitsRequired(JSContext*, unsigned char, unsigned int, unsigned int*)+318>: ud2 This issue is 32-bit only and looking at the code, a violation of this check can lead to an integer overflow. Marking s-s based on that.
1,558,299
14,172,519
Created attachment 9071074 In this zip there are download.php base64.php test.html payload.html to reproduce the problem. User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.80 Safari/537.36 Steps to reproduce: STEP TO REPROCUDE 1) Upload all the files from zip to your server 2) Edit files - replace attacker.domain with your server domain 3) Add a small image (<2kb, max 50x50) in /sdcard/Download/test.jpeg [I have used this path because it is easy and I have used a little image because so the code of the proof of concept is easy, but it is possible to replicate with every image] 4) With Firefox 67.0 open attacker.domain/test.html 5) Firefox will download the file payload.html and will save it in /sdcard/Download (by default) 6) Open with Firefox the downloaded file payload.html and wait some seconds 7) The base64 string of test.jpeg should be in image.txt Tested on Samsung Galaxy S6 with Android 7.0 and Firefox 67.0 In the PoC.zip you find: - test.html - download.php, that downloads the file payload.html - the malicious file payload.html - base64.php to convert an image into base64 and steal it Sorry for my english. Actual results: It is possible to steal files from sdcard, in particular it is easy to steal the images. In my opinion it is a serious problem because it is really easy to find some paths (e.g. /sdcard/Whatsapp/Media/WhatsApp Images/ and the images have easy name: IMG-AAAAMMDD-WAXXXX.jpg where XXXX is a number like 0000, 0001, and so) Expected results: In Chrome, or Microsoft Edge, or Samsung Browser this doesn't append because there is a different Same Origin Policy. I think that it is important, because it is possible to receive an HTML file in a chat (like WhatsApp), download it and open it with Firefox. So in my opinion this is a bug.
1,558,522
14,174,237
Created attachment 9071311 testcase.html Testcase found while fuzzing mozilla-central rev 0679bf09303e. Testcase takes 30-60 seconds in order to reproduce. ``` ==27763==ERROR: AddressSanitizer: heap-use-after-free on address 0x61100024c500 at pc 0x7f99156e73d0 bp 0x7f98822d9a90 sp 0x7f98822d9a88 READ of size 8 at 0x61100024c500 thread T32 (DOM Worker) #0 0x7f99156e73cf in IsCurrentThread /builds/worker/workspace/build/src/xpcom/base/nsISupportsImpl.cpp:45:10 #1 0x7f99156e73cf in nsAutoOwningThread::AssertCurrentThreadOwnsMe(char const*) const /builds/worker/workspace/build/src/xpcom/base/nsISupportsImpl.cpp:38 #2 0x7f991db18bf8 in AssertOwnership<37> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsISupportsImpl.h:59:5 #3 0x7f991db18bf8 in mozilla::DOMEventTargetHelper::AddRef() /builds/worker/workspace/build/src/dom/events/DOMEventTargetHelper.cpp:83 #4 0x7f991f6a53e4 in AddRef /builds/worker/workspace/build/src/dom/indexedDB/IDBDatabase.cpp:1059:1 #5 0x7f991f6a53e4 in AddRef /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:45 #6 0x7f991f6a53e4 in AddRef /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:362 #7 0x7f991f6a53e4 in RefPtr /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/RefPtr.h:105 #8 0x7f991f6a53e4 in mozilla::dom::(anonymous namespace)::DatabaseFile::ActorDestroy(mozilla::ipc::IProtocol::ActorDestroyReason) /builds/worker/workspace/build/src/dom/indexedDB/IDBDatabase.cpp:111 #9 0x7f9916ce936f in mozilla::ipc::IProtocol::DestroySubtree(mozilla::ipc::IProtocol::ActorDestroyReason) /builds/worker/workspace/build/src/ipc/glue/ProtocolUtils.cpp:659:3 #10 0x7f9916ce9238 in mozilla::ipc::IProtocol::DestroySubtree(mozilla::ipc::IProtocol::ActorDestroyReason) /builds/worker/workspace/build/src/ipc/glue/ProtocolUtils.cpp:647:14 #11 0x7f991749928a in mozilla::dom::indexedDB::PBackgroundIDBDatabaseChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/build/src/obj-firefox/ipc/ipdl/PBackgroundIDBDatabaseChild.cpp:668:20 #12 0x7f991744bf8b in mozilla::ipc::PBackgroundChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/build/src/obj-firefox/ipc/ipdl/PBackgroundChild.cpp:4717:32 #13 0x7f9916ccfaf6 in mozilla::ipc::MessageChannel::DispatchAsyncMessage(mozilla::ipc::ActorLifecycleProxy*, IPC::Message const&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:2158:25 #14 0x7f9916cca9fb in mozilla::ipc::MessageChannel::DispatchMessage(IPC::Message&&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:2082:9 #15 0x7f9916cccfb7 in mozilla::ipc::MessageChannel::RunMessage(mozilla::ipc::MessageChannel::MessageTask&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:1939:3 #16 0x7f9916ccdd47 in mozilla::ipc::MessageChannel::MessageTask::Run() /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:1970:13 #17 0x7f9915905223 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1215:14 #18 0x7f991590cfe4 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #19 0x7f991f91a08b in mozilla::dom::WorkerPrivate::DoRunLoop(JSContext*) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:2791:7 #20 0x7f991f8d5ab4 in mozilla::dom::workerinternals::(anonymous namespace)::WorkerThreadPrimaryRunnable::Run() /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:2316:40 #21 0x7f9915905223 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1215:14 #22 0x7f991590cfe4 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #23 0x7f9916cda671 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:303:20 #24 0x7f9916bb01ae in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #25 0x7f9916bb01ae in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308 #26 0x7f9916bb01ae in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290 #27 0x7f99158fcd23 in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:459:11 #28 0x7f993b9f50bd in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #29 0x7f993b6396da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da) #30 0x7f993a61788e in clone /build/glibc-OTsEL5/glibc-2.27/misc/../sysdeps/unix/sysv/linux/x86_64/clone.S:95 0x61100024c500 is located 64 bytes inside of 248-byte region [0x61100024c4c0,0x61100024c5b8) freed by thread T32 (DOM Worker) here: #0 0x557243ba6a82 in __interceptor_free /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:124:3 #1 0x7f99156c73e1 in SnowWhiteKiller::~SnowWhiteKiller() /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:2416:7 #2 0x7f99156c5a93 in nsCycleCollector::FreeSnowWhite(bool) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:2607:3 #3 0x7f99156d23f5 in nsCycleCollector::BeginCollection(ccType, nsICycleCollectorListener*) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3582:3 #4 0x7f99156d16a5 in nsCycleCollector::Collect(ccType, js::SliceBudget&, nsICycleCollectorListener*, bool) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3411:9 #5 0x7f99156d66bc in nsCycleCollector_collect(nsICycleCollectorListener*) /builds/worker/workspace/build/src/xpcom/base/nsCycleCollector.cpp:3947:21 #6 0x7f9925cb1f17 in callGCCallback /builds/worker/workspace/build/src/js/src/gc/GC.cpp:1924:3 #7 0x7f9925cb1f17 in js::gc::GCRuntime::maybeCallGCCallback(JSGCStatus) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7542 #8 0x7f9925cb2ef5 in ~AutoCallGCCallbacks /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7521:32 #9 0x7f9925cb2ef5 in js::gc::GCRuntime::gcCycle(bool, js::SliceBudget, JS::GCReason) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7631 #10 0x7f9925cb6198 in js::gc::GCRuntime::collect(bool, js::SliceBudget, JS::GCReason) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7796:9 #11 0x7f9925cc00da in gc /builds/worker/workspace/build/src/js/src/gc/GC.cpp:7884:3 #12 0x7f9925cc00da in JS::NonIncrementalGC(JSContext*, JSGCInvocationKind, JS::GCReason) /builds/worker/workspace/build/src/js/src/gc/GC.cpp:8720 #13 0x7f991f92fc6f in mozilla::dom::WorkerPrivate::GarbageCollectInternal(JSContext*, bool, bool) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:4551:7 #14 0x7f99158ec8b5 in nsTimerImpl::Fire(int) /builds/worker/workspace/build/src/xpcom/threads/nsTimerImpl.cpp:561:7 #15 0x7f99158ebe91 in nsTimerEvent::Run() /builds/worker/workspace/build/src/xpcom/threads/TimerThread.cpp:260:11 #16 0x7f991f8f74bc in mozilla::dom::(anonymous namespace)::WrappedControlRunnable::WorkerRun(JSContext*, mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/WorkerEventTarget.cpp:36:13 #17 0x7f991f93a341 in mozilla::dom::WorkerRunnable::Run() /builds/worker/workspace/build/src/dom/workers/WorkerRunnable.cpp:363:12 #18 0x7f991f919626 in ProcessAllControlRunnablesLocked /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:3319:9 #19 0x7f991f919626 in mozilla::dom::WorkerPrivate::DoRunLoop(JSContext*) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:2689 #20 0x7f991f8d5ab4 in mozilla::dom::workerinternals::(anonymous namespace)::WorkerThreadPrimaryRunnable::Run() /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:2316:40 #21 0x7f9915905223 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1215:14 #22 0x7f991590cfe4 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #23 0x7f9916cda671 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:303:20 previously allocated by thread T32 (DOM Worker) here: #0 0x557243ba6e03 in __interceptor_malloc /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:146:3 #1 0x557243bdbb6d in moz_xmalloc /builds/worker/workspace/build/src/memory/mozalloc/mozalloc.cpp:52:15 #2 0x7f991f5f43ca in operator new /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/mozalloc.h:144:10 #3 0x7f991f5f43ca in mozilla::dom::IDBDatabase::Create(mozilla::dom::IDBOpenDBRequest*, mozilla::dom::IDBFactory*, mozilla::dom::indexedDB::BackgroundDatabaseChild*, mozilla::dom::indexedDB::DatabaseSpec*) /builds/worker/workspace/build/src/dom/indexedDB/IDBDatabase.cpp:185 #4 0x7f991f5f50f9 in EnsureDOMObject /builds/worker/workspace/build/src/dom/indexedDB/ActorsChild.cpp:1828:30 #5 0x7f991f5f50f9 in mozilla::dom::indexedDB::BackgroundDatabaseChild::RecvPBackgroundIDBVersionChangeTransactionConstructor(mozilla::dom::indexedDB::PBackgroundIDBVersionChangeTransactionChild*, unsigned long const&, unsigned long const&, long const&, long const&) /builds/worker/workspace/build/src/dom/indexedDB/ActorsChild.cpp:1941 #6 0x7f9917498dfc in mozilla::dom::indexedDB::PBackgroundIDBDatabaseChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/build/src/obj-firefox/ipc/ipdl/PBackgroundIDBDatabaseChild.cpp:832:28 #7 0x7f991744bf8b in mozilla::ipc::PBackgroundChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/build/src/obj-firefox/ipc/ipdl/PBackgroundChild.cpp:4717:32 #8 0x7f9916ccfaf6 in mozilla::ipc::MessageChannel::DispatchAsyncMessage(mozilla::ipc::ActorLifecycleProxy*, IPC::Message const&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:2158:25 #9 0x7f9916cca9fb in mozilla::ipc::MessageChannel::DispatchMessage(IPC::Message&&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:2082:9 #10 0x7f9916cccfb7 in mozilla::ipc::MessageChannel::RunMessage(mozilla::ipc::MessageChannel::MessageTask&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:1939:3 #11 0x7f9916ccdd47 in mozilla::ipc::MessageChannel::MessageTask::Run() /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:1970:13 #12 0x7f9915905223 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1215:14 #13 0x7f991590cfe4 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #14 0x7f991f91a08b in mozilla::dom::WorkerPrivate::DoRunLoop(JSContext*) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:2791:7 #15 0x7f991f8d5ab4 in mozilla::dom::workerinternals::(anonymous namespace)::WorkerThreadPrimaryRunnable::Run() /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:2316:40 #16 0x7f9915905223 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1215:14 #17 0x7f991590cfe4 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #18 0x7f9916cda671 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:303:20 #19 0x7f9916bb01ae in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #20 0x7f9916bb01ae in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308 #21 0x7f9916bb01ae in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290 #22 0x7f99158fcd23 in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:459:11 #23 0x7f993b9f50bd in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:201:5 Thread T32 (DOM Worker) created by T0 (file:// Content) here: #0 0x557243b8f3dd in __interceptor_pthread_create /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cc:210:3 #1 0x7f993b9e71b8 in _PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:433:14 #2 0x7f993b9d0d9e in PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:518:12 #3 0x7f99158ffe49 in nsThread::Init(nsTSubstring<char> const&) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:672:8 #4 0x7f991f94d04e in mozilla::dom::WorkerThread::Create(mozilla::dom::WorkerThreadFriendKey const&) /builds/worker/workspace/build/src/dom/workers/WorkerThread.cpp:93:7 #5 0x7f991f8a0ffc in mozilla::dom::workerinternals::RuntimeService::ScheduleWorker(mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:1435:14 #6 0x7f991f89ef47 in mozilla::dom::workerinternals::RuntimeService::RegisterWorker(mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:1300:19 #7 0x7f991f913060 in mozilla::dom::WorkerPrivate::Constructor(JSContext*, nsTSubstring<char16_t> const&, bool, mozilla::dom::WorkerType, nsTSubstring<char16_t> const&, nsTSubstring<char> const&, mozilla::dom::WorkerLoadInfo*, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:2283:24 #8 0x7f991f8b2bb1 in mozilla::dom::Worker::Constructor(mozilla::dom::GlobalObject const&, nsTSubstring<char16_t> const&, mozilla::dom::WorkerOptions const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/workers/Worker.cpp:30:41 #9 0x7f991c4f8cb6 in mozilla::dom::Worker_Binding::_constructor(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/WorkerBinding.cpp:1139:52 #10 0x7f9924c00b67 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:448:13 #11 0x7f9924c00b67 in CallJSNativeConstructor /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:464 #12 0x7f9924c00b67 in InternalConstruct(JSContext*, js::AnyConstructArgs const&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:657 #13 0x7f9924bdd4d8 in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3078:16 #14 0x7f9924bc70e8 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:425:10 #15 0x7f9924bfd97f in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:568:13 #16 0x7f9924bffba2 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:611:8 #17 0x7f9925879f58 in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jsapi.cpp:2667:10 #18 0x7f991c913e39 in mozilla::dom::EventListener::HandleEvent(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/EventListenerBinding.cpp:52:8 #19 0x7f991dbb70a2 in HandleEvent<mozilla::dom::EventTarget *> /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/dom/EventListenerBinding.h:66:12 #20 0x7f991dbb70a2 in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1022 #21 0x7f991dbb8cf7 in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event**, mozilla::dom::EventTarget*, nsEventStatus*, bool) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1220:17 #22 0x7f991db99a61 in HandleEvent /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/EventListenerManager.h:353:5 #23 0x7f991db99a61 in mozilla::EventTargetChainItem::HandleEvent(mozilla::EventChainPostVisitor&, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:349 #24 0x7f991db97c96 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:551:16 #25 0x7f991db9ea04 in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:1047:11 #26 0x7f991dba674b in mozilla::EventDispatcher::DispatchDOMEvent(nsISupports*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsPresContext*, nsEventStatus*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp #27 0x7f991a1bad64 in nsINode::DispatchEvent(mozilla::dom::Event&, mozilla::dom::CallerType, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/base/nsINode.cpp:1029:17 #28 0x7f9919a06c76 in nsContentUtils::DispatchEvent(mozilla::dom::Document*, nsISupports*, nsTSubstring<char16_t> const&, mozilla::CanBubble, mozilla::Cancelable, mozilla::Composed, mozilla::Trusted, bool*, mozilla::ChromeOnlyDispatch) /builds/worker/workspace/build/src/dom/base/nsContentUtils.cpp:3945:28 #29 0x7f9919a069ee in nsContentUtils::DispatchTrustedEvent(mozilla::dom::Document*, nsISupports*, nsTSubstring<char16_t> const&, mozilla::CanBubble, mozilla::Cancelable, mozilla::Composed, bool*) /builds/worker/workspace/build/src/dom/base/nsContentUtils.cpp:3915:10 #30 0x7f9919dd9ec2 in mozilla::dom::Document::DispatchContentLoadedEvents() /builds/worker/workspace/build/src/dom/base/Document.cpp:6871:3 #31 0x7f9919eef0ab in applyImpl<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:1124:12 #32 0x7f9919eef0ab in apply<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:1130 #33 0x7f9919eef0ab in mozilla::detail::RunnableMethodImpl<mozilla::dom::Document*, void (mozilla::dom::Document::*)(), true, (mozilla::RunnableKind)0>::Run() /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:1176 #34 0x7f99158c4565 in mozilla::SchedulerGroup::Runnable::Run() /builds/worker/workspace/build/src/xpcom/threads/SchedulerGroup.cpp:295:32 #35 0x7f9915905223 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1215:14 #36 0x7f991590cfe4 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10 #37 0x7f9916cd8f0f in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:88:21 #38 0x7f9916bb01ae in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #39 0x7f9916bb01ae in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308 #40 0x7f9916bb01ae in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290 #41 0x7f99202de313 in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:137:27 #42 0x7f992492401e in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:919:20 #43 0x7f9916bb01ae in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10 #44 0x7f9916bb01ae in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308 #45 0x7f9916bb01ae in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290 #46 0x7f9924922b61 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:754:34 #47 0x557243bd9eb3 in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28 #48 0x557243bd9eb3 in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:267 #49 0x7f993a517b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-use-after-free /builds/worker/workspace/build/src/xpcom/base/nsISupportsImpl.cpp:45:10 in IsCurrentThread Shadow bytes around the buggy address: 0x0c2280041850: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2280041860: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa 0x0c2280041870: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2280041880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fa fa 0x0c2280041890: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd =>0x0c22800418a0:[fd]fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c22800418b0: fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa fa 0x0c22800418c0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c22800418d0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c22800418e0: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c22800418f0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==27763==ABORTING ```
1,558,546
14,174,553
This bug is for crash report bp-5547e6e3-9fd4-4174-9385-1b8f30190611. Seen while looking at 67.0.1 crash stats for mobile: https://bit.ly/2Kb5vvg. Crashes occurred back to at least 63, but in 67.0.1 it is currently the #2 overall top crash. Comments are not useful and the correlations don't show anything. APIs range from 22-28 and some phones from Oppo and Vivo are the top crashing devices currently. ``` Top 10 frames of crashing thread: 0 libxul.so nsRangeFrame::GetValueAtEventPoint xpcom/base/nsCOMPtr.h:823 1 libxul.so mozilla::dom::HTMLInputElement::StartRangeThumbDrag dom/html/HTMLInputElement.cpp:3462 2 libxul.so mozilla::dom::HTMLInputElement::PostHandleEventForRangeThumb xpcom/ds/nsTArray.h 3 libxul.so mozilla::dom::HTMLInputElement::PostHandleEvent dom/html/HTMLInputElement.cpp:4196 4 libxul.so mozilla::EventTargetChainItem::HandleEventTargetChain dom/events/EventDispatcher.cpp:556 5 libxul.so mozilla::EventTargetChainItem::HandleEventTargetChain dom/events/EventDispatcher.cpp:633 6 libxul.so mozilla::EventDispatcher::Dispatch dom/events/EventDispatcher.cpp:1048 7 libxul.so mozilla::PresShell::EventHandler::DispatchEvent layout/base/PresShell.cpp:8261 8 libxul.so mozilla::PresShell::EventHandler::HandleEventWithCurrentEventInfo layout/base/PresShell.cpp:7700 9 libxul.so mozilla::PresShell::EventHandler::HandleEventUsingCoordinates layout/base/PresShell.cpp:6716 ```
1,493,590
13,635,843
This bug was filed from the Socorro interface and is report bp-72015bb5-7880-421f-8283-218910180924. ============================================================= Top 10 frames of crashing thread: 0 xul.dll mozilla::layers::GPUVideoImage::GetAsSourceSurface gfx/layers/GPUVideoImage.h:66 1 xul.dll mozilla::layers::BasicImageLayer::Paint gfx/layers/basic/BasicImageLayer.cpp:81 2 xul.dll mozilla::layers::BasicLayerManager::PaintSelfOrChildren gfx/layers/basic/BasicLayerManager.cpp:709 3 xul.dll mozilla::layers::BasicLayerManager::PaintLayer gfx/layers/basic/BasicLayerManager.cpp:877 4 xul.dll mozilla::layers::BasicLayerManager::EndTransactionInternal gfx/layers/basic/BasicLayerManager.cpp:616 5 xul.dll static void mozilla::PaintInactiveLayer layout/painting/FrameLayerBuilder.cpp:4036 6 xul.dll mozilla::FrameLayerBuilder::PaintItems layout/painting/FrameLayerBuilder.cpp:6419 7 xul.dll mozilla::FrameLayerBuilder::DrawPaintedLayer layout/painting/FrameLayerBuilder.cpp:6590 8 xul.dll mozilla::layers::ClientPaintedLayer::PaintOffMainThread gfx/layers/client/ClientPaintedLayer.cpp:266 9 xul.dll mozilla::layers::ClientPaintedLayer::RenderLayerWithReadback gfx/layers/client/ClientPaintedLayer.cpp:304 ============================================================= This seems to be happening with GPUs from all the major vendors but the vast majority of the crashes are with AMD hardware so it might be easier to reproduce it there.
