Bug ID
int64 961
1.91M
| Comment ID
int64 3.98k
17.1M
| Author
stringlengths 8
48
| Comment Text
stringlengths 1
64.3k
⌀ |
---|---|---|---|
15,391 | 113,064 |
STEPS TO REPRODUCE
1. Download and install latest nightly build.
2. Run viewer.
3. Go to:
http://www.bath.ac.uk/%7Epy8ieh/internet/projects/mozilla/mathml/concept.xml
ACTUAL RESULTS
The math doesn't look like an equation to me!
EXPECTED RESULTS
There should be an equation below the paragraph.
NOTES
The MathML is included inline using namespaces. Here is the markup for the
equation bit:
<math xmlns="http://www.w3.org/Math/MathML">
<mrow>
<mi> F </mi>
<mo> = </mo>
<mi> m </mi>
<mfrac>
<mrow> <mi>d</mi> <mi>v</mi> </mrow>
<mrow> <mi>d</mi> <mi>t</mi> </mrow>
</mfrac>
</mrow>
</math>
Should that work?
|
|
62,787 | 534,261 |
XML bindings files are having their loads cancelled in Necko when the profile
manager dialog is dismissed. Thus XBL bindings don't load, and the build goes to
hell.
This seems worse when using files, not jars, in chrome, so it somewhat timing
dependent.
|
|
53,150 | 437,549 |
From Bugzilla Helper:
User-Agent: Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)
BuildID: 2000091312
Adding a tab using tabbox.appendChild() causes stack overflow in rdf.dll
Reproducible: Always
Steps to Reproduce:
1. Load the attached xul file as chrome (I use a debug version of
Mozilla, and have it in packages/komodo/komodo/content/editor/tab.xul).
2. Press the button
3. Pick up the pieces.
Actual Results: I get the OK/Cancel fatal error dialog box.
Expected Results: Added a second tab to the right of the first. It did
this last week before we moved to the post capabilityID version
of Moz.
|
|
419,917 | 3,502,343 |
Created attachment 306080
testcase 1
Steps to reproduce:
1. Print testcase.
ACTUAL RESULTS:
The text is duplicated inside the table, with the lines reversed. See upcoming print-to-file results.
This doesn't happen in print-preview, so I'm guessing it's a rendering/graphics-related issue.
Bug reproduces on Linux on both FF3b3 and on latest trunk.
Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9b4pre) Gecko/2008022704 Minefield/3.0b4pre
|
|
457,886 | 3,799,500 |
This is blocker bug for JP testers.
ISO-2022-JP encoder may be broken on trunk. If a line ends non-ASCII character, the state should be changed to ASCII. However, the current trunk doesn't append the state change to the end of the line. Therefore, Japanese testers cannot use trunk Tb. We should fix this bug before Tb3b1 release.
Simon, can you take this?
|
|
388,608 | 3,252,093 |
Steps to reproduce:
1. Launch either Firefox or Thunderbird from 17th July or later
2. Launch Accerciser and use it to examine the hierarchy of accessibles
Expected results: The hierarchy would be exposed.
Actual results: The application's frame has a single child of role "redundant object" which claims 0 children.
This problem does not occur with the 16th July and earlier builds.
|
|
519,719 | 4,324,912 |
bz sez it's related to firebug.
Report ID
Date Submitted
bp-2957a8ba-365f-4784-b985-83ebc2090930 9/30/09 8:27 AM
5A392FEE-A972-48FC-A4AD-14C6B1C87115 9/29/09 10:26 PM
bp-e670e956-c927-42ee-8903-935dc2090929 9/29/09 10:08 PM
bp-9669dd85-099b-44dc-8cac-2c08a2090929 9/29/09 7:55 PM
bp-37083bdd-14fe-4954-be4d-dbb692090929 9/29/09 6:41 PM
bp-ac636e77-bba5-442b-a4cd-b3a4f2090929 9/29/09 6:02 PM
bp-4ccbb440-d72b-4675-a392-f944c2090929 9/29/09 5:33 PM
bp-fb0f45b9-4703-4bf2-9602-8cd332090929 9/29/09 4:33 PM
bp-7d9ffafc-7cd7-4a3d-b3f1-07bc12090929 9/29/09 4:27 PM
bp-baa81903-4312-43ca-81fd-593fe2090929 9/29/09 2:33 PM
bp-1fb87891-b68e-42ee-b9ae-25ab62090929 9/29/09 2:27 PM
bp-fa64b2b5-7ce2-47f8-9ee5-519862090929 9/29/09 12:54 PM
bp-6f1dd6d9-619f-4849-9b8a-b2a2d2090929 9/29/09 11:46 AM
bp-cff4cab8-27fe-4776-bd99-f14472090929 9/29/09 10:14 AM
|
|
1,692,889 | 15,266,469 |
See here for an example: https://treeherder.mozilla.org/jobs?repo=mozilla-beta&selectedJob=329676408&revision=05381d3748a5462c8ed23019d1570c7ca25ffe54&searchStr=talos
On mozilla-central/autoland we only run on the shippable platform.
|
|
1,636,614 | 14,805,762 |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Firefox/78.0
Steps to reproduce:
* Join a Google Meet meeting
* Start talking after you are successfully logged in
Actual results:
It takes about 10 seconds until the other meeting participants start hearing my audio
Expected results:
Audio should be heard immediately
|
|
1,638,793 | 14,828,111 |
This bug is for crash report bp-5b8e6832-17ed-4403-8e3e-939f80200516.
```
Top 10 frames of crashing thread:
0 xul.dll mozilla::dom::BrowsingContext::Attach docshell/base/BrowsingContext.cpp:507
1 xul.dll mozilla::dom::BrowsingContext::EnsureAttached docshell/base/BrowsingContext.cpp:324
2 xul.dll mozilla::dom::ContentChild::ProvideWindowCommon dom/ipc/ContentChild.cpp:953
3 xul.dll mozilla::dom::BrowserChild::ProvideWindow dom/ipc/BrowserChild.cpp:887
4 xul.dll nsWindowWatcher::OpenWindowInternal toolkit/components/windowwatcher/nsWindowWatcher.cpp:837
5 xul.dll nsWindowWatcher::OpenWindow2 toolkit/components/windowwatcher/nsWindowWatcher.cpp:375
6 xul.dll nsGlobalWindowOuter::OpenInternal dom/base/nsGlobalWindowOuter.cpp:7123
7 xul.dll nsGlobalWindowOuter::OpenOuter dom/base/nsGlobalWindowOuter.cpp:5642
8 xul.dll nsGlobalWindowInner::Open dom/base/nsGlobalWindowInner.cpp:3749
9 xul.dll mozilla::dom::Window_Binding::open dom/bindings/WindowBinding.cpp:2701
```
There's two different crashes under this signature. The first seems to have started in buildid 20200514211114 and is happening in this assertion: [`MOZ_DIAGNOSTIC_ASSERT(opener->mPrivateBrowsingId == mPrivateBrowsingId)`](https://searchfox.org/mozilla-central/rev/09b8072a543c145de2dc9bb76eddddd4a6c09adc/docshell/base/BrowsingContext.cpp#1326).
The other one started in buildid 20200514211114 and is triggered by this other assertion: [` MOZ_DIAGNOSTIC_ASSERT(opener->mOriginAttributes.EqualsIgnoringFPD(mOriginAttributes))`](https://searchfox.org/mozilla-central/rev/09b8072a543c145de2dc9bb76eddddd4a6c09adc/docshell/base/BrowsingContext.cpp#1327-1328)
|
|
1,663,137 | 15,021,162 |
Created attachment 9173958
screencast issue.gif
**Affected versions**
* 82.0a1 (2020-09-03)
* 81.0b6
**Affected platforms**
* Ubuntu 18.04
**Steps to reproduce**
1. Open the new Print modal (select other option than Save to PDF)
2. Observe the Print using the system dialog link displayed under the More settings
**Expected result**
* The link is displayed
**Actual result**
* The link is not displayed
**Regression range**
* First bad: 4a18696ce81f949bd4fea1a68966a4e335d8fbad (2020-09-01)
* Last good: 93d8458a0c4dc91b24c34e2f446c76d80384c948 (2020-08-31)
* Pushlog: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=93d8458a0c4dc91b24c34e2f446c76d80384c948&tochange=4a18696ce81f949bd4fea1a68966a4e335d8fbad
**Additional notes**
* Mac/ Win are not affected
**Suggested severity**
* S2
|
|
1,575,163 | 14,310,653 |
This bug is for crash report bp-40090b34-f6c0-442f-97d0-da1d20190820.
```
Top 10 frames of crashing thread:
0 xul.dll static void mozilla::ipc::IPDLParamTraits<mozilla::dom::BrowsingContext*>::Write docshell/base/BrowsingContext.cpp:1097
1 xul.dll mozilla::dom::PContentChild::SendWindowPostMessage ipc/ipdl/PContentChild.cpp:7278
2 xul.dll mozilla::dom::BrowsingContext::PostMessageMoz docshell/base/BrowsingContext.cpp:918
3 xul.dll static bool mozilla::dom::Window_Binding::postMessage dom/bindings/WindowBinding.cpp
4 xul.dll mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::CrossOriginThisPolicy, mozilla::dom::binding_detail::ThrowExceptions> dom/bindings/BindingUtils.cpp:3163
5 xul.dll js::InternalCallOrConstruct js/src/vm/Interpreter.cpp:539
6 xul.dll Interpret js/src/vm/Interpreter.cpp:3084
7 xul.dll js::RunScript js/src/vm/Interpreter.cpp:424
8 xul.dll js::InternalCallOrConstruct js/src/vm/Interpreter.cpp:567
9 xul.dll js::jit::DoCallFallback js/src/jit/BaselineIC.cpp:3229
```
**Affected Versions:**
Firefox 70.0a1 (BuildId:20190819215716).
**Steps to Reproduce:**
1. Launch Firefox with a fresh profile.
2. Enable Fission.
3. Access the following [website](https://www.9gag.com).
4. Scroll down through the recent posts.
Expected Result:
The website is successfully displayed and Firefox is stable.
Actual Result:
At some point the recent posts are no longer visible (some portions of the website becomes blank) and a tab crash occurs.
|
|
1,575,271 | 14,311,651 |
Testcase found while fuzzing mozilla-central rev e7e658ec1e98.
Testcase bisects to the following range:
https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=cc2984b1f9f28bc2ab198efd1378db80db36f4d6&tochange=e66a2b59914df9ac0ac6bad9887dc8585575bede
CC'ing :apehrson as it appears he touched the affected file during this range.
```
==16301==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000001 (pc 0x7f8e11afd2ad bp 0x7ffdf9741390 sp 0x7ffdf97412e0 T0)
==16301==The signal is caused by a WRITE memory access.
==16301==Hint: address points to the zero page.
#0 0x7f8e11afd2ac in mozilla::MediaEncoder::RunOnGraph(already_AddRefed<mozilla::Runnable>) /builds/worker/workspace/build/src/dom/media/encoder/MediaEncoder.cpp:449:5
#1 0x7f8e118b2b0f in mozilla::dom::MediaRecorder::Session::Resume() /builds/worker/workspace/build/src/dom/media/MediaRecorder.cpp:467:15
#2 0x7f8e118b287f in mozilla::dom::MediaRecorder::Resume(mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/media/MediaRecorder.cpp:1326:42
#3 0x7f8e0ebd819c in mozilla::dom::MediaRecorder_Binding::resume(JSContext*, JS::Handle<JSObject*>, mozilla::dom::MediaRecorder*, JSJitMethodCallArgs const&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/MediaRecorderBinding.cpp:1128:24
#4 0x7f8e109a4aad in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:3163:13
#5 0x7f8e17567577 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:447:13
#6 0x7f8e17567577 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:539
#7 0x7f8e1754f81c in CallFromStack /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:598:10
#8 0x7f8e1754f81c in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3084
#9 0x7f8e17530ebf in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:424:10
#10 0x7f8e1756807f in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:567:13
#11 0x7f8e1756a2a2 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:610:8
#12 0x7f8e180760d8 in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jsapi.cpp:2722:10
#13 0x7f8e1020de10 in mozilla::dom::EventListener::HandleEvent(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/EventListenerBinding.cpp:52:8
#14 0x7f8e111313b5 in HandleEvent<mozilla::dom::EventTarget *> /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/dom/EventListenerBinding.h:66:12
#15 0x7f8e111313b5 in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1033
#16 0x7f8e11132e30 in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event**, mozilla::dom::EventTarget*, nsEventStatus*, bool) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1231:17
#17 0x7f8e1111998a in HandleEvent /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/EventListenerManager.h:353:5
#18 0x7f8e1111998a in mozilla::EventTargetChainItem::HandleEvent(mozilla::EventChainPostVisitor&, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:349
#19 0x7f8e111181a2 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:551:16
#20 0x7f8e1111db6b in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:1047:11
#21 0x7f8e13ac7144 in nsDocumentViewer::LoadComplete(nsresult) /builds/worker/workspace/build/src/layout/base/nsDocumentViewer.cpp:1169:7
#22 0x7f8e166f4f49 in nsDocShell::EndPageLoad(nsIWebProgress*, nsIChannel*, nsresult) /builds/worker/workspace/build/src/docshell/base/nsDocShell.cpp:6519:20
#23 0x7f8e166f41ee in nsDocShell::OnStateChange(nsIWebProgress*, nsIRequest*, unsigned int, nsresult) /builds/worker/workspace/build/src/docshell/base/nsDocShell.cpp:6319:7
#24 0x7f8e166f8d3f in non-virtual thunk to nsDocShell::OnStateChange(nsIWebProgress*, nsIRequest*, unsigned int, nsresult) /builds/worker/workspace/build/src/docshell/base/nsDocShell.cpp
#25 0x7f8e0ca8b65c in nsDocLoader::DoFireOnStateChange(nsIWebProgress*, nsIRequest*, int&, nsresult) /builds/worker/workspace/build/src/uriloader/base/nsDocLoader.cpp:1333:3
#26 0x7f8e0ca8a6fc in nsDocLoader::doStopDocumentLoad(nsIRequest*, nsresult) /builds/worker/workspace/build/src/uriloader/base/nsDocLoader.cpp:892:14
#27 0x7f8e0ca8631b in nsDocLoader::DocLoaderIsEmpty(bool) /builds/worker/workspace/build/src/uriloader/base/nsDocLoader.cpp:726:9
#28 0x7f8e0ca89176 in nsDocLoader::OnStopRequest(nsIRequest*, nsresult) /builds/worker/workspace/build/src/uriloader/base/nsDocLoader.cpp:614:5
#29 0x7f8e0ca8a2dc in non-virtual thunk to nsDocLoader::OnStopRequest(nsIRequest*, nsresult) /builds/worker/workspace/build/src/uriloader/base/nsDocLoader.cpp
#30 0x7f8e0a31c870 in mozilla::net::nsLoadGroup::RemoveRequest(nsIRequest*, nsISupports*, nsresult) /builds/worker/workspace/build/src/netwerk/base/nsLoadGroup.cpp:568:22
#31 0x7f8e0e21a3b1 in DoUnblockOnload /builds/worker/workspace/build/src/dom/base/Document.cpp:10671:18
#32 0x7f8e0e21a3b1 in mozilla::dom::nsUnblockOnloadEvent::Run() /builds/worker/workspace/build/src/dom/base/Document.cpp:10627
#33 0x7f8e0a0355d1 in mozilla::SchedulerGroup::Runnable::Run() /builds/worker/workspace/build/src/xpcom/threads/SchedulerGroup.cpp:295:32
#34 0x7f8e0a067520 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1225:14
#35 0x7f8e0a06d568 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10
#36 0x7f8e0b261fef in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:88:21
#37 0x7f8e0b15d052 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10
#38 0x7f8e0b15d052 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308
#39 0x7f8e0b15d052 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290
#40 0x7f8e133daad9 in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:137:27
#41 0x7f8e172aef7f in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:934:20
#42 0x7f8e0b15d052 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10
#43 0x7f8e0b15d052 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308
#44 0x7f8e0b15d052 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290
#45 0x7f8e172ae826 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:769:34
#46 0x5603d0820d73 in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28
#47 0x5603d0820d73 in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:267
#48 0x7f8e2b77bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
```
|
|
1,561,627 | 14,199,734 |
This bug is for crash report bp-f1d1a5c4-3d4a-4afa-9a01-60f3b0190623.
Seen while looking at nightly crash stats, started in 20190623094201 : https://bit.ly/2NgurE1.
Possible regression range based on build id: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=e729bfa4f60157a8e8ed9cd3ae5f9d854ab7f7f3&tochange=a8c21ee98a4c2f683335b8358c11b2fceb863f05
```
Top 10 frames of crashing thread:
0 xul.dll void mozilla::dom::BrowserBridgeHost::UpdateDimensions dom/ipc/BrowserBridgeHost.cpp:81
1 xul.dll nsFrameLoader::UpdatePositionAndSize dom/base/nsFrameLoader.cpp:2453
2 xul.dll nsSubDocumentFrame::ReflowFinished layout/generic/nsSubDocumentFrame.cpp:850
3 xul.dll void mozilla::PresShell::HandlePostedReflowCallbacks layout/base/PresShell.cpp:3970
4 xul.dll void mozilla::PresShell::DidDoReflow layout/base/PresShell.cpp:9096
5 xul.dll bool mozilla::PresShell::ProcessReflowCommands layout/base/PresShell.cpp:9469
6 xul.dll mozilla::PresShell::DoFlushPendingNotifications layout/base/PresShell.cpp:4233
7 xul.dll void nsRefreshDriver::Tick layout/base/nsRefreshDriver.cpp:1986
8 xul.dll void mozilla::RefreshDriverTimer::TickRefreshDrivers layout/base/nsRefreshDriver.cpp:327
9 xul.dll void mozilla::RefreshDriverTimer::Tick layout/base/nsRefreshDriver.cpp:344
```
|
|
1,562,208 | 14,204,207 |
This bug is for crash report bp-c9aae560-4139-4fa0-9172-d93720190628.
```
Top 10 frames of crashing thread:
0 xul.dll void mozilla::a11y::HyperTextProxyAccessibleWrap::GetNativeInterface accessible/windows/ProxyWrappers.h:49
1 xul.dll mozilla::a11y::AccessibleWrap::GetIAccessibleFor accessible/windows/msaa/AccessibleWrap.cpp:1374
2 xul.dll mozilla::a11y::AccessibleWrap::GetIAccessibleFor accessible/windows/msaa/AccessibleWrap.cpp:1374
3 xul.dll void mozilla::a11y::HyperTextProxyAccessibleWrap::GetNativeInterface accessible/windows/ProxyWrappers.h:49
4 xul.dll mozilla::a11y::AccessibleWrap::GetIAccessibleFor accessible/windows/msaa/AccessibleWrap.cpp:1374
5 xul.dll void mozilla::a11y::HyperTextProxyAccessibleWrap::GetNativeInterface accessible/windows/ProxyWrappers.h:49
6 xul.dll mozilla::a11y::AccessibleWrap::GetIAccessibleFor accessible/windows/msaa/AccessibleWrap.cpp:1374
7 xul.dll void mozilla::a11y::HyperTextProxyAccessibleWrap::GetNativeInterface accessible/windows/ProxyWrappers.h:49
8 xul.dll mozilla::a11y::AccessibleWrap::GetIAccessibleFor accessible/windows/msaa/AccessibleWrap.cpp:1374
9 xul.dll void mozilla::a11y::HyperTextProxyAccessibleWrap::GetNativeInterface accessible/windows/ProxyWrappers.h:49
```
**Affected versions**
* 69.0a1(2019-06-28)
**Affected platforms**
* Windows 10x64 aarch64
**Steps to reproduce**
1. Launch FF.
2. Go to about:config.
3. Set fission.autostart to True then restart the browser.
4. Go to any top website (eg: Netflix, Youtube, Reddit, Facebook, Pornhub, Twitter)
**Expected result**
* Reaching the website is done without any engine and stability issues( crashes and freezes)
*Actual result**
* Reaching any website will render various behaviors as follows:
- After a while , the browser will enter a non responsive stat (Not Responding) and will ultimately crash.
- Sometimes, it will crash simply when reaching any website.
-
**Regression range**
* Will return with regression range ASAP
**Another note:**
- After a crash, when choosing to Restore, the page that will be loaded is the one previously accessed before the crash occurred.
- The frequency of crashes on this platform makes it impossible for us to properly test.
|
|
1,564,127 | 14,220,648 |
This bug is for crash report bp-6717a756-1682-4568-8095-f6a340190708.
```
Top 10 frames of crashing thread:
0 xul.dll mozilla::ipc::IToplevelProtocol::OtherPid ipc/glue/ProtocolUtils.cpp:586
1 xul.dll void mozilla::gfx::VRProcessParent::InitAfterConnect gfx/vr/ipc/VRProcessParent.cpp:156
2 xul.dll nsresult mozilla::ipc::TaskFactory<mozilla::RDDProcessHost>::TaskWrapper<mozilla::ipc::TaskFactory<mozilla::RDDProcessHost>::RunnableMethod<void ipc/glue/TaskFactory.h:37
3 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1175
4 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
5 xul.dll nsThread::Shutdown xpcom/threads/nsThread.cpp:881
6 xul.dll nsresult mozilla::LazyIdleThread::ShutdownThread xpcom/threads/LazyIdleThread.cpp:276
7 xul.dll nsresult mozilla::LazyIdleThread::Notify xpcom/threads/LazyIdleThread.cpp:516
8 xul.dll nsresult nsTimerEvent::Run xpcom/threads/TimerThread.cpp:260
9 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1175
```
|
|
1,568,950 | 14,260,673 |
STEPS TO REPRODUCE:
1) Start a nightly from today or later with a clean profile.
2) Open a tab with http://web.mit.edu/bzbarsky/test-use-counter.html in it. This just exercises a codepath I know has a usecounter in today's build.
3) Open a second tab with `about:memory` in it.
4) Close the tab opened in step 2.
5) Minimize memory usage in `about:memory`.
6) Open `about:telemetry`.
7) Type `USE_COUNTER` in the search field at top right and hit enter.
EXPECTED RESULTS: There is a histogram for the `USE_COUNTER2_HTMLDOCUMENTNAMEDGETTERHIT_PAGE` counter (and one for `USE_COUNTER2_HTMLDOCUMENTNAMEDGETTERHIT_DOCUMENT`).
ACTUAL RESULTS: There is no such histogram.
ADDITIONAL INFORMATION:
* If I load a different page from http://web.mit.edu between steps 2 and 4, that does not change things.
* If I load a different page from http://web.mit.edu between steps 2 and 4, _and_ switch the order of steps 4 and 5 (so memory minimization happens before tab closing and gets to destroy the test document when it happens), then I _do_ see the histograms.
We collect the use counters in `~Document`. It seems plausible that when we close the tab we just kill the process without destroying its documents and therefore never collect use counters for anything that is loaded or in bfcache at that point?
This seems like it would bias our data, esp. for sites that claim you should close the tab after using them (e.g. bank sites).
|
|
1,569,012 | 14,261,060 |
Upon visiting https://wiki.mozilla.org/RapidRelease/Calendar I got a crash both times. I also got a crash doing a Bugzilla search for an existing crash bug.
This bug is for crash report bp-fcf4c582-aab8-4545-bcbe-8869d0190725.
```
Top 10 frames of crashing thread:
0 libobjc.A.dylib objc_msgSend
1 XUL imgRequestProxy::Notify image/imgRequestProxy.cpp:1018
2 XUL void mozilla::image::SyncNotifyInternal<mozilla::image::ObserverTable const*> image/ProgressTracker.cpp:333
3 XUL mozilla::image::ProgressTracker::SyncNotifyProgress image/ProgressTracker.cpp:370
4 XUL mozilla::image::RasterImage::NotifyProgress image/RasterImage.cpp:1622
5 XUL mozilla::image::RasterImage::NotifyDecodeComplete image/RasterImage.cpp:1656
6 XUL mozilla::detail::RunnableFunction<mozilla::image::IDecodingTask::NotifyDecodeComplete image/IDecodingTask.cpp:123
7 XUL nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225
8 XUL NS_ProcessPendingEvents xpcom/threads/nsThreadUtils.cpp:434
9 XUL nsBaseAppShell::NativeEventCallback widget/nsBaseAppShell.cpp:87
```
|
|
1,569,772 | 14,267,855 |
This bug is for crash report bp-072b6696-05db-4bf7-9964-db16c0190720.
```
Top 10 frames of crashing thread:
0 xul.dll mozilla::ipc::MessageChannel::CxxStackFrame::CxxStackFrame ipc/glue/MessageChannel.cpp:225
1 xul.dll mozilla::ipc::MessageChannel::Send ipc/glue/MessageChannel.cpp:980
2 xul.dll mozilla::net::PNeckoChild::SendRemoveRequestContext ipc/ipdl/PNeckoChild.cpp:1933
3 xul.dll mozilla::net::RequestContextService::RemoveRequestContext netwerk/base/RequestContextService.cpp:562
4 xul.dll mozilla::net::nsLoadGroup::~nsLoadGroup netwerk/base/nsLoadGroup.cpp:107
5 xul.dll void mozilla::net::nsLoadGroup::~nsLoadGroup netwerk/base/nsLoadGroup.cpp:100
6 xul.dll mozilla::net::nsLoadGroup::Release netwerk/base/nsLoadGroup.cpp:116
7 xul.dll void nsIconChannel::~nsIconChannel image/decoders/icon/win/nsIconChannel.cpp:173
8 xul.dll nsresult nsIconChannel::IconAsyncOpenTask::Run image/decoders/icon/win/nsIconChannel.cpp:104
9 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225
```
content crash reports with this signature are regressing (again) in firefox 69 from windows machines. they come with `MOZ_RELEASE_ASSERT(mWorkerThread == GetCurrentVirtualThread()) (not on worker thread!)` and users who opted to submit the crashing url appear to have been browsing some local directory structures through the file:///-protocol mostly.
|
|
1,578,143 | 14,336,449 |
This bug is for crash report bp-d3ffd51e-0095-481c-9f7f-4b1770190901.
