Bug ID
int64
961
1.91M
Comment ID
int64
3.98k
17.1M
Author
stringlengths
8
48
Comment Text
stringlengths
1
64.3k
481,302
3,999,406
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b3pre) Gecko/20090303 Firefox/3.1b3pre Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2a1pre) Gecko/20090303 Minefield/3.2a1pre Crash When rloading of the page is completed. Reproducible: Always Steps to Reproduce: 1.Start Minefield with New Profile. 2.set javascript.options.jit.chrome to true in about:config. 3.Go URL Actual Results: Crash Minefield with the crash report. http://crash-stats.mozilla.com/report/index/8877ef0e-1f16-486f-95e8-8177b2090303?p=1 Expected Results: No crash. If javascript.options.jit.chrome not set to true, Minefield did not crash.
481,804
4,003,214
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2a1pre) Gecko/20090305 Firefox/3.0 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2a1pre) Gecko/20090305 Minefield/3.2a1pre With the Linkification extension installed, JIT chrome enabled, and the ABC News video player loaded (the linked URL), if one rapidly clicks the scroll "up" video list navigation arrow on the left-hand side, Minefield crashes with the signature: [@ js3250.dll@0x90ff3 ]: http://crash-stats.mozilla.com/report/index/d30e4c4d-64aa-4960-920e-896982090305 This crash also happens with the latest Tracemonkey nightly build, but the signature is slightly different: [@ js_Interpret ]: http://crash-stats.mozilla.com/report/index/864d61bd-48bb-4247-9697-70edf2090305 The crash occurs only if JIT chrome is enabled. Reproducible: Always Steps to Reproduce: 1. Set javascript.options.jit.chrome to: true 2. Install Linkification 3.5 and restart: https://addons.mozilla.org/en-US/firefox/addon/190 3. Visit the linked URL 4. Once the media player window has fully loaded, quickly and repeatedly click the medial list scroll up arrow on the left-hand side of the media player page, until the browser crashes. 5. Try again with JIT chrome disabled. Browser does not crash. Actual Results: Browser crashes Expected Results: Should function the same as when JIT chrome is not enabled (i.e. should not crash).
470,487
3,902,715
Currently the #4 top crash in Firefox 3.1b2 0 xul.dll nsWindow::GetParentWindow widget/src/windows/nsWindow.cpp:1544 1 xul.dll nsWindow::GetParent widget/src/windows/nsWindow.cpp:1518 2 xul.dll nsBaseWidget::Destroy widget/src/xpwidgets/nsBaseWidget.cpp:260 3 xul.dll nsWindow::Destroy widget/src/windows/nsWindow.cpp:1416 4 xul.dll nsPluginInstanceOwner::Destroy layout/generic/nsObjectFrame.cpp:4030 5 xul.dll DoStopPlugin layout/generic/nsObjectFrame.cpp:1987 6 xul.dll nsStopPluginRunnable::Run layout/generic/nsObjectFrame.cpp:2024 7 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:510 8 xul.dll nsBaseAppShell::Run widget/src/xpwidgets/nsBaseAppShell.cpp:170 9 nspr4.dll PR_GetEnv 10 firefox.exe wmain toolkit/xre/nsWindowsWMain.cpp:87 11 firefox.exe firefox.exe@0x2197 12 kernel32.dll kernel32.dll@0x17066 not many comments to go on. *replying to message in yahoo mail at the time it crashed. Had just hit reply
472,312
3,918,550
Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090104 Shiretoko/3.1b3pre ID:20090104020455 I did a search on Google Images and tried to open one of the images directly in full-size by clicking the top link. For now I cannot supply a URL but will try to get the STR in some minutes. crash report: bp-5337bcb0-0ce3-4282-aa72-579ff2090106 First 10 frames: 0 XUL nsSubDocumentFrame::ShowDocShell layout/generic/nsFrameFrame.cpp:914 1 XUL nsSubDocumentFrame::ShowViewer layout/generic/nsFrameFrame.cpp:327 2 XUL nsSubDocumentFrame::Init layout/generic/nsFrameFrame.cpp:312 3 XUL nsCSSFrameConstructor::InitAndRestoreFrame layout/base/nsCSSFrameConstructor.cpp:6782 4 XUL nsCSSFrameConstructor::ConstructHTMLFrame layout/base/nsCSSFrameConstructor.cpp:5582 5 XUL nsCSSFrameConstructor::ConstructFrameInternal layout/base/nsCSSFrameConstructor.cpp:7556 6 XUL nsCSSFrameConstructor::ConstructFrame layout/base/nsCSSFrameConstructor.cpp:7428 7 XUL nsCSSFrameConstructor::ContentAppended layout/base/nsCSSFrameConstructor.cpp:8612 8 XUL PresShell::ContentAppended layout/base/nsPresShell.cpp:4720 9 XUL nsNodeUtils::ContentAppended content/base/src/nsNodeUtils.cpp:119 10 XUL nsContentSink::NotifyAppend content/base/src/nsContentSink.cpp:1332
472,776
3,923,236
Created attachment 356114 testcase (causes shutdown crash) Steps to reproduce: 1. Load the testcase. 2. Quit Firefox. Result: crash [@ UnhookTextRunFromFrames] or [@ ClearAllTextRunReferences]. If MallocScribble is enabled, the crash involves dereferencing 5555567d, but without MallocScribble, a random address gets called.
465,784
3,862,362
Click on a ROM, say, the first one, then Run. Crashes. Different trace from bug #465773 These emulators do seem to give the JIT trouble. :) http://crash-stats.mozilla.com/report/index/3e279837-b578-4d10-baeb-37fd20081119?p=1
477,739
3,966,560
Created attachment 361441 Broken places.sqlite Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090209 Shiretoko/3.1b3pre Ubiquity/0.1.5 ID:20090209020514 Marcia showed me a serious problem today while sitting together in the QA lab. There is no way to edit a bookmark while clicking the star or pressing Cmd+D. The following exception is thrown: Error: uncaught exception: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsINavBookmarksService.getFolderIdForItem]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: file:///Applications/Minefield.app/Contents/MacOS/modules/utils.js :: anonymous :: line 877" data: no] After digging into this problem I've noticed that we have a broken places.sqlite file. The folder hierarchy is infinite. Means opening the unsorted bookmarks always displays the bookmarks root folder with all its sub-folders again. Further this also results in broken JSON backups. All backups which were made the last days have a filesize of zero. All bookmarks will be lost if you have the need to restore them. I'll attach the affected places.sqlite file here, so it is easier to reproduce. The problem is that we don't have an idea how it gets broken. Even the steps are not known how to get into this problem. Sadly. :/ The profile was created with Shiretoko a month ago. So we don't suffer from an older bug, which has been already fixed. Marco and Dietrich, could you have a look at this places.sqlite file?
478,527
3,973,423
Created attachment 362366 testcase (can cause crashes) Steps to reproduce: 1. Apply the ireflow patch (bug 67752 comment 56). 2. Set the following environment variables: export GECKO_REFLOW_INTERRUPT_MODE=counter export GECKO_REFLOW_INTERRUPT_CHECKS_TO_SKIP=1 export GECKO_REFLOW_INTERRUPT_FREQUENCY=1 3. Load the testcase 4. Wait a few seconds Result: ###!!! ASSERTION: Could not find frame to remove!: 'NS_SUCCEEDED(rv)', file /Users/jruderman/central/layout/generic/nsContainerFrame.cpp, line 230 WARNING: Scanning overflow inline frames is something we should avoid: '!result.mOverflowFrameToScan', file /Users/jruderman/central/layout/generic/nsTextFrameThebes.cpp, line 868 Crash [@ BuildTextRunsScanner::ScanFrame]