1,493,611
13,635,990
This bug was filed from the Socorro interface and is report bp-8d0918ff-0cb3-45c4-8bd2-0481f0180924. ============================================================= Top 10 frames of crashing thread: 0 libxul.so aom_lpf_vertical_4_neon third_party/aom/aom_dsp/arm/loopfilter_neon.c:797 1 libxul.so av1_filter_block_plane_vert third_party/aom/av1/common/av1_loopfilter.c 2 libxul.so loop_filter_row_worker third_party/aom/av1/common/thread_common.c:278 3 libxul.so execute third_party/aom/aom_util/aom_thread.c:135 4 libxul.so av1_loop_filter_frame_mt third_party/aom/av1/common/thread_common.c:355 5 libxul.so av1_decode_tg_tiles_and_wrapup third_party/aom/av1/decoder/decodeframe.c:5487 6 libxul.so aom_decode_frame_from_obus third_party/aom/av1/decoder/obu.c:342 7 libxul.so av1_receive_compressed_data third_party/aom/av1/decoder/decoder.c:499 8 libxul.so frame_worker_hook third_party/aom/av1/av1_dx_iface.c:357 9 libxul.so execute third_party/aom/aom_util/aom_thread.c:135 ============================================================= New crash, seem to have started with buildid 20180921100234. Here's a couple of crashing URLs: https://www.youtube.com/watch?v=mIAfxj7nd9k&list=PLyqf6gJt7KuHBmeVzZteZUlNUQAVLwrZS&index=11&pbjreload=10 https://demo.bitmovin.com/public/firefox/av1/
1,493,629
13,636,095
The attached crash information was submitted via the ASan Nightly Reporter on mozilla-central-asan-nightly revision 64.0a1-20180920220102-https://hg.mozilla.org/mozilla-central/rev/5347c7e4811a1a4d80bcee4119cead9192fdff69. For detailed crash information, see attachment.
1,493,689
13,636,587
Found while fuzzing mozilla-central rev 095ec59a8800. I'm currently reducing the testcase and will update once complete. ==11993==ERROR: AddressSanitizer: heap-use-after-free on address 0x6110000b7c5c at pc 0x7fb0f0916ab2 bp 0x7fb0979fd120 sp 0x7fb0979fd118 READ of size 8 at 0x6110000b7c5c thread T8 (Socket Thread) #0 0x7fb0f0916ab1 in nr_ice_media_stream_component_failed /builds/worker/workspace/build/src/media/mtransport/third_party/nICEr/src/ice/ice_media_stream.c:772:48 #1 0x7fb0f09380ce in nr_ice_peer_ctx_trickle_wait_cb /builds/worker/workspace/build/src/media/mtransport/third_party/nICEr/src/ice/ice_peer_ctx.c:354:9 #2 0x7fb0e4ca0a35 in Notify /builds/worker/workspace/build/src/media/mtransport/nr_timer.cpp:132:3 #3 0x7fb0e4ca0a35 in non-virtual thunk to mozilla::nrappkitTimerCallback::Notify(nsITimer*) /builds/worker/workspace/build/src/media/mtransport/nr_timer.cpp #4 0x7fb0e252f733 in nsTimerImpl::Fire(int) /builds/worker/workspace/build/src/xpcom/threads/nsTimerImpl.cpp:704:40 #5 0x7fb0e24eae6d in nsTimerEvent::Run() /builds/worker/workspace/build/src/xpcom/threads/TimerThread.cpp:297:11 #6 0x7fb0e2502897 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1166:14 #7 0x7fb0e250b415 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:519:10 #8 0x7fb0e283160f in mozilla::net::nsSocketTransportService::Run() /builds/worker/workspace/build/src/netwerk/base/nsSocketTransportService2.cpp:1071:21 #9 0x7fb0e28345a4 in non-virtual thunk to mozilla::net::nsSocketTransportService::Run() /builds/worker/workspace/build/src/netwerk/base/nsSocketTransportService2.cpp #10 0x7fb0e2502897 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1166:14 #11 0x7fb0e250b415 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:519:10 #12 0x7fb0e371e3a1 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:334:20 #13 0x7fb0e361f73c in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:325:10 #14 0x7fb0e361f73c in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:318 #15 0x7fb0e361f73c in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:298 #16 0x7fb0e24fa55f in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:465:11 #17 0x7fb10593e008 in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #18 0x7fb1055846da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da) #19 0x7fb10455d88e in clone /build/glibc-OTsEL5/glibc-2.27/misc/../sysdeps/unix/sysv/linux/x86_64/clone.S:95 0x6110000b7c5c is located 28 bytes inside of 200-byte region [0x6110000b7c40,0x6110000b7d08) freed by thread T8 (Socket Thread) here: #0 0x562d397a5372 in __interceptor_free /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:68:3 #1 0x7fb0f091dd94 in nr_ice_media_stream_destroy /builds/worker/workspace/build/src/media/mtransport/third_party/nICEr/src/ice/ice_media_stream.c:130:5 #2 0x7fb0f091d267 in nr_ice_peer_ctx_remove_pstream /builds/worker/workspace/build/src/media/mtransport/third_party/nICEr/src/ice/ice_peer_ctx.c:259:10 #3 0x7fb0f091d267 in nr_ice_remove_media_stream /builds/worker/workspace/build/src/media/mtransport/third_party/nICEr/src/ice/ice_ctx.c:829 #4 0x7fb0e4cd1e35 in mozilla::NrIceMediaStream::CloseStream(nr_ice_media_stream_**) /builds/worker/workspace/build/src/media/mtransport/nricemediastream.cpp:690:13 #5 0x7fb0e4ce5afc in mozilla::NrIceMediaStream::Failed() /builds/worker/workspace/build/src/media/mtransport/nricemediastream.cpp:673:5 #6 0x7fb0e4cb00d4 in mozilla::NrIceCtx::stream_failed(void*, nr_ice_media_stream_*) /builds/worker/workspace/build/src/media/mtransport/nricectx.cpp:383:8 #7 0x7fb0f0916a9b in nr_ice_media_stream_component_failed /builds/worker/workspace/build/src/media/mtransport/third_party/nICEr/src/ice/ice_media_stream.c:768:7 #8 0x7fb0f09380ce in nr_ice_peer_ctx_trickle_wait_cb /builds/worker/workspace/build/src/media/mtransport/third_party/nICEr/src/ice/ice_peer_ctx.c:354:9 #9 0x7fb0e4ca0a35 in Notify /builds/worker/workspace/build/src/media/mtransport/nr_timer.cpp:132:3 #10 0x7fb0e4ca0a35 in non-virtual thunk to mozilla::nrappkitTimerCallback::Notify(nsITimer*) /builds/worker/workspace/build/src/media/mtransport/nr_timer.cpp #11 0x7fb0e252f733 in nsTimerImpl::Fire(int) /builds/worker/workspace/build/src/xpcom/threads/nsTimerImpl.cpp:704:40 #12 0x7fb0e24eae6d in nsTimerEvent::Run() /builds/worker/workspace/build/src/xpcom/threads/TimerThread.cpp:297:11 #13 0x7fb0e2502897 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1166:14 #14 0x7fb0e250b415 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:519:10 #15 0x7fb0e283160f in mozilla::net::nsSocketTransportService::Run() /builds/worker/workspace/build/src/netwerk/base/nsSocketTransportService2.cpp:1071:21 #16 0x7fb0e28345a4 in non-virtual thunk to mozilla::net::nsSocketTransportService::Run() /builds/worker/workspace/build/src/netwerk/base/nsSocketTransportService2.cpp #17 0x7fb0e2502897 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1166:14 #18 0x7fb0e250b415 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:519:10 #19 0x7fb0e371e3a1 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:334:20 #20 0x7fb0e361f73c in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:325:10 #21 0x7fb0e361f73c in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:318 #22 0x7fb0e361f73c in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:298 #23 0x7fb0e24fa55f in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:465:11 #24 0x7fb10593e008 in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #25 0x7fb1055846da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da) previously allocated by thread T8 (Socket Thread) here: #0 0x562d397a56b3 in malloc /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:88:3 #1 0x7fb0f09708b6 in r_malloc /builds/worker/workspace/build/src/media/mtransport/third_party/nrappkit/src/util/libekr/r_memory.c:73:16 #2 0x7fb0f09708b6 in r_calloc /builds/worker/workspace/build/src/media/mtransport/third_party/nrappkit/src/util/libekr/r_memory.c:98 #3 0x7fb0f091c845 in nr_ice_media_stream_create /builds/worker/workspace/build/src/media/mtransport/third_party/nICEr/src/ice/ice_media_stream.c:54:17 #4 0x7fb0f0929d04 in nr_ice_peer_ctx_parse_stream_attributes /builds/worker/workspace/build/src/media/mtransport/third_party/nICEr/src/ice/ice_peer_ctx.c:102:10 #5 0x7fb0e4cd0cd3 in mozilla::NrIceMediaStream::ConnectToPeer(std::string const&, std::string const&, std::vector<std::string, std::allocator<std::string> > const&) /builds/worker/workspace/build/src/media/mtransport/nricemediastream.cpp:241:13 #6 0x7fb0e4aa8697 in mozilla::PeerConnectionMedia::ActivateTransport_s(std::string const&, std::string const&, std::string const&, unsigned long, std::string const&, std::string