```
Top 10 frames of crashing thread:
0 xul.dll InvalidArrayIndex_CRASH xpcom/ds/nsTArray.cpp:27
1 xul.dll void mozilla::TrackBuffersManager::DoEvictData dom/media/mediasource/TrackBuffersManager.cpp
2 xul.dll void mozilla::TrackBuffersManager::ProcessTasks dom/media/mediasource/TrackBuffersManager.cpp:235
3 xul.dll void mozilla::TrackBuffersManager::QueueTask dom/media/mediasource/TrackBuffersManager.cpp:171
4 xul.dll nsresult mozilla::detail::RunnableMethodImpl<IPC::Channel*, bool xpcom/threads/nsThreadUtils.h:1174
5 xul.dll nsresult mozilla::TaskQueue::Runner::Run xpcom/threads/TaskQueue.cpp:199
6 xul.dll nsresult nsThreadPool::Run xpcom/threads/nsThreadPool.cpp:244
7 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1175
8 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
9 xul.dll mozilla::ipc::MessagePumpForNonMainThreads::Run ipc/glue/MessagePump.cpp:333
```
content crash reports with this signature are spiking up since two days ago.
the spike is mostly coming from spanish builds and comments/submitted urls point to (some change on the website) animeflv.net as the source of the crash. MOZ_CRASH reason is recorded as `ElementAt(aIndex = 0, aLength = 0)`.
|
|
1,578,177 | 14,336,949 |
This bug is for crash report bp-169ad429-70f6-47b4-b2f1-fa72c0190901.
```
Top 10 frames of crashing thread:
0 xul.dll mozilla::dom::quota::QuotaManager::EnsureTemporaryStorageIsInitialized dom/quota/ActorsParent.cpp:6714
1 xul.dll mozilla::dom::quota::QuotaManager::EnsureOriginIsInitializedInternal dom/quota/ActorsParent.cpp:6629
2 xul.dll mozilla::dom::quota::QuotaManager::EnsureOriginIsInitialized dom/quota/ActorsParent.cpp:6594
3 xul.dll nsresult mozilla::dom::indexedDB::`anonymous namespace'::OpenDatabaseOp::DoDatabaseWork dom/indexedDB/ActorsParent.cpp:20009
4 xul.dll nsresult mozilla::dom::indexedDB::`anonymous namespace'::FactoryOp::Run dom/indexedDB/ActorsParent.cpp:19840
5 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225
6 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
7 xul.dll mozilla::ipc::MessagePumpForNonMainThreads::Run ipc/glue/MessagePump.cpp:333
8 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:308
9 xul.dll MessageLoop::Run ipc/chromium/src/base/message_loop.cc:290
```
The crash is happening here:
https://hg.mozilla.org/mozilla-central/annotate/b3cc8963e8718dbd40761f14664f45320c258bbd/dom/quota/ActorsParent.cpp#l6714
`GetTemporaryStorageLimit()` contains a division where the code doesn't ensure that the divisor is non-zero so this might be a valid bug:
https://searchfox.org/mozilla-central/rev/9415ecf29ba1acbef9381335e0ecde5916ca4073/dom/quota/ActorsParent.cpp#2601
|
|
1,578,381 | 14,338,334 |
Created attachment 9090009
homepage message incorrect after blocking the hijack of the homepage.png
**Note**
* When an extension hijacks the homepage preferences, and then it gets blocked by the Remote Blocklisting feature, an incorrect message remains displayed in about:preferences#home that says that the extension is still controlling your homepage.
**Affected versions**
* Nightly v70.0a1 from 2019-09-02
* Beta v69.0 RC
* Release v68.0.2
**Affected platforms**
* all
**Steps to reproduce**
1. Install Bing Homepage and Search Engine extension:
https://addons.mozilla.org/ro/firefox/addon/bing-homepage-searchengine/?src=search
2. Add "pc=U510" as a string to block on the "homepage-urls" blocklist identifier;
(that string is part of the homepage link set by the Bing extension)
4. Install the "Remote-settings-devtools" extension;
5. Open extension menu, switch to staging, clear all data and poll server.
Now the homepage set by Bing should be blocked.
6. Observe the Home section of about:preferences.
**Expected result**
* No confusing messages should be displayed.
**Actual result**
* Incorrect message is displayed: "An extension, Bing Homepage and Search Engine, is controlling your home page."
**Additional notes**
* The same message remains incorrectly displayed even after browser restart.
|
|
1,578,919 | 14,342,438 |
This bug is for crash report bp-59542135-db39-44db-8f5a-694d60190904.
```
Top 10 frames of crashing thread:
0 libxul.so mozilla::ipc::InputStreamHelper::PostSerializationActivation ipc/glue/InputStreamUtils.cpp:272
1 libxul.so mozilla::ipc:: ipc/glue/IPCStreamUtils.cpp:228
2 libxul.so mozilla::ipc::AutoIPCStream::~AutoIPCStream ipc/glue/IPCStreamUtils.cpp
3 libxul.so mozilla::dom::ServiceWorkerPrivateImpl::PendingFetchEvent::~PendingFetchEvent dom/serviceworkers/ServiceWorkerPrivateImpl.cpp:783
4 libxul.so mozilla::dom::ServiceWorkerPrivateImpl::PendingFetchEvent::~PendingFetchEvent dom/serviceworkers/ServiceWorkerPrivateImpl.cpp:777
5 libxul.so nsTArray_Impl<mozilla::UniquePtr<mozilla::dom::ServiceWorkerPrivateImpl::PendingFunctionalEvent, mozilla::DefaultDelete<mozilla::dom::ServiceWorkerPrivateImpl::PendingFunctionalEvent> >, nsTArrayInfallibleAllocator>::Clear mfbt/UniquePtr.h:486
6 libxul.so mozilla::dom::ServiceWorkerPrivateImpl::UpdateState dom/serviceworkers/ServiceWorkerPrivateImpl.cpp:970
7 libxul.so mozilla::dom::ServiceWorkerPrivate::UpdateState dom/serviceworkers/ServiceWorkerPrivate.cpp:1867
8 libxul.so mozilla::dom::ServiceWorkerInfo::UpdateState dom/serviceworkers/ServiceWorkerInfo.cpp:156
9 libxul.so mozilla::dom::ServiceWorkerRegistrationInfo::FinishActivate dom/serviceworkers/ServiceWorkerRegistrationInfo.cpp:369
```
This looks like it might be a use-after-free because the assertion about an unexpected InputStreamParams union type already has complete coverage, which suggests the allocator poisoned the memory when it performed the free.
This may have involved devtools inspecting a ServiceWorker with the debugger paused on processing a fetch event. Or it might not have.
|
|
1,579,437 | 14,345,985 |
This bug is for crash report bp-cce618a4-2c15-4f51-bd35-d53eb0190719.
```
Top 10 frames of crashing thread:
0 xul.dll static void mozilla::ipc::IPDLParamTraits<mozilla::dom::BrowsingContext*>::Write docshell/base/BrowsingContext.cpp:970
1 xul.dll mozilla::dom::PContentChild::SendWindowPostMessage ipc/ipdl/PContentChild.cpp:6621
2 xul.dll mozilla::dom::ContentParent::RecvWindowPostMessage dom/ipc/ContentParent.cpp:6018
3 xul.dll mozilla::dom::PContentParent::OnMessageReceived ipc/ipdl/PContentParent.cpp:10924
4 xul.dll mozilla::ipc::MessageChannel::DispatchMessage ipc/glue/MessageChannel.cpp:2092
5 xul.dll mozilla::ipc::MessageChannel::MessageTask::Run ipc/glue/MessageChannel.cpp:1970
6 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225
7 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
8 xul.dll mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:88
9 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:308
```
this crash signature is regressing in volume in the 70.0b cycle - currently it's accounting for 2% of tab crashes.
crashes occur cross-platform and come with `MOZ_RELEASE_ASSERT(!aParam->IsDiscarded()) (Cannot send discarded BrowsingContext between processes!)` - bug 1566806 doesn't look like it has fully fixed this problem yet.
|
|
1,579,788 | 14,349,761 |
This bug is for crash report bp-eb2cbcc2-a3da-4304-a52c-ee7a90190906.
When I upgraded to 70b3 this started happening 100% when trying to log in to Artifactory (5.11.1).
```
Top 10 frames of crashing thread:
0 libxul.so mozilla::RestyleManager::ContentStateChanged layout/base/RestyleManager.cpp:3227
1 libxul.so mozilla::dom::Element::UpdateState layout/base/PresShell.cpp:4254
2 libxul.so mozilla::dom::HTMLFormElement::UpdateValidity dom/html/HTMLFormElement.cpp:1853
3 libxul.so mozilla::dom::HTMLInputElement::UpdateAllValidityStatesButNotElementState dom/html/HTMLInputElement.cpp:6712
4 libxul.so non-virtual thunk to mozilla::dom::HTMLInputElement::OnValueChanged dom/html/HTMLInputElement.cpp
5 libxul.so nsTextEditorState::SetValue dom/html/nsTextEditorState.cpp:2508
6 libxul.so nsTextEditorState::UnbindFromFrame dom/html/nsTextEditorState.cpp:2045
7 libxul.so nsTextControlFrame::DestroyFrom layout/forms/nsTextControlFrame.cpp:137
8 libxul.so nsContainerFrame::DestroyFrom layout/generic/nsContainerFrame.cpp:215
9 libxul.so nsLineBox::DeleteLineList layout/generic/nsLineBox.cpp:386
```
|
|
1,576,187 | 14,318,183 |
Created attachment 9087751
testcase.html
Testcase found while fuzzing mozilla-central rev 5df00af5913e. Testcase must be served via a local web server. Furthermore, testcase may take several attempts in order to reproduce.
```
==27798==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000001 (pc 0x7f6274e2fd07 bp 0x7fff2b382c10 sp 0x7fff2b382b60 T0)
==27798==The signal is caused by a WRITE memory access.
==27798==Hint: address points to the zero page.
#0 0x7f6274e2fd06 in mozilla::ipc::IPDLParamTraits<mozilla::dom::BrowsingContext*>::Write(IPC::Message*, mozilla::ipc::IProtocol*, mozilla::dom::BrowsingContext*) /builds/worker/workspace/build/src/docshell/base/BrowsingContext.cpp:1109:5
#1 0x7f6269cc45ba in mozilla::dom::PContentChild::SendCommitBrowsingContextTransaction(mozilla::dom::BrowsingContext*, mozilla::dom::BrowsingContext::Transaction const&, unsigned long const&) /builds/worker/workspace/build/src/obj-firefox/ipc/ipdl/PContentChild.cpp:6939:5
#2 0x7f6274e2d94b in mozilla::dom::BrowsingContext::Transaction::Commit(mozilla::dom::BrowsingContext*) /builds/worker/workspace/build/src/docshell/base/BrowsingContext.cpp:955:9
#3 0x7f626c66f268 in SetClosed<bool> /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/dom/BrowsingContextFieldList.h:14:1
#4 0x7f626c66f268 in nsGlobalWindowOuter::FinalClose() /builds/worker/workspace/build/src/dom/base/nsGlobalWindowOuter.cpp:6333
#5 0x7f626c66e819 in nsGlobalWindowOuter::CloseOuter(bool) /builds/worker/workspace/build/src/dom/base/nsGlobalWindowOuter.cpp:6299:3
#6 0x7f626e669b6f in mozilla::dom::Window_Binding::close(JSContext*, JS::Handle<JSObject*>, void*, JSJitMethodCallArgs const&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/WindowBinding.cpp:2088:24
#7 0x7f626f13c0e0 in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::CrossOriginThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:3163:13
#8 0x7f6275d17877 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:447:13
#9 0x7f6275d17877 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:539
#10 0x7f6275cffb1c in CallFromStack /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:598:10
#11 0x7f6275cffb1c in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3084
#12 0x7f6275ce11bf in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:424:10
#13 0x7f6275d1837f in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:567:13
#14 0x7f6275d1a5a2 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:610:8
#15 0x7f6276828c48 in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jsapi.cpp:2722:10
#16 0x7f626e99c9e4 in mozilla::dom::EventHandlerNonNull::Call(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, JS::MutableHandle<JS::Value>, mozilla::ErrorResult&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/EventHandlerBinding.cpp:267:37
#17 0x7f626f9020f1 in Call<nsCOMPtr<mozilla::dom::EventTarget> > /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/dom/EventHandlerBinding.h:363:12
#18 0x7f626f9020f1 in mozilla::JSEventHandler::HandleEvent(mozilla::dom::Event*) /builds/worker/workspace/build/src/dom/events/JSEventHandler.cpp:205
#19 0x7f626f8c66dc in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1039:22
#20 0x7f626f8c817e in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event**, mozilla::dom::EventTarget*, nsEventStatus*, bool) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1231:17
#21 0x7f626f8aec7a in HandleEvent /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/EventListenerManager.h:353:5
#22 0x7f626f8aec7a in mozilla::EventTargetChainItem::HandleEvent(mozilla::EventChainPostVisitor&, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:349
#23 0x7f626f8ad492 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:551:16
#24 0x7f626f8b2e5b in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:1047:11
#25 0x7f626f8b9ed0 in mozilla::EventDispatcher::DispatchDOMEvent(nsISupports*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsPresContext*, nsEventStatus*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp
#26 0x7f626f87523d in mozilla::DOMEventTargetHelper::DispatchEvent(mozilla::dom::Event&, mozilla::dom::CallerType, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/events/DOMEventTargetHelper.cpp:166:17
#27 0x7f626f8d6053 in mozilla::dom::EventTarget::DispatchEvent(mozilla::dom::Event&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/events/EventTarget.cpp:184:13
#28 0x7f62710281e5 in mozilla::dom::indexedDB::(anonymous namespace)::DispatchSuccessEvent(mozilla::dom::indexedDB::(anonymous namespace)::ResultHelper*, mozilla::dom::Event*) /builds/worker/workspace/build/src/dom/indexedDB/ActorsChild.cpp:767:12
#29 0x7f62710274dd in mozilla::dom::indexedDB::BackgroundFactoryRequestChild::HandleResponse(mozilla::dom::indexedDB::OpenDatabaseRequestResponse const&) /builds/worker/workspace/build/src/dom/indexedDB/ActorsChild.cpp:1591:5
#30 0x7f62710293cd in mozilla::dom::indexedDB::BackgroundFactoryRequestChild::Recv__delete__(mozilla::dom::indexedDB::FactoryRequestResponse const&) /builds/worker/workspace/build/src/dom/indexedDB/ActorsChild.cpp:1646:16
#31 0x7f626a50c60a in mozilla::dom::indexedDB::PBackgroundIDBFactoryRequestChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/build/src/obj-firefox/ipc/ipdl/PBackgroundIDBFactoryRequestChild.cpp:128:28
#32 0x7f626a0d256f in mozilla::ipc::PBackgroundChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/build/src/obj-firefox/ipc/ipdl/PBackgroundChild.cpp:5768:32
#33 0x7f6269969246 in mozilla::ipc::MessageChannel::DispatchAsyncMessage(mozilla::ipc::ActorLifecycleProxy*, IPC::Message const&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:2184:25
#34 0x7f6269963fab in mozilla::ipc::MessageChannel::DispatchMessage(IPC::Message&&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:2108:9
#35 0x7f6269966567 in mozilla::ipc::MessageChannel::RunMessage(mozilla::ipc::MessageChannel::MessageTask&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:1955:3
#36 0x7f62699673f7 in mozilla::ipc::MessageChannel::MessageTask::Run() /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:1986:13
#37 0x7f62687430f1 in mozilla::SchedulerGroup::Runnable::Run() /builds/worker/workspace/build/src/xpcom/threads/SchedulerGroup.cpp:295:32
#38 0x7f6268775040 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1225:14
#39 0x7f626877b088 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10
#40 0x7f62710e2a23 in SpinEventLoopUntil<mozilla::ProcessFailureBehavior::ReportToCaller, (lambda at /builds/worker/workspace/build/src/dom/ipc/ContentChild.cpp:1215:24)> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:348:25
#41 0x7f62710e2a23 in mozilla::dom::ContentChild::ProvideWindowCommon(mozilla::dom::BrowserChild*, mozIDOMWindowProxy*, bool, unsigned int, bool, bool, bool, nsIURI*, nsTSubstring<char16_t> const&, nsTSubstring<char> const&, bool, bool, nsDocShellLoadState*, bool*, mozilla::dom::BrowsingContext**) /builds/worker/workspace/build/src/dom/ipc/ContentChild.cpp:1215
#42 0x7f6271142c7a in mozilla::dom::BrowserChild::ProvideWindow(mozIDOMWindowProxy*, unsigned int, bool, bool, bool, nsIURI*, nsTSubstring<char16_t> const&, nsTSubstring<char> const&, bool, bool, nsDocShellLoadState*, bool*, mozilla::dom::BrowsingContext**) /builds/worker/workspace/build/src/dom/ipc/BrowserChild.cpp:947:14
#43 0x7f62759a8472 in nsWindowWatcher::OpenWindowInternal(mozIDOMWindowProxy*, char const*, char const*, char const*, bool, bool, bool, nsIArray*, bool, bool, bool, nsDocShellLoadState*, mozilla::dom::BrowsingContext**) /builds/worker/workspace/build/src/toolkit/components/windowwatcher/nsWindowWatcher.cpp:767:24
#44 0x7f62759ad7f5 in OpenWindow2 /builds/worker/workspace/build/src/toolkit/components/windowwatcher/nsWindowWatcher.cpp:377:10
#45 0x7f62759ad7f5 in non-virtual thunk to nsWindowWatcher::OpenWindow2(mozIDOMWindowProxy*, char const*, char const*, char const*, bool, bool, bool, nsISupports*, bool, bool, bool, nsDocShellLoadState*, mozilla::dom::BrowsingContext**) /builds/worker/workspace/build/src/toolkit/components/windowwatcher/nsWindowWatcher.cpp
#46 0x7f626c667f81 in nsGlobalWindowOuter::OpenInternal(nsTSubstring<char16_t> const&, nsTSubstring<char16_t> const&, nsTSubstring<char16_t> const&, bool, bool, bool, bool, bool, nsIArray*, nsISupports*, nsDocShellLoadState*, bool, mozilla::dom::BrowsingContext**) /builds/worker/workspace/build/src/dom/base/nsGlobalWindowOuter.cpp:7302:21
#47 0x7f626c6668fc in OpenJS /builds/worker/workspace/build/src/dom/base/nsGlobalWindowOuter.cpp:5784:10
#48 0x7f626c6668fc in nsGlobalWindowOuter::OpenOuter(nsTSubstring<char16_t> const&, nsTSubstring<char16_t> const&, nsTSubstring<char16_t> const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/base/nsGlobalWindowOuter.cpp:5757
#49 0x7f626c600661 in nsGlobalWindowInner::Open(nsTSubstring<char16_t> const&, nsTSubstring<char16_t> const&, nsTSubstring<char16_t> const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/base/nsGlobalWindowInner.cpp:3744:3
#50 0x7f626e5ae669 in mozilla::dom::Window_Binding::open(JSContext*, JS::Handle<JSObject*>, nsGlobalWindowInner*, JSJitMethodCallArgs const&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/WindowBinding.cpp:2868:59
#51 0x7f626f13a4a7 in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::MaybeGlobalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:3163:13
#52 0x7f6275d17877 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:447:13
#53 0x7f6275d17877 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:539
#54 0x7f6275cffb1c in CallFromStack /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:598:10
#55 0x7f6275cffb1c in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3084
#56 0x7f6275ce11bf in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:424:10
#57 0x7f6275d1e13f in js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value const&, js::AbstractFramePtr, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:786:13
#58 0x7f6275d1e90f in js::Execute(JSContext*, JS::Handle<JSScript*>, JSObject&, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:819:10
#59 0x7f6275fd097e in ExecuteScript(JSContext*, JS::Handle<JS::StackGCVector<JSObject*, js::TempAllocPolicy> >, JS::Handle<JSScript*>, JS::Value*) /builds/worker/workspace/build/src/js/src/vm/CompilationAndEvaluation.cpp:468:10
#60 0x7f626cbb7fc4 in nsJSUtils::ExecutionContext::ExecScript() /builds/worker/workspace/build/src/dom/base/nsJSUtils.cpp:414:8
#61 0x7f6271797001 in mozilla::dom::ExecuteCompiledScript(JSContext*, mozilla::dom::ScriptLoadRequest*, nsJSUtils::ExecutionContext&) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:2590:16
#62 0x7f62717940a6 in mozilla::dom::ScriptLoader::EvaluateScript(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:2814:20
#63 0x7f627178c968 in mozilla::dom::ScriptLoader::ProcessRequest(mozilla::dom::ScriptLoadRequest*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:2317:10
#64 0x7f6271789264 in mozilla::dom::ScriptLoader::ProcessInlineScript(nsIScriptElement*, mozilla::dom::ScriptKind) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1866:10
#65 0x7f627176191e in mozilla::dom::ScriptLoader::ProcessScriptElement(nsIScriptElement*) /builds/worker/workspace/build/src/dom/script/ScriptLoader.cpp:1589:10
#66 0x7f6271760bee in mozilla::dom::ScriptElement::MaybeProcessScript() /builds/worker/workspace/build/src/dom/script/ScriptElement.cpp:118:18
#67 0x7f626b4372aa in AttemptToExecute /builds/worker/workspace/build/src/obj-firefox/dist/include/nsIScriptElement.h:224:18
#68 0x7f626b4372aa in nsHtml5TreeOpExecutor::RunScript(nsIContent*) /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:729
#69 0x7f626b430ad3 in nsHtml5TreeOpExecutor::RunFlushLoop() /builds/worker/workspace/build/src/parser/html/nsHtml5TreeOpExecutor.cpp:532:7
#70 0x7f626b43dcb0 in nsHtml5ExecutorFlusher::Run() /builds/worker/workspace/build/src/parser/html/nsHtml5StreamParser.cpp:134:18
#71 0x7f62687430f1 in mozilla::SchedulerGroup::Runnable::Run() /builds/worker/workspace/build/src/xpcom/threads/SchedulerGroup.cpp:295:32
#72 0x7f6268775040 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1225:14
#73 0x7f626877b088 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10
#74 0x7f626997262f in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:88:21
#75 0x7f626986d692 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10
#76 0x7f626986d692 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308
#77 0x7f626986d692 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290
#78 0x7f6271b74529 in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:137:27
#79 0x7f6275a5f79f in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:934:20
#80 0x7f626986d692 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10
#81 0x7f626986d692 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308
#82 0x7f626986d692 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290
#83 0x7f6275a5f046 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:769:34
#84 0x558b03520d73 in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28
#85 0x558b03520d73 in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:267
#86 0x7f6289f37b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /builds/worker/workspace/build/src/docshell/base/BrowsingContext.cpp:1109:5 in mozilla::ipc::IPDLParamTraits<mozilla::dom::BrowsingContext*>::Write(IPC::Message*, mozilla::ipc::IProtocol*, mozilla::dom::BrowsingContext*)
```
|
|
1,576,260 | 14,318,845 |
This bug is for crash report bp-64b5308d-e61c-462d-97e0-453fd0190702.
```
Top 10 frames of crashing thread:
0 xul.dll NS_ABORT_OOM xpcom/base/nsDebugImpl.cpp:604
1 xul.dll nsTSubstring<char>::SetLength xpcom/string/nsTSubstring.cpp:942
2 xul.dll static bool mozilla::dom::SnappyCompress dom/localstorage/SnappyUtils.cpp:25
3 xul.dll void mozilla::dom::LSValue::LSValue dom/localstorage/LSValue.h:47
4 xul.dll void mozilla::dom::SnapshotWriteOptimizer::Enumerate dom/localstorage/LSSnapshot.cpp:71
5 xul.dll nsresult mozilla::dom::LSSnapshot::Checkpoint dom/localstorage/LSSnapshot.cpp:856
6 xul.dll nsresult mozilla::dom::LSSnapshot::Run dom/localstorage/LSSnapshot.cpp:928
7 xul.dll mozilla::CycleCollectedJSContext::ProcessStableStateQueue xpcom/base/CycleCollectedJSContext.cpp:434
8 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1283
9 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
```
this was a mid to high volume crash signature (~60 reports per day with this stack) on firefox 69 beta until lsng was turned off with bug 1570644, when it basically stopped.
can we look into it before the feature starts shipping to release?
|
|
1,576,335 | 14,319,281 |
This bug is for crash report bp-80a47a70-76ad-4df0-b800-460010190824.
```
Top 10 frames of crashing thread:
0 firefox-bin mozalloc_abort memory/mozalloc/mozalloc_abort.cpp:33
1 libxul.so Abort xpcom/base/nsDebugImpl.cpp:439
2 libxul.so NS_DebugBreak xpcom/string/nsSubstring.cpp
3 libxul.so nsDebugImpl::Abort xpcom/base/nsDebugImpl.cpp:133
4 libxul.so NS_InvokeByIndex
5 libxul.so XPCWrappedNative::CallMethod js/xpconnect/src/XPCWrappedNative.cpp:1149
6 libxul.so XPC_WN_CallMethod js/xpconnect/src/XPCWrappedNativeJSOps.cpp:943
7 libxul.so js::InternalCallOrConstruct js/src/vm/Interpreter.cpp:539
8 libxul.so Interpret js/src/vm/Interpreter.cpp:594
9 libxul.so js::RunScript js/src/vm/Interpreter.cpp:424
```
|
|
1,576,386 | 14,319,580 |
This bug is for crash report bp-44924865-4f83-4691-8164-35ab50190824.
```
Top 10 frames of crashing thread:
0 ntdll.dll NtWaitForAlertByThreadId
1 ntdll.dll RtlSleepConditionVariableSRW
2 kernelbase.dll SleepConditionVariableSRW
3 mozglue.dll mozilla::detail::ConditionVariableImpl::wait mozglue/misc/ConditionVariable_windows.cpp:50
4 xul.dll mozilla::ThreadEventQueue<mozilla::PrioritizedEventQueue>::GetEvent xpcom/threads/ThreadEventQueue.cpp:153
5 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1134
6 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
7 xul.dll nsThread::Shutdown xpcom/threads/nsThread.cpp:900
8 xul.dll nsresult nsNotifyAddrListener::Shutdown netwerk/system/win32/nsNotifyAddrListener.cpp:378
9 xul.dll nsresult nsNotifyAddrListener::Observe netwerk/system/win32/nsNotifyAddrListener.cpp:339
```
shutdownhang crash reports with this signature are showing up in increased frequency in firefox 69.
unfortunately there aren't any particular correlations or useful comments that would shed any more light on the issue.
|
|
1,577,184 | 14,328,196 |
Created attachment 9088714
testcase.html
Testcase found while fuzzing mozilla-central 98cbe150f012.
```
==82546==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7ff38309126e bp 0x7ffd24723f00 sp 0x7ffd24723ec0 T0)
==82546==The signal is caused by a READ memory access.
==82546==Hint: address points to the zero page.