480,134
3,989,469
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.0.6) Gecko/2009011912 Firefox/3.0.6 Build Identifier: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.0.6) Gecko/2009011912 Firefox/3.0.6 Both Firefox and Camino are exposed to a font rendering integer overflow which exists independently in libpango and in Apple's CoreGraphics (ripc). I have reported the bug upstream to Apple, but they have no timeline to fix. (Yes, this affects Safari too..) The issue is in URL bar rendering. If a very long document.location is set via javascript, the integer overflow is reachable. The files at the above location show this bug for each. The affected code in pango is in pango_glyph_string_set_size: An overflow check when doubling the size neglects the overflow possible on the subsequent allocation: string->glyphs = g_realloc (string->glyphs, string->space * sizeof (PangoGlyphInfo)); I don't have a live exploit, but this looks exploitable. I have not yet gotten this reported upstream to libpango. It is pending on their mailing list and I've received no response. Because of their delay and Apple's delay, I thought it would make the most sense to put a maximum limit on the document.location. This will be referenced with advisory oCERT-2009-001. Reproducible: Always Steps to Reproduce: 1. Goto a pango crasher in http://static.dataspill.org/glyph/ E.g., http://static.dataspill.org/glyph/pango_2.html 2. Crash. Depending on how the overflow is handled, you can get it to proceed without a crash. (Note, I've been tinkering with the crashers so there's nothing special about the different versions, just a few tweaks.) Actual Results: In camino, it is often a NULL deref. I can get a few other random stack-addresses visible, but I haven't done a thorough analysis on the Apple libraries to know. In ff, pango exposes the num_glyphs after a successful underallocation. If this is used for writing to the glyph array, it will result in heap corruption. Expected Results: Maximum URL length and/or integer overflow checks in libpango/ripc would stop this. Please let me know if I can help coordinate anything. I can be reached at my personal address: [email protected] or at my oCERT addr: [email protected]. I will be pursuing getting this upstream to pango, but if you have any contacts that can help, that'd be great. In addition, if you have some idea for Camino fixes, if you plan to release the crashers, please let me know in advance. I would like to negotiate some embargo date with Apple if possible, but who knows.
484,442
4,025,689
Litmus test case: 6931 Build: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1b3) Gecko/20090305 Firefox/3.1b3 ID:20090305134136 This occurs only on Linux only and the function works just fine on the latest 3.0 release. Steps to Reproduce: 1. Start Firefox in safe-mode (happens with or without "-P") 2. Select any or all the Options and Click on the Activated "Makes Changes and Restart" button. Actual Results: Firefox crashes with the following crash report Id: http://crash-stats.mozilla.com/report/index/f475db62-d5fd-4d2e-9408-19c922090320?p=1 Expected Results: Firefox should not crash.
486,470
4,042,780