const&, std::vector<std::string, std::allocator<std::string> > const&) /builds/worker/workspace/build/src/media/webrtc/signaling/src/peerconnection/PeerConnectionMedia.cpp:454:25 #7 0x7fb0e4afa97e in apply<RefPtr<mozilla::PeerConnectionMedia>, void (mozilla::PeerConnectionMedia::*)(const std::basic_string<char> &, const std::basic_string<char> &, const std::basic_string<char> &, unsigned long, const std::basic_string<char> &, const std::basic_string<char> &, const std::vector<std::basic_string<char>, std::allocator<std::basic_string<char> > > &), std::basic_string<char>, std::basic_string<char>, std::basic_string<char>, unsigned long, std::basic_string<char>, std::basic_string<char>, std::vector<std::basic_string<char>, std::allocator<std::basic_string<char> > > , 0, 1, 2, 3, 4, 5, 6> /builds/worker/workspace/build/src/obj-firefox/dist/include/mtransport/runnable_utils.h:86:5 #8 0x7fb0e4afa97e in mozilla::runnable_args_memfn<RefPtr<mozilla::PeerConnectionMedia>, void (mozilla::PeerConnectionMedia::*)(std::string const&, std::string const&, std::string const&, unsigned long, std::string const&, std::string const&, std::vector<std::string, std::allocator<std::string> > const&), std::string, std::string, std::string, unsigned long, std::string, std::string, std::vector<std::string, std::allocator<std::string> > >::Run() /builds/worker/workspace/build/src/obj-firefox/dist/include/mtransport/runnable_utils.h:156 #9 0x7fb0e2502897 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1166:14 #10 0x7fb0e250b415 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:519:10 #11 0x7fb0e283160f in mozilla::net::nsSocketTransportService::Run() /builds/worker/workspace/build/src/netwerk/base/nsSocketTransportService2.cpp:1071:21 #12 0x7fb0e28345a4 in non-virtual thunk to mozilla::net::nsSocketTransportService::Run() /builds/worker/workspace/build/src/netwerk/base/nsSocketTransportService2.cpp #13 0x7fb0e2502897 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1166:14 #14 0x7fb0e250b415 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:519:10 #15 0x7fb0e371e3a1 in mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:334:20 #16 0x7fb0e361f73c in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:325:10 #17 0x7fb0e361f73c in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:318 #18 0x7fb0e361f73c in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:298 #19 0x7fb0e24fa55f in nsThread::ThreadFunc(void*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:465:11 #20 0x7fb10593e008 in _pt_root /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:201:5 #21 0x7fb1055846da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da) Thread T8 (Socket Thread) created by T0 (file:// Content) here: #0 0x562d3978e73d in __interceptor_pthread_create /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cc:204:3 #1 0x7fb10593ad45 in _PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:433:14 #2 0x7fb10593a92e in PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:518:12 #3 0x7fb0e24fdad8 in nsThread::Init(nsTSubstring<char> const&) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:660:8 #4 0x7fb0e2509bee in nsThreadManager::NewNamedThread(nsTSubstring<char> const&, unsigned int, nsIThread**) /builds/worker/workspace/build/src/xpcom/threads/nsThreadManager.cpp:518:22 #5 0x7fb0e250ee0e in NS_NewNamedThread(nsTSubstring<char> const&, nsIThread**, nsIRunnable*, unsigned int) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:143:45 #6 0x7fb0e282e7b1 in NS_NewNamedThread<14> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:75:10 #7 0x7fb0e282e7b1 in mozilla::net::nsSocketTransportService::Init() /builds/worker/workspace/build/src/netwerk/base/nsSocketTransportService2.cpp:640 #8 0x7fb0e35e06b4 in nsSocketTransportServiceConstructor(nsISupports*, nsID const&, void**) /builds/worker/workspace/build/src/netwerk/build/nsNetModule.cpp:75:1 #9 0x7fb0e2498bce in nsComponentManagerImpl::CreateInstanceByContractID(char const*, nsISupports*, nsID const&, void**) /builds/worker/workspace/build/src/xpcom/components/nsComponentManager.cpp:1161:19 #10 0x7fb0e248fbf3 in nsComponentManagerImpl::GetServiceByContractID(char const*, nsID const&, void**) /builds/worker/workspace/build/src/xpcom/components/nsComponentManager.cpp:1521:10 #11 0x7fb0e249efc5 in CallGetService /builds/worker/workspace/build/src/xpcom/components/nsComponentManagerUtils.cpp:67:43 #12 0x7fb0e249efc5 in nsGetServiceByContractIDWithError::operator()(nsID const&, void**) const /builds/worker/workspace/build/src/xpcom/components/nsComponentManagerUtils.cpp:292 #13 0x7fb0e22e4ce3 in nsCOMPtr_base::assign_from_gs_contractid_with_error(nsGetServiceByContractIDWithError const&, nsID const&) /builds/worker/workspace/build/src/xpcom/base/nsCOMPtr.cpp:106:7 #14 0x7fb0e2752158 in operator= /builds/worker/workspace/build/src/obj-firefox/dist/include/nsCOMPtr.h:704:5 #15 0x7fb0e2752158 in InitializeSocketTransportService /builds/worker/workspace/build/src/netwerk/base/nsIOService.cpp:299 #16 0x7fb0e2752158 in mozilla::net::nsIOService::SetOffline(bool) /builds/worker/workspace/build/src/netwerk/base/nsIOService.cpp:1074 #17 0x7fb0e27505a7 in mozilla::net::nsIOService::Init() /builds/worker/workspace/build/src/netwerk/base/nsIOService.cpp:263:5 #18 0x7fb0e2754963 in mozilla::net::nsIOService::GetInstance() /builds/worker/workspace/build/src/netwerk/base/nsIOService.cpp:360:13 #19 0x7fb0e35e0396 in nsIOServiceConstructor(nsISupports*, nsID const&, void**) /builds/worker/workspace/build/src/netwerk/build/nsNetModule.cpp:57:1 #20 0x7fb0e2498bce in nsComponentManagerImpl::CreateInstanceByContractID(char const*, nsISupports*, nsID const&, void**) /builds/worker/workspace/build/src/xpcom/components/nsComponentManager.cpp:1161:19 #21 0x7fb0e248fbf3 in nsComponentManagerImpl::GetServiceByContractID(char const*, nsID const&, void**) /builds/worker/workspace/build/src/xpcom/components/nsComponentManager.cpp:1521:10 #22 0x7fb0e4e9f12a in CallGetService<nsIIOService> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsServiceManagerUtils.h:90:10 #23 0x7fb0e4e9f12a in nsScriptSecurityManager::Init() /builds/worker/workspace/build/src/caps/nsScriptSecurityManager.cpp:1389 #24 0x7fb0e4ea020c in nsScriptSecurityManager::InitStatics() /builds/worker/workspace/build/src/caps/nsScriptSecurityManager.cpp:1458:30 #25 0x7fb0e47e7acf in nsXPConnect::InitStatics() /builds/worker/workspace/build/src/js/xpconnect/src/nsXPConnect.cpp:140:5 #26 0x7fb0e476aa70 in xpcModuleCtor() /builds/worker/workspace/build/src/js/xpconnect/src/XPCModule.cpp:13:5 #27 0x7fb0ed7db838 in Initialize() /builds/worker/workspace/build/src/layout/build/nsLayoutModule.cpp:235:8 #28 0x7fb0e24965d7 in nsComponentManagerImpl::KnownModule::Load() /builds/worker/workspace/build/src/xpcom/components/nsComponentManager.cpp:838:21 #29 0x7fb0e2497e64 in nsFactoryEntry::GetFactory() /builds/worker/workspace/build/src/xpcom/components/nsComponentManager.cpp:1859:19 #30 0x7fb0e2498b86 in nsComponentManagerImpl::CreateInstanceByContractID(char const*, nsISupports*, nsID const&, void**) /builds/worker/workspace/build/src/xpcom/components/nsComponentManager.cpp:1158:41 #31 0x7fb0e249e9fb in CallCreateInstance /builds/worker/workspace/build/src/xpcom/components/nsComponentManagerUtils.cpp:149:38 #32 0x7fb0e249e9fb in nsCreateInstanceByContractID::operator()(nsID const&, void**) const /builds/worker/workspace/build/src/xpcom/components/nsComponentManagerUtils.cpp:197 #33 0x7fb0e22e5160 in nsCOMPtr_base::assign_from_helper(nsCOMPtr_helper const&, nsID const&) /builds/worker/workspace/build/src/xpcom/base/nsCOMPtr.cpp:128:7 #34 0x7fb0e247f151 in nsCOMPtr /builds/worker/workspace/build/src/obj-firefox/dist/include/nsCOMPtr.h:605:5 #35 0x7fb0e247f151 in LogMessageWithContext(mozilla::FileLocation&, unsigned int, char const*, ...) /builds/worker/workspace/build/src/xpcom/components/ManifestParser.cpp:151 #36 0x7fb0e2485b12 in nsComponentManagerImpl::ManifestContract(nsComponentManagerImpl::ManifestProcessingContext&, int, char* const*) /builds/worker/workspace/build/src/xpcom/components/nsComponentManager.cpp:769:5 #37 0x7fb0e24829f7 in ParseManifest(NSLocationType, mozilla::FileLocation&, char*, bool) /builds/worker/workspace/build/src/xpcom/components/ManifestParser.cpp:695:7 #38 