#0 0x7ff38309126d in mozilla::MozPromise<bool, nsresult, false>::ThenValueBase::Dispatch(mozilla::MozPromise<bool, nsresult, false>*) /src/obj-firefox/dist/include/mozilla/MozPromise.h:454:24
#1 0x7ff383095f4e in mozilla::MozPromise<bool, nsresult, false>::ThenInternal(already_AddRefed<mozilla::MozPromise<bool, nsresult, false>::ThenValueBase>, char const*) /src/obj-firefox/dist/include/mozilla/MozPromise.h:821:18
#2 0x7ff38a4ed479 in Track /src/obj-firefox/dist/include/mozilla/MozPromise.h:890:18
#3 0x7ff38a4ed479 in mozilla::dom::MediaElementAudioSourceNode::ListenForAllowedToPlay(mozilla::dom::MediaElementAudioSourceOptions const&) /src/dom/media/webaudio/MediaElementAudioSourceNode.cpp:89
#4 0x7ff38a4ecb11 in mozilla::dom::MediaElementAudioSourceNode::Create(mozilla::dom::AudioContext&, mozilla::dom::MediaElementAudioSourceOptions const&, mozilla::ErrorResult&) /src/dom/media/webaudio/MediaElementAudioSourceNode.cpp:67:9
#5 0x7ff38a463f94 in mozilla::dom::AudioContext::CreateMediaElementSource(mozilla::dom::HTMLMediaElement&, mozilla::ErrorResult&) /src/dom/media/webaudio/AudioContext.cpp:415:10
#6 0x7ff386940e9b in mozilla::dom::AudioContext_Binding::createMediaElementSource(JSContext*, JS::Handle<JSObject*>, mozilla::dom::AudioContext*, JSJitMethodCallArgs const&) /src/obj-firefox/dom/bindings/AudioContextBinding.cpp:629:94
#7 0x7ff388d5073d in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*) /src/dom/bindings/BindingUtils.cpp:3163:13
#8 0x7ff38f946fc7 in CallJSNative /src/js/src/vm/Interpreter.cpp:447:13
#9 0x7ff38f946fc7 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:539
#10 0x7ff38f92f26c in CallFromStack /src/js/src/vm/Interpreter.cpp:598:10
#11 0x7ff38f92f26c in Interpret(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:3084
#12 0x7ff38f91090f in js::RunScript(JSContext*, js::RunState&) /src/js/src/vm/Interpreter.cpp:424:10
#13 0x7ff38f947acf in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct) /src/js/src/vm/Interpreter.cpp:567:13
#14 0x7ff38f949cf2 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>) /src/js/src/vm/Interpreter.cpp:610:8
#15 0x7ff390458528 in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /src/js/src/jsapi.cpp:2722:10
#16 0x7ff3885b9280 in mozilla::dom::EventListener::HandleEvent(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, mozilla::ErrorResult&) /src/obj-firefox/dom/bindings/EventListenerBinding.cpp:52:8
#17 0x7ff3894de555 in HandleEvent<mozilla::dom::EventTarget *> /src/obj-firefox/dist/include/mozilla/dom/EventListenerBinding.h:66:12
#18 0x7ff3894de555 in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /src/dom/events/EventListenerManager.cpp:1035
#19 0x7ff3894dffd0 in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event**, mozilla::dom::EventTarget*, nsEventStatus*, bool) /src/dom/events/EventListenerManager.cpp:1233:17
#20 0x7ff3894c6a4a in HandleEvent /src/obj-firefox/dist/include/mozilla/EventListenerManager.h:353:5
#21 0x7ff3894c6a4a in mozilla::EventTargetChainItem::HandleEvent(mozilla::EventChainPostVisitor&, mozilla::ELMCreationDetector&) /src/dom/events/EventDispatcher.cpp:349
#22 0x7ff3894c5262 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /src/dom/events/EventDispatcher.cpp:551:16
#23 0x7ff3894cac2b in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /src/dom/events/EventDispatcher.cpp:1047:11
#24 0x7ff3894d1ca0 in mozilla::EventDispatcher::DispatchDOMEvent(nsISupports*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsPresContext*, nsEventStatus*) /src/dom/events/EventDispatcher.cpp
#25 0x7ff3867ad9aa in nsINode::DispatchEvent(mozilla::dom::Event&, mozilla::dom::CallerType, mozilla::ErrorResult&) /src/dom/base/nsINode.cpp:1061:17
#26 0x7ff38614f1c9 in nsContentUtils::DispatchEvent(mozilla::dom::Document*, nsISupports*, nsTSubstring<char16_t> const&, mozilla::CanBubble, mozilla::Cancelable, mozilla::Composed, mozilla::Trusted, bool*, mozilla::ChromeOnlyDispatch) /src/dom/base/nsContentUtils.cpp:3973:28
#27 0x7ff38614ef93 in nsContentUtils::DispatchTrustedEvent(mozilla::dom::Document*, nsISupports*, nsTSubstring<char16_t> const&, mozilla::CanBubble, mozilla::Cancelable, mozilla::Composed, bool*) /src/dom/base/nsContentUtils.cpp:3943:10
#28 0x7ff386496002 in mozilla::dom::Document::DispatchContentLoadedEvents() /src/dom/base/Document.cpp:7060:3
#29 0x7ff38657d044 in applyImpl<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /src/obj-firefox/dist/include/nsThreadUtils.h:1124:12
#30 0x7ff38657d044 in apply<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /src/obj-firefox/dist/include/nsThreadUtils.h:1130
#31 0x7ff38657d044 in mozilla::detail::RunnableMethodImpl<mozilla::dom::Document*, void (mozilla::dom::Document::*)(), true, (mozilla::RunnableKind)0>::Run() /src/obj-firefox/dist/include/nsThreadUtils.h:1176
#32 0x7ff38239c180 in nsThread::ProcessNextEvent(bool, bool*) /src/xpcom/threads/nsThread.cpp:1225:14
#33 0x7ff3823a21c8 in NS_ProcessNextEvent(nsIThread*, bool) /src/xpcom/threads/nsThreadUtils.cpp:486:10
#34 0x7ff38358fe6f in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /src/ipc/glue/MessagePump.cpp:88:21
#35 0x7ff38348ae42 in RunInternal /src/ipc/chromium/src/base/message_loop.cc:315:10
#36 0x7ff38348ae42 in RunHandler /src/ipc/chromium/src/base/message_loop.cc:308
#37 0x7ff38348ae42 in MessageLoop::Run() /src/ipc/chromium/src/base/message_loop.cc:290
#38 0x7ff38b797779 in nsBaseAppShell::Run() /src/widget/nsBaseAppShell.cpp:137:27
#39 0x7ff38f40b9f0 in nsAppStartup::Run() /src/toolkit/components/startup/nsAppStartup.cpp:276:30
#40 0x7ff38f688b53 in XREMain::XRE_mainRun() /src/toolkit/xre/nsAppRunner.cpp:4573:22
#41 0x7ff38f68ac7e in XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&) /src/toolkit/xre/nsAppRunner.cpp:4711:8
#42 0x7ff38f68cc8e in XRE_main(int, char**, mozilla::BootstrapConfig const&) /src/toolkit/xre/nsAppRunner.cpp:4792:21
#43 0x561ccc9d29d4 in do_main /src/browser/app/nsBrowserApp.cpp:213:22
#44 0x561ccc9d29d4 in main /src/browser/app/nsBrowserApp.cpp:295
#45 0x7ff3a3b5db96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
#46 0x561ccc8f42ac in _start (/home/worker/builds/m-c-20190825213650-fuzzing-asan-opt/firefox+0x452ac)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /src/obj-firefox/dist/include/mozilla/MozPromise.h:454:24 in mozilla::MozPromise<bool, nsresult, false>::ThenValueBase::Dispatch(mozilla::MozPromise<bool, nsresult, false>*)
==82546==ABORTING
```
|
|
1,577,537 | 14,330,518 |
**Filed by:** apavel [at] mozilla.com
**Parsed log:** https://treeherder.mozilla.org/logviewer.html#?job_id=264062649&repo=autoland
**Full log:** https://queue.taskcluster.net/v1/task/Cq2ocgvhSNquSIRfrEHTtQ/runs/0/artifacts/public/logs/live_backing.log
**Reftest URL:** https://hg.mozilla.org/mozilla-central/raw-file/tip/layout/tools/reftest/reftest-analyzer.xhtml#logurl=https://queue.taskcluster.net/v1/task/Cq2ocgvhSNquSIRfrEHTtQ/runs/0/artifacts/public/logs/live_backing.log&only_show_unexpected=1
---
[task 2019-08-29T14:43:32.654Z] 14:43:32 INFO - REFTEST TEST-START | file:///Users/cltbld/tasks/task_1567089628/build/tests/reftest/tests/dom/media/test/crashtests/1411322.html
[task 2019-08-29T14:43:32.654Z] 14:43:32 INFO - REFTEST TEST-LOAD | file:///Users/cltbld/tasks/task_1567089628/build/tests/reftest/tests/dom/media/test/crashtests/1411322.html | 635 / 3808 (16%)
[task 2019-08-29T14:43:33.032Z] 14:43:33 ERROR - A content process crashed and MOZ_CRASHREPORTER_SHUTDOWN is set, shutting down
[task 2019-08-29T14:43:33.139Z] 14:43:33 INFO - !!! error running onStopped callback: TypeError: callback is not a function
[task 2019-08-29T14:43:33.259Z] 14:43:33 INFO - 1567089813239 Marionette TRACE Received observer notification xpcom-will-shutdown
[task 2019-08-29T14:43:33.259Z] 14:43:33 INFO - 1567089813239 Marionette INFO Stopped listening on port 2828
[task 2019-08-29T14:43:33.259Z] 14:43:33 INFO - 1567089813239 Marionette DEBUG Remote service is inactive
[task 2019-08-29T14:43:33.607Z] 14:43:33 INFO - REFTEST INFO | Downloading symbols from: https://queue.taskcluster.net/v1/task/Xu28JW6nTc2hetNs9W0DfA/artifacts/public/build/target.crashreporter-symbols.zip
[task 2019-08-29T14:43:36.662Z] 14:43:36 INFO - REFTEST INFO | Copy/paste: /Users/cltbld/tasks/task_1567089628/build/macosx64-minidump_stackwalk /var/folders/5g/1kptcbp1615_5s2v8rdwr8qw000017/T/tmpoLVzrk.mozrunner/minidumps/DE1F5C40-FBD7-4F90-9DDD-4E184E9C4CE8.dmp /var/folders/5g/1kptcbp1615_5s2v8rdwr8qw000017/T/tmpwnXwJB
[task 2019-08-29T14:43:40.531Z] 14:43:40 INFO - REFTEST INFO | Saved minidump as /Users/cltbld/tasks/task_1567089628/build/blobber_upload_dir/DE1F5C40-FBD7-4F90-9DDD-4E184E9C4CE8.dmp
[task 2019-08-29T14:43:40.531Z] 14:43:40 INFO - REFTEST INFO | Saved app info as /Users/cltbld/tasks/task_1567089628/build/blobber_upload_dir/DE1F5C40-FBD7-4F90-9DDD-4E184E9C4CE8.extra
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO - REFTEST PROCESS-CRASH | file:///Users/cltbld/tasks/task_1567089628/build/tests/reftest/tests/dom/media/test/crashtests/1411322.html | application crashed [@ mozilla::(anonymous namespace)::MediaStreamGraphStableStateRunnable::Run()]
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO - Crash dump filename: /var/folders/5g/1kptcbp1615_5s2v8rdwr8qw000017/T/tmpoLVzrk.mozrunner/minidumps/DE1F5C40-FBD7-4F90-9DDD-4E184E9C4CE8.dmp
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO - Operating system: Mac OS X
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO - 10.14.5 18F132
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO - CPU: amd64
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO - family 6 model 69 stepping 1
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO - 4 CPUs
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO -
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO - GPU: UNKNOWN
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO -
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO - Crash reason: EXC_BAD_ACCESS / KERN_INVALID_ADDRESS
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO - Crash address: 0x0
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO - Process uptime: 76 seconds
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO -
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO - Thread 0 (crashed)
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO - 0 XUL!mozilla::(anonymous namespace)::MediaStreamGraphStableStateRunnable::Run() [MediaStreamGraph.cpp:3b11b55b1c97e81a38268a308d9ab422835ff79d : 1595 + 0x3bd]
[task 2019-08-29T14:43:40.650Z] 14:43:40 INFO - rax = 0x000000010b7dd1eb rdx = 0x0000000000000008
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - rcx = 0x00000001100cfe30 rbx = 0x0000000000000000
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - rsi = 0x0000000149b12180 rdi = 0x0000000117236548
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - rbp = 0x00007ffeeaf66020 rsp = 0x00007ffeeaf65f80
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - r8 = 0x00000001102000d8 r9 = 0x0000000000001a5e
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - r10 = 0x0000000000000000 r11 = 0xffff8002218d4019
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - r12 = 0x5c09b1ef162be8d4 r13 = 0x00000001172299c0
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - r14 = 0x0000000149b12000 r15 = 0x0000000000000660
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - rip = 0x0000000107c89167
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - Found by: given as instruction pointer in context
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - 1 XUL!mozilla::CycleCollectedJSContext::ProcessStableStateQueue() [CycleCollectedJSContext.cpp:3b11b55b1c97e81a38268a308d9ab422835ff79d : 435 + 0x9]
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - rbp = 0x00007ffeeaf66060 rsp = 0x00007ffeeaf66030
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - rip = 0x00000001051185c0
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - Found by: previous frame's frame pointer
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - 2 XUL!mozilla::CycleCollectedJSContext::AfterProcessTask(unsigned int) [CycleCollectedJSContext.cpp:3b11b55b1c97e81a38268a308d9ab422835ff79d : 494 + 0x8]
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - rbp = 0x00007ffeeaf660a0 rsp = 0x00007ffeeaf66070
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - rip = 0x0000000105119a7f
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - Found by: previous frame's frame pointer
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - 3 XUL!XPCJSContext::AfterProcessTask(unsigned int) [XPCJSContext.cpp:3b11b55b1c97e81a38268a308d9ab422835ff79d : 1313 + 0xb]
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - rbp = 0x00007ffeeaf660c0 rsp = 0x00007ffeeaf660b0
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - rip = 0x0000000105ed591f
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - Found by: previous frame's frame pointer
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - 4 XUL!nsThread::ProcessNextEvent(bool, bool*) [nsThread.cpp:3b11b55b1c97e81a38268a308d9ab422835ff79d : 1283 + 0xa]
[task 2019-08-29T14:43:40.651Z] 14:43:40 INFO - rbp = 0x00007ffeeaf665b0 rsp = 0x00007ffeeaf660d0
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - rip = 0x00000001051ece4d
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - Found by: previous frame's frame pointer
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - 5 XUL!NS_ProcessNextEvent(nsIThread*, bool) [nsThreadUtils.cpp:3b11b55b1c97e81a38268a308d9ab422835ff79d : 486 + 0xd]
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - rbp = 0x00007ffeeaf665e0 rsp = 0x00007ffeeaf665c0
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - rip = 0x00000001051ef189
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - Found by: previous frame's frame pointer
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - 6 XUL!mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) [MessagePump.cpp:3b11b55b1c97e81a38268a308d9ab422835ff79d : 88 + 0x7]
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - rbp = 0x00007ffeeaf66630 rsp = 0x00007ffeeaf665f0
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - rip = 0x000000010590bb01
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - Found by: previous frame's frame pointer
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - 7 XUL!nsBaseAppShell::Run() [nsBaseAppShell.cpp:3b11b55b1c97e81a38268a308d9ab422835ff79d : 137 + 0x45]
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - rbp = 0x00007ffeeaf66670 rsp = 0x00007ffeeaf66640
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - rip = 0x00000001085e0ecc
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - Found by: previous frame's frame pointer
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - 8 XUL!nsAppShell::Run() [nsAppShell.mm:3b11b55b1c97e81a38268a308d9ab422835ff79d : 705 + 0x8]
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - rbp = 0x00007ffeeaf666b0 rsp = 0x00007ffeeaf66680
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - rip = 0x0000000108668a7c
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - Found by: previous frame's frame pointer
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - 9 XUL!XRE_RunAppShell() [nsEmbedFunctions.cpp:3b11b55b1c97e81a38268a308d9ab422835ff79d : 934 + 0xa]
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - rbp = 0x00007ffeeaf66710 rsp = 0x00007ffeeaf666c0
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - rip = 0x0000000109caddbf
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - Found by: previous frame's frame pointer
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - 10 XUL!XRE_InitChildProcess(int, char**, XREChildData const*) [message_loop.cc:3b11b55b1c97e81a38268a308d9ab422835ff79d : 315 + 0xc]
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - rbp = 0x00007ffeeaf66a10 rsp = 0x00007ffeeaf66720
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - rip = 0x0000000109cad9e2
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - Found by: previous frame's frame pointer
[task 2019-08-29T14:43:40.652Z] 14:43:40 INFO - 11 plugin-container!main [MozillaRuntimeMain.cpp:3b11b55b1c97e81a38268a308d9ab422835ff79d : 23 + 0x2c]
[task 2019-08-29T14:43:40.653Z] 14:43:40 INFO - rbp = 0x00007ffeeaf66a50 rsp = 0x00007ffeeaf66a20
[task 2019-08-29T14:43:40.653Z] 14:43:40 INFO - rip = 0x0000000104c98f07
[task 2019-08-29T14:43:40.653Z] 14:43:40 INFO - Found by: previous frame's frame pointer
[task 2019-08-29T14:43:40.653Z] 14:43:40 INFO - 12 0x7fff7a8693d5
[task 2019-08-29T14:43:40.653Z] 14:43:40 INFO - rbp = 0x00007ffeeaf66a60 rsp = 0x00007ffeeaf66a60
[task 2019-08-29T14:43:40.653Z] 14:43:40 INFO - rip = 0x00007fff7a8693d5
[task 2019-08-29T14:43:40.653Z] 14:43:40 INFO - Found by: previous frame's frame pointer
|
|
1,565,255 | 14,229,336 |
This bug is for crash report bp-0d1f96ac-6903-4cdc-84bf-167aa0190711.
Seen while looking at beta and nightly crash stats: https://mzl.la/2XJ5S2D. Looks as if this regressed starting in 69 nightly. In Nightly 69 this appears to have started in 20190522093426 . Could Bug 1552734 be involved? ni on sotaro
```
Top 10 frames of crashing thread:
0 xul.dll static struct std::pair<std::_Tree_iterator<std::_Tree_val<std::_Tree_simple_types<std::pair<mozilla::layers::TextureClient*const, RefPtr<mozilla::layers::TextureClientHolder> > > > >, bool> std::map<mozilla::layers::TextureClient*, RefPtr<mozilla::layers::TextureClientHolder>, std::less<mozilla::layers::TextureClient*>, std::allocator<std::pair<mozilla::layers::TextureClient*const, RefPtr<mozilla::layers::TextureClientHolder> > > >::_Try_emplace<mozilla::layers::TextureClient*> vs2017_15.8.4/VC/include/map:228
1 xul.dll mozilla::layers::TextureClientRecycleAllocator::CreateOrRecycle gfx/layers/client/TextureClientRecycleAllocator.cpp:179
2 xul.dll mozilla::layers::D3D11YCbCrImage::CreateAndCopyDataToDXGIYCbCrTextureData gfx/layers/D3D11YCbCrImage.cpp:52
3 xul.dll mozilla::layers::ImageClient::CreateTextureClientForImage gfx/layers/client/ImageClient.cpp:121
4 xul.dll bool mozilla::layers::ImageClientSingle::UpdateImage gfx/layers/client/ImageClient.cpp:249
5 xul.dll mozilla::layers::ImageBridgeChild::UpdateImageClient gfx/layers/ipc/ImageBridgeChild.cpp:333
6 xul.dll nsresult mozilla::runnable_args_memfn<RefPtr<mozilla::layers::ImageBridgeChild>, void media/mtransport/runnable_utils.h:148
7 xul.dll MessageLoop::DoWork ipc/chromium/src/base/message_loop.cc:523
8 xul.dll base::MessagePumpDefault::Run ipc/chromium/src/base/message_pump_default.cc:35
9 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:308
```
|
|
1,565,318 | 14,229,885 |
Created attachment 9077474
FF macOS - autocomplete dropdown selected text not populating
FF 68.0
macOS 10.14.5
Autofill addresses setting unchecked
Enter login form to get autocomplete history to appear :
- https://noisetrade.com/account/signin
"Forget password"
- Enter `example`, hit button
- Repeat steps, start typing `ex` ...
- Click autocomplete dropdown entry
What happened (actual behaviour) :
Clicked autocomplete entry is highlighted blue, but is not populated to the text field.
Expected :
Clicking entry populates autocomplete entry to text field , closes autocomplete text dropdown
|
|
1,565,501 | 14,231,224 |
This bug is for crash report bp-8d12f31c-4cdd-4265-8290-ca7f70190710.
```
Top 10 frames of crashing thread:
0 xul.dll NS_ABORT_OOM xpcom/base/nsDebugImpl.cpp:604
1 xul.dll nsTArray_base<nsTArrayInfallibleAllocator, nsTArray_CopyWithMemutils>::EnsureCapacity<nsTArrayInfallibleAllocator> xpcom/ds/nsTArray-inl.h:136
2 xul.dll nsTArray_Impl<unsigned char, nsTArrayInfallibleAllocator>::AppendElements<unsigned char, nsTArrayInfallibleAllocator> xpcom/ds/nsTArray.h:2355
3 xul.dll bool mozilla::MediaSpan::Append dom/media/MediaSpan.h:89
4 xul.dll void mozilla::TrackBuffersManager::ProcessTasks dom/media/mediasource/TrackBuffersManager.cpp:217
5 xul.dll void mozilla::TrackBuffersManager::QueueTask dom/media/mediasource/TrackBuffersManager.cpp:170
6 xul.dll class RefPtr<mozilla::MozPromise<mozilla::Pair<bool, mozilla::SourceBufferAttributes>, mozilla::MediaResult, 1> > mozilla::TrackBuffersManager::DoAppendData dom/media/mediasource/TrackBuffersManager.cpp:142
7 xul.dll nsresult mozilla::detail::ProxyRunnable<mozilla::MozPromise<mozilla::Pair<bool, mozilla::SourceBufferAttributes>, mozilla::MediaResult, 1>, RefPtr<mozilla::MozPromise<mozilla::Pair<bool, mozilla::SourceBufferAttributes>, mozilla::MediaResult, 1> > xpcom/threads/MozPromise.h:1313
8 xul.dll nsresult mozilla::TaskQueue::Runner::Run xpcom/threads/TaskQueue.cpp:199
9 xul.dll nsresult nsThreadPool::Run xpcom/threads/nsThreadPool.cpp:244
```
these out of memory crash signatures are newly showing up since firefox 69 - looking related to the changes in bug 1558364.
in the extreme case of this particular report, firefox attempted to allocate over 2GB of memory.
|
|
1,565,919 | 14,234,116 |
User Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:68.0) Gecko/20100101 Firefox/68.0
Steps to reproduce:
I was writing a message in response to a thread at a mozillaZine forum. In the text I entered the word (including the single quote marks) 'update' the Firefox inbuilt speller marked the word as incorrect. I tried entering the word (including the double quote marks) "update" the speller did not mark the word as incorrect. In Firefox I use the Marco Pinto English GB speller list -- I keep this up to date at the latest version.
I emailed Marco Pinto suggesting that this might be bug in his speller. He wrote back saying that likely it was a bug, or some other recent change, Mozilla had done with the spellchecker component to Firefox -- perhaps the problem lay with Hunspell.
(I would note that I use the Marco Pinto GB speller also in Thunderbird Portable (from PortableApps). The error with the speller as described above does not occur in Thunderbird. Likewise I use the Marco Pinto GB speller in LibreOffice Writer, again, the error described above does not occur in that.)
Actual results:
Please see above.
Expected results:
I would expect that the word update enclosed in single quote marks should not be flagged as an error in Firefox. I have a suspicion that the Firefox inbuilt speller is not making allowances for people enclosing a word in single quote marks.
|
|
1,565,932 | 14,234,189 |
This bug is for crash report bp-179cdb69-13a2-44ae-963b-238350190714.
```
Top 10 frames of crashing thread:
0 user32.dll NtUserGetMessage
1 user32.dll NtUserGetMessage
2 user32.dll NtUserGetMessage
3 winspool.drv WaitForCompletionMessage
4 winspool.drv PrintUIDocumentPropertiesWrap
5 printui.dll DocumentPropertiesWrapWOW64
6 comdlg32.dll _alloca_probe
7 comdlg32.dll CPrintDialog::CreateHookDialog
8 user32.dll InternalCallWinProc
9 user32.dll UserCallDlgProcCheckWow
```
this printing related shutdownhang signature is newly showing up in firefox 69 from users of 32bit versions of firefox on windows 7. i'm not sure if the crash stack provides much useful information to go on to look into a fix though...
|
|
1,566,333 | 14,238,807 |
Steps to reproduce:
1. Enable "Restore previous session" in about:preferences
2. Set gfx.e10s.font-list.shared to true.
3. Open https://bugzilla.mozilla.org/query.cgi?format=advanced.
4. Restart Firefox.
Actual results:
The tab crashed.