Windows unit test machine is periodically crashing in gfxTextRun::~gfxTextRun() when running mochitest-plain tests. Example logs: http://tinderbox.mozilla.org/showlog.cgi?log=Firefox/1238606166.1238611997.12746.gz&fulltext=1 http://tinderbox.mozilla.org/showlog.cgi?log=Firefox/1238599133.1238605868.953.gz&fulltext=1 Crash reason: EXCEPTION_ACCESS_VIOLATION Crash address: 0x0 Stack crawl: 0 xul.dll!nsTArray<gfxTextRun::GlyphRun>::~nsTArray<gfxTextRun::GlyphRun>() [nsTArray.h:7f359d93170a : 267 + 0x5] eip = 0x101c5059 esp = 0x0012e11c ebp = 0x0012e174 ebx = 0x0719c401 esi = 0x0719c428 edi = 0x0ac5841c eax = 0x00000000 ecx = 0x0719c428 edx = 0xf57b0012 efl = 0x00010202 1 xul.dll!gfxTextRun::~gfxTextRun() [gfxFont.cpp:7f359d93170a : 1409 + 0xf] eip = 0x10632267 esp = 0x0012e124 ebp = 0x0012e174 2 xul.dll!gfxTextRun::`vector deleting destructor'(unsigned int) + 0x35 eip = 0x101bdd3c esp = 0x0012e12c ebp = 0x0012e174 3 xul.dll!nsTextFrame::ClearTextRun() [nsTextFrameThebes.cpp:7f359d93170a : 3692 + 0x7] eip = 0x1027213a esp = 0x0012e138 ebp = 0x0012e174 ebx = 0x0719c418 4 xul.dll!nsTextFrame::Destroy() [nsTextFrameThebes.cpp:7f359d93170a : 3345 + 0x4] eip = 0x102729eb esp = 0x0012e144 ebp = 0x0012e174 ebx = 0x00000000 5 xul.dll!nsLineBox::DeleteLineList(nsPresContext *,nsLineList &) [nsLineBox.cpp:7f359d93170a : 337 + 0x7] eip = 0x1033d6a8 esp = 0x0012e14c ebp = 0x0012e174 6 xul.dll!nsBlockFrame::Destroy() [nsBlockFrame.cpp:7f359d93170a : 298 + 0x9] eip = 0x103376f7 esp = 0x0012e158 ebp = 0x0012e174 Going back to 3/20, I don't see the exact same crash but there are other crashes in GlyphRun code: Example: http://tinderbox.mozilla.org/showlog.cgi?log=Firefox/1237610333.1237613764.10070.gz&fulltext=1 0 xul.dll!gfxTextRun::FindFirstGlyphRunContaining(unsigned int) [gfxFont.cpp:49d7fee2e9b4 : 2175 + 0x3] eip = 0x1062eefa esp = 0x0012bc90 ebp = 0x0012bcd4 ebx = 0x00000001 esi = 0x00000000 edi = 0x00000000 eax = 0x00000000 ecx = 0x0313a1f8 edx = 0x00000000 efl = 0x00010297 1 xul.dll!gfxTextRun::GlyphRunIterator::GlyphRunIterator(gfxTextRun *,unsigned int,unsigned int) [gfxFont.h:49d7fee2e9b4 : 1313 + 0xd] eip = 0x101bda30 esp = 0x0012bc9c ebp = 0x0012bcd4 2 xul.dll!gfxTextRun::MeasureText(unsigned int,unsigned int,gfxFont::BoundingBoxType,gfxContext *,gfxTextRun::PropertyProvider *) [gfxFont.cpp:49d7fee2e9b4 : 1925 + 0xe] eip = 0x1062faff esp = 0x0012bca8 ebp = 0x0012bcd4 3 xul.dll!gfxTextRun::BreakAndMeasureText(unsigned int,unsigned int,int,double,gfxTextRun::PropertyProvider *,int,double *,gfxFont::RunMetrics *,gfxFont::BoundingBoxType,gfxContext *,int *,unsigned int *,int,gfxBreakPriority *) [gfxFont.cpp:49d7fee2e9b4 : 2103 + 0x21] eip = 0x1062fefd esp = 0x0012bcdc ebp = 0x0012c418 4 xul.dll!nsTextFrame::Reflow(nsPresContext *,nsHTMLReflowMetrics &,nsHTMLReflowState const &,unsigned int &) [nsTextFrameThebes.cpp:49d7fee2e9b4 : 5976 + 0x71] eip = 0x10275bfe esp = 0x0012c45c ebp = 0x0012c5e8 ebx = 0x0b694df0 5 xul.dll!nsLineLayout::ReflowFrame(nsIFrame *,unsigned int &,nsHTMLReflowMetrics *,int &) [nsLineLayout.cpp:49d7fee2e9b4 : 852 + 0x2e] eip = 0x103a037e esp = 0x0012c654 ebp = 0x0012c72c ebx = 0x0012c840 6 xul.dll!nsBlockFrame::ReflowInlineFrame(nsBlockReflowState &,nsLineLayout &,nsLineList_iterator,nsIFrame *,LineReflowStatus *) [nsBlockFrame.cpp:49d7fee2e9b4 : 3594 + 0x13] eip = 0x10339af0 esp = 0x0012c79c ebp = 0x0012c7cc ebx = 0x0b694f1c 7 xul.dll!nsBlockFrame::DoReflowInlineFrames(nsBlockReflowState &,nsLineLayout &,nsLineList_iterator,int *,LineReflowStatus *,int) [nsBlockFrame.cpp:49d7fee2e9b4 : 3415 + 0x15] eip = 0x1033a364 esp = 0x0012c7d4 ebp = 0x0012c814 ebx = 0x0b694f1c All these crashes occur running this test: *** 31828 INFO Running /tests/dom/tests/mochitest/ajax/offline/test_xhtmlManifest.xhtml... Not sure if there are other factors that match (e.g. same tinderbox machine).