0x7fb0e2494096 in DoRegisterManifest /builds/worker/workspace/build/src/xpcom/components/nsComponentManager.cpp:662:5 #39 0x7fb0e2494096 in nsComponentManagerImpl::RegisterManifest(NSLocationType, mozilla::FileLocation&, bool) /builds/worker/workspace/build/src/xpcom/components/nsComponentManager.cpp:675 #40 0x7fb0e24944ad in nsComponentManagerImpl::ManifestManifest(nsComponentManagerImpl::ManifestProcessingContext&, int, char* const*) /builds/worker/workspace/build/src/xpcom/components/nsComponentManager.cpp:684:3 #41 0x7fb0e24829f7 in ParseManifest(NSLocationType, mozilla::FileLocation&, char*, bool) /builds/worker/workspace/build/src/xpcom/components/ManifestParser.cpp:695:7 #42 0x7fb0e2494096 in DoRegisterManifest /builds/worker/workspace/build/src/xpcom/components/nsComponentManager.cpp:662:5 #43 0x7fb0e2494096 in nsComponentManagerImpl::RegisterManifest(NSLocationType, mozilla::FileLocation&, bool) /builds/worker/workspace/build/src/xpcom/components/nsComponentManager.cpp:675 #44 0x7fb0e2492d52 in nsComponentManagerImpl::RereadChromeManifests(bool) /builds/worker/workspace/build/src/xpcom/components/nsComponentManager.cpp:796:5 #45 0x7fb0e24910ff in nsComponentManagerImpl::Init() /builds/worker/workspace/build/src/xpcom/components/nsComponentManager.cpp:414:5 #46 0x7fb0e257434d in NS_InitXPCOM2 /builds/worker/workspace/build/src/xpcom/build/XPCOMInit.cpp:684:51 #47 0x7fb0f07cf48c in XRE_InitEmbedding2(nsIFile*, nsIFile*, nsIDirectoryServiceProvider*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:195:8 #48 0x7fb0e372bf2e in mozilla::ipc::ScopedXREEmbed::Start() /builds/worker/workspace/build/src/ipc/glue/ScopedXREEmbed.cpp #49 0x7fb0eb9889d7 in mozilla::dom::ContentProcess::Init(int, char**) /builds/worker/workspace/build/src/dom/ipc/ContentProcess.cpp:296:13 #50 0x7fb0f07d03f0 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:739:21 #51 0x562d397d5b91 in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:50:30 #52 0x562d397d5b91 in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:287 #53 0x7fb10445db96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-use-after-free /builds/worker/workspace/build/src/media/mtransport/third_party/nICEr/src/ice/ice_media_stream.c:772:48 in nr_ice_media_stream_component_failed Shadow bytes around the buggy address: 0x0c228000ef30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c228000ef40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c228000ef50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c228000ef60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c228000ef70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c228000ef80: fa fa fa fa fa fa fa fa fd fd fd[fd]fd fd fd fd 0x0c228000ef90: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c228000efa0: fd fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c228000efb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c228000efc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c228000efd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==11993==ABORTING
1,494,752
13,645,797
The following testcase crashes on mozilla-central revision 2e3e89c9c68c (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --enable-debug --enable-optimize, run with --fuzzing-safe --cpu-count=2 --ion-offthread-compile=off): var lfLogBuffer = ` function evalWithCache(code, ctx) { ctx = Object.create(ctx, {}); code = code instanceof Object ? code : cacheEntry(code); var incremental = ctx.incremental || false; ctx.global = newGlobal({ cloneSingletons: !incremental }); ctx_save = Object.create(ctx, {saveBytecode: { value: true } }); var res1 = evaluate(code, ctx_save); var res3 = evaluate(code, Object.create(ctx, {loadBytecode: { value: true } })); } var test = "new class extends class { } { constructor() { super(); } }()"; evalWithCache(test, { assertEqBytecode : true }); `; loadFile(lfLogBuffer); function loadFile(lfVarx, lfForceModule = false) { try { oomTest(new Function(lfVarx)); } catch (lfVare) {} } Backtrace: received signal SIGSEGV, Segmentation fault. js::CheckTracedThing<JSString> (trc=trc@entry=0x7fffffffafa8, thing=0xfffe4ccccccccccc) at js/src/gc/Marking.cpp:210 #0 js::CheckTracedThing<JSString> (trc=trc@entry=0x7fffffffafa8, thing=0xfffe4ccccccccccc) at js/src/gc/Marking.cpp:210 #1 0x0000555555893958 in DoCallback<JSString*> (trc=0x7fffffffafa0, thingp=0x7fffffffaf30, name=0x555556501d80 "scope name") at js/src/gc/Tracer.cpp:49 #2 0x00005555561b78aa in js::TraceManuallyBarrieredEdge<JSAtom*> (name=0x555556501d80 "scope name", thingp=0x7fffffffaf30, trc=0x7fffffffafa8) at js/src/gc/Tracer.h:187 #3 TraceNullableBindingNames (length=<optimized out>, names=0x7ffff4ab3e30, trc=0x7fffffffafa8) at js/src/gc/Marking.cpp:1235 #4 js::FunctionScope::Data::trace (this=this@entry=0x7ffff4ab3e00, trc=trc@entry=0x7fffffffafa8) at js/src/gc/Marking.cpp:1260 #5 0x0000555555f02d62 in js::GCManagedDeletePolicy<js::FunctionScope::Data>::operator() (this=<optimized out>, constPtr=0x7ffff4ab3e00) at js/src/gc/DeletePolicy.h:80 #6 DeleteScopeData<js::FunctionScope::Data> (data=0x7ffff4ab3e00) at js/src/vm/Scope.cpp:266 #7 mozilla::Result<mozilla::Ok, JS::TranscodeResult> js::Scope::XDRSizedBindingNames<js::FunctionScope, (js::XDRMode)1>(js::XDRState<(js::XDRMode)1>*, JS::Handle<js::FunctionScope*>, JS::MutableHandle<js::FunctionScope::Data*>)::{lambda()#1}::operator()() const (__closure=0x7fffffffaf90) at js/src/vm/Scope.cpp:296 #8 mozilla::ScopeExit<mozilla::Result<mozilla::Ok, JS::TranscodeResult> js::Scope::XDRSizedBindingNames<js::FunctionScope, (js::XDRMode)1>(js::XDRState<(js::XDRMode)1>*, JS::Handle<js::FunctionScope*>, JS::MutableHandle<js::FunctionScope::Data*>)::{lambda()#1}>::~ScopeExit() (this=0x7fffffffaf90, __in_chrg=<optimized out>) at /srv/jenkins/jobs/mozilla-central-build-jsshell/workspace/arch/64/compiler/gcc/instrumentation/none/type/debug/dist/include/mozilla/ScopeExit.h:113 #9 js::Scope::XDRSizedBindingNames<js::FunctionScope, (js::XDRMode)1> (xdr=xdr@entry=0x7fffffffb860, scope=..., data=...) at js/src/vm/Scope.cpp:299 #10 0x0000555555f0b7db in js::FunctionScope::XDR<(js::XDRMode)1> (xdr=xdr@entry=0x7fffffffb860, fun=..., fun@entry=..., enclosing=..., enclosing@entry=..., scope=...) at js/src/vm/Scope.cpp:782 #11 0x0000555555e6fa20 in js::XDRScript<(js::XDRMode)1> (xdr=xdr@entry=0x7fffffffb860, scriptEnclosingScope=scriptEnclosingScope@entry=..., sourceObjectArg=..., fun=..., fun@entry=..., scriptp=...) at js/src/vm/JSScript.cpp:780 #12 0x0000555555e70b37 in js::XDRInterpretedFunction<(js::XDRMode)1> (xdr=xdr@entry=0x7fffffffb860, enclosingScope=..., enclosingScope@entry=..., sourceObject=..., sourceObject@entry=..., objp=..., objp@entry=...) at js/src/vm/JSFunction.cpp:705 #13 0x0000555555e6fc74 in js::XDRScript<(js::XDRMode)1> (xdr=xdr@entry=0x7fffffffb860, scriptEnclosingScope=..., scriptEnclosingScope@entry=..., sourceObjectArg=..., fun=fun@entry=..., scriptp=...) at js/src/vm/JSScript.cpp:900 #14 0x0000555555ffcaf4 in js::XDRState<(js::XDRMode)1>::codeScript (this=this@entry=0x7fffffffb860, scriptp=...) at js/src/vm/Xdr.cpp:200 #15 0x0000555555c69a0f in JS::DecodeScript (cx=<optimized out>, buffer=..., scriptp=..., cursorIndex=<optimized out>) at js/src/jsapi.cpp:6950 #16 0x0000555555680848 in Evaluate (cx=<optimized out>, argc=<optimized out>, vp=<optimized out>) at js/src/shell/js.cpp:2103 #17 0x00002db8d48a453b in ?? () [...] #20 0x0000000000000000 in ?? () rax 0x0 0 rbx 0xfffe4ccccccccccc -478507460408116 rcx 0x0 0 rdx 0x555556501d80 93825008672128 rsi 0xfffe4ccccccccccc -478507460408116 rdi 0x7fffffffafa8 140737488334760 rbp 0x7fffffffaed0 140737488334544 rsp 0x7fffffffaeb0 140737488334512 r8 0x7fffffffab70 140737488333680 r9 0x6cb 1739 r10 0x7fffffffac50 140737488333904 r11 0x7ffff6cb9f90 140737333927824 r12 0x7fffffffafa8 140737488334760 r13 0x555556501d80 93825008672128 r14 0x7fffffffaf30 140737488334640 r15 0x7ffff5f16000 140737319624704 rip 0x5555561e0e39 <js::CheckTracedThing<JSString>(JSTracer*, JSString*)+41> => 0x5555561e0e39 <js::CheckTracedThing<JSString>(JSTracer*, JSString*)+41>: testb $0x1,(%rsi) 0x5555561e0e3c <js::CheckTracedThing<JSString>(JSTracer*, JSString*)+44>: jne 0x5555561e0fd8 <js::CheckTracedThing<JSString>(JSTracer*, JSString*)+456> Marking s-s because the register we read contains a garbage address.