Crash report: bp-a84af803-fe2a-42d7-8e73-159560190715
```
Top 10 frames of crashing thread:
0 xul.dll mozilla::ipc::MessageChannel::Send ipc/glue/MessageChannel.cpp
1 xul.dll mozilla::dom::PContentChild::SendInitializeFamily ipc/ipdl/PContentChild.cpp:5109
2 xul.dll gfxPlatformFontList::InitializeFamily gfx/thebes/gfxPlatformFontList.cpp:1048
3 xul.dll mozilla::fontlist::FontList::SearchForLocalFace gfx/thebes/SharedFontList.cpp:795
4 xul.dll gfxPlatformFontList::LookupInSharedFaceNameList gfx/thebes/gfxPlatformFontList.cpp:621
5 xul.dll class gfxFontEntry* gfxDWriteFontList::LookupLocalFont gfx/thebes/gfxDWriteFontList.cpp:876
6 xul.dll gfxPlatform::LookupLocalFont gfx/thebes/gfxPlatform.cpp:1849
7 xul.dll gfxUserFontEntry::DoLoadNextSrc gfx/thebes/gfxUserFontSet.cpp:513
8 xul.dll gfxFontGroup::GetFirstValidFont gfx/thebes/gfxTextRun.cpp:2069
9 xul.dll nsFontMetrics::XHeight gfx/src/nsFontMetrics.cpp:163
```
|
|
1,567,040 | 14,243,650 |
The following testcase crashes on mozilla-central revision b6d154b23098 (build with --enable-debug --enable-address-sanitizer, run with --fuzzing-safe --no-threads --no-baseline --no-ion --wasm-compiler=baseline and the environment variables ASAN_OPTIONS=detect_leaks=1 LSAN_OPTIONS=max_leaks=1):
// Adapted from randomly chosen test: js/src/jit-test/tests/wasm/regress/oom-masm-baseline.js
oomTest(function() {
return new WebAssembly.Module(wasmTextToBinary("(module (func i32.const 0))"));
});
Backtrace:
```
Direct leak of 12 byte(s) in 1 object(s) allocated from:
#0 0x55ead0c059f3 in __interceptor_malloc (/home/ubuntu/shell-cache/js-dbg-64-asan-linux-x86_64-b6d154b23098/js-dbg-64-asan-linux-x86_64-b6d154b23098+0x262c9f3)
#1 0x55ead3406155 in js_arena_malloc(unsigned long, unsigned long) /home/ubuntu/shell-cache/js-dbg-64-asan-linux-x86_64-b6d154b23098/objdir-js/dist/include/js/Utility.h:392:10
#2 0x55ead3406155 in js_malloc(unsigned long) /home/ubuntu/shell-cache/js-dbg-64-asan-linux-x86_64-b6d154b23098/objdir-js/dist/include/js/Utility.h:396
#3 0x55ead3406155 in js::wasm::StackMap::create(unsigned int) js/src/wasm/WasmGC.h:89
#4 0x55ead3bd34b3 in js::wasm::StackMapGenerator::createStackMap(char const*, mozilla::Vector<bool, 32ul, js::SystemAllocPolicy> const&, unsigned int, js::wasm::HasRefTypedDebugFrame, mozilla::Vector<js::wasm::Stk, 0ul, js::SystemAllocPolicy> const&) js/src/wasm/WasmBaselineCompile.cpp:2346:26
#5 0x55ead3babe0c in js::wasm::BaseCompiler::createStackMap(char const*, mozilla::Vector<bool, 32ul, js::SystemAllocPolicy> const&, unsigned int, js::wasm::HasRefTypedDebugFrame) js/src/wasm/WasmBaselineCompile.cpp:3296:31
/snip
```
For detailed crash information, see attachment.
|
|
1,571,283 | 14,278,299 |
This bug is for crash report bp-78b472ee-e41e-4d36-826b-cfe960190804.
```
Top 10 frames of crashing thread:
0 xul.dll nsresult mozilla::dom::FetchDriver::OnStartRequest dom/fetch/FetchDriver.cpp:830
1 xul.dll void mozilla::net::HttpChannelChild::DoOnStartRequest netwerk/protocol/http/HttpChannelChild.cpp:683
2 xul.dll mozilla::net::HttpChannelChild::OnStartRequest netwerk/protocol/http/HttpChannelChild.cpp:608
3 xul.dll mozilla::net::StartRequestEvent::Run netwerk/protocol/http/HttpChannelChild.cpp:427
4 xul.dll mozilla::net::ChannelEventQueue::RunOrEnqueue netwerk/ipc/ChannelEventQueue.h:210
5 xul.dll class mozilla::ipc::IPCResult mozilla::net::HttpChannelChild::RecvOnStartRequest netwerk/protocol/http/HttpChannelChild.cpp:489
6 xul.dll mozilla::net::PHttpChannelChild::OnMessageReceived ipc/ipdl/PHttpChannelChild.cpp:859
7 xul.dll mozilla::dom::PContentChild::OnMessageReceived ipc/ipdl/PContentChild.cpp:7197
8 xul.dll mozilla::ipc::MessageChannel::DispatchMessage ipc/glue/MessageChannel.cpp:2082
9 xul.dll mozilla::ipc::MessageChannel::MessageTask::Run ipc/glue/MessageChannel.cpp:1970
```
|
|
1,600,491 | 14,519,394 |
This bug is for crash report bp-f3aff941-e046-41cd-87c0-f99c40191130.
This crash appears in 2 different installations in the Windows nightly of
20191128094109.
```
Top 10 frames of crashing thread:
0 xul.dll mozilla::gfx::RecordedEventDerived<mozilla::gfx::RecordedSourceSurfaceCreation>::RecordToStream gfx/2d/RecordedEvent.h:421
1 xul.dll mozilla::gfx::DrawEventRecorderMemory::RecordEvent gfx/2d/DrawEventRecorder.cpp:58
2 xul.dll mozilla::gfx::DrawEventRecorderPrivate::StoreSourceSurfaceRecording gfx/2d/DrawEventRecorder.cpp:46
3 xul.dll static void mozilla::gfx::EnsureSurfaceStoredRecording gfx/2d/DrawTargetRecording.cpp:45
4 xul.dll void mozilla::gfx::DrawTargetRecording::FillRect gfx/2d/DrawTargetRecording.cpp:245
5 xul.dll void gfxSurfaceDrawable::DrawInternal gfx/thebes/gfxDrawable.cpp:88
6 xul.dll bool gfxSurfaceDrawable::Draw gfx/thebes/gfxDrawable.cpp:64
7 xul.dll gfxUtils::DrawPixelSnapped gfx/thebes/gfxUtils.cpp:562
8 xul.dll bool mozilla::image::imgFrame::Draw image/imgFrame.cpp:638
9 xul.dll mozilla::image::ImgDrawResult mozilla::image::RasterImage::DrawInternal image/RasterImage.cpp:1380
```
|
|
1,602,009 | 14,531,742 |
The attached crash information was detected while running CI tests with ThreadSanitizer on mozilla-central revision 6989fcd6bab3.
I briefly looked into this and it looks like it is simply racing on assigning `mSecurityObserver` vs. checking it in `TLSServerConnectionInfo::HandshakeCallback`. The `TLSServerConnectionInfo::SetSecurityObserver` uses a mutex for setting the observer, but `TLSServerConnectionInfo::HandshakeCallback` is reading `mSecurityObserver` without it.
Is this intended behavior? I guess even with the mutex being used to check `mSecurityObserver` the order between these two is still not defined and it could lead to the observer not being notified for the handshake callback (unless there is some kind of invisible guarantee that synchronizes these).
I've only seen this race happening on XPCShell tests so far.
### General information about TSan reports
#### Why fix races?
Data races are undefined behavior and can cause crashes as well as correctness issues. Compiler optimizations can cause racy code to have unpredictable and hard-to-reproduce behavior.
#### Rating
If you think this race can cause crashes or correctness issues, it would be great to rate the bug appropriately as P1/P2 and/or indicating this in the bug. This makes it a lot easier for us to assess the actual impact that these reports make and if they are helpful to you.
#### False Positives / Benign Races
Typically, races reported by TSan are not false positives [1], but it is possible that the race is benign. Even in this case it would be nice to come up with a fix if it is easily doable and does not regress performance. Every race that we cannot fix will have to remain on the suppression list and slows down the overall TSan performance. Also note that seemingly benign races can possibly be harmful (also depending on the compiler, optimizations and the architecture) [2][3].
[1] One major exception is the involvement of uninstrumented code from third-party libraries.
[2] http://software.intel.com/en-us/blogs/2013/01/06/benign-data-races-what-could-possibly-go-wrong
[3] How to miscompile programs with "benign" data races: https://www.usenix.org/legacy/events/hotpar11/tech/final_files/Boehm.pdf
#### Suppressing unfixable races
If the bug cannot be fixed, then a runtime suppression needs to be added in `mozglue/build/TsanOptions.cpp`. The suppressions match on the full stack, so it should be picked such that it is unique to this particular race. The bug number of this bug should also be included so we have some documentation on why this suppression was added.
|
|
1,606,864 | 14,572,052 |
The attached crash information was detected while running CI tests with ThreadSanitizer on mozilla-central revision c0a6eb95b65c.
This looks like an interesting race. We have this code:
https://searchfox.org/mozilla-central/rev/053826b10f838f77c27507e5efecc96e34718541/netwerk/base/nsSocketTransport2.cpp#2636
racing vs.
https://searchfox.org/mozilla-central/rev/053826b10f838f77c27507e5efecc96e34718541/netwerk/base/nsSocketTransport2.cpp#2419
I see two things that can happen here:
1) If `mFDFastOpenInProgress` is `true` then this can lead to a null crash in either of the two functions (because the other sets it to `nullptr`).
2) The two threads can race on `mDoNotRetryToConnect` causing random reconnecting (or not) on the socket thread. I am seeing that as a separate race report actually.
### General information about TSan reports
#### Why fix races?
Data races are undefined behavior and can cause crashes as well as correctness issues. Compiler optimizations can cause racy code to have unpredictable and hard-to-reproduce behavior.
#### Rating
If you think this race can cause crashes or correctness issues, it would be great to rate the bug appropriately as P1/P2 and/or indicating this in the bug. This makes it a lot easier for us to assess the actual impact that these reports make and if they are helpful to you.
#### False Positives / Benign Races
Typically, races reported by TSan are not false positives [1], but it is possible that the race is benign. Even in this case it would be nice to come up with a fix if it is easily doable and does not regress performance. Every race that we cannot fix will have to remain on the suppression list and slows down the overall TSan performance. Also note that seemingly benign races can possibly be harmful (also depending on the compiler, optimizations and the architecture) [2][3].
[1] One major exception is the involvement of uninstrumented code from third-party libraries.
[2] http://software.intel.com/en-us/blogs/2013/01/06/benign-data-races-what-could-possibly-go-wrong
[3] How to miscompile programs with "benign" data races: https://www.usenix.org/legacy/events/hotpar11/tech/final_files/Boehm.pdf
#### Suppressing unfixable races
If the bug cannot be fixed, then a runtime suppression needs to be added in `mozglue/build/TsanOptions.cpp`. The suppressions match on the full stack, so it should be picked such that it is unique to this particular race. The bug number of this bug should also be included so we have some documentation on why this suppression was added.
|
|
1,607,045 | 14,573,003 |
Created attachment 9118676
tabcrash.png
Steps to reproduce, observed with FF71.0 (64-bit) for Windows 10:
1. Firefox=> Page Setup is Landscape (not observed if it's Portrait).
2. The default printer is Microsoft Print to PDF.
2. Navigate to https://www.capitalone.com/credit-cards/dining-and-entertainment/ or the archive at http://archive.ph/xTh3E.
3. Choose File=> Print Preview.
4. The preview flashes up and then is quickly replaced by "Gah. Your tab just crashed." (Screenshot attached.)
5. You can choose Restore This Tab, which causes the screen to go gray, with no clear restoration or path forward. (Screenshot attached.)
6. Click to Close the print preview.
7. The tab flashes and is restored.
8. Other tabs are also affected. For example, having typed a partial bug report with steps to reproduce into https://bugzilla.mozilla.org/enter_bug.cgi?product=Core, all the entered text is lost and the user must restart again.
Expected behavior:
A. There is no tab-crash on print-preview.
B. When there is a tab-crash on print-preview, clicking to Restore the Tab closes Print Preview so the user can see the effect of restoration.
C. A crash in one tab does not affect other tabs, as in the example of the partial bug report being deleted.
|
|
1,607,762 | 14,579,983 |
The attached crash information was detected while running CI tests with ThreadSanitizer on mozilla-central revision 12fb5e522dd3.
It looks like we are giving up a reference to a `nsHtml5OwningUTF16Buffer` from to threads at the same time. Since this is a non-threadsafe `RefPtr` this can lead to various side-effects. For this particular race, where both threads are decreasing the non-atomic reference count, one of the updates might be trashed, so we end up with the reference count only being decremented once and have a memory leak. However, If this `RefPtr` is touched from two different threads at the same time, then there is likely some underlying ownership problem and if we increased the reference count on one thread while releasing on the other, it would cause a use-after-free.
I'm filing this as a security bug as a start until this has been fully investigated.
### General information about TSan reports
#### Why fix races?
Data races are undefined behavior and can cause crashes as well as correctness issues. Compiler optimizations can cause racy code to have unpredictable and hard-to-reproduce behavior.
#### Rating
If you think this race can cause crashes or correctness issues, it would be great to rate the bug appropriately as P1/P2 and/or indicating this in the bug. This makes it a lot easier for us to assess the actual impact that these reports make and if they are helpful to you.
#### False Positives / Benign Races
Typically, races reported by TSan are not false positives [1], but it is possible that the race is benign. Even in this case it would be nice to come up with a fix if it is easily doable and does not regress performance. Every race that we cannot fix will have to remain on the suppression list and slows down the overall TSan performance. Also note that seemingly benign races can possibly be harmful (also depending on the compiler, optimizations and the architecture) [2][3].
[1] One major exception is the involvement of uninstrumented code from third-party libraries.
[2] http://software.intel.com/en-us/blogs/2013/01/06/benign-data-races-what-could-possibly-go-wrong
[3] How to miscompile programs with "benign" data races: https://www.usenix.org/legacy/events/hotpar11/tech/final_files/Boehm.pdf
#### Suppressing unfixable races
If the bug cannot be fixed, then a runtime suppression needs to be added in `mozglue/build/TsanOptions.cpp`. The suppressions match on the full stack, so it should be picked such that it is unique to this particular race. The bug number of this bug should also be included so we have some documentation on why this suppression was added.
|
|
1,604,472 | 14,551,671 |
Created attachment 9116375
LogExport.txt
**Affected versions**
Nightly 73
Beta 72
**Affected platforms**
Windows 10 x64 (to be checked on the other OS)
**Steps to reproduce**
1. Launch Firefox and use Private Browsing window
2. Go to reddit.com
3. Save a set of credentials
4. Re-load login form
5. Generate a secure password
6. Re-open form
7. Fill in the username with the saved credential
8. Delete the filled-in password and replace it with the "No username" entry -> generated password
9. Click on Log in
10. Choose to "Update" the entry in the displayed doorhanger
**Expected result**
The entries should be merged in about:logins.
The initial username should have the generated password
The "No username" entry should be deleted given it was merged
**Actual Result**
Both entries are still displayed in about:logins.
The username does not have the new(generated) password updated
The "No username" entry is still displayed in about:logins because it was not merged
**Note**
This happens ONLY to credentials/generatedPasswords saved in Private Browsing mode.
Those credentials can't be merged in normal browsing mode either.
Saving credentials in normal browsing and merging them in Private Browsing WORKS.
|
|
1,631,615 | 14,767,768 |
Created attachment 9141874
76 left vs 77 right
(Sorry for the poor title, I don't know how to describe this)
Originally reported @ https://github.com/webcompat/web-bugs/issues/51892
STR:
1. load windy.com
Expected: You see a colorful map image with greens, yellows, reds, etc
Actual: None of that, just a blue and gray rain layer.
This gets SUPER obvious if you click on the temperature control on the top right.
In the console:
```
WebGL warning: texSubImage: Texture has not been initialized prior to a partial upload, forcing the browser to clear it. This may be slow. gl-particles.js:2:10223
WebGL warning: texSubImage: Tex image TEXTURE_2D level 0 is incurring lazy initialization.
```
11:04.45 INFO: Narrowed integration regression window from [ad3f58c9, 5f2454ac] (3 builds) to [ad3f58c9, 6392325e] (2 builds) (~1 steps left)
11:04.45 INFO: No more integration revisions, bisection finished.
11:04.45 INFO: Last good revision: ad3f58c996e59bc5ca0a0e6aac61c8f6a7e51096
11:04.45 INFO: First bad revision: 6392325ec39e5cb10edd4aaaa4afb7a9f061b0b2
11:04.45 INFO: Pushlog:
https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=ad3f58c996e59bc5ca0a0e6aac61c8f6a7e51096&tochange=6392325ec39e5cb10edd4aaaa4afb7a9f061b0b2
|
|
1,632,203 | 14,771,894 |
Created attachment 9142437
no progress bar high contrast.gif
**Note**
* note1
**Affected versions**
* Fx 77.0a1
**Affected platforms**
* Win 10
**Steps to reproduce**
1. Activate high contrast mode.
2. Download and run the stub installer.
**Expected result**
* The progress bar is visible.
**Actual result**
* The progress bar is invisible.
**Regression range**
Fx 77.0a1 (build ID 2020-04-21-09-42-20)
|
|
1,632,453 | 14,773,618 |
**Affected versions**
* 77.0a1
**Affected platforms**
* Windows 10 x64
**Preconditions**
Note:
- Firefox is already installed through Stub installer and the browser was ran at least once.
- Install NVDA (https://www.nvaccess.org/download/) screen reader
**Steps to reproduce**
1. Uninstall the installed copy from preconditions.
2. Run Stub Installer again.
3.Hover over the reinstall button.
**Expected result**
* The reinstall button is readable by the NVDA tool.
**Actual result**
* The reinstall button is not readable by the NVDA tool.
**Regression range**
Fx 77.0a1 (build ID 2020-04-21-09-42-20)
**Additional notes**
* The reinstall button is readable when using the TAB key.
|
|
1,620,213 | 14,677,835 |
The following testcase crashes on mozilla-central revision 20200305-2e1a978b09d7 (build with --enable-debug, run with --fuzzing-safe --no-threads --ion-warmup-threshold=1 --baseline-warmup-threshold=0 --disable-oom-functions):
try {
evaluate(`
for (var i40 = 0; i40 < 1536; {}) {
let target = new ArrayBuffer(1024*1024);
}
`);
} catch(exc) {}
Backtrace:
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x000055bf37c3967e in ProcessExecutableMemory::deallocate(void*, unsigned long, bool) ()
#0 0x000055bf37c3967e in ProcessExecutableMemory::deallocate(void*, unsigned long, bool) ()
#1 0x000055bf37aa5e0a in js::jit::ExecutableAllocator::releasePoolPages(js::jit::ExecutablePool*) ()
#2 0x000055bf37aa70cf in js::jit::ExecutableAllocator::purge() ()
#3 0x000055bf3777f313 in js::gc::GCRuntime::endSweepingSweepGroup(JSFreeOp*, js::SliceBudget&) ()
#4 0x000055bf377bcc41 in sweepaction::SweepActionSequence::run(js::gc::SweepAction::Args&) ()
#5 0x000055bf377acba7 in sweepaction::SweepActionForEach<js::gc::SweepGroupsIter, JSRuntime*>::run(js::gc::SweepAction::Args&) ()
#6 0x000055bf37781fc5 in js::gc::GCRuntime::performSweepActions(js::SliceBudget&) ()
#7 0x000055bf377867b9 in js::gc::GCRuntime::incrementalSlice(js::SliceBudget&, mozilla::Maybe<JSGCInvocationKind> const&, JS::GCReason, js::gc::AutoGCSession&) ()
#8 0x000055bf377895dc in js::gc::GCRuntime::gcCycle(bool, js::SliceBudget, mozilla::Maybe<JSGCInvocationKind> const&, JS::GCReason) ()
#9 0x000055bf3778b22e in js::gc::GCRuntime::collect(bool, js::SliceBudget, mozilla::Maybe<JSGCInvocationKind> const&, JS::GCReason) ()
#10 0x000055bf37745637 in js::gc::GCRuntime::gc(JSGCInvocationKind, JS::GCReason) ()
#11 0x000055bf371fdfb5 in JSRuntime::destroyRuntime() ()
#12 0x000055bf37104012 in js::DestroyContext(JSContext*) ()
#13 0x000055bf36c6fe72 in main ()
rax 0x55bf384acdde 94279771540958
rbx 0x10000 65536
rcx 0x55bf393fd850 94279787599952
rdx 0x0 0
rsi 0x7fd4a04c3770 140551199143792
rdi 0x7fd4a04c2540 140551199139136
rbp 0x7ffd7699d9c0 140726593247680
rsp 0x7ffd7699d990 140726593247632
r8 0x7fd4a04c3770 140551199143792
r9 0x7fd4a1566d00 140551216590080
r10 0x58 88
r11 0x7fd4a016a7a0 140551195633568
r12 0x212390cc8000 36436636893184
r13 0x212390c78000 36436636565504
r14 0x55bf393ff368 94279787606888
r15 0x1 1
rip 0x55bf37c3967e <ProcessExecutableMemory::deallocate(void*, unsigned long, bool)+718>
=> 0x55bf37c3967e <_ZN23ProcessExecutableMemory10deallocateEPvmb+718>: movl $0x1ac,0x0
0x55bf37c39689 <_ZN23ProcessExecutableMemory10deallocateEPvmb+729>: callq 0x55bf36cf805e <abort>
This bug is intermittently happening and varying in outcome between the two assertions in the summary and an "unhandlable oom" message:
`[unhandlable oom] Failed to mmap, likely no more mappings available memory/build/mozjemalloc.cpp : 1297`
The question here is, are we okay with these assertions firing intermittently in OOM situations? If it can be fixed easily, then it might be worth doing so, because we see this happening in fuzzing intermittently.
|
|
1,621,024 | 14,684,821 |
The payment request dialog currently fails to show on Windows due to a fluent related issue. The failure occurs in the form auto fill initialization here -
https://searchfox.org/mozilla-central/source/browser/extensions/formautofill/FormAutofill.jsm#129
stack:
[JavaScript Error: "[Exception... "Component returned failure code: 0x80520012 (NS_ERROR_FILE_NOT_FOUND) [nsIChannel.open]" nsresult: "0x80520012 (NS_ERROR_FILE_NOT_FOUND)" location: "JS frame :: resource://gre/modules/L10nRegistry.jsm :: L10nRegistry.loadSync :: line 774" data: no]"]
L10nRegistry.loadSync@resource://gre/modules/L10nRegistry.jsm:774:12
fetchFile@resource://gre/modules/L10nRegistry.jsm:676:31
generateResourceSetSync/<@resource://gre/modules/L10nRegistry.jsm:581:19
generateResourceSetSync@resource://gre/modules/L10nRegistry.jsm:576:22
generateResourceSetsForLocaleSync@resource://gre/modules/L10nRegistry.jsm:412:44
generateBundlesSync@resource://gre/modules/L10nRegistry.jsm:174:7
touchNext@resource://gre/modules/Localization.jsm:167:37
onChange@resource://gre/modules/Localization.jsm:500:20
Localization@resource://gre/modules/Localization.jsm:227:10
getRegionDisplayNames@resource://gre/modules/mozIntl.jsm:736:19
@resource://formautofill/FormAutofill.jsm:129:36
get@resource://gre/modules/XPCOMUtils.jsm:129:51
exposeUtilityFunctions@chrome://payments/content/paymentDialogFrameScript.js:96:7
sendToChrome@chrome://payments/content/paymentDialogFrameScript.js:158:12
handleEvent@chrome://payments/content/paymentDialogFrameScript.js:64:10
sendMessageToChrome@resource://payments/paymentRequest.js:76:14
init@resource://payments/paymentRequest.js:28:10
@resource://payments/paymentRequest.js:354:16
|
|
1,623,849 | 14,706,196 |
Raptor has detected a Firefox performance regression from push:
https://hg.mozilla.org/integration/autoland/pushloghtml?changeset=06a61ba9c44415c7e84eb2c1548f53a95bd651e0
As author of one of the patches included in that push, we need your help to address this regression.
Regressions:
42% raptor-tp6-pinterest-firefox-cold fcp windows10-64-shippable-qr opt 564.54 -> 804.33
37% raptor-tp6-twitter-firefox-cold fcp linux64-shippable opt 593.00 -> 811.08
36% raptor-tp6-twitter-firefox-cold fcp linux64-shippable-qr opt 593.58 -> 809.83
33% raptor-tp6-twitter-firefox-cold fcp windows7-32-shippable opt 571.00 -> 760.67
33% raptor-tp6-twitter-firefox-cold fcp windows10-64-shippable-qr opt 538.42 -> 716.42
32% raptor-tp6-pinterest-firefox-cold fcp linux64-shippable opt 655.42 -> 866.58
30% raptor-tp6-pinterest-firefox-cold fcp windows7-32-shippable opt 596.33 -> 774.58
30% raptor-tp6-pinterest-firefox-cold fcp linux64-shippable-qr opt 673.42 -> 872.08
26% raptor-tp6-pinterest-firefox-cold linux64-shippable-qr opt 907.90 -> 1,145.80
25% raptor-tp6-pinterest-firefox-cold linux64-shippable opt 902.04 -> 1,127.25
24% raptor-tp6-pinterest-firefox-cold linux64-shippable opt 913.99 -> 1,136.43
24% raptor-tp6-pinterest-firefox-cold windows10-64-shippable opt 866.00 -> 1,076.42
24% raptor-tp6-twitter-firefox-cold fcp macosx1014-64-shippable opt 873.50 -> 1,083.33
23% raptor-tp6-pinterest-firefox-cold windows10-64-shippable-qr opt 840.98 -> 1,037.25
21% raptor-tp6-pinterest-firefox-cold fcp macosx1014-64-shippable opt 1,076.50 -> 1,305.58
17% raptor-tp6-pinterest-firefox-cold windows7-32-shippable opt 861.03 -> 1,005.31
13% raptor-tp6-office-firefox-cold fcp linux64-shippable-qr opt 447.25 -> 506.33
13% raptor-tp6-pinterest-firefox-cold loadtime linux64-shippable opt 1,897.58 -> 2,146.17
13% raptor-tp6-pinterest-firefox-cold macosx1014-64-shippable opt 1,425.27 -> 1,606.14
13% raptor-tp6-office-firefox-cold fcp linux64-shippable opt 449.29 -> 505.50
12% raptor-tp6-pinterest-firefox-cold loadtime linux64-shippable-qr opt 1,945.42 -> 2,180.75
11% raptor-tp6-twitter-firefox-cold linux64-shippable opt 733.42 -> 813.41
10% raptor-tp6-pinterest-firefox-cold loadtime windows7-32-shippable opt 1,778.33 -> 1,947.42
9% raptor-tp6-twitter-firefox-cold windows7-32-shippable opt 681.64 -> 746.34
9% raptor-tp6-office-firefox-cold linux64-shippable opt 463.56 -> 507.17
9% raptor-tp6-pinterest-firefox-cold loadtime windows10-64-shippable-qr opt 1,788.58 -> 1,956.00
9% raptor-tp6-pinterest-firefox-cold loadtime windows10-64-shippable opt 1,816.17 -> 1,980.00
9% raptor-tp6-office-firefox-cold linux64-shippable-qr opt 460.98 -> 502.42
9% raptor-tp6-microsoft-firefox-cold linux64-shippable opt 544.82 -> 591.46
8% raptor-tp6-microsoft-firefox-cold fcp linux64-shippable opt 489.17 -> 529.58
8% raptor-tp6-microsoft-firefox-cold loadtime linux64-shippable opt 832.12 -> 898.00
7% raptor-tp6-microsoft-firefox-cold fcp windows10-64-shippable opt 449.50 -> 482.83
7% raptor-tp6-microsoft-firefox-cold fcp windows7-32-shippable opt 454.33 -> 487.50
6% raptor-tp6-microsoft-firefox-cold fcp windows10-64-shippable-qr opt 510.25 -> 542.58
6% raptor-tp6-microsoft-firefox-cold windows7-32-shippable opt 473.08 -> 502.28
6% raptor-tp6-microsoft-firefox-cold linux64-shippable-qr opt 555.89 -> 590.04
6% raptor-tp6-microsoft-firefox-cold fcp linux64-shippable-qr opt 546.67 -> 579.58
6% raptor-tp6-microsoft-firefox-cold windows10-64-shippable opt 470.80 -> 498.60
5% raptor-tp6-netflix-firefox-cold fcp linux64-shippable opt 579.08 -> 607.42
5% raptor-tp6-microsoft-firefox-cold windows10-64-shippable-qr opt 479.68 -> 502.08
4% raptor-tp6-netflix-firefox-cold linux64-shippable opt 761.91 -> 796.02
4% raptor-tp6-netflix-firefox-cold windows10-64-shippable-qr opt 729.32 -> 758.55
4% raptor-tp6-netflix-firefox-cold fcp windows10-64-shippable opt 553.88 -> 573.83
3% raptor-tp6-netflix-firefox-cold windows10-64-shippable opt 717.51 -> 739.48
3% raptor-tp6-sheets-firefox-cold fcp linux64-shippable opt 768.62 -> 789.42
2% raptor-tp6-sheets-firefox-cold linux64-shippable opt 904.98 -> 926.64
Improvements:
48% raptor-tp6-twitter-firefox-cold loadtime macosx1014-64-shippable opt 2,353.17 -> 1,231.08
45% raptor-tp6-twitter-firefox-cold loadtime windows10-64-shippable opt 1,468.42 -> 813.00
43% raptor-tp6-twitter-firefox-cold loadtime windows7-32-shippable opt 1,448.33 -> 828.42
42% raptor-tp6-twitter-firefox-cold loadtime linux64-shippable-qr opt 1,567.25 -> 904.58
42% raptor-tp6-twitter-firefox-cold loadtime linux64-shippable opt 1,565.25 -> 909.33
You can find links to graphs and comparison views for each of the above tests at: https://treeherder.mozilla.org/perf.html#/alerts?id=25452
On the page above you can see an alert for each affected platform as well as a link to a graph showing the history of scores for this test. There is also a link to a Treeherder page showing the Raptor jobs in a pushlog format.