591,330
4,895,349
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:2.0b5pre) Gecko/20100826 Minefield/4.0b5pre Build Identifier: Mozilla/5.0 (X11; Linux i686; rv:2.0b5pre) Gecko/20100826 Minefield/4.0b5pre Whenever I tried to open http://www.cdcf.ngo.cn, Firefox 4.0 nightly crashes. However, Firefox 3.6.8 works quite fine Reproducible: Always Steps to Reproduce: 1. Go to http://www.cdcf.ngo.cn Actual Results: Firefox crashes. Expected Results: It should not crash.
602,792
4,997,398
Created attachment 481766 debug patch, delay font cmap loading and neuter system font fallback Steps to reproduce: 1. Install xperf, see notes here: 2. Build with attached patch (this delays cmap loading until 60secs after startup and stubs out system font fallback until these load) 3. Set default profile to startup with several tabs, including www.facebook.com 4. Reboot 5. Run cmd shell with Admin privs 6. Start xperf: xperf -on latency -stackwalk profile+hardfault 7. Run Minefield build 8. Wait 30 secs 9. Stop xperf: xperf -d coldstartup-dwrite.etl 10. View results: xperf coldstartup-dwrite.etl Result: on my Dell i7 dev machine this took 13.9 secs to startup of which 6.7 secs was spent in gfxDWriteFontList::InitFontList. 99% of this time was spent in the GetSystemFontCollection method. The xperf trace indicates that this call is iterating over all fonts and reading in the *entire* font file contents for each (so all 8MB of Meiryo). This is *really* problematic, the FindFontFamily method of the system font collection is DWrite's equivalent to CreateFontIndirect, the main API used look up a font. So even if we never cached a whiff of font data we still have to take the hit at some point of calling GetSystemFontCollection. What's extremely curious is that I did the same cold startup trace on IE9. Their code also ends up iterating over all fonts at startup but only a small fraction of each file is read in. Maybe they're using the GDI interop interface? Or some private API (that would truly suck...)?
604,361
5,009,970
Build: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0b8pre) Gecko/20101014 Firefox/4.0b8pre This is a new crash signature. Crashes first appeared in b8pre/20101011 build. It is #14 top crasher in 4.0b8pre for the last week. Signature JSObject::unwrap(unsigned int*) UUID b728dcb6-c104-45df-a0aa-a6a122101014 Time 2010-10-14 07:12:03.816936 Uptime 49 Install Age 3102 seconds (51.7 minutes) since version was first installed. Product Firefox Version 4.0b8pre Build ID 20101014041748 Branch 2.0 OS Windows NT OS Version 6.1.7600 CPU x86 CPU Info GenuineIntel family 6 model 28 stepping 10 Crash Reason EXCEPTION_ACCESS_VIOLATION_READ Crash Address 0x4 App Notes AdapterVendorID: 8086, AdapterDeviceID: a011 Frame Module Signature [Expand] Source 0 mozjs.dll JSObject::unwrap js/src/jswrapper.cpp:82 1 xul.dll xpc::WrapperFactory::WaiveXrayAndWrap js/src/xpconnect/wrappers/WrapperFactory.cpp:289 2 xul.dll xpc::CrossOriginWrapper::get js/src/xpconnect/wrappers/CrossOriginWrapper.cpp:84 3 mozjs.dll js::JSProxy::get js/src/jsproxy.cpp:774 4 mozjs.dll js::proxy_GetProperty js/src/jsproxy.cpp:867 5 mozjs.dll js::mjit::ic::GetProp js/src/methodjit/PolyIC.cpp:2065 The regression range is : http://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=26c47ba8064f&tochange=5a41a70eb631 More reports at: http://crash-stats.mozilla.com/report/list?product=Firefox&query_search=signature&query_type=exact&query=&range_value=4&range_unit=weeks&hang_type=any&process_type=any&plugin_field=&plugin_query_type=&plugin_query=&do_query=1&admin=&signature=JSObject%3A%3Aunwrap%28unsigned%20int*%29
595,740
4,933,263
STEPS TO REPRODUCE: 1. Load URL: http://www.paradiso-design.net/videostandards.html 2. Print-preview before the background-image shows up. (Shift-reload & try again if you're too late.) ACTUAL RESULTS: Crash [@ nsFloatManager::GetFlowArea ] Crash reports: bp-28a6ac57-a8a4-4a8d-8515-3c6a42100912 bp-8f29f59b-0787-49f5-b8c1-23eb62100912 The Crash Address is "0xf0dea823", which I think (?) is a frame-poisoned value.