1,495,245
13,649,467
This bug was filed from the Socorro interface and is report bp-0418108d-c89d-4720-9a35-6d4cb0180925. ============================================================= Top 10 frames of crashing thread: 0 xul.dll PLDHashTable::Iterator::Iterator xpcom/ds/PLDHashTable.cpp:733 1 xul.dll mozilla::plugins::PluginUtilsWin::AudioDeviceMessageRunnable::Run dom/plugins/ipc/PluginUtilsWin.cpp:45 2 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1051 3 xul.dll nsThread::Shutdown xpcom/threads/nsThread.cpp:799 4 xul.dll mozilla::detail::RunnableMethodImpl<RefPtr<nsUrlClassifierDBServiceWorker>, void xpcom/threads/nsThreadUtils.h:1216 5 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1051 6 xul.dll nsThread::Shutdown xpcom/threads/nsThread.cpp:799 7 xul.dll mozilla::detail::RunnableMethodImpl<RefPtr<nsUrlClassifierDBServiceWorker>, void xpcom/threads/nsThreadUtils.h:1216 8 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1051 9 xul.dll XPTC__InvokebyIndex xpcom/reflect/xptcall/md/win32/xptcinvoke_asm_x86_64.asm:97 ============================================================= this crash signature is newly showing up in firefox 62 - perhaps related to the changes in bug 1449388. in the absolute majority of cases it's a win64 build that's crashing with accessibility enabled.
1,496,340
13,661,586
This bug was filed from the Socorro interface and is report bp-06009b73-e113-49d3-ad99-eaaa40181004. ============================================================= Top 10 frames of crashing thread: 0 xul.dll void nsSSLIOLayerHelpers::adjustForTLSIntolerance security/manager/ssl/nsNSSIOLayer.cpp:913 1 xul.dll nsNSSCertificate::Release security/manager/ssl/nsNSSCertificate.cpp:82 2 xul.dll nsNSSCertList::ForEachCertificateInChain security/manager/ssl/nsNSSCertificate.cpp:1164 3 xul.dll static nsresult EvalChain security/manager/ssl/PublicKeyPinningService.cpp:114 4 xul.dll static nsresult CheckPinsForHostname security/manager/ssl/PublicKeyPinningService.cpp:276 5 xul.dll mozilla::psm::PublicKeyPinningService::ChainHasValidPins security/manager/ssl/PublicKeyPinningService.cpp:359 6 xul.dll mozilla::psm::NSSCertDBTrustDomain::IsChainValid security/certverifier/NSSCertDBTrustDomain.cpp:819 7 xul.dll static mozilla::pkix::Result mozilla::pkix::BuildForward security/nss/lib/mozpkix/lib/pkixbuild.cpp:338 8 xul.dll mozilla::pkix::PathBuildingStep::Check security/nss/lib/mozpkix/lib/pkixbuild.cpp:211 9 xul.dll static mozilla::pkix::Result mozilla::psm::FindIssuerInner security/certverifier/NSSCertDBTrustDomain.cpp:138 ============================================================= There are 14 crashes (from 1 installation) in nightly 64 with buildid 20181003100127. In analyzing the backtrace, the regression may have been introduced by patch [1] to fix bug 1488622. [1] https://hg.mozilla.org/mozilla-central/rev?node=7f966968076c
1,497,215
13,668,216
[Affected versions]: Nightly 64.0a1 (2018-10-08) [Affected platforms]: Platforms: Windows 10 x 64, Mac OS 10.13, Ubuntu 16.04. [Preconditions]: 1. Set the pref dom.payments.request.enabled to "true"; 2. Make sure you have at least one Shipping Address and one Credit Card saved in your browser. [Steps to reproduce]: 1. Go to "https://rsolomakhin.github.io/pr/us/" and click on "Buy" 2. Add or Edit a shipping address 3. Fill in any field with the " ; " punctuation mark 4. Click on the "Pay" button on the Order Summary screen [Expected result]: The payment widget should be closed and the response displayed correctly. [Actual result]: The browser crashes. [Note]: Tried out all the other basic punctuation marks and symbols on the keyboard, so far only " ; " seems to crash the browser. The crash can NOT be reproduced on Windows 7 x64.
1,498,510
13,679,824
This bug was filed from the Socorro interface and is report bp-2ef1eaf2-e2a1-4230-b37c-10a7a0181011. ============================================================= Top 10 frames of crashing thread: 0 mozglue.dll arena_t::DallocSmall memory/build/mozjemalloc.cpp:3450 1 mozglue.dll BaseAllocator::free memory/build/mozjemalloc.cpp:4264 2 mozglue.dll je_free memory/build/malloc_decls.h:40 3 xul.dll mozilla::dom::WorkerCSPEventListener::Release dom/workers/WorkerCSPEventListener.cpp:51 4 xul.dll mozilla::net::InterceptedHttpChannel::SetReleaseHandle netwerk/protocol/http/InterceptedHttpChannel.cpp:1036 5 xul.dll bool mozilla::dom::WorkerPrivate::EnsureCSPEventListener dom/workers/WorkerPrivate.cpp:3456 6 xul.dll ?WorkerRun@CompileScriptRunnable@?A0x30C6BC27@dom@mozilla@@EEAA_NPEAUJSContext@@PEAVWorkerPrivate@23@@Z$c9819905468e1c5f2eb55f63ab0ae971 dom/workers/WorkerPrivate.cpp:361 7 xul.dll mozilla::dom::WorkerRunnable::Run dom/workers/WorkerRunnable.cpp:380 8 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1161 9 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:519 ============================================================= There are 7 crashes (from 7 installations) in 63.0b13 with buildid 20181008155858. In analyzing the backtrace, the regression may have been introduced by patch [1] to fix bug 1493629. [1] https://hg.mozilla.org/releases/mozilla-beta/rev?node=be85aa71510b
1,499,004
13,686,482
This bug was filed from the Socorro interface and is report bp-8822c35a-a568-460d-bd48-50f240181015. ============================================================= Top 10 frames of crashing thread: 0 mozglue.dll mozalloc_abort memory/mozalloc/mozalloc_abort.cpp:35 1 xul.dll static void Abort xpcom/base/nsDebugImpl.cpp:471 2 xul.dll NS_DebugBreak xpcom/base/nsDebugImpl.cpp:453 3 xul.dll nsDebugImpl::Abort xpcom/base/nsDebugImpl.cpp:146 4 xul.dll XPTC__InvokebyIndex xpcom/reflect/xptcall/md/win32/xptcinvoke_asm_x86_64.asm:97 5 @0x1c302210abf 6 xul.dll XPCWrappedNative::CallMethod js/xpconnect/src/XPCWrappedNative.cpp:1233 7 xul.dll static bool XPC_WN_CallMethod js/xpconnect/src/XPCWrappedNativeJSOps.cpp:1019 8 xul.dll js::InternalCallOrConstruct js/src/vm/Interpreter.cpp:553 9 xul.dll static bool InternalCall js/src/vm/Interpreter.cpp:607 =============================================================
1,485,253
13,562,360
When closing tab, my nightly is crashed by the following stack. This bug was filed from the Socorro interface and is report bp-9ee63d03-0e8d-464c-b310-daefb0180822. ============================================================= Top 10 frames of crashing thread: 0 xul.dll struct mozilla::widget::WindowHook::MessageData* mozilla::widget::WindowHook::LookupOrCreate widget/windows/WindowHook.cpp:77 1 xul.dll mozilla::widget::WindowHook::AddMonitor widget/windows/WindowHook.cpp:45 2 xul.dll mozilla::widget::TaskbarPreview::Enable widget/windows/TaskbarPreview.cpp:173 3 xul.dll mozilla::widget::TaskbarTabPreview::Enable widget/windows/TaskbarTabPreview.cpp:237 4 xul.dll XPTC__InvokebyIndex xpcom/reflect/xptcall/md/win32/xptcinvoke_asm_x86_64.asm:97 5 xul.dll exp2 6 xul.dll exp2 7 xul.dll exp2 8 xul.dll XPCWrappedNative::CallMethod js/xpconnect/src/XPCWrappedNative.cpp:1201 9 xul.dll static bool XPC_WN_GetterSetter js/xpconnect/src/XPCWrappedNativeJSOps.cpp:923 ============================================================= 0:000> k 5 Child-SP RetAddr Call Site 000000d6`1a1f61f0 00007ff8`a8944050 xul!mozilla::widget::WindowHook::LookupOrCreate+0x8 [z:\build\build\src\widget\windows\WindowHook.cpp @ 77] 000000d6`1a1f6230 00007ff8`a894410b xul!mozilla::widget::WindowHook::AddMonitor+0x20 [z:\build\build\src\widget\windows\WindowHook.cpp @ 46] 000000d6`1a1f6280 00007ff8`ab793c7c xul!mozilla::widget::TaskbarPreview::Enable+0x4b [z:\build\build\src\widget\windows\TaskbarPreview.cpp @ 175] 000000d6`1a1f62c0 00007ff8`ac754782 xul!mozilla::widget::TaskbarTabPreview::Enable+0xfc [z:\build\build\src\widget\windows\TaskbarTabPreview.cpp @ 237] 000000d6`1a1f63a0 00007ff8`a83b6c9d xul!XPTC__InvokebyIndex+0x72 [z:\build\build\src\xpcom\reflect\xptcall\md\win32\xptcinvoke_asm_x86_64.asm @ 99] 0:000> x @rcx this = 0x00000000`000002c8 @edi nMsg = 0xc0d5 <unavailable> data = <value unavailable> mozilla::widget::TaskbarPreview::Enable doesn't check whether window is still alive. So we should add check it.