To learn more about the regressing test(s) or reproducing them, please see: https://wiki.mozilla.org/TestEngineering/Performance/Raptor
*** Please let us know your plans within 3 business days, or the offending patch(es) will be backed out! ***
Our wiki page outlines the common responses and expectations: https://wiki.mozilla.org/TestEngineering/Performance/Talos/RegressionBugsHandling
|
|
1,585,106 | 14,395,309 |
This bug is for crash report bp-9d3c1b42-c28a-4d19-8e1b-f51b70190930.
```
Top 10 frames of crashing thread:
0 XUL non-virtual thunk to mozilla::net::PACResolver::Notify netwerk/base/ProxyAutoConfig.cpp
1 XUL nsTimerEvent::Run xpcom/threads/TimerThread.cpp:260
2 libobjc.A.dylib objc_msgLookupSuper2
3 libobjc.A.dylib objc_msgLookupSuper2
4 CoreFoundation _CFXNotificationPost
5 libobjc.A.dylib look_up_class
6 CoreFoundation CFBasicHashFindBucket
7 AppKit _NSGestureRecognizerRemoveObjectsFromArrayAndApplyBlocks
8 AppKit _NSGestureRecognizerRemoveObjectsFromArrayAndApplyBlocks
9 SkyLight CGSEventSourceForID
```
this browser crash signature is hitting macos users and is most common on the esr channel.
|
|
1,586,387 | 14,404,997 |
This bug is for crash report bp-a01eb454-a9d8-4f93-be48-aef0d0191004.
Seen while looking at nightly crash stats - so far only one crash on 10.15. Moz Crash reason: MOZ_DIAGNOSTIC_ASSERT(mMainThreadTrackCount > 0 || mMainThreadPortCount > 0)
Looks as if code was touched in Bug 1454998.
```
Top 10 frames of crashing thread:
0 XUL mozilla::MediaTrackGraphImpl::AppendMessage dom/media/MediaTrackGraph.cpp:1725
1 XUL mozilla::MediaTrackGraphImpl::DeviceChanged dom/media/MediaTrackGraph.cpp:873
2 XUL mozilla::runnable_args_memfn<RefPtr<mozilla::MediaTrackGraphImpl>, void media/mtransport/runnable_utils.h:148
3 XUL mozilla::EventTargetWrapper::Runner::Run xpcom/threads/AbstractThread.cpp:113
4 XUL mozilla::SchedulerGroup::Runnable::Run xpcom/threads/SchedulerGroup.cpp:295
5 XUL nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225
6 XUL NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
7 XUL mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:110
8 XUL nsBaseAppShell::Run widget/nsBaseAppShell.cpp:137
9 XUL nsAppShell::Run widget/cocoa/nsAppShell.mm:705
```
|
|
1,583,479 | 14,380,429 |
Created attachment 9094866
first reopen blocked homepage shown plus extension doorhanger.png
**Note**
* When the blocklist string is saved in uppercase and the homepage link contains the blocklist string, but with uppercase characters, and IF the blocklist is retrieved before installing an extension that hijacks the homepage, then the homepage preferences will only be reverted after the first restart AND the set homepage will be opened at first reopen of the profile, even if it's blocklisted.
**Affected versions**
* Nightly v71.0a1 from 2019-09-23 and Nightly v71.0a1 form 2019-10-03
* Beta v70.0b8 and Beta v70.0b11
**Affected platforms**
* All
**Steps to reproduce**
1. Make sure that the "pc=U510" or "PC=U510" (NOT "pc=u510" or "bing") are added to the "homepage-urls" collection of the hijack-blocklists and no other strings that would block the homepage are added.
2. Install the Remote Settings Devtools extension
https://github.com/mozilla/remote-settings-devtools/releases/tag/1.1.0
3. Click the "Remote Settings Devtools" extension icon from the toolbar.
4. Change the Environment setting (from the top-right corner) to Stage.
5. Click on "Clear ALL local data" button.
6. Click on the "Poll Server" button (or click on the "Force Sync" button from the "main/hijack-blocklists" Collection.
7. Open Bing Homepage and Search Engine and install the extension:
https://addons.mozilla.org/ro/firefox/addon/bing-homepage-searchengine/?src=search
Observation: The homepage is NOT instantly blocked and reverted to original settings.
8. Close the browser and reopen (as a normal user).
**Expected result**
* The homepage preferences set by the Bing extension are being removed, reverting the original homepage preferences and the blocked homepage is not loaded.
**Actual result**
* The blocked homepage is loaded after first restart AND the extension door hanger that notifies the user that "Your homepage has been changed." at this point when it's already blocked and reverted.
|
|
1,584,126 | 14,385,208 |
Created attachment 9095453
password revealed without entering master password.gif
[Affected Versions]:
- Nightly 71.0a1
- Beta 70.0b9
[Affected Platforms]
- All Windows
- All Mac
- All Linux
[Prerequisites]
- Have multiple logins saved.
- Have a master password set.
[Steps to reproduce]:
1. Open the latest Nightly build with the profile from prerequisites.
2. Navigate to a login page and enter the MP to unlock it (eg: "https://www.facebook.com/").
3. Open about:logins and select any saved password from the login list.
4. Right-click on the password and select the "Inspect Element" option.
5. From the Inspector tool change the input's argument from "password" to "text" and press "Ente" key.
6. Observe the password from login-item.
[Expected results]:
- The password is not revealed.
[Actual results]:
- The password is revealed.
[Notes]:
- Attached a screen recording with the issue.
|
|
1,584,143 | 14,385,287 |
**Steps to reproduce:**
1. Set `gfx.e10s.font-list.shared` to `true`.
2. Restart Firefox.
3. Download [Font Loader](https://onedrive.live.com/download?cid=F96BA52A2AF70D03&resid=F96BA52A2AF70D03%211500&authkey=AHgxfcvRZeh9SZo).
4. Download [Franklin Gothic Book Regular.ttf](https://onedrive.live.com/download?cid=F96BA52A2AF70D03&resid=F96BA52A2AF70D03%211501&authkey=AIpmTlWfHSvYhyw).
5. Open https://twitter.com/comic_natalie/status/1175062260156264448.
6. Open the **Font Loader**, Click on the **Add Fonts** button, Select the font file **Franklin Gothic Book Regular.ttf** then click **Open**.
7. Click on the **Load** button then **Unload**.
**Actual results:**
The tab crashed.
**Crash report:** bp-e1df90f5-81f3-45e6-b911-f43cd0190926
```
Top 10 frames of crashing thread:
0 xul.dll nsObserverService::NotifyObservers xpcom/ds/nsObserverService.cpp:277
1 xul.dll gfxPlatformFontList::InitFontList gfx/thebes/gfxPlatformFontList.cpp:408
2 xul.dll gfxFontGroup::GetDefaultFont gfx/thebes/gfxTextRun.cpp:1996
3 xul.dll gfxFontGroup::GetFirstValidFont gfx/thebes/gfxTextRun.cpp:2082
4 xul.dll nsFontMetrics::XHeight gfx/src/nsFontMetrics.cpp:163
5 xul.dll Gecko_GetFontMetrics layout/style/GeckoBindings.cpp:1639
6 xul.dll static struct style::font_metrics::FontMetrics style::gecko::wrapper::{{impl}}::query servo/components/style/gecko/wrapper.rs:1027
7 xul.dll static struct style::values::computed::length::CSSPixelLength style::values::specified::length::FontRelativeLength::to_computed_value servo/components/style/values/specified/length.rs:114
8 xul.dll static struct style::values::computed::length::CSSPixelLength style::values::computed::length::{{impl}}::to_computed_value servo/components/style/values/computed/length.rs:39
9 xul.dll static void style::properties::longhands::max_width::cascade_property i686-pc-windows-msvc/release/build/style-46263c804b1d9f71/out/longhands/position.rs:2721
```
|
|
1,579,929 | 14,350,896 |
Created attachment 9091488
screenshot, contents area hang up
Reproducible: always on Nightly71.0a1.
not reproduced on Firefox69.0.
Steps To Reproduce:
0. Start Nightly with newly created profile
1. Open https://twitter.com/ and logged in
2. Wait page loading
3. Resize browser width, repeat step3 1-4 times
Actual Results:
Browser UI is working. But contents has the following problem.
Mouse left, right and middle click does not work.
Mouse hover effects and mouse cursor are not changed.
Back/Reload/Home button stops working.
However, mouse wheel scroll is working as expected though page would not be added.
Expected Results:
Page should be successfully resized without hang up
|
|
1,580,194 | 14,352,770 |
Created attachment 9091733
crash with fission on.gif
This bug is for crash report bp-671f9811-6deb-42f2-b9d2-45f040190910.
```
Top 10 frames of crashing thread:
0 XUL PLDHashTable::Search const xpcom/ds/PLDHashTable.cpp:511
1 XUL nsGlobalWindowOuter::TabGroupOuter dom/base/nsGlobalWindowOuter.cpp:7729
2 XUL nsGlobalWindowOuter::TabGroupOuter dom/base/nsGlobalWindowOuter.cpp:7739
3 XUL nsGlobalWindowOuter::TabGroupOuter dom/base/nsGlobalWindowOuter.cpp:7739
4 XUL nsGlobalWindowOuter::TabGroupOuter dom/base/nsGlobalWindowOuter.cpp:7739
5 XUL nsGlobalWindowOuter::TabGroupOuter dom/base/nsGlobalWindowOuter.cpp:7739
6 XUL nsGlobalWindowOuter::TabGroupOuter dom/base/nsGlobalWindowOuter.cpp:7739
7 XUL nsGlobalWindowOuter::TabGroupOuter dom/base/nsGlobalWindowOuter.cpp:7739
8 XUL nsGlobalWindowOuter::TabGroupOuter dom/base/nsGlobalWindowOuter.cpp:7739
9 XUL nsGlobalWindowOuter::TabGroupOuter dom/base/nsGlobalWindowOuter.cpp:7739
```
**Affected versions**
* 71.0a1 (2019-09-09)
**Affected platforms**
* macOS 10.14.6
**Steps to reproduce**
1. Launch FF.
2. Go to about:config.
3. Search for fission.autostart and toggle it to True.
4. Go to the following link https://tinyurl.com/y6h7yrzp.
5. Once the page has loaded, right click the opened image and select View.
**Expected result**
* The image is opened and the tab does not crash.
**Actual result**
* When selecting the View Image from the context menu, the tab crashes.
**Regression range**
* Not a regression.
**Additional notes**
* This crash occurs only once per profile per session. Once it is occurred, following the same steps will not render another crash.
|
|
1,598,434 | 14,503,032 |
## Repro steps ##
* open about:support
* scroll down to ~mid-page
Expected result:
* page shows correctly
Actual result:
* Browser crashes
Reproduced on device: Pixel 2 XL, Android 10.
## Extra info ##
Crash occurs here due to failing assert:
https://searchfox.org/mozilla-central/rev/652014ca1183c56bc5f04daf01af180d4e50a91c/gfx/wr/webrender/src/picture.rs#3681
It looks like the tile.world_rect.origin has a fraction, causing the assert to fail.
Another thing I've noticed is that when opening the page, the content first loads at normal zoom and zooms out once the page is fully loaded. This zoom might contribute to the fraction.
|
|
1,588,484 | 14,422,987 |
Created attachment 9100838
crash.gif
This bug is for crash report bp-45377dff-3a67-448f-a941-7e1b80191014.
```
Top 10 frames of crashing thread:
0 xul.dll static class mozilla::Maybe<mozilla::gfx::IntRectTyped<mozilla::gfx::UnknownUnits> > mozilla::layers::ContainerLayerMLGPU::FindVisibleBounds gfx/layers/mlgpu/ContainerLayerMLGPU.cpp:110
1 xul.dll static class mozilla::Maybe<mozilla::gfx::IntRectTyped<mozilla::gfx::UnknownUnits> > mozilla::layers::ContainerLayerMLGPU::FindVisibleBounds gfx/layers/mlgpu/ContainerLayerMLGPU.cpp:132
2 xul.dll static class mozilla::Maybe<mozilla::gfx::IntRectTyped<mozilla::gfx::UnknownUnits> > mozilla::layers::ContainerLayerMLGPU::FindVisibleBounds gfx/layers/mlgpu/ContainerLayerMLGPU.cpp:132
3 xul.dll void mozilla::layers::ContainerLayerMLGPU::ComputeIntermediateSurfaceBounds gfx/layers/mlgpu/ContainerLayerMLGPU.cpp:162
4 xul.dll bool mozilla::layers::FrameBuilder::Build gfx/layers/mlgpu/FrameBuilder.cpp:69
5 xul.dll void mozilla::layers::LayerManagerMLGPU::RenderLayers gfx/layers/mlgpu/LayerManagerMLGPU.cpp:373
6 xul.dll void mozilla::layers::LayerManagerMLGPU::Composite gfx/layers/mlgpu/LayerManagerMLGPU.cpp:327
7 xul.dll void mozilla::layers::LayerManagerMLGPU::EndTransaction gfx/layers/mlgpu/LayerManagerMLGPU.cpp:276
8 xul.dll void mozilla::layers::CompositorBridgeParent::CompositeToTarget gfx/layers/ipc/CompositorBridgeParent.cpp:1028
9 xul.dll mozilla::layers::CompositorVsyncScheduler::Composite gfx/layers/ipc/CompositorVsyncScheduler.cpp:250
```
- Steps to Reproduce:
1. Launch Firefox
2. Set fission.autostart to true
3. Go to reddit.com
4. Restart browser using browser console
5. Go to reddit.com tab after restart
6. Repeat steps 4. and 5.
- Expected Result: No crashes, issues are encountered
- Actual Result: Browser crash in Crash in [@ mozilla::layers::ContainerLayerMLGPU::FindVisibleBounds]
|
|
1,588,993 | 14,427,359 |
**Steps to reproduce:**
1. Set `gfx.e10s.font-list.shared` to `true`.
2. Restart Firefox.
3. Download [Font Loader](https://onedrive.live.com/download?cid=F96BA52A2AF70D03&resid=F96BA52A2AF70D03%211500&authkey=AHgxfcvRZeh9SZo).
4. Download [Franklin Gothic Book Regular.ttf](https://onedrive.live.com/download?cid=F96BA52A2AF70D03&resid=F96BA52A2AF70D03%211501&authkey=AIpmTlWfHSvYhyw).
5. Open [this page](https://www.ptt.cc/bbs/Browsers/M.1422890095.A.BD3.html).
6. Open the **Font Loader**, Click on the **Add Fonts** button, Select the font file **Franklin Gothic Book Regular.ttf** then click **Open**.
7. Click on the **Load** button.
**Actual results:**
The tab crashed.
This also happens on startup.
**Crash report:** bp-cdb19dfa-e476-4433-9b62-b02000191016
```
Top 10 frames of crashing thread:
0 xul.dll mozilla::ipc::MessageChannel::Send ipc/glue/MessageChannel.cpp
1 xul.dll mozilla::dom::PContentChild::SendInitOtherFamilyNames ipc/ipdl/PContentChild.cpp:5685
2 xul.dll void gfxPlatformFontList::InitOtherFamilyNames gfx/thebes/gfxPlatformFontList.cpp:531
3 xul.dll gfxPlatformFontList::FindAndAddFamilies gfx/thebes/gfxPlatformFontList.cpp:970
4 xul.dll gfxDWriteFontList::FindAndAddFamilies gfx/thebes/gfxDWriteFontList.cpp:1703
5 xul.dll void gfxFontGroup::AddPlatformFont gfx/thebes/gfxTextRun.cpp:1762
6 xul.dll gfxFontGroup::BuildFontList gfx/thebes/gfxTextRun.cpp:1713
7 xul.dll gfxFontGroup::gfxFontGroup gfx/thebes/gfxTextRun.cpp:1696
8 xul.dll nsFontMetrics::nsFontMetrics gfx/src/nsFontMetrics.cpp:133
9 xul.dll nsFontCache::GetMetricsFor gfx/src/nsDeviceContext.cpp:178
```
|
|
1,589,342 | 14,429,835 |
This bug is for crash report bp-1aca8855-b6c6-483e-a44e-da1b90191017.
```
Top 10 frames of crashing thread:
0 xul.dll static void mozilla::ipc::IPDLParamTraits<mozilla::dom::BrowsingContext*>::Write docshell/base/BrowsingContext.cpp:1263
1 xul.dll mozilla::dom::PWindowGlobalParent::SendMakeFrameRemote ipc/ipdl/PWindowGlobalParent.cpp:113
2 xul.dll void mozilla::dom::CanonicalBrowsingContext::PendingRemotenessChange::Complete docshell/base/CanonicalBrowsingContext.cpp:297
3 xul.dll void mozilla::MozPromise<RefPtr<mozilla::dom::ContentParent>, nsresult, 0>::ThenValue<`lambda at z:/task_1571266240/build/src/docshell/base/CanonicalBrowsingContext.cpp:430:11', `lambda at z:/task_1571266240/build/src/docshell/base/CanonicalBrowsingContext.cpp:433:11'>::DoResolveOrRejectInternal xpcom/threads/MozPromise.h:726
4 xul.dll mozilla::MozPromise<RefPtr<mozilla::DOMMediaStream>, RefPtr<mozilla::MediaMgrError>, 1>::ThenValueBase::ResolveOrRejectRunnable::Run xpcom/threads/MozPromise.h:402
5 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225
6 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
7 xul.dll mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:88
8 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:308
9 xul.dll MessageLoop::Run ipc/chromium/src/base/message_loop.cc:290
```
**Affected Versions**:
Firefox 71.0a1 (BuildId:20191016212918).
**Steps to Reproduce**:
1. Launch Firefox.
2. Enable Fission.
3. Open a new tab and access the following [website](www.mediafax.ro).
4. Wait a couple of seconds
**Expected Results**
* Content is successfully loaded and Firefox is stable.
**Actual Results**
* Firefox crashes.
**Note**:
* This is **both** reproducible with fission.rebuild_frameloaders_on_remoteness_change pref to true or false.
* It seems to be related to the fact that fission.autostart is **enabled**.
|
|
1,589,854 | 14,433,947 |
This bug is for crash report bp-d0643524-ac33-4b00-ace0-7b02b0191018.
```
Top 10 frames of crashing thread:
0 xul.dll void mozilla::MozPromise<RefPtr<mozilla::media::Refcountable<nsTArray<RefPtr<mozilla::MediaDevice> > > >, RefPtr<mozilla::MediaMgrError>, 1>::ThenValue<`lambda at z:/task_1571393270/build/src/dom/media/MediaDevices.cpp:137:11', `lambda at z:/task_1571393270/build/src/dom/media/MediaDevices.cpp:166:11'>::DoResolveOrRejectInternal xpcom/threads/MozPromise.h
1 xul.dll nsresult mozilla::MozPromise<RefPtr<AudioDeviceInfo>, nsresult, 1>::ThenValueBase::ResolveOrRejectRunnable::Run xpcom/threads/MozPromise.h:402
2 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225
3 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
4 xul.dll mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:88
5 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:308
6 xul.dll MessageLoop::Run ipc/chromium/src/base/message_loop.cc:290
7 xul.dll nsBaseAppShell::Run widget/nsBaseAppShell.cpp:137
8 xul.dll nsAppShell::Run widget/windows/nsAppShell.cpp:406
9 xul.dll XRE_RunAppShell toolkit/xre/nsEmbedFunctions.cpp:934
```
|
|
1,589,930 | 14,434,306 |
This bug is for crash report bp-03bb4abb-2336-4fb6-9d04-e6c5f0191019.
This crash appears 8 times in 2 different instances in the Windows nightly
20191017093524.
```
Top 10 frames of crashing thread:
0 xul.dll nsresult txFormatNumberFunctionCall::evaluate dom/xslt/xslt/txFormatNumberFunctionCall.cpp
1 xul.dll Expr::evaluateToString dom/xslt/xpath/txExpr.cpp:20
2 xul.dll nsresult txCoreFunctionCall::evaluate dom/xslt/xpath/txCoreFunctionCall.cpp:423
3 xul.dll nsresult txValueOf::execute dom/xslt/xslt/txInstructions.cpp:767
4 xul.dll txXSLTProcessor::execute dom/xslt/xslt/txXSLTProcessor.cpp:37
5 xul.dll nsresult txMozillaXSLTProcessor::TransformToDoc dom/xslt/xslt/txMozillaXSLTProcessor.cpp:566
6 xul.dll nsresult nsTransformBlockerEvent::Run dom/xslt/xslt/txMozillaXSLTProcessor.cpp:458
7 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225
8 xul.dll NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
9 xul.dll mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:88
```
|
|
1,590,119 | 14,437,087 |
Created attachment 9102997
netblocking_UnblockNotResettingFilterList.gif
**Affected versions**
* 71.0a1 (2019-10-21)
**Affected platforms**
* Windows 10, macOS 10.13, Ubuntu 16.04;
**Steps to reproduce**
devtools.netmonitor.features.requestBlocking - pref set on true
1. Launch Firefox, access https://www.wikipedia.org/
2. enable the Netmonitor - Request Blocking section;
3. In the blocking section add to block: *wikipedia*
4. Refresh the page;
5. Right click on the blocked request;
6. Click on the Unblock option;
7. Refresh the page.
**Expected result**
* request is not blocked;
* filter is still in list but checkbox empty;
**Actual result**
* request remains blocked;
* filter appears to be toggled off(checkbox) but remains active;
**Regression range**
* most likely not a regression, only visible after implementation of bug 1580728;
**Additional notes**
* added recording with the issue;
* manually toggling the filter has the desired effect;
|
|
1,593,841 | 14,467,259 |
This bug is for crash report bp-5cc787ba-6ea3-4fa9-928f-ad9930191104.
Repeatedly this afternoon and evening, each time I visited the CalFIRE incident tracking site (https://www.fire.ca.gov/incidents/), it would finish loading (or appear to), then its tab would crash.
Upon seeing it's crashing inside the gamepad manager, I thought about the fact that I have a single joystick (An original-model Saitek Cyborg USB 3D, from way back shortly after the Mac went USB) connected, and no gamepads. So I opened up a utility that lets me examine the data returned by a joystick, and found the stick and took a look at what it was doing and all seemed normal, other than it taking a minute or so for the stick to appear in the list of available devices.
Since running that utility, the crash listed here no longer occurs. This leads me to wonder if it's possible that we are not handling some case in which a controller is connected but has not previously been accessed by the user's system (I have not used the stick at all since reinstalling macOS from scratch on a reformatted hard drive a couple of months ago).