610,223
5,063,736
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:2.0b6) Gecko/20100101 Firefox/4.0b6 Build Identifier: Mozilla/5.0 (X11; Linux i686; rv:2.0b6) Gecko/20100101 Firefox/4.0b6 Firefox 4.0b6 JavaScript Engine Arbitrary Memory Reading Original release date: <undisclosed> Last revised: 2010-11-07 Source: Christian Holler <http://users.own-hero.net/~decoder/> Credits: Christian Holler <[email protected]> Maximilian Grothusmann <[email protected]> Systems Affected: Mozilla Firefox 4.0b6 (http://www.mozilla.com/en/firefox/beta/) - Web Browser Beta Severity: High Overview: I. Description The Mozilla Firefox 4 JavaScript engine supports the Regexp.input property to set the input string used for a regular expression match. When assigning Regexp.input, the engine fails to reset the submatch properties Regexp.$1..$9. When accessing these properties, they are provided as dependent strings to Regexp.input at the time of access to the submatch property. When matching some large string and then setting Regexp.input to another object or an empty string, the whole memory starting at the provided object with the length of the submatch is returned. II. Impact The described weakness can be used to read arbitrary memory starting at the location of any object in memory that we can refer to. This includes reading beyond our own document, leaking information of other tabs or add-ons that are open, including any sensitive information that might be contained in there. III. Proof of concept === Explanation === In our proof of concept exploit, we first create a large string "haystack" that has approximately 16 MB size (which should be enough for demonstration purposes) with a repeating pattern. We then create a regular expression "needle" containing a single match which encloses roughly 512 KB of memory (the limit for a single pattern is 1 MB, but we can use the "global" flag and simply match multiple times to read further). We then execute the regular expression and then set Regexp.input to some different object. In our case, we choose the "document" object to demonstrate reading beyond our own document to disclose other tabs and add-ons. === Demonstration === Exploit is attached to this bug report. Open the poc.html file and you'll see a dump of 512 KB memory, starting at the object "document". You can alter both the starting point within "document" by increasing the "repeat" variable on top (if you get a crash you've gone too far), or choose a different object to start with (any object that can be referenced in the script context, including all global objects). The proof-of-concept exploit was tested in Firefox 4b6 and verified to also work against nightly builds. In our tests, we were able to read browser history, data from other tabs and even sensitive information such as the password of the "Firefox Sync" feature. IV. Solution The following patch will fix the described problem, we do however not claim completeness for this fix: diff -r 633e895d5e84 js/src/jscntxt.h --- a/js/src/jscntxt.h Thu Sep 09 12:19:50 2010 -0700 +++ b/js/src/jscntxt.h Sun Nov 07 16:18:09 2010 +0100 @@ -1797,6 +1797,7 @@ void setInput(JSString *newInput) { input = newInput; + matchPairs.clear(); } /* Accessors. */ Timeline: 2010-11-07: Reported to Mozilla 2010-11-05: Vulnerability discovered Reproducible: Always Steps to Reproduce: 1. Open the attached proof-of-concept exploit (poc.html). 2. Inspect memory dump. Actual Results: Memory is revealed to the script's context. Expected Results: Submatch properties should have been reset when the input property is changed, hence empty string or undefined should be returned.