1,485,441
13,564,130
This bug was filed from the Socorro interface and is report bp-bcd8bc7d-54d3-4c6a-bc93-b6dd90180822. ============================================================= Seen while looking at b19 data: https://bit.ly/2w6bDfT. Present in 61 as well. No crashes seen in 63 nightly. 48 crashes/19 installs so far on b19. URLs are varied, and there are no useful comments. APIs range from 28 all the way down to 18. Top 10 frames of crashing thread: 0 libxul.so mozilla::layers::ShaderProgramOGL::GetProgram gfx/layers/opengl/OGLShaderProgram.cpp:953 1 libxul.so mozilla::layers::CompositorOGL::ActivateProgram gfx/layers/opengl/CompositorOGL.cpp:1052 2 libxul.so void mozilla::layers::CompositorOGL::DrawGeometry<mozilla::gfx::RectTyped<mozilla::gfx::UnknownUnits, float> > gfx/layers/opengl/CompositorOGL.cpp:1293 3 libGLESv2_adreno.so libGLESv2_adreno.so@0xc3e27 4 dalvik-main space (region space) (deleted) dalvik-main space @0x31c6fffe 5 dalvik-main space (region space) (deleted) dalvik-main space @0x32419ffe 6 libGLESv2_adreno.so libGLESv2_adreno.so@0xc352f 7 libxul.so mozilla::gl::GLContext::fUniform4fv gfx/gl/GLContext.h:1754 8 libxul.so mozilla::gl::GLContext::fBindBuffer gfx/gl/GLContext.h:838 9 libxul.so mozilla::gl::GLContext::fBindBuffer gfx/gl/GLContext.h:838 =============================================================
1,486,314
13,571,130
Test case is being reduced and will be added once complete. ==17501==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000705a00 at pc 0x7f13727d9a88 bp 0x7fff324e36a0 sp 0x7fff324e3698 READ of size 8 at 0x602000705a00 thread T0 (file:// Content) #0 0x7f13727d9a87 in Equals src/dom/base/nsAttrName.h:110:50 #1 0x7f13727d9a87 in AttrArray::GetAttr(nsAtom*, int) const src/dom/base/AttrArray.cpp:42 #2 0x7f1378aad8da in IsMozEditorBogusNode src/obj-firefox/dist/include/mozilla/dom/Element.h:2026:35 #3 0x7f1378aad8da in mozilla::TextEditRules::CreateBogusNodeIfNeeded() src/editor/libeditor/TextEditRules.cpp:1539 #4 0x7f1378aacf04 in mozilla::TextEditRules::Init(mozilla::TextEditor*) src/editor/libeditor/TextEditRules.cpp:155:17 #5 0x7f1378ac2748 in mozilla::TextEditor::EndEditorInit() src/editor/libeditor/TextEditor.cpp:214:17 #6 0x7f1378ac50c4 in ~AutoEditInitRulesTrigger src/editor/libeditor/TextEditUtils.cpp:93:28 #7 0x7f1378ac50c4 in mozilla::TextEditor::Init(nsIDocument&, mozilla::dom::Element*, nsISelectionController*, unsigned int, nsTSubstring<char16_t> const&) src/editor/libeditor/TextEditor.cpp:148 #8 0x7f1376824f41 in nsTextEditorState::PrepareEditor(nsTSubstring<char16_t> const*) src/dom/html/nsTextEditorState.cpp:1424:25 #9 0x7f1379518579 in nsTextControlFrame::EnsureEditorInitialized() src/layout/forms/nsTextControlFrame.cpp:315:28 #10 0x7f137661f8c3 in mozilla::dom::HTMLInputElement::GetEventTargetParent(mozilla::EventChainPreVisitor&) src/dom/html/HTMLInputElement.cpp:3387:25 #11 0x7f13762d1092 in mozilla::EventTargetChainItem::GetEventTargetParent(mozilla::EventChainPreVisitor&) src/dom/events/EventDispatcher.cpp:495:12 #12 0x7f13762d7347 in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) src/dom/events/EventDispatcher.cpp:1001:15 #13 0x7f13762dc6c6 in mozilla::EventDispatcher::DispatchDOMEvent(nsISupports*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsPresContext*, nsEventStatus*) src/dom/events/EventDispatcher.cpp #14 0x7f137260208d in nsContentUtils::DispatchEvent(nsIDocument*, nsISupports*, mozilla::WidgetEvent&, mozilla::EventMessage, mozilla::CanBubble, mozilla::Cancelable, mozilla::Trusted, bool*, mozilla::ChromeOnlyDispatch) src/dom/base/nsContentUtils.cpp:4471:17 #15 0x7f1376252ed1 in nsresult nsContentUtils::DispatchTrustedEvent<mozilla::WidgetEvent>(nsIDocument*, nsISupports*, mozilla::EventMessage, mozilla::CanBubble, mozilla::Cancelable, bool*, mozilla::ChromeOnlyDispatch) src/dom/base/nsContentUtils.h:1381:12 #16 0x7f1376252718 in mozilla::AsyncEventDispatcher::Run() src/dom/events/AsyncEventDispatcher.cpp:54:12 #17 0x7f136ea73902 in mozilla::SchedulerGroup::Runnable::Run() src/xpcom/threads/SchedulerGroup.cpp:337:32 #18 0x7f136eab0850 in nsThread::ProcessNextEvent(bool, bool*) src/xpcom/threads/nsThread.cpp:1167:14 #19 0x7f136eab9565 in NS_ProcessNextEvent(nsIThread*, bool) src/xpcom/threads/nsThreadUtils.cpp:519:10 #20 0x7f136fc9887e in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) src/ipc/glue/MessagePump.cpp:97:21 #21 0x7f136fb9a4cc in RunInternal src/ipc/chromium/src/base/message_loop.cc:325:10 #22 0x7f136fb9a4cc in RunHandler src/ipc/chromium/src/base/message_loop.cc:318 #23 0x7f136fb9a4cc in MessageLoop::Run() src/ipc/chromium/src/base/message_loop.cc:298 #24 0x7f13786ba316 in nsBaseAppShell::Run() src/widget/nsBaseAppShell.cpp:158:27 #25 0x7f137ca44b7e in XRE_RunAppShell() src/toolkit/xre/nsEmbedFunctions.cpp:944:22 #26 0x7f136fb9a4cc in RunInternal src/ipc/chromium/src/base/message_loop.cc:325:10 #27 0x7f136fb9a4cc in RunHandler src/ipc/chromium/src/base/message_loop.cc:318 #28 0x7f136fb9a4cc in MessageLoop::Run() src/ipc/chromium/src/base/message_loop.cc:298 #29 0x7f137ca43c35 in XRE_InitChildProcess(int, char**, XREChildData const*) src/toolkit/xre/nsEmbedFunctions.cpp:770:34 #30 0x4f5b01 in content_process_main src/browser/app/../../ipc/contentproc/plugin-container.cpp:50:30 #31 0x4f5b01 in main src/browser/app/nsBrowserApp.cpp:287 #32 0x7f139221d82f in __libc_start_main /build/glibc-Cl5G7W/glibc-2.23/csu/../csu/libc-start.c:291 #33 0x424edc in _start (firefox+0x424edc) 0x602000705a00 is located 10 bytes to the right of 6-byte region [0x6020007059f0,0x6020007059f6) allocated by thread T0 (file:// Content) here: #0 0x4c5623 in malloc /builds/worker/workspace/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:88:3 #1 0x7f1372cfb5df in nsTextFragment::SetTo(char16_t const*, int, bool, bool) src/dom/base/nsTextFragment.cpp:315:37 #2 0x7f13727eb3a8 in mozilla::dom::CharacterData::SetTextInternal(unsigned int, unsigned int, char16_t const*, unsigned int, bool, CharacterDataChangeInfo::Details*) src/dom/base/CharacterData.cpp:302:13 #3 0x7f13727ef1f6 in mozilla::dom::CharacterData::SetText(char16_t const*, unsigned int, bool) src/dom/base/CharacterData.cpp:615:10 #4 0x7f137951be12 in SetText src/obj-firefox/dist/include/mozilla/dom/CharacterData.h:156:12 #5 0x7f137951be12 in nsTextControlFrame::UpdateValueDisplay(bool, bool, nsTSubstring<char16_t> const*) src/layout/forms/nsTextControlFrame.cpp:1312 #6 0x7f1376824027 in nsTextEditorState::PrepareEditor(nsTSubstring<char16_t> const*) src/dom/html/nsTextEditorState.cpp:1376:23 #7 0x7f1379518579 in nsTextControlFrame::EnsureEditorInitialized() src/layout/forms/nsTextControlFrame.cpp:315:28 #8 0x7f137661f8c3 in mozilla::dom::HTMLInputElement::GetEventTargetParent(mozilla::EventChainPreVisitor&) src/dom/html/HTMLInputElement.cpp:3387:25 #9 0x7f13762d1092 in mozilla::EventTargetChainItem::GetEventTargetParent(mozilla::EventChainPreVisitor&) src/dom/events/EventDispatcher.cpp:495:12 #10 0x7f13762d7347 in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) src/dom/events/EventDispatcher.cpp:1001:15 #11 0x7f13762dc6c6 in mozilla::EventDispatcher::DispatchDOMEvent(nsISupports*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsPresContext*, nsEventStatus*) src/dom/events/EventDispatcher.cpp #12 0x7f137260208d in nsContentUtils::DispatchEvent(nsIDocument*, nsISupports*, mozilla::WidgetEvent&, mozilla::EventMessage, mozilla::CanBubble, mozilla::Cancelable, mozilla::Trusted, bool*, mozilla::ChromeOnlyDispatch) src/dom/base/nsContentUtils.cpp:4471:17 #13 0x7f1376252ed1 in nsresult nsContentUtils::DispatchTrustedEvent<mozilla::WidgetEvent>(nsIDocument*, nsISupports*, mozilla::EventMessage, mozilla::CanBubble, mozilla::Cancelable, bool*, mozilla::ChromeOnlyDispatch) src/dom/base/nsContentUtils.h:1381:12 #14 0x7f1376252718 in mozilla::AsyncEventDispatcher::Run() src/dom/events/AsyncEventDispatcher.cpp:54:12 #15 0x7f136ea73902 in mozilla::SchedulerGroup::Runnable::Run() src/xpcom/threads/SchedulerGroup.cpp:337:32 #16 0x7f136eab0850 in nsThread::ProcessNextEvent(bool, bool*) src/xpcom/threads/nsThread.cpp:1167:14 #17 0x7f136eab9565 in NS_ProcessNextEvent(nsIThread*, bool) src/xpcom/threads/nsThreadUtils.cpp:519:10 #18 0x7f136fc9887e in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) src/ipc/glue/MessagePump.cpp:97:21 #19 0x7f136fb9a4cc in RunInternal src/ipc/chromium/src/base/message_loop.cc:325:10 #20 0x7f136fb9a4cc in RunHandler src/ipc/chromium/src/base/message_loop.cc:318 #21 0x7f136fb9a4cc in MessageLoop::Run() src/ipc/chromium/src/base/message_loop.cc:298 #22 0x7f13786ba316 in nsBaseAppShell::Run() src/widget/nsBaseAppShell.cpp:158:27