```
Top 10 frames of crashing thread:
0 XUL InvalidArrayIndex_CRASH xpcom/ds/nsTArray.cpp:27
1 XUL mozilla::dom::GamepadManager::SetGamepadByEvent dom/gamepad/GamepadManager.cpp
2 XUL mozilla::dom::GamepadManager::Update dom/gamepad/GamepadManager.cpp:477
3 XUL mozilla::dom:: dom/gamepad/ipc/GamepadEventChannelChild.cpp:21
4 XUL nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1225
5 XUL NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:486
6 XUL mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:88
7 XUL nsBaseAppShell::Run widget/nsBaseAppShell.cpp:137
8 XUL nsAppShell::Run widget/cocoa/nsAppShell.mm:705
9 XUL XRE_RunAppShell toolkit/xre/nsEmbedFunctions.cpp:934
```
about:support information:
Application Basics
------------------
Name: Firefox
Version: 72.0a1
Build ID: 20191029093803
Update Channel: nightly
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:72.0) Gecko/20100101 Firefox/72.0
OS: Darwin 19.0.0
Multiprocess Windows: 4/4 Enabled by default
Remote Processes: 9
Enterprise Policies: Inactive
Google Location Service Key: Found
Google Safebrowsing Key: Found
Mozilla Location Service Key: Found
Safe Mode: false
Crash Reports for the Last 3 Days
---------------------------------
Report ID: bp-5cc787ba-6ea3-4fa9-928f-ad9930191104
Submitted: 35 minutes ago
Report ID: bp-2b578efc-a83e-4fa0-9906-95e550191104
Submitted: 35 minutes ago
Report ID: bp-282b15b8-90eb-4ac1-8673-26a250191103
Submitted: 1 day ago
Nightly Features
----------------
Name: Firefox Screenshots
Version: 39.0.0
ID: [email protected]
Name: Form Autofill
Version: 1.0
ID: [email protected]
Name: Web Compat
Version: 6.4.0
ID: [email protected]
Name: WebCompat Reporter
Version: 1.1.0
ID: [email protected]
Remote Processes
----------------
Type: Web Content
Count: 8 / 8
Type: Extension
Count: 1
Extensions
----------
Name: 1Password X – Password Manager
Version: 1.16.2
Enabled: true
ID: {d634138d-c276-4fc8-924b-40a0ea21d284}
Name: Amazon.com
Version: 1.1
Enabled: true
ID: [email protected]
Name: Bing
Version: 1.0
Enabled: true
ID: [email protected]
Name: DuckDuckGo
Version: 1.0
Enabled: true
ID: [email protected]
Name: eBay
Version: 1.0
Enabled: true
ID: [email protected]
Name: Firefox Voice Beta
Version: 0.11.0
Enabled: true
ID: [email protected]
Name: Google
Version: 1.0
Enabled: true
ID: [email protected]
Name: Tab Wrangler
Version: 6.7.1
Enabled: true
ID: {81b74d53-9416-4fb3-afa2-ab46684b253b}
Name: Twitter
Version: 1.0
Enabled: true
ID: [email protected]
Name: WebXR API Emulator
Version: 0.1.3
Enabled: true
ID: {c9bd631a-fdc3-488d-b083-0fed11cefb84}
Name: Wikipedia (en)
Version: 1.0
Enabled: true
ID: [email protected]
Name: Adobe Acrobat
Version: 18.0.10
Enabled: false
ID: [email protected]
Graphics
--------
Features
Compositing: OpenGL
Asynchronous Pan/Zoom: wheel input enabled; scrollbar drag enabled; keyboard enabled; autoscroll enabled
WebGL 1 Driver WSI Info: CGL
WebGL 1 Driver Renderer: ATI Technologies Inc. -- AMD Radeon Pro 580 OpenGL Engine
WebGL 1 Driver Version: 4.1 ATI-3.0.68
WebGL 1 Driver Extensions: GL_ARB_blend_func_extended GL_ARB_draw_buffers_blend GL_ARB_draw_indirect GL_ARB_ES2_compatibility GL_ARB_explicit_attrib_location GL_ARB_gpu_shader_fp64 GL_ARB_gpu_shader5 GL_ARB_instanced_arrays GL_ARB_internalformat_query GL_ARB_occlusion_query2 GL_ARB_sample_shading GL_ARB_sampler_objects GL_ARB_separate_shader_objects GL_ARB_shader_bit_encoding GL_ARB_shader_subroutine GL_ARB_shading_language_include GL_ARB_tessellation_shader GL_ARB_texture_buffer_object_rgb32 GL_ARB_texture_cube_map_array GL_ARB_texture_gather GL_ARB_texture_query_lod GL_ARB_texture_rgb10_a2ui GL_ARB_texture_storage GL_ARB_texture_swizzle GL_ARB_timer_query GL_ARB_transform_feedback2 GL_ARB_transform_feedback3 GL_ARB_vertex_attrib_64bit GL_ARB_vertex_type_2_10_10_10_rev GL_ARB_viewport_array GL_EXT_debug_label GL_EXT_debug_marker GL_EXT_depth_bounds_test GL_EXT_texture_compression_s3tc GL_EXT_texture_filter_anisotropic GL_EXT_texture_mirror_clamp GL_EXT_texture_sRGB_decode GL_APPLE_client_storage GL_APPLE_container_object_shareable GL_APPLE_flush_render GL_APPLE_object_purgeable GL_APPLE_rgb_422 GL_APPLE_row_bytes GL_APPLE_texture_range GL_ATI_texture_mirror_once GL_NV_texture_barrier
WebGL 1 Extensions: ANGLE_instanced_arrays EXT_blend_minmax EXT_color_buffer_half_float EXT_disjoint_timer_query EXT_float_blend EXT_frag_depth EXT_shader_texture_lod EXT_sRGB EXT_texture_compression_rgtc EXT_texture_filter_anisotropic OES_element_index_uint OES_fbo_render_mipmap OES_standard_derivatives OES_texture_float OES_texture_float_linear OES_texture_half_float OES_texture_half_float_linear OES_vertex_array_object WEBGL_color_buffer_float WEBGL_compressed_texture_s3tc WEBGL_compressed_texture_s3tc_srgb WEBGL_debug_renderer_info WEBGL_debug_shaders WEBGL_depth_texture WEBGL_draw_buffers WEBGL_lose_context
WebGL 2 Driver WSI Info: CGL
WebGL 2 Driver Renderer: ATI Technologies Inc. -- AMD Radeon Pro 580 OpenGL Engine
WebGL 2 Driver Version: 4.1 ATI-3.0.68
WebGL 2 Driver Extensions: GL_ARB_blend_func_extended GL_ARB_draw_buffers_blend GL_ARB_draw_indirect GL_ARB_ES2_compatibility GL_ARB_explicit_attrib_location GL_ARB_gpu_shader_fp64 GL_ARB_gpu_shader5 GL_ARB_instanced_arrays GL_ARB_internalformat_query GL_ARB_occlusion_query2 GL_ARB_sample_shading GL_ARB_sampler_objects GL_ARB_separate_shader_objects GL_ARB_shader_bit_encoding GL_ARB_shader_subroutine GL_ARB_shading_language_include GL_ARB_tessellation_shader GL_ARB_texture_buffer_object_rgb32 GL_ARB_texture_cube_map_array GL_ARB_texture_gather GL_ARB_texture_query_lod GL_ARB_texture_rgb10_a2ui GL_ARB_texture_storage GL_ARB_texture_swizzle GL_ARB_timer_query GL_ARB_transform_feedback2 GL_ARB_transform_feedback3 GL_ARB_vertex_attrib_64bit GL_ARB_vertex_type_2_10_10_10_rev GL_ARB_viewport_array GL_EXT_debug_label GL_EXT_debug_marker GL_EXT_depth_bounds_test GL_EXT_texture_compression_s3tc GL_EXT_texture_filter_anisotropic GL_EXT_texture_mirror_clamp GL_EXT_texture_sRGB_decode GL_APPLE_client_storage GL_APPLE_container_object_shareable GL_APPLE_flush_render GL_APPLE_object_purgeable GL_APPLE_rgb_422 GL_APPLE_row_bytes GL_APPLE_texture_range GL_ATI_texture_mirror_once GL_NV_texture_barrier
WebGL 2 Extensions: EXT_color_buffer_float EXT_disjoint_timer_query EXT_float_blend EXT_texture_compression_rgtc EXT_texture_filter_anisotropic OES_texture_float_linear WEBGL_compressed_texture_s3tc WEBGL_compressed_texture_s3tc_srgb WEBGL_debug_renderer_info WEBGL_debug_shaders WEBGL_lose_context
Uses Tiling: true
Uses Tiling (Content): true
Off Main Thread Painting Enabled: true
Off Main Thread Painting Worker Count: 4
Target Frame Rate: 60
GPU #1
Active: Yes
Vendor ID: 0x1002
Device ID: 0x67df
Diagnostics
AzureCanvasBackend: skia
AzureContentBackend: skia
AzureFallbackCanvasBackend: none
CMSOutputProfile: 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
Display0: 3200x1800 scale:2.000000
Display1: 2560x1440 scale:1.000000
Display2: 1920x1080 scale:1.000000
DisplayCount: 3
TileHeight: 1024
TileWidth: 1024
Decision Log
WEBRENDER:
opt-in by default: WebRender is an opt-in feature
WEBRENDER_QUALIFIED:
blacklisted by env: No qualified hardware
Media
-----
Audio Backend: audiounit-rust
Max Channels: 2
Preferred Sample Rate: 48000
Output Devices
Name: Group
USB audio CODEC: AppleUSBAudioEngine:Burr-Brown from TI:USB audio CODEC:2200000:1
SB Omni Surround 5.1 Digital Out: AppleUSBAudioEngine:Creative Technology Ltd:SB Omni Surround 5.1:000000Mb:2
SB Omni Surround 5.1: AppleUSBAudioEngine:Creative Technology Ltd:SB Omni Surround 5.1:000000Mb:1
Internal Speakers: AppleHDAEngineOutput:1F,3,0,1,1:0
DELL U2713H: AppleGFXHDAEngineOutputDP:10001:0:{AC10-A092-31314A4C}
1601W: AppleGFXHDAEngineOutputDP:10001:1:{E305-1601-000007AC}
Input Devices
Name: Group
USB audio CODEC: AppleUSBAudioEngine:Burr-Brown from TI:USB audio CODEC:2200000:2
Line In: AppleUSBAudioEngine:Creative Technology Ltd:SB Omni Surround 5.1:000000Mb:3
Internal Microphone: AppleHDAEngineInput:1F,3,0,1,0:1
Media Capabilities
Enumerate database video/av1: ResolutionLevel3-FrameRateLevel1-8bit: 1100 ResolutionLevel4-FrameRateLevel1-8bit: 1100 video/vp8: ResolutionLevel2-FrameRateLevel1-8bit: 1100 ResolutionLevel3-FrameRateLevel2-8bit: 5100 ResolutionLevel4-FrameRateLevel1-8bit: 1100 ResolutionLevel5-FrameRateLevel1-8bit: 6099 video/vp9: ResolutionLevel3-FrameRateLevel0-8bit: 1090 ResolutionLevel3-FrameRateLevel1-8bit: 2100 ResolutionLevel3-FrameRateLevel4-8bit: 1099 ResolutionLevel4-FrameRateLevel1-8bit: 2100 ResolutionLevel4-FrameRateLevel2-8bit: 1100 ResolutionLevel4-FrameRateLevel4-8bit: 1099 ResolutionLevel5-FrameRateLevel1-8bit: 11098 ResolutionLevel5-FrameRateLevel2-8bit: 1100 video/avc: ResolutionLevel0-FrameRateLevel4-8bit: 20100 ResolutionLevel1-FrameRateLevel1-8bit: 7100 ResolutionLevel1-FrameRateLevel2-8bit: 1100 ResolutionLevel1-FrameRateLevel4-8bit: 20100 ResolutionLevel2-FrameRateLevel1-8bit: 6100 ResolutionLevel2-FrameRateLevel2-8bit: 9099 ResolutionLevel3-FrameRateLevel1-8bit: 4100 ResolutionLevel3-FrameRateLevel2-8bit: 20100 ResolutionLevel4-FrameRateLevel1-8bit: 1100 ResolutionLevel4-FrameRateLevel2-8bit: 20099 ResolutionLevel4-FrameRateLevel4-8bit: 20100 ResolutionLevel5-FrameRateLevel1-8bit: 1100 ResolutionLevel5-FrameRateLevel2-8bit: 20100 ResolutionLevel5-FrameRateLevel4-8bit: 20100 ResolutionLevel6-FrameRateLevel4-8bit: 5100 video/theora:
Important Modified Preferences
------------------------------
accessibility.typeaheadfind.flashBar: 0
browser.cache.disk.amount_written: 351511
browser.cache.disk.capacity: 1048576
browser.cache.disk.filesystem_reported: 1
browser.cache.disk.hashstats_reported: 1
browser.cache.disk.telemetry_report_ID: 3
browser.contentblocking.category: standard
browser.sessionstore.upgradeBackup.latestBuildID: 20191023094816
browser.startup.homepage_override.buildID: 20191029093803
browser.startup.homepage_override.mstone: 72.0a1
browser.tabs.drawInTitlebar: false
browser.urlbar.placeholderName: Google
browser.urlbar.placeholderName.private: Google
dom.forms.autocomplete.formautofill: true
dom.push.userAgentID: 02652a305eaf4f098ac60da41b92bd26
extensions.formautofill.firstTimeUse: false
extensions.lastAppVersion: 72.0a1
font.internaluseonly.changed: true
general.autoScroll: false
idle.lastDailyNotification: 1572757834
media.gmp-gmpopenh264.abi: x86_64-gcc3
media.gmp-gmpopenh264.lastUpdate: 1571525602
media.gmp-gmpopenh264.version: 1.8.1.1
media.gmp-manager.buildID: 20191029093803
media.gmp-manager.lastCheck: 1572892582
media.gmp-widevinecdm.abi: x86_64-gcc3
media.gmp-widevinecdm.lastUpdate: 1570456220
media.gmp-widevinecdm.version: 4.10.1440.19
media.gmp.storage.version.observed: 1
network.predictor.cleaned-up: true
places.database.lastMaintenance: 1572425620
places.history.expiration.transient_current_max_pages: 72886
print.print_bgcolor: false
print.print_bgimages: false
print.print_duplex: 0
print.print_evenpages: true
print.print_in_color: true
print.print_margin_bottom: 0.5
print.print_margin_left: 0.5
print.print_margin_right: 0.5
print.print_margin_top: 0.5
print.print_oddpages: true
print.print_orientation: 0
print.print_page_delay: 50
print.print_paper_data: 0
print.print_paper_height: 11.00
print.print_paper_name:
print.print_paper_size_unit: 0
print.print_paper_width: 8.50
print.print_resolution: 0
print.print_reversed: false
print.print_scaling: 1.00
print.print_shrink_to_fit: true
print.print_to_file: false
print.print_unwriteable_margin_bottom: 56
print.print_unwriteable_margin_left: 25
print.print_unwriteable_margin_right: 25
print.print_unwriteable_margin_top: 25
privacy.sanitize.pending: [{"id":"newtab-container","itemsToClear":[],"options":{}}]
security.remote_settings.crlite_filters.checked: 1572897749
security.remote_settings.intermediates.checked: 1572897749
security.sandbox.content.tempDirSuffix: 11bb0abe-a920-f84b-837e-6ddf09465636
security.sandbox.plugin.tempDirSuffix: 22293b4e-5d3c-664f-9475-dcbbd9161160
services.sync.declinedEngines:
services.sync.engine.addresses.available: true
signon.importedFromSqlite: true
storage.vacuum.last.index: 1
storage.vacuum.last.places.sqlite: 1570491979
Important Locked Preferences
----------------------------
Places Database
---------------
JavaScript
----------
Incremental GC: true
Accessibility
-------------
Activated: false
Prevent Accessibility: 0
Library Versions
----------------
NSPR
Expected minimum version: 4.24 Beta
Version in use: 4.24 Beta
NSS
Expected minimum version: 3.47
Version in use: 3.47
NSSSMIME
Expected minimum version: 3.47
Version in use: 3.47
NSSSSL
Expected minimum version: 3.47
Version in use: 3.47
NSSUTIL
Expected minimum version: 3.47
Version in use: 3.47
Sandbox
-------
Content Process Sandbox Level: 3
Effective Content Process Sandbox Level: 3
Internationalization & Localization
-----------------------------------
Application Settings
Requested Locales: ["en-US"]
Available Locales: ["en-US"]
App Locales: ["en-US"]
Regional Preferences: ["en-US"]
Default Locale: "en-US"
Operating System
System Locales: ["en-US"]
Regional Preferences: ["en-US"]
|
|
1,594,136 | 14,469,568 |
Created attachment 9106654
testcase.html
Testcase found while fuzzing mozilla-central rev 4d585c7edc76.
```
==13867==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000001 (pc 0x7fbb267dd223 bp 0x7ffdf3b51810 sp 0x7ffdf3b51800 T0)
==13867==The signal is caused by a WRITE memory access.
==13867==Hint: address points to the zero page.
#0 0x7fbb267dd222 in mozilla::dom::MediaStreamTrack::Graph() const /builds/worker/workspace/build/src/dom/media/MediaStreamTrack.cpp:388:3
#1 0x7fbb26f7aac7 in mozilla::dom::MediaStreamTrackAudioSourceNode::Create(mozilla::dom::AudioContext&, mozilla::dom::MediaStreamTrackAudioSourceOptions const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/media/webaudio/MediaStreamTrackAudioSourceNode.cpp:52:60
#2 0x7fbb26ef0fb6 in mozilla::dom::AudioContext::CreateMediaStreamTrackSource(mozilla::dom::MediaStreamTrack&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/media/webaudio/AudioContext.cpp:431:10
#3 0x7fbb236a3037 in mozilla::dom::AudioContext_Binding::createMediaStreamTrackSource(JSContext*, JS::Handle<JSObject*>, mozilla::dom::AudioContext*, JSJitMethodCallArgs const&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/AudioContextBinding.cpp:584:98
#4 0x7fbb257c148c in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:3218:13
#5 0x7fbb2c4cf259 in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:456:13
#6 0x7fbb2c4cf259 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:548:12
#7 0x7fbb2c4b7da4 in CallFromStack /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:621:10
#8 0x7fbb2c4b7da4 in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3110:16
#9 0x7fbb2c49a0c4 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:423:10
#10 0x7fbb2c4cfd5e in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:589:13
#11 0x7fbb2c4d2069 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:634:8
#12 0x7fbb2c6ec09c in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jsapi.cpp:2718:10
#13 0x7fbb25073772 in mozilla::dom::EventListener::HandleEvent(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/EventListenerBinding.cpp:52:8
#14 0x7fbb25f5d6e5 in HandleEvent<mozilla::dom::EventTarget *> /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/dom/EventListenerBinding.h:66:12
#15 0x7fbb25f5d6e5 in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1033:43
#16 0x7fbb25f5f14a in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event**, mozilla::dom::EventTarget*, nsEventStatus*, bool) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1231:17
#17 0x7fbb25f465b8 in HandleEvent /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/EventListenerManager.h:353:5
#18 0x7fbb25f465b8 in mozilla::EventTargetChainItem::HandleEvent(mozilla::EventChainPostVisitor&, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:349:17
#19 0x7fbb25f44df1 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:551:16
#20 0x7fbb25f4a6f3 in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:1049:11
#21 0x7fbb25f510b0 in mozilla::EventDispatcher::DispatchDOMEvent(nsISupports*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsPresContext*, nsEventStatus*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp
#22 0x7fbb25f0d6d5 in mozilla::DOMEventTargetHelper::DispatchEvent(mozilla::dom::Event&, mozilla::dom::CallerType, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/events/DOMEventTargetHelper.cpp:169:17
#23 0x7fbb22ece527 in nsContentUtils::DispatchEvent(mozilla::dom::Document*, nsISupports*, nsTSubstring<char16_t> const&, mozilla::CanBubble, mozilla::Cancelable, mozilla::Composed, mozilla::Trusted, bool*, mozilla::ChromeOnlyDispatch) /builds/worker/workspace/build/src/dom/base/nsContentUtils.cpp:4020:28
#24 0x7fbb22ece303 in nsContentUtils::DispatchTrustedEvent(mozilla::dom::Document*, nsISupports*, nsTSubstring<char16_t> const&, mozilla::CanBubble, mozilla::Cancelable, mozilla::Composed, bool*) /builds/worker/workspace/build/src/dom/base/nsContentUtils.cpp:3990:10
#25 0x7fbb26f27219 in mozilla::dom::OnStateChangeTask::Run() /builds/worker/workspace/build/src/dom/media/webaudio/AudioContext.cpp:841:12
#26 0x7fbb1f043bf6 in mozilla::AutoTaskDispatcher::TaskGroupRunnable::Run() /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/TaskDispatcher.h:197:35
#27 0x7fbb1f0400c2 in mozilla::EventTargetWrapper::Runner::Run() /builds/worker/workspace/build/src/xpcom/threads/AbstractThread.cpp:113:25
#28 0x7fbb1f0665a3 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1225:14
#29 0x7fbb1f06d101 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10
#30 0x7fbb202dd42f in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:88:21
#31 0x7fbb201d7d82 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10
#32 0x7fbb201d7d82 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308:3
#33 0x7fbb201d7d82 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290:3
#34 0x7fbb281a6b48 in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:137:27
#35 0x7fbb2bfaab0f in nsAppStartup::Run() /builds/worker/workspace/build/src/toolkit/components/startup/nsAppStartup.cpp:276:30
#36 0x7fbb2c21dd67 in XREMain::XRE_mainRun() /builds/worker/workspace/build/src/toolkit/xre/nsAppRunner.cpp:4586:22
#37 0x7fbb2c21fd8d in XREMain::XRE_main(int, char**, mozilla::BootstrapConfig const&) /builds/worker/workspace/build/src/toolkit/xre/nsAppRunner.cpp:4721:8
#38 0x7fbb2c2215d0 in XRE_main(int, char**, mozilla::BootstrapConfig const&) /builds/worker/workspace/build/src/toolkit/xre/nsAppRunner.cpp:4802:21
#39 0x5624ef1c0acb in do_main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:218:22
#40 0x5624ef1c0acb in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:300:16
#41 0x7fbb420e2b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /builds/worker/workspace/build/src/dom/media/MediaStreamTrack.cpp:388:3 in mozilla::dom::MediaStreamTrack::Graph() const
```
|
|
1,594,147 | 14,469,625 |
Created attachment 9106669
testcase.html
Testcase found while fuzzing mozilla-central rev 4d585c7edc76.
```
==15029==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000094 (pc 0x7fc1629f761f bp 0x7fc0c7caf3d0 sp 0x7fc0c7caf280 T32)
==15029==The signal is caused by a WRITE memory access.
==15029==Hint: address points to the zero page.
#0 0x7fc1629f761e in mozilla::dom::XMLHttpRequestWorker::MaybeDispatchPrematureAbortEvents(mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/xhr/XMLHttpRequestWorker.cpp:1532:34
#1 0x7fc1629f8f5e in mozilla::dom::XMLHttpRequestWorker::Open(nsTSubstring<char> const&, nsTSubstring<char16_t> const&, bool, mozilla::dom::Optional<nsTSubstring<char16_t> > const&, mozilla::dom::Optional<nsTSubstring<char16_t> > const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/xhr/XMLHttpRequestWorker.cpp:1703:5
#2 0x7fc162a038bf in mozilla::dom::XMLHttpRequestWorker::Open(nsTSubstring<char> const&, nsTSubstring<char16_t> const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/xhr/XMLHttpRequestWorker.h:99:5
#3 0x7fc15fa67763 in mozilla::dom::XMLHttpRequest_Binding::open(JSContext*, JS::Handle<JSObject*>, mozilla::dom::XMLHttpRequest*, JSJitMethodCallArgs const&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/XMLHttpRequestBinding.cpp:907:28
#4 0x7fc16044848c in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/dom/bindings/BindingUtils.cpp:3218:13
#5 0x7fc0d13e9baf (<unknown module>)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /builds/worker/workspace/build/src/dom/xhr/XMLHttpRequestWorker.cpp:1532:34 in mozilla::dom::XMLHttpRequestWorker::MaybeDispatchPrematureAbortEvents(mozilla::ErrorResult&)
Thread T32 (DOM Worker) created by T0 (file:// Content) here:
#0 0x55d9c3f1989a in pthread_create /builds/worker/fetches/llvm-project/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cc:209:3
#1 0x7fc17e238129 in _PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:458:14
#2 0x7fc17e221e5e in PR_CreateThread /builds/worker/workspace/build/src/nsprpub/pr/src/pthreads/ptthread.c:533:12
#3 0x7fc159ce9426 in nsThread::Init(nsTSubstring<char> const&) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:672:8
#4 0x7fc16267b3f8 in mozilla::dom::WorkerThread::Create(mozilla::dom::WorkerThreadFriendKey const&) /builds/worker/workspace/build/src/dom/workers/WorkerThread.cpp:92:7
#5 0x7fc1625eb4cf in mozilla::dom::workerinternals::RuntimeService::ScheduleWorker(mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:1439:14
#6 0x7fc1625e9b5c in mozilla::dom::workerinternals::RuntimeService::RegisterWorker(mozilla::dom::WorkerPrivate*) /builds/worker/workspace/build/src/dom/workers/RuntimeService.cpp:1304:19
#7 0x7fc162649f1e in mozilla::dom::WorkerPrivate::Constructor(JSContext*, nsTSubstring<char16_t> const&, bool, mozilla::dom::WorkerType, nsTSubstring<char16_t> const&, nsTSubstring<char> const&, mozilla::dom::WorkerLoadInfo*, mozilla::ErrorResult&, nsTString<char16_t>) /builds/worker/workspace/build/src/dom/workers/WorkerPrivate.cpp:2362:24
#8 0x7fc1625fa2c5 in mozilla::dom::Worker::Constructor(mozilla::dom::GlobalObject const&, nsTSubstring<char16_t> const&, mozilla::dom::WorkerOptions const&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/dom/workers/Worker.cpp:31:41
#9 0x7fc15fa27b89 in mozilla::dom::Worker_Binding::_constructor(JSContext*, unsigned int, JS::Value*) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/WorkerBinding.cpp:1078:52
#10 0x7fc16715a11c in CallJSNative /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:456:13
#11 0x7fc16715a11c in CallJSNativeConstructor /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:472:8
#12 0x7fc16715a11c in InternalConstruct(JSContext*, js::AnyConstructArgs const&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:680:10
#13 0x7fc16713eba7 in Interpret(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:3101:16
#14 0x7fc1671210c4 in js::RunScript(JSContext*, js::RunState&) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:423:10
#15 0x7fc167156d5e in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:589:13
#16 0x7fc167159069 in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>, js::CallReason) /builds/worker/workspace/build/src/js/src/vm/Interpreter.cpp:634:8
#17 0x7fc16737309c in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /builds/worker/workspace/build/src/js/src/jsapi.cpp:2718:10
#18 0x7fc15fcfa772 in mozilla::dom::EventListener::HandleEvent(JSContext*, JS::Handle<JS::Value>, mozilla::dom::Event&, mozilla::ErrorResult&) /builds/worker/workspace/build/src/obj-firefox/dom/bindings/EventListenerBinding.cpp:52:8
#19 0x7fc160be46e5 in HandleEvent<mozilla::dom::EventTarget *> /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/dom/EventListenerBinding.h:66:12
#20 0x7fc160be46e5 in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1033:43
#21 0x7fc160be614a in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event**, mozilla::dom::EventTarget*, nsEventStatus*, bool) /builds/worker/workspace/build/src/dom/events/EventListenerManager.cpp:1231:17
#22 0x7fc160bcd5b8 in HandleEvent /builds/worker/workspace/build/src/obj-firefox/dist/include/mozilla/EventListenerManager.h:353:5
#23 0x7fc160bcd5b8 in mozilla::EventTargetChainItem::HandleEvent(mozilla::EventChainPostVisitor&, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:349:17
#24 0x7fc160bcbdf1 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:551:16
#25 0x7fc160bd16f3 in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /builds/worker/workspace/build/src/dom/events/EventDispatcher.cpp:1049:11
#26 0x7fc1635078ad in nsDocumentViewer::LoadComplete(nsresult) /builds/worker/workspace/build/src/layout/base/nsDocumentViewer.cpp:1164:7
#27 0x7fc1662b5179 in nsDocShell::EndPageLoad(nsIWebProgress*, nsIChannel*, nsresult) /builds/worker/workspace/build/src/docshell/base/nsDocShell.cpp:6354:20
#28 0x7fc1662b4407 in nsDocShell::OnStateChange(nsIWebProgress*, nsIRequest*, unsigned int, nsresult) /builds/worker/workspace/build/src/docshell/base/nsDocShell.cpp:6132:7
#29 0x7fc1662b92cf in non-virtual thunk to nsDocShell::OnStateChange(nsIWebProgress*, nsIRequest*, unsigned int, nsresult) /builds/worker/workspace/build/src/docshell/base/nsDocShell.cpp
#30 0x7fc15c7a8623 in nsDocLoader::DoFireOnStateChange(nsIWebProgress*, nsIRequest*, int&, nsresult) /builds/worker/workspace/build/src/uriloader/base/nsDocLoader.cpp:1352:3
#31 0x7fc15c7a729a in nsDocLoader::doStopDocumentLoad(nsIRequest*, nsresult) /builds/worker/workspace/build/src/uriloader/base/nsDocLoader.cpp:911:14
#32 0x7fc15c7a2f46 in nsDocLoader::DocLoaderIsEmpty(bool) /builds/worker/workspace/build/src/uriloader/base/nsDocLoader.cpp:731:9
#33 0x7fc15c7a5d3a in nsDocLoader::OnStopRequest(nsIRequest*, nsresult) /builds/worker/workspace/build/src/uriloader/base/nsDocLoader.cpp:619:5
#34 0x7fc15c7a6e8c in non-virtual thunk to nsDocLoader::OnStopRequest(nsIRequest*, nsresult) /builds/worker/workspace/build/src/uriloader/base/nsDocLoader.cpp
#35 0x7fc159f8242b in mozilla::net::nsLoadGroup::NotifyRemovalObservers(nsIRequest*, nsresult) /builds/worker/workspace/build/src/netwerk/base/nsLoadGroup.cpp:595:22
#36 0x7fc159f84cf4 in mozilla::net::nsLoadGroup::RemoveRequest(nsIRequest*, nsISupports*, nsresult) /builds/worker/workspace/build/src/netwerk/base/nsLoadGroup.cpp:502:10
#37 0x7fc15de67ab8 in DoUnblockOnload /builds/worker/workspace/build/src/dom/base/Document.cpp:10691:18
#38 0x7fc15de67ab8 in mozilla::dom::Document::UnblockOnload(bool) /builds/worker/workspace/build/src/dom/base/Document.cpp:10623:9
#39 0x7fc15de949fc in mozilla::dom::Document::DispatchContentLoadedEvents() /builds/worker/workspace/build/src/dom/base/Document.cpp:7179:3
#40 0x7fc15df78664 in applyImpl<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:1124:12
#41 0x7fc15df78664 in apply<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:1130:12
#42 0x7fc15df78664 in mozilla::detail::RunnableMethodImpl<mozilla::dom::Document*, void (mozilla::dom::Document::*)(), true, (mozilla::RunnableKind)0>::Run() /builds/worker/workspace/build/src/obj-firefox/dist/include/nsThreadUtils.h:1176:13
#43 0x7fc159cc0851 in mozilla::SchedulerGroup::Runnable::Run() /builds/worker/workspace/build/src/xpcom/threads/SchedulerGroup.cpp:295:32
#44 0x7fc159ced5a3 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1225:14
#45 0x7fc159cf4101 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:486:10
#46 0x7fc15af6442f in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:88:21
#47 0x7fc15ae5ed82 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10
#48 0x7fc15ae5ed82 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308:3
#49 0x7fc15ae5ed82 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290:3
#50 0x7fc162e2db48 in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:137:27
#51 0x7fc166eaa806 in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:934:20
#52 0x7fc15ae5ed82 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:315:10
#53 0x7fc15ae5ed82 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:308:3
#54 0x7fc15ae5ed82 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:290:3
#55 0x7fc166eaa0c5 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:769:34
#56 0x55d9c3f61cf0 in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:56:28
#57 0x55d9c3f61cf0 in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:272:18
#58 0x7fc17cd69b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
==15029==ABORTING
```
|
|
1,594,936 | 14,475,074 |
STEPS TO REPRODUCE:
1) Start Firefox with a clean profile
2) Load "about:preferences"
3) Type "pdf" in the search field at the top right of the preferences.