1,490,585
13,608,861
This bug was filed from the Socorro interface and is report bp-b21e8499-5fa4-4bed-9d81-2c19f0180912. ============================================================= Top 10 frames of crashing thread: 0 xul.dll nsSSLStatus::~nsSSLStatus security/manager/ssl/nsSSLStatus.h:34 1 xul.dll nsSSLStatus::Release security/manager/ssl/nsSSLStatus.cpp:387 2 xul.dll mozilla::psm::TransportSecurityInfo::~TransportSecurityInfo security/manager/ssl/TransportSecurityInfo.h:35 3 xul.dll mozilla::psm::TransportSecurityInfo::`scalar deleting destructor' 4 xul.dll mozilla::psm::TransportSecurityInfo::Release security/manager/ssl/TransportSecurityInfo.cpp:50 5 xul.dll nsBinaryInputStream::ReadObject xpcom/io/nsBinaryStream.cpp:989 6 xul.dll NS_DeserializeObject netwerk/base/nsSerializationHelper.cpp:48 7 xul.dll mozilla::net::CacheEntry::GetSecurityInfo netwerk/cache2/CacheEntry.cpp:1365 8 xul.dll mozilla::net::CacheEntryHandle::GetSecurityInfo netwerk/cache2/CacheEntry.h:451 9 xul.dll mozilla::net::nsHttpChannel::OpenCacheInputStream netwerk/protocol/http/nsHttpChannel.cpp:4698 ============================================================= this startup crash signature is taking off in volume over the past hours: https://crash-stats.mozilla.com/signature/?product=Firefox&signature=nsSSLStatus%3A%3A~nsSSLStatus&date=%3E%3D2018-08-29#graphs we have users linking that to installing the latest windows updates from yesterday's windows updates which would fit timing-wise, as the signature started increasing then across multiple release channels: https://support.mozilla.org/en-US/questions/1233386
1,493,497
13,633,922
This bug was filed from the Socorro interface and is report bp-e594a59a-df9f-461f-9690-a6c4f0180922. ============================================================= This crash happened in two different installations in the Windows nightly 20180920100522. Top 10 frames of crashing thread: 0 libglesv2.dll gl::Framebuffer::Framebuffer gfx/angle/checkout/src/libANGLE/Framebuffer.cpp:668 1 libglesv2.dll gl::Context::makeCurrent gfx/angle/checkout/src/libANGLE/Context.cpp:657 2 libglesv2.dll egl::Display::makeCurrent gfx/angle/checkout/src/libANGLE/Display.cpp:815 3 libglesv2.dll egl::Display::destroyContext gfx/angle/checkout/src/libANGLE/Display.cpp:909 4 libglesv2.dll egl::DestroyContext gfx/angle/checkout/src/libGLESv2/entry_points_egl.cpp:388 5 xul.dll void mozilla::gl::GLContextEGL::~GLContextEGL gfx/gl/GLContextProviderEGL.cpp:328 6 xul.dll void mozilla::gl::GLContextEGL::~GLContextEGL gfx/gl/GLContextProviderEGL.cpp:316 7 xul.dll mozilla::layers::CopyableCanvasRenderer::~CopyableCanvasRenderer gfx/layers/CopyableCanvasRenderer.cpp:53 8 xul.dll void mozilla::layers::WebRenderCanvasRendererAsync::~WebRenderCanvasRendererAsync gfx/layers/wr/WebRenderCanvasRenderer.cpp:32 9 xul.dll void mozilla::layers::WebRenderCanvasData::~WebRenderCanvasData gfx/layers/wr/WebRenderUserData.cpp:316 =============================================================
1,502,410
13,715,083
[Description:] Once a client gets enrolled into a preference experiment, Normandy creates a preference: app.normandy.startupExperimentPrefs.experiment_preference_name and stores the experiment temporary value in it in order for it to be available in early start-up. This is mainly due to the fact that the preference experiment are still remote actions and not local actions. In a normal behavior, the app.normandy.startupExperimentPrefs.experiment_preference_name should be removed once the experiment expires. [Affected versions]: Release 63.0 Beta 64.0b3 2018-10-22 Nightly 65 2018-10-26 [Affected platforms]: - most likely all, tested on Windows 10/ Windows 8.1 [Pre-conditions:] user_pref("security.content.signature.root_hash", "DB:74:CE:58:E4:F9:D0:9E:E0:42:36:BE:6C:C5:C4:F6:6A:E7:74:7D:C0:21:42:7A:03:BC:2F:57:0C:8B:9B:90"); user_pref("app.normandy.api_url", "https://normandy.stage.mozaws.net/api/v1"); user_pref("app.normandy.dev_mode", true); user_pref("app.normandy.logging.level", 0); [Steps to reproduce]: 1. Create/Publish a pref-experiment that sets an existent int preference. 2. Run a firefox client with the pre-conditions. 3. From delivery console disable the pref-experiment 4. Restart the client. 5. Restart the client. [Actual Result:] 2. Pref-experiment is applied to the client. 4. Upon restart, pref-experiment expires and the value for the preference is set to the initial default value. app.normandy.startupExperimentPrefs.experiment_preference_name is not removed. 5. Upon the 2nd restart, the value for the preference that has been involved into the preference experiment is now re-set to the experiment value, due to the fact that app.normandy.startupExperimentPrefs.experiment_preference_name was not removed. [Expected Result:] The expected result is that upon experiment expiration, the experimental value is reset to initial value and the app.normandy.startupExperimentPrefs.experiment_preference_name is removed. [Regression Range:] Since for Normandy regression ranges, mozregression is not usable, a manual regression range was attempted and we managed to reduce the regression range to this: last good build: 63.0a1 (2018-07-14) first bad build: 63.0a1 (2018-07-15) https://hg.mozilla.org/mozilla-central/pushloghtml?startdate=105+days+ago&enddate=103+days+ago The most likely candidate from the above pushlog to introduce this regression in my oppinion might be bug 1471025. [User Impact:] This bug causes users that have been involved into a preference experiment to have the experimental value set again after the first restart after the experiment has expired.
1,502,748
13,717,175
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 Steps to reproduce: Install Chrome ver 63, 64-bit. (Latest version currently). Problem on Win and Mac. (Linux not tested) Open link https://www.gamearter.com/game/insurgents-2-mp or https://www.gamearter.com/game/fighter-aircraft-pilot. Launch the game and remain inside. After short time, the game get stuck. If not, it stuck during a part with heavy particle (like fire or explosion - hit a ground with an airplane to achieve it). Actual results: Game get stuck and then Firefox says "A web page is slowing down your browser. What would you like to do?". Browser is completely stucked in this time, there is need to close it. Expected results: Should normally work, as in FF ver 62 or 64 (currently in beta) or any other browser.
1,502,841
13,719,000
This bug was filed from the Socorro interface and is report bp-34874eca-430c-456d-bfa1-328720181028. ============================================================= Top 10 frames of crashing thread: 0 ntdll.dll KiFastSystemCallRet 1 ntdll.dll ZwWaitForKeyedEvent 2 ntdll.dll RtlpWaitCouldDeadlock 3 mozglue.dll mozilla::detail::MutexImpl::lock mozglue/misc/Mutex_windows.cpp:27 4 xul.dll static nsresult `anonymous namespace'::DataStorageSharedThread::Initialize security/manager/ssl/DataStorage.cpp:86 5 xul.dll mozilla::DataStorage::Init security/manager/ssl/DataStorage.cpp:379 6 xul.dll mozilla::DataStorage::GetAllChildProcessData security/manager/ssl/DataStorage.cpp:286 7 xul.dll void mozilla::dom::ContentParent::InitInternal dom/ipc/ContentParent.cpp:2487 8 xul.dll bool mozilla::dom::ContentParent::LaunchSubprocess dom/ipc/ContentParent.cpp:2274 9 xul.dll mozilla::dom::ContentParent::GetNewOrUsedBrowserProcess dom/ipc/ContentParent.cpp:888 ============================================================= shutdownhangs with this signature or similar start to show up with firefox 63 on windows in low-to-mid volume, likely related to the changes from bug 1470918.