4) In the "Applications" list, change the action for "Portable Document Format (PDF)" to "Always ask"
5) Open a new window.
6) Load https://bugzilla.mozilla.org/attachment.cgi?id=9107408
7) Click the "Submit Query" button
EXPECTED RESULTS: A new tab opens while waiting for the server response, then that tab closes and a dialog appears asking me what to do with the PDF file.
ACTUAL RESULTS: A new tab opens while waiting for the server response, then the entire Firefox window (including the tab the form was in!) closes and a dialog appears asking me what to do with the PDF file.
ADDITIONAL INFORMATION: This was making it impossible for me to deal with some bank stuff today: whenever they tried to show me a PDF the entire Firefox window would close.
Bisect on nightlies says the bug appeared in https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=8e8e5bb63105fd26d10f7cba6adf85a606bceaf0&tochange=ad7a152bc66c0d411a6fb0b210d675abed9693c7
Flipping the "browser.tabs.documentchannel" preference to false makes the bug go away.
I guess DocumentChannel is only enabled on nightly so far, so we don't need to track this for 72?
|
|
519,147 | 4,320,167 |
STEPS TO REPRODUCE:
1. Install Weave 0.7pre4 in a fresh Firefox profile, & restart Firefox
2. Enter your existing Weave login credentials on the Weave firstrun page, and click through the rest of the firstrun process, accepting all the defaults.
3. Restart Firefox (once you're done with the firstrun stuff)
4. Click the Weave context menu. Or, open the Tools menu, and look at the Weave submenu.
ACTUAL RESULTS: "Sign In" is greyed out.
EXPECTED RESULTS: "Sign In" should be available.
NOTE: I can still sign in by manually visiting the "about:weave" URL.
NOTE: I initially hit this bug just now when upgrading from Weave 0.7pre3 to 0.7pre4. As suggested by the STR above, I've confirmed that it also happens in a fresh profile + weave 0.7pre4 with weave credentials entered.
|
|
519,344 | 4,321,797 |
From the TopCrash Statistics :
http://crash-stats.mozilla.com/report/list?product=Firefox&version=Firefox%3A3.5.3&query_search=signature&query_type=exact&query=&date=&range_value=1&range_unit=weeks&do_query=1&signature=GoogleDesktopNetwork3.dll%400x3dfb
Will see if i find steps to reproduce
|
|
519,767 | 4,325,269 |
filing from the topcrash statistics :
http://crash-stats.mozilla.com/report/list?product=Firefox&version=Firefox%3A3.5.3&query_search=signature&query_type=exact&query=&date=&range_value=1&range_unit=weeks&do_query=1&signature=nsXULDocument%3A%3AResumeWalk%28%29
comments mention"This has been happening for over a month now. The first time I try to start Firefox, it crashes and then restarts without a problem." but no clear steps to reproduce, maybe worth to check the urls ?
|
|
521,071 | 4,336,458 |
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 FirePHP/0.3
Build Identifier: 1.0b4
Attempting to get geolocation crashes Fennec. Same site works fine w/Firefox Desktop.
Reproducible: Always
Steps to Reproduce:
1.Browse to http://avwx.net
2.Log-in. Username: Mozilla Password: Fennec
3.Choose "Find Nearby Airports" from main menu.
4.Click the "Share" button in response to avwx.net wants your location.
Actual Results:
Fennec Crashes
Expected Results:
Display the main menu with 3 nearby airports at the top of the menu.
MacOS Crash Report attached.
|
|
521,426 | 4,339,527 |
nsRootPresContext* nsPresContext::RootPresContext() may apparently return nsPresContext instance (not nsRootPresContext that inherits that). The static cast is wrong in that function.
mPresContext->RootPresContext()->UpdatePluginGeometry(target) then may crash during mRegisteredPlugins.EnumerateEntries call, the hash table instance is a foreign object memory.
I have to find a simple STR.
Backtrace on windows:
xpcom_core.dll!PL_DHashTableEnumerate(PLDHashTable * table=0x05051930, PLDHashOperator (PLDHashTable *, PLDHashEntryHdr *, unsigned int, void *)* etor=0x01b2eb80, void * arg=0x0012e1d8) Line 743 + 0x24 bytes C
gklayout.dll!nsTHashtable<nsPtrHashKey<nsObjectFrame> >::EnumerateEntries(PLDHashOperator (nsPtrHashKey<nsObjectFrame> *, void *)* enumFunc=0x01b2cbe0, void * userArg=0x0012e4d8) Line 241 + 0x13 bytes C++
> gklayout.dll!nsRootPresContext::GetPluginGeometryUpdates(nsIFrame * aChangedSubtree=0x06eb6098, nsTArray<nsIWidget::Configuration> * aConfigurations=0x0012e544) Line 2347 C++
gklayout.dll!nsRootPresContext::UpdatePluginGeometry(nsIFrame * aChangedSubtree=0x06eb6098) Line 2395 C++
gklayout.dll!PresShell::DoReflow(nsIFrame * target=0x06eb6098, int aInterruptible=0x00000000) Line 7362 C++
gklayout.dll!PresShell::ProcessReflowCommands(int aInterruptible=0x00000000) Line 7428 + 0x10 bytes C++
gklayout.dll!PresShell::FlushPendingNotifications(mozFlushType aType=Flush_Layout) Line 4892 + 0x12 bytes C++
gklayout.dll!nsEditor::EndUpdateViewBatch() Line 4397 C++
gklayout.dll!nsEditor::EndPlaceHolderTransaction() Line 1002 C++
gklayout.dll!nsAutoPlaceHolderBatch::~nsAutoPlaceHolderBatch() Line 65 + 0x31 bytes C++
gklayout.dll!nsPlaintextEditor::DeleteSelection(short aAction=0x0000) Line 765 + 0x26 bytes C++
gklayout.dll!nsTextControlFrame::SetValue(const nsAString_internal & aValue={...}) Line 2692 C++
gklayout.dll!nsTextControlFrame::SetFormProperty(nsIAtom * aName=0x00d00160, const nsAString_internal & aValue={...}) Line 1902 + 0xf bytes C++
gklayout.dll!nsHTMLInputElement::SetValueInternal(const nsAString_internal & aValue={...}, nsITextControlFrame * aFrame=0x00000000, int aUserInput=0x00000000) Line 1057 C++
gklayout.dll!nsHTMLInputElement::SetValue(const nsAString_internal & aValue={...}) Line 922 C++
gklayout.dll!nsHTMLInputElement::Reset() Line 2466 + 0x1c bytes C++
gklayout.dll!nsDocument::Sanitize() Line 6807 C++
gklayout.dll!DocumentViewerImpl::Destroy() Line 1493 + 0x1e bytes C++
gklayout.dll!DocumentViewerImpl::Show() Line 1882 C++
gklayout.dll!nsPresContext::EnsureVisible() Line 1592 C++
gklayout.dll!PresShell::UnsuppressAndInvalidate() Line 4632 + 0xb bytes C++
gklayout.dll!PresShell::UnsuppressPainting() Line 4675 C++
gklayout.dll!DocumentViewerImpl::LoadComplete(unsigned int aStatus=0x00000000) Line 1064 C++
docshell.dll!nsDocShell::EndPageLoad(nsIWebProgress * aProgress=0x0535a5a4, nsIChannel * aChannel=0x00da7b28, unsigned int aStatus=0x00000000) Line 5748 C++
docshell.dll!nsDocShell::OnStateChange(nsIWebProgress * aProgress=0x0535a5a4, nsIRequest * aRequest=0x00da7b28, unsigned int aStateFlags=0x00020010, unsigned int aStatus=0x00000000) Line 5626 C++
docshell.dll!nsDocLoader::FireOnStateChange(nsIWebProgress * aProgress=0x0535a5a4, nsIRequest * aRequest=0x00da7b28, int aStateFlags=0x00020010, unsigned int aStatus=0x00000000) Line 1315 C++
docshell.dll!nsDocLoader::doStopDocumentLoad(nsIRequest * request=0x00da7b28, unsigned int aStatus=0x00000000) Line 937 C++
docshell.dll!nsDocLoader::DocLoaderIsEmpty(int aFlushLayout=0x00000001) Line 804 C++
docshell.dll!nsDocLoader::OnStopRequest(nsIRequest * aRequest=0x053712b0, nsISupports * aCtxt=0x00000000, unsigned int aStatus=0x00000000) Line 700 C++
necko.dll!nsLoadGroup::RemoveRequest(nsIRequest * request=0x053712b0, nsISupports * ctxt=0x00000000, unsigned int aStatus=0x00000000) Line 680 + 0x2e bytes C++
imglib2.dll!imgRequestProxy::RemoveFromLoadGroup(int releaseLoadGroup=0x00000001) Line 195 C++
imglib2.dll!imgRequestProxy::OnStopRequest(nsIRequest * request=0x064674c0, nsISupports * ctxt=0x00000000, unsigned int statusCode=0x00000000, int lastPart=0x00000001) Line 648 C++
imglib2.dll!imgRequest::OnStopRequest(nsIRequest * aRequest=0x064674c0, nsISupports * ctxt=0x00000000, unsigned int status=0x00000000) Line 939 C++
imglib2.dll!ProxyListener::OnStopRequest(nsIRequest * aRequest=0x064674c0, nsISupports * ctxt=0x00000000, unsigned int status=0x00000000) Line 1784 C++
necko.dll!nsStreamListenerTee::OnStopRequest(nsIRequest * request=0x064674c0, nsISupports * context=0x00000000, unsigned int status=0x00000000) Line 66 C++
necko.dll!nsHttpChannel::OnStopRequest(nsIRequest * request=0x06de3600, nsISupports * ctxt=0x00000000, unsigned int status=0x00000000) Line 5256 C++
necko.dll!nsInputStreamPump::OnStateStop() Line 577 C++
necko.dll!nsInputStreamPump::OnInputStreamReady(nsIAsyncInputStream * stream=0x064e56c8) Line 401 + 0xb bytes C++
xpcom_core.dll!nsInputStreamReadyEvent::Run() Line 113 C++
xpcom_core.dll!nsThread::ProcessNextEvent(int mayWait=0x00000001, int * result=0x0012f838) Line 527 + 0x19 bytes C++
xpcom_core.dll!NS_ProcessNextEvent_P(nsIThread * thread=0x00cee6a0, int mayWait=0x00000001) Line 230 + 0x16 bytes C++
gkwidget.dll!nsBaseAppShell::Run() Line 170 + 0xc bytes C++
toolkitcomps.dll!nsAppStartup::Run() Line 182 + 0x1c bytes C++
xul.dll!XRE_main(int argc=0x00000005, char * * argv=0x00ce9be8, const nsXREAppData * aAppData=0x00ce1a08) Line 3420 + 0x25 bytes C++
firefox.exe!NS_internal_main(int argc=0x00000005, char * * argv=0x00ce9be8) Line 156 + 0x12 bytes C++
firefox.exe!wmain(int argc=0x00000005, wchar_t * * argv=0x00cbfce0) Line 110 + 0xd bytes C++
firefox.exe!__tmainCRTStartup() Line 594 + 0x19 bytes C
firefox.exe!wmainCRTStartup() Line 414 C
kernel32.dll!7c817077()
[Frames below may be incorrect and/or missing, no symbols loaded for kernel32.dll]
|
|
521,668 | 4,341,525 |
Kinda wierd, but when trying to go this page, get these crashes (did it 3 times, two were [@SinkContext::DidAddContent(nsIContent*) ] the other was the @xul one).
bp-032188c2-20c6-4d3f-b6b1-9fece2091011
bp-d81fe7bb-56b9-46eb-9359-217fb2091011
bp-2a44d905-cb6c-4fcb-b74c-b5a942091011
Did not crash in safe mode.
|
|
527,306 | 4,386,810 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2b2pre) Gecko/20091030 Namoroka/3.6b2pre
Build Identifier:
The summary is probably all wrong but I can't really understand the mechanics behind what happens in the code and why it results in wrong text.value ... The bug revealed itself while using a web application I'm developing on firefox 3.6b1.
I narrowed down the problem and created two test cases.
test-fail.html (bug, div display style change)
test-work.html (no bug, no div display style change)
The problem appears both when jit.content is true or false.
Reproducible: Always
Steps to Reproduce:
1. Open attached 'test-fail.html'
2. Click on edit button next to the first 'Battambang' item
(you can change item text with the edit text box that appeared)
3. Click on edit button next to the second 'Mondolkiri' item
Actual Results:
When clicking on edit button of a second item, the value in the edit text box is not updated to use the second item's text but keep value of first item.
Expected Results:
The edit text box value is updated to the content of second item.
(I'm setting severity of bug to critical as the behavior can lead to lose of data if one is not aware of value wrongfully assigned during interface with page)
|
|
538,351 | 4,477,009 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.7) Gecko/20091221 Firefox/3.5.7 (.NET CLR 3.5.30729)
Build Identifier: 2.3
Preconditions:
You have a test run with at least 1 test case, that has a Resolved Fixed bug attached.
Reproducible: Always
Steps to Reproduce:
1. Go to the test case run
2. Select the case
3. Check the Update bug checkbox
4. Click on Pass or Fail button to set the status of the case-run
Actual Results:
The attached bug's status is not changed.
Expected Results:
As described in manual, Resolved Fixed bugs should change their status according to the case run status. pass = verified, failed = reopened
In addition, I would like to ask the behavior in the case, when a test case run has more bugs attached. I suppose, that all bugs should be updated accordingly.
|
|
514,660 | 4,283,340 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2a2pre) Gecko/20090903 Firefox/3.5.1
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.3a1pre) Gecko/20090903 Minefield/3.7a1pre ID:20090903063153
Minefield crashes with Crash Report When View > Page Style > No.Style on certain page.
It does not crash unless you log in to the page.
Reproducible: Always
Steps to Reproduce:
1. Start Minefield with New Profile.
2. Login bugzilla.mozilla.org ( https://bugzilla.mozilla.org )
3. Go URL https://bugzilla.mozilla.org/show_bug.cgi?id=514629
4. View > Page Style > No Style
(You should log in to the bugzilla.mozilla.org)
Actual Results:
Minefield crashes with Crash Report.
Expected Results:
Should not crash. No Style should be applied.
Crash Report of Minefield:
http://crash-stats.mozilla.com/report/index/07a2fb58-5ba5-4fca-b60d-89b5f2090904?p=1
Namoroka 3.6a2pre crashes also. but the crash report is not same the above.
Crash Report of Namoroka:
http://crash-stats.mozilla.com/report/index/0cf3115c-2fd4-41f6-a053-d1a032090904?p=1
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2a2pre) Gecko/20090903 Namoroka/3.6a2pre ID:20090903051734
|
|
515,211 | 4,288,047 |
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322)
Build Identifier: http://www.mozilla.com/en-US/firefox/ie.html
since the new firefox update (version 3.5.2) every time i open firefox the browser freezes for around half an hour, and then crashes. before finishing loading ANY pages. I've tried at least 7 or 8 times with the same results.
Reproducible: Always
Steps to Reproduce:
1.open firefox
2.
3.
Actual Results:
it freezes, then crashes minutes later.
Expected Results:
it should have done what it was supposed to do. let me browse the internet.
|
|
515,403 | 4,290,013 |
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; Maxthon; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 1.1.4322; InfoPath.2; MS-RTC LM 8; CIBA; .NET CLR 3.5.30729; .NET CLR 3.0.30618)
Build Identifier: The bug order (js_FinishRuntimeScriptState --> js_SweepScriptFilenames) can still occur and cause crash
Dear developers:
I am investigating the bug order (js_FinishRuntimeScriptState --> js_SweepScriptFilenames) in latest javascript code in hg repository. In this bug order, js_FinishRuntimeScriptState will destroy a hash table, then js_SweepScriptFilenames will access this table, causing a crash. I have used sempahores to successfully enforce a feasible schedule in latest source code to prove that this bug order can still happen.
Although this bug can be hidden by another fix for another bug 131246 (the fix for this bug is adding NULL check at js_{Mark,Sweep}AtomState), this bug order is very dangerous. In the past 7 years (starting from the bug 133773 at 2002), developers have tried some ordering mechanisms like js_WaitForGC to avoid this bug order, but failed.
The corresponding bug order in old code (js-1.5) is (js_FreeAtomState --> js_{Mark,Sweep}AtomState). Regarding the fixes in bug 133773, my schedule can cause a crash (please refer to the 133773 and 477021 bug pages for more details), because the NULL check at js_{Mark,Sweep}AtomState has not been deployed when bug 133773 is being fixed. This means that the fix in bug 133773 actually can not fix 133773, and a crash can still occur after the patches in 133773 are added.
Since I am using semaphores, this bug can happen at each execution.
Reproducible: Always
Steps to Reproduce:
1. Add my patch to latest js source code in hg repository.
2. Run my simple testcase (just start two threads and only two threads).
3. Bug occur.
Actual Results:
Below is my output, which shows js_FinishRuntimeScriptState is called in one thread, and then js_{Mark,Sweep}ScriptFilenames is called in another thread:
---------------------------------------------------------------------------
DestroyContext tid -1220404336 in critical region, js_ContextNum 2
Tid -1220404336 sets -1220404336 to sem 1 tid1
Tid -1220404336 sets -1220404336 to sem 2 tid2
Tid -1220404336 js_WaitForGC in js_DestroyContext
enter js_GC tid -1220404336, rt state 2, gcLevel 0
Tid -1220404336 post on sem 1
Tid -1220404336 wait on sem 2
DestroyContext tid -1229329520 in critical region, js_ContextNum 1
Tid -1229329520 sets -1229329520 to sem 1 tid2
Tid -1229329520 sets -1229329520 to sem 2 tid1
Tid -1229329520 wait on sem 1
Tid -1229329520 wakes up on sem 1
Tid -1229329520 js_WaitForGC in js_DestroyContext
enter js_GC tid -1229329520, rt state 3, gcLevel 0
Tid -1229329520 js_MarkScriptFilenames
Tid -1229329520 destroy js_FinishRuntimeScriptState
Tid -1229329520 post on sem 2
Tid -1220404336 wakes up on sem 2
Tid -1220404336 js_MarkScriptFilenames
Tid -1220404336 js_MarkScriptFilenames NUUUUUUUL, will CRASH without the scriptFilenameTable check! 0
Tid -1220404336 js_SweepScriptFilenames NUUUUUUUL, will CRASH without the scriptFilenameTable check!
A crash and its gdb backtrace if I remove the NULL check at js_{Mark,Sweep}ScriptFilenames functions (we can see that ht=0x0, because js_FinishRuntimeScriptState has already destroyed this table):
(gdb) bt
#0 JS_HashTableEnumerateEntries (ht=0x0, f=0x80ccb10 <js_script_filename_sweeper>, arg=0x8135818) at jshash.cpp:361
#1 0x080cd1e0 in js_SweepScriptFilenames (rt=0x8135818) at jsscript.cpp:1310
#2 0x08080a83 in js_GC (cx=0x813d310, gckind=GC_NORMAL) at jsgc.cpp:3744
#3 0x0805d8f5 in js_DestroyContext (cx=0x813d310, mode=JSDCM_FORCE_GC) at jscntxt.cpp:768
#4 0x0804e759 in JS_DestroyContext (cx=0x813d310) at jsapi.cpp:1074
#5 0x0804a4d7 in RunJavascript ()
|
|
522,430 | 4,347,358 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.4) Gecko/20091007 Firefox/3.5.4
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.4) Gecko/20091007 Firefox/3.5.4
When new windows are opened in Firefox, the new window has a reference to the window that created it using window.opener. If window.opener is a ChromeWindow, then any webpage opened in this window will be able to access the functions inside the ChromeWindow.
Both Firefox itself and many extensions for Firefox often open windows from within chrome code. With this security hole, windows opened by chrome code are unsafe.
Reproducible: Always
Steps to Reproduce:
1. Select Help -> About Mozilla Firefox
2. Click on "Licensing Information"
3. A new window will open with licensing information. In this window, go to http://www.google.com
4. In the URL bar, type javascript:window.opener.URLBarSetURI({spec:"https://www.ebay.com/"},true)
5. In the URL bar, type javascript:window.opener.BrowserOffline.toggleOfflineStatus()
6. Browse to a web page that contains the above code in a script tag. Note that Firefox's security model does not prevent this code from running.
Actual Results:
1. The URL bar of the opening window is set to "https://www.ebay.com/"
2. The browser is set to work offline
3. Web pages can access and run chrome code
Expected Results:
The new window should not be able to access properties of the chrome window.
This bug likely effects not just Firefox itself, but also many extensions which open windows using window.open.
|
|
526,391 | 4,379,134 |
STEPS TO REPRODUCE:
1. Connect to Weave
2. From Weave Context menu, choose "Sync Now", to make sure you're fully synchronized. (Not sure if this is required, but it's the state I've been in when I've reproduced this.)
3. Severely rate-limit your network connection.
On Ubuntu Linux: "sudo wondershaper eth0 10 10"
4. Open Weave Context menu, and choose "Sync Now"
5. Immediately re-open Weave Context menu and choose "Activity Log" (while you're syncing)
RESULT:
* Crash
* ALSO: The next time I start Firefox & connect to Weave, Weave performs a full sync (with "First sync, uploading all items" showing up in the activity log)
Crash reports:
http://crash-stats.mozilla.com/report/index/6885b562-9156-4da8-949a-d298d2091103
http://crash-stats.mozilla.com/report/index/f7622986-9d96-4721-92eb-26ce92091103
Version Info:
Weave version 0.8
Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.3a1pre) Gecko/20091103 Minefield/3.7a1pre
|
|
619,021 | 5,141,392 |
User-Agent: Mozilla/5.0 (X11; Linux i686 on x86_64; rv:2.0b7) Gecko/20100101 Firefox/4.0b7
Build Identifier: Firefox 4.0b7
Opening a specific HTML document consisting mainly of marquee elements causes current Firefox 4.0b7 to crash with an invalid read of size 4 with a high address (0xf0dea813) in libxul.so.
Reproducible: Always
Steps to Reproduce:
1.$ echo "<foo> <marquee> <marquee> <marquee> <marquee> <marquee>
<marquee> <foo> <marquee> <foo> <marquee> <foo> <object> <marquee>
<foo> <marquee> <marquee> <foo> <foo> <marquee> <marquee> <foo>
<marquee> <marquee> <marquee> <foo> <marquee> <foo> <foo> <marquee>
<marquee>" > marquee.html
2.
3. firefox marquee.html
Actual Results:
Firefox crashes with a segfault.
Expected Results:
Firefox remains running.
This looks like a potentially dangerous crash to me. 4.0 stable release is probably not too far off, and many people are already using 4.0 beta series, so reporting this as a security issue to be on the safe side.
|
|
628,114 | 5,220,368 |
User-Agent: Opera/9.80 (Windows NT 6.1; U; en) Presto/2.7.62 Version/11.01
Build Identifier: NSS 3.12.8
To delete a certificate from the Microsoft CAPI store, ckcapi_mdObject_Destroy does the following:
1. CertFindCertificateInStore to get the certificate context
2. Call CertDeleteCertificateFromStore to delete the certificate from MS CAPI store
3. Redundant call to CertFreeCertificateContext which leads to a crash
Reproducible: Always
Steps to Reproduce:
1. call SEC_DeletePermCertificate, pass any certificate from Microsoft CAPI store as an argument.
Actual Results:
The application crashes with an access violation reading invalid memory address
Expected Results:
The certificate is successfully deleted or an error code is returned
MSDN says CertDeleteCertificateFromStore always calls CertFreeCertificateContext. Removing the call to CertFreeCertificateContext solves the problem.
|
|
628,115 | 5,220,369 |
User-Agent: Opera/9.80 (Windows NT 6.1; U; en) Presto/2.7.62 Version/11.01
Build Identifier: NSS 3.12.8
nss_ckcapi_WideToUTF8 passes invalid length argument to WideCharToMultiByte which leads to a crash
Reproducible: Sometimes
Steps to Reproduce:
1. load the MS CAPI module
2. call PK11_ListCerts(PK11CertListAll, NULL)
Actual Results:
Application crashes with access violation
Expected Results:
Application does not crash
WideCharToMultiByte expects the cchWideChar argument in WCHAR values, not in bytes. nss_ckcapi_WideToUTF8 calculates the size of the wide character string in bytes and passes it as an argument to WideCharToMultiByte. Passing "-1" solves this issue.
|
|
628,118 | 5,220,386 |
User-Agent: Opera/9.80 (Windows NT 6.1; U; en) Presto/2.7.62 Version/11.01
Build Identifier: NSS 3.12.8
When CERT_ChangeCertTrust is called on a certificate which is stored in Microsoft CAPI store, the application crashes.
Internally, nss_ckcapi_CreateObject is called to create a trust object. Since this is not supported, nss_ckcapi_CreateObject should return NULL. However, nss_ckcapi_CreateObject fails to initialize "io" and even if the object type is not supproted it tries to access the "io" variable.
Reproducible: Always
Steps to Reproduce:
1. call CERT_ChangeCertTrust on a certificate which is stored in Microsoft CAPI store
Actual Results:
The application crashes with an access violation
Expected Results:
nss_ckcapi_CreateObject should return NULL when creating an unsupported object type
"io" local variable in nss_ckcapi_CreateObject should be initialized to NULL to solve this issue.
|
|
507,167 | 4,222,258 |
Created attachment 391362
test file that causes crash
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.12) Gecko/2009070811 Ubuntu/9.04 (jaunty) Firefox/3.0.12
Build Identifier: mozilla-central revision bf4d4c37361c
Segmentation fault when playing corrupted ogg vorbis file (attached).
Reproducible: Always
Steps to Reproduce:
1. Load attached file.
Actual Results:
firefox crashes
Expected Results:
some sort of "this file is corrupted" message
|
|
496,316 | 4,129,133 |
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_6; en-us) AppleWebKit/528.16 (KHTML, like Gecko) Version/4.0 Safari/528.16
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1pre) Gecko/20090602 Shiretoko/3.5pre
In the new XULRunner build seems that E4X doesn't set correctly the xmlns attribute.
If we try to set "lang" attribute on xmlns, will be raised an ReferenceError ('xmlns is not defined") if this code is executed into a function.
This error is reproducible in Firefox (last build), both of Windows and OS X. Executing this line on Error Console:
(function() {var xmlns = new Namespace("xml", "http://www.w3.org/XML/1998/namespace"); var xml = <data />; xml.@xmlns::lang = "en-US"; alert(xml.toXMLString());})()
will raise an error, meanwhile:
var xmlns = new Namespace("xml", "http://www.w3.org/XML/1998/namespace"); var xml = <data />; xml.@xmlns::lang = "en-US"; alert(xml.toXMLString());
will be fine.
Reproducible: Always
Steps to Reproduce:
1. Open Error Console on Firefox
2. Evaluate: (function() {var xmlns = new Namespace("xml", "http://www.w3.org/XML/1998/namespace"); var xml = <data />; xml.@xmlns::lang = "en-US"; alert(xml.toXMLString());})()
3. The ReferenceError "xmlns is not defined" will be raised.
Actual Results:
a ReferenceError that said xmlns is not defined
Expected Results:
no throwing error, xmlns should be defined and lang attribute set as well; at the end, the alert() should be displayed the correct XML code with namespace and lang.
|
|
488,734 | 4,062,867 |
Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2a1pre) Gecko/20090416 Firefox/3.6a1pre
found during the topsite tests with the latest TM Build. Seems to be a regression because does not happen with builds 2 days old.
Steps to reproduce:
Just load a major site like gmx.net
--> Assertion failure
Program received signal SIGTRAP, Trace/breakpoint trap.
JS_Assert (s=0x410f88 "scope->shape == PCVCAP_SHAPE(entry->vcap)", file=0x40db28 "/work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jstracer.cpp", ln=7478) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jsutil.cpp:69
69 abort();
(gdb) bt
#0 JS_Assert (s=0x410f88 "scope->shape == PCVCAP_SHAPE(entry->vcap)", file=0x40db28 "/work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jstracer.cpp", ln=7478) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jsutil.cpp:69
#1 0x003adb79 in TraceRecorder::record_SetPropMiss (this=0xff72f90, entry=0x6eab58) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jstracer.cpp:7478
#2 0x002dd69a in js_Interpret (cx=0xb37c00) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jsinterp.cpp:4803
#3 0x002f26f3 in js_Execute (cx=0xb37c00, chain=0x1485c6a0, script=0xf98a00, down=0x0, flags=0, result=0x0) at jsinterp.cpp:1632
#4 0x00276bd5 in JS_EvaluateUCScriptForPrincipals (cx=0xb37c00, obj=0x1485c6a0, principals=0x16bbcec4, chars=0xfe9a008, length=50516, filename=0xff79438 "http://js.ui-portal.de/gmx/home/js/20090331/prototype.js", lineno=1, rval=0x0) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/js/src/jsapi.cpp:5154
#5 0x0bb4aa51 in nsJSContext::EvaluateString (this=0x136ea350, aScript=@0xff794c4, aScopeObject=0x1485c6a0, aPrincipal=0x16bbcec0, aURL=0xff79438 "http://js.ui-portal.de/gmx/home/js/20090331/prototype.js", aLineNo=1, aVersion=0, aRetValue=0x0, aIsUndefined=0xbfffd0c4) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/dom/base/nsJSEnvironment.cpp:1603
#6 0x0b924b34 in nsScriptLoader::EvaluateScript (this=0x16bbe6e0, aRequest=0xff794b0, aScript=@0xff794c4) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/content/base/src/nsScriptLoader.cpp:686
#7 0x0b924f04 in nsScriptLoader::ProcessRequest (this=0x16bbe6e0, aRequest=0xff794b0) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/content/base/src/nsScriptLoader.cpp:600
#8 0x0b924f90 in nsScriptLoader::ProcessPendingRequests (this=0x16bbe6e0) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/content/base/src/nsScriptLoader.cpp:739
#9 0x0b9252de in nsScriptLoader::OnStreamComplete (this=0x16bbe6e0, aLoader=0xff79880, aContext=0xff794b0, aStatus=0, aStringLen=50516, aString=0xfe84008 "/* DON'T EDIT THIS GENERATED FILE! Changes will be lost. */\r\n\r\n/* Prototype JavaScript framework, version 1.4.0\r\n * (c) 2005 Sam Stephenson <[email protected]>\r\n *\r\n * Prototype is freely distributable"...) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/content/base/src/nsScriptLoader.cpp:926
#10 0x0948ca4b in nsStreamLoader::OnStopRequest (this=0xff79880, request=0xff79510, ctxt=0xff794b0, aStatus=0) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/netwerk/base/src/nsStreamLoader.cpp:108
#11 0x094b07d7 in nsHTTPCompressConv::OnStopRequest (this=0xff7b620, request=0xff79510, aContext=0xff794b0, aStatus=0) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/netwerk/streamconv/converters/nsHTTPCompressConv.cpp:127
#12 0x0948c058 in nsStreamListenerTee::OnStopRequest (this=0xff7a6e0, request=0xff79510, context=0xff794b0, status=0) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/netwerk/base/src/nsStreamListenerTee.cpp:65
#13 0x0953a25d in nsHttpChannel::OnStopRequest (this=0xff794e0, request=0xff79f80, ctxt=0x0, status=0) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/netwerk/protocol/http/src/nsHttpChannel.cpp:4907
#14 0x09457d24 in nsInputStreamPump::OnStateStop (this=0xff79f80) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/netwerk/base/src/nsInputStreamPump.cpp:576
#15 0x09457e44 in nsInputStreamPump::OnInputStreamReady (this=0xff79f80, stream=0xff79e6c) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/netwerk/base/src/nsInputStreamPump.cpp:401
#16 0x00516c4e in nsInputStreamReadyEvent::Run (this=0xff79d60) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/xpcom/io/nsStreamUtils.cpp:111
#17 0x00549d0c in nsThread::ProcessNextEvent (this=0x715980, mayWait=0, result=0xbfffd4e4) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/xpcom/threads/nsThread.cpp:510
#18 0x004d2b1e in NS_ProcessPendingEvents_P (thread=0x715980, timeout=20) at nsThreadUtils.cpp:180
#19 0x098d48f9 in nsBaseAppShell::NativeEventCallback (this=0x735320) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/widget/src/xpwidgets/nsBaseAppShell.cpp:121
#20 0x0988b39a in nsAppShell::ProcessGeckoEvents (aInfo=0x735320) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/widget/src/cocoa/nsAppShell.mm:412
#21 0x90ffa5f5 in CFRunLoopRunSpecific ()
#22 0x90ffacd8 in CFRunLoopRunInMode ()
#23 0x9356b2c0 in RunCurrentEventLoopInMode ()
#24 0x9356b0d9 in ReceiveNextEventCommon ()
#25 0x9356af4d in BlockUntilNextEventMatchingListInMode ()
#26 0x95a6cd7d in _DPSNextEvent ()
#27 0x95a6c630 in -[NSApplication nextEventMatchingMask:untilDate:inMode:dequeue:] ()
#28 0x95a6566b in -[NSApplication run] ()
#29 0x098887f4 in nsAppShell::Run (this=0x735320) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/widget/src/cocoa/nsAppShell.mm:723
#30 0x0a57d37a in nsAppStartup::Run (this=0x74ef50) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/toolkit/components/startup/src/nsAppStartup.cpp:192
#31 0x0008198c in XRE_main (argc=1, argv=0xbfffea7c, aAppData=0x70edf0) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/toolkit/xre/nsAppRunner.cpp:3340
#32 0x000026e3 in main (argc=1, argv=0xbfffea7c) at /work/mozilla/builds/1.9.1-tracemonkey/mozilla/browser/app/nsBrowserApp.cpp:156
|
|
489,008 | 4,065,662 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b4pre) Gecko/20090418 Shiretoko/3.5b4pre Firefox/3.0.8
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b4pre) Gecko/20090418 Shiretoko/3.5b4pre
Nightly Firefox 3.5b4pre build 20090418045023 crashes when you click the Upload Resume button @ the URL provided.
http://crash-stats.mozilla.com/report/index/03e15174-2ee1-46dc-84eb-9bc122090418
http://crash-stats.mozilla.com/report/index/7b627f0a-4b89-4204-a2b7-348f12090418
Reproducible: Always
Steps to Reproduce:
1. Open Firefox.
2. Visit URL provided.
3. Click Upload Resume.
Actual Results:
Firefox crashes.
Expected Results:
Firefox should not crash.
|
|
492,675 | 4,095,515 |
#9 topcrash on firefox 3.5 b4.
I can't see where any of the code on the stack has changed in many months or years.
url's appear pretty randomly distributed with about 10% on startpages and then wide distribution of sites.
here is the stack for tracking until we figure out what to try and look at next.
0 xul.dll nsStyleSet::FileRules layout/style/nsStyleSet.cpp:588
1 xul.dll nsFrameManager::ReResolveStyleContext layout/base/nsFrameManager.cpp:1246
2 xul.dll nsFrameManager::ReResolveStyleContext layout/base/nsFrameManager.cpp:1499
3 xul.dll nsFrameManager::ReResolveStyleContext layout/base/nsFrameManager.cpp:1499
4 xul.dll nsFrameManager::ComputeStyleChangeFor layout/base/nsFrameManager.cpp:1566
5 xul.dll nsCSSFrameConstructor::RestyleElement layout/base/nsCSSFrameConstructor.cpp:9992
6 xul.dll nsCSSFrameConstructor::ProcessOneRestyle layout/base/nsCSSFrameConstructor.cpp:13372
7 xul.dll nsCSSFrameConstructor::ProcessPendingRestyles layout/base/nsCSSFrameConstructor.cpp:13480
8 xul.dll PresShell::DoFlushPendingNotifications layout/base/nsPresShell.cpp:4686
9 xul.dll PresShell::FlushPendingNotifications layout/base/nsPresShell.cpp:4644
10 xul.dll nsCSSFrameConstructor::RestyleEvent::Run layout/base/nsCSSFrameConstructor.cpp:13564
11 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:510
12 xul.dll nsBaseAppShell::Run widget/src/xpwidgets/nsBaseAppShell.cpp:170
13 xul.dll nsAppStartup::Run toolkit/components/startup/src/nsAppStartup.cpp:193
14 nspr4.dll PR_GetEnv
15 firefox.exe wmain toolkit/xre/nsWindowsWMain.cpp:110
16 firefox.exe firefox.exe@0x2197
17 kernel32.dll kernel32.dll@0x16fe6
|
|
504,311 | 4,199,289 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; ru-RU; rv:1.9.1) Gecko/20090624 Firefox/3.5
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2a1pre) Gecko/20090703 Minefield/3.6a1pre
Assignment of '-1' to 'wrapWidth' property of nsIPlainTextEditor component crashes the browser.
It was documented on xulplanet.com that assignment of '-1' to wrapWidth disables word wrapping. Exactly quotation is:
> PRInt32 wrapWidth
> Get and set the body wrap width.
> Special values: 0 = wrap to window width -1 = no wrap at all
Well, it worked on FF 1.5 / 2 / 3.0 / 3.5. But on FF 3.6a1pre the assignment, once it had been made, causes that the browser has crashed.
Reproducible: Always
Steps to Reproduce:
1. Make an .xul file and put next code in it:
<?xml version="1.0"?>
<?xml-stylesheet href="chrome://global/skin" type="text/css"?>
<window xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">
<script type="text/javascript">
<![CDATA[
function f ()
{
var tb = document. getElementById ("tb01");
var inputField = tb. inputField;
var editor = inputField. QueryInterface (Components. interfaces. nsIDOMNSEditableElement). editor;
editor = editor. QueryInterface (Components. interfaces. nsIEditor);
editor = editor. QueryInterface (Components. interfaces. nsIPlaintextEditor);
editor. wrapWidth = -1;
}
]]>
</script>
<textbox id="tb01" multiline="true"/>
<button onclick="f()"/>
</window>
2. Open the .xul with the chrome priveleges
3. Click button
Actual Results:
Firefox crashes
Expected Results:
Nothing should happen (no changes in UI)
|
|
504,766 | 4,202,636 |
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; Zune 2.0)
Build Identifier: http://people.mozilla.com/~vladimir/ce/firefox.cab (11th July)
firefox crashed when tried to open http://www.onlinemovies.top-site-list.com/
The log is as below. Similar kind of xul.dll crash was observed in bug 502230 but with 11th July version it started to hang the device.
** We want fake weight
** We want fake weight
** We want fake weight
** We want fake weight
_ogl_surface_create returned OpenGL ES error code 0x500
_ogl_surface_create returned OpenGL ES error code 0x500
Exception 'Data Abort' (4): Thread-Id=086500b2(pth=83e0d708), Proc-Id=0640081e(pprc=841c4bb8) 'firefox.exe', VM-active=0640081e(pprc=841c4bb8) 'firefox.exe'
PC=42dce02c(xul.dll+0x00b9e02c) RA=58595a20(???+0x58595a20) SP=001ff4d8, BVA=00000000
Reproducible: Always
Steps to Reproduce:
1.install firefox
2.open http://www.onlinemovies.top-site-list.com/
3.
Actual Results:
firefox crashes
|
|
505,305 | 4,206,535 |
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.1pre) Gecko/20090716
Shiretoko/3.5.1pre
Steps to reproduce:
-Load : http://www.donorschoose.org/donors/
search.html?page=9&keywords=music&max=50
-> Crash
(eb4.ac0): Access violation - code c0000005 (!!! second chance !!!)
eax=04b4d0da ebx=7ffd4000 ecx=3f6fdc36 edx=00000002 esi=06f56000 edi=06f47208
eip=1023d53a esp=0012e240 ebp=0012e248 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
-
MSVCR80D!memcpy+0x5a:
1023d53a f3a5 rep movs dword ptr es:[edi],dword ptr [esi] es:0023:06f47208=dddddddd ds:0023:06f56000=????????
0:000> cdb: Reading initial command '!load winext\msec.dll;.logappend;!exploitable;k;q'
Exploitability Classification: PROBABLY_EXPLOITABLE
Recommended Bug Title: Probably Exploitable - Read Access Violation on Block Data Move starting at MSVCR80D!memcpy+0x000000000000005a (Hash=0x6e021839.0x70393e49)
This is a read access violation in a block data move, and is therefore classified as probably exploitable.
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
0012e248 005ad1a4 MSVCR80D!memcpy+0x5a
0012e28c 005ac540 js3250!do_replace+0x134
0012e310 005ac1a2 js3250!js_StringReplaceHelper+0x370
0012e334 0051aeba js3250!str_replace+0x82
0012ea64 0050709c js3250!js_Interpret+0x1179a
0012eb40 00507962 js3250!js_Invoke+0x95c
0012eb64 004b30ed js3250!js_InternalInvoke+0x82
0012eb8c 03016620 js3250!JS_CallFunctionValue+0x5d
0012ec3c 0307a2d9 gklayout!nsJSContext::CallEventHandler+0x2a0
0012eeb0 02ecee75 gklayout!nsJSEventListener::HandleEvent+0x10d9
0012ef9c 02ecf288 gklayout!nsEventListenerManager::HandleEventSubType+0x195
0012f010 02ed2ec0 gklayout!nsEventListenerManager::HandleEvent+0x398
0012f050 02ed3104 gklayout!nsEventTargetChainItem::HandleEvent+0x130
0012f08c 02ed381e gklayout!nsEventTargetChainItem::HandleEventTargetChain+0x194
0012f158 02bf0595 gklayout!nsEventDispatcher::Dispatch+0x51e
0012f1e0 03a1788c gklayout!DocumentViewerImpl::LoadComplete+0x1c5
0012f21c 039fa127 docshell!nsDocShell::EndPageLoad+0x8c
0012f5f0 03a1752a docshell!nsWebShell::EndPageLoad+0x127
0012f640 03a41149 docshell!nsDocShell::OnStateChange+0x2ea
0012f6ec 03a402eb docshell!nsDocLoader::FireOnStateChange+0x1f9
quit:
|
|
561,577 | 4,658,539 |
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.9) Gecko/20100317 SUSE/3.5.9-0.1.1 Firefox/3.5.9
Build Identifier: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.9) Gecko/20100317 SUSE/3.5.9-0.1.1 Firefox/3.5.9
A coworker was having a problem getting to www.gmail.com with an error mentioned in various already-reported bugs (Bug# 410622, Bug# 435013, Bug# 435778). While trying to find out which certificate may be bad through Firefox's interface the browser crashes (completely gone in a fraction of a second) when clicking on 'View Certificates' (Edit: Preferences: Advanced: Encryption: View Certificates). This happened on her Linux box with Firefox 3.5.x and I can reproduce it on mine (FF 3.5.9 x86_64 on Linux) by copying out just her cert8.db and putting it in my profile directory leaving everything else the same. I can also reproduce the sec_error_reused_issuer_and_serial error she saw by copying in this one database file. As this is a non-trivial site (gmail.com) I'm interested in hearing why this error would occur for them. Thawte should, obviously, know better than to reissue serial numbers so I assume something else is wrong.
This bug is specifically for the Firefox crashing issue (the browser shouldn't crash no matter how munged up the certificate file is). If the cert8.db helps resolve other issues with the sec_error_reused_issuer_and_serial error then that's great, but at this point I cannot tell what the root cause of that is due to the Firefox bug until I get up the energy to open the file another way.
My apologies if I chose the wrong component.
Reproducible: Always
Steps to Reproduce:
1. Copy attached cert8.db file into user's profile directory, overwriting previous version.
2. Start Firefox.
3. Edit: Preferences: Advanced: Encryption: View Certificates
Actual Results:
Boom
Expected Results:
No Boom. Show a warning about a problem with the file, or auto-correct the error and let the user know, or recreate the database, or something else.
|
|
569,384 | 4,722,194 |
for (b = 0; b < 1; ++b) {
var d = b
}
(function () {
x = Proxy.create(function () {
return {
getPropertyDescriptor: function () {
+""
}
}
}(), 5)
}())
for (a = 0; a < 3; ++a) {
if (a == 1) {
d in x
}
}
crashes js opt shell with -j on TM tip at JSObject::dropProperty and asserts js debug shell with -j on TM tip at Assertion failure: status == ARECORD_ERROR, at ../jsops.cpp:7
s-s because this seems like a scary address (prior to reduction the edx instruction was at a weird 0x128 location). Assuming [sg:critical?] unless otherwise noted.
Program received signal SIGSEGV, Segmentation fault.
0x080bfef7 in JSObject::dropProperty(JSContext*, JSProperty*) ()
(gdb) bt
#0 0x080bfef7 in JSObject::dropProperty(JSContext*, JSProperty*) ()
#1 0x08216644 in ?? ()
Backtrace stopped: previous frame inner to this frame (corrupt stack?)
(gdb) x/i $eip
=> 0x80bfef7 <_ZN8JSObject12dropPropertyEP9JSContextP10JSProperty+7>: mov (%edx),%eax
(gdb) x/b $edx
0x1: Cannot access memory at address 0x1
|
|
675,927 | 5,627,609 |
Build ID:
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:8.0a1) Gecko/20110720 Firefox/8.0a1
Steps to reproduce:
1. Launch Firefox on a clean profile
2. Launch the Web console and set it in window mode (change its "position")
3. Drag and drop the parent tab of the webconsole to create a new window
Expected result:
3. The web console window is expected to remain functional
Actual result:
3. The web console window freezes
*Notes:
Last good nightly: 2011-07-08
First bad nightly: 2011-07-09
Pushlog:
http://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=6e461b1419b8&tochange=97012a02db93
|
|
670,445 | 5,582,849 |
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:5.0) Gecko/20100101 Firefox/5.0
Build ID: 20110615151330
Steps to reproduce:
I am using the following 3.1.1 on Windows 7.
Mozilla/5.0 (Windows; U; Windows NT 6.1; ja; rv:1.9.2.18) Gecko/20110616 Thunderbird/3.1.11
Choose a folder with lower sub-folders for search target and search with a certain criteria such as last 195 days (and including sub-directory as target.)
Looked at the search results and noted the message count, 5000+.
Now saved the search as the virtual search folder using the button at the lower-right corner of the search result window.
Noticed that the search result in the created virtual folder showed the message count as only about 3500+.
Much smaller than the original.
Strange (!?)
Actual results:
I investigated and found that the
virtual save folder LOST the top-most folder as its target.
All the sub-folders and below are marked as target.
That explains the missing messages.
When I ticked and marked the top-most folder as its target,
the searched message count matched the original 5000+ number.
Expected results:
When creating the virtual save folder, the top-most folder
should not be removed from the search target.
I think this is a newly introduced bug in the last 3 months or so.
I used the virtual search folders in February and March and
didn't realize this problem back then.
I tried a different folder and different last N days condition and noticed the missing top-level search target directory when
the virtual folder is created by hitting the button in the lower-right corner of the search result button.
|
|
466,607 | 3,869,473 |
Created attachment 349927
testcase with <video> (can cause shutdown crash)
Steps to reproduce:
1. Load the testcase.
2. Wait a few hundred milliseconds.
3. Quit Firefox with Cmd+Q.
Result: Crash on shutdown, 50% of the time. Most of the crashes happen during XPCWrappedNative::FlatJSObjectFinalized (during GC), but sometimes they happen during nsHTMLMediaElement::Freeze instead. Both types of crashes appear [sg:critical].
The second crash signature makes me suspicious: why is an nsHTMLMediaElement is being created here, given that the "video" element isn't in the HTML namespace?
|
|
466,856 | 3,871,710 |
The testcase is attached to bug 461813, I mistakenly thought it was the same crash.
Just move your mouse over the window of the testcase, it should crash very soonish.
I tried to make a fully automated testcase that crashes, by using mousemove
events, but I didn't succeed at that.
Not sure when this regressed, I can look for a regression range, if wanted.
http://crash-stats.mozilla.com/report/index/46e92879-ef5b-4267-a37e-ed6762081126?p=1
0 xul.dll nsTypedSelection::CopyRangeToAnchorFocus layout/generic/nsSelection.cpp:5643
1 xul.dll nsTypedSelection::ReplaceAnchorFocusRange layout/generic/nsSelection.cpp:5662
2 xul.dll nsFrameSelection::AdjustForMaintainedSelection layout/generic/nsSelection.cpp:1755
3 xul.dll nsFrameSelection::HandleClick layout/generic/nsSelection.cpp:1794
4 xul.dll nsFrameSelection::HandleDrag layout/generic/nsSelection.cpp:1872
5 xul.dll nsFrame::HandleDrag layout/generic/nsFrame.cpp:2262
6 xul.dll nsFrame::HandleEvent layout/generic/nsFrame.cpp:1641
7 xul.dll nsPresShellEventCB::HandleEvent layout/base/nsPresShell.cpp:1254
8 xul.dll xul.dll@0x2f0b48
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.