308,727
2,612,240
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6 Going to any https:// website crashes FireFox. It does display the page while submitting the bug report. Reproducible: Always Steps to Reproduce: 1.go to any https:// website 2. 3. Actual Results: Crash Expected Results: Shown the page
309,981
2,621,568
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b4) Gecko/20050908 Firefox/1.4 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b4) Gecko/20050908 Firefox/1.4 Ok there are two pages to the issue. First is the page that causes the crash. Second is the page loaded in the frame via src. page1: <html > <head> <script language="JavaScript" type="text/JavaScript"> // initialize function init(){ // Attach event to objects document.getElementById("fittowin").onclick = testcrash; document.getElementById("testbut").onclick = testcrash; // turn on design mode document.getElementById('editor').contentWindow.document.designMode = "on"; return; } // Make it crash function testcrash(e){ // Set the container position to absolute document.getElementById("container").style.position = "absolute"; // Get the offsetTop. var cy = document.getElementById('editor').offsetTop; // Show the value of cy alert("cy = " + cy) // Set the return; return; } </script> </head> <body onload="init();" > <div id="container" > <ul style=" position:absolute; display:block; width:175px; top:100px; left:100px; background-color:#FF0000;"> <li id="fittowin" >crash it!</li> </ul> <iframe id="editor" src="../index2.htm" ></iframe> <form action="" method="get"><input id="testbut" name="" type="button" value="button" /></form> </div> </body> </html> Page2: <html> <head> <title >test page</title> </head> <body > <table> <tr> <td >Edit/Click here First</td> </tr> </table> </body> </html> Reproducible: Always Steps to Reproduce: 1. Set the page up so that you can view them. make sure that the second page shows in the iframe. 2. Click on the text in the iframe "Edit/Click here First" and type anything. 3. Click the red "crash it!" item and you get a crash. 4. If it does not crash then you did not follow the steps exactly. Actual Results: Crash-- FF takes a dump and you have to restart every time. Expected Results: Get the offsettop of the iframe. I have tested this for about four hours and have found many ways to make it crash on the OffsetTop of the iframe. The code above is the simplest that i could conger up. Note: That for the error to occur the styles are important! if you change the position to any thing other that absoulte the the error does not occur.
310,919
2,644,621
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.9a1) Gecko/20051001 Camino/1.0+ Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.9a1) Gecko/20051001 Camino/1.0+ I found a reproducable bug that Quits Firefox (1.5b1) and Camino (trunk-Oct 1) when displaying an XML document (RSS) Reproducible: Always Steps to Reproduce: 1. Put the following line in your userContent.css: rss * { display: block;} 2. Load the url above ( http://joi.ito.com/index.xml ) Actual Results: When the page is downloaded, just before display, the browser Quits and leaves no trace (no console messages, no crashreporter, no Talkback (not even on restartup)) Expected Results: The XML should be rendered with the css rule applied. Or at least the crash should be detectable.
343,283
2,899,428
User-Agent: Mozilla/5.0 (X11; U; Linux i686; de-AT; rv:1.8.0.2) Gecko/20060409 SeaMonkey/1.0.1 Build Identifier: This bug had been originally filed for PrefBar (see URL above). Thank you very much to j. schade who did really great work to find the reason of this bug. His unchanged comments follow: ------- Comment #18 From j. schade 2006-06-26 15:02:23 ------- Well, since it was raining yesterday here in the Caribbean I finally found time to look at this issue. Here is what I found out so far: Using newer perfbars (>=3.3) gives me a sig11 on FreeBSD-5.4. It happens in libgklayout.so: Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 1 (LWP 100116)] 0x29a9599b in nsGlobalWindow::RunTimeout (this=0x8393500, aTimeout=0x8935000) at nsGlobalWindow.cpp:6378 6378 timeout->mArgv[timeout->mArgc] = Current language: auto; currently c++ (gdb) p timeout->mArgc $1 = 0 (gdb) p timeout->mArgv $2 = (jsval *) 0x800 (gdb) p timeout->mArgv[timeout->mArgc] Error accessing memory address 0x800: Bad address. The corresponding code in nsGlobalWindow.cpp: ... PRTime lateness = now - timeout->mWhen; timeout->mArgv[timeout->mArgc] = INT_TO_JSVAL((jsint)(lateness / PR_USEC_PER_MSEC)); jsval dummy; scx->CallEventHandler(mJSObject, timeout->mFunObj, timeout->mArgc + 1, timeout->mArgv, &dummy); ... Now, where does the funny 0x800 come from? Throwing in some debugging printf's revealed that when timeout->mArgv had "some reasonable" values (like 0x83655c0, 0x88ef8e0, 0x843d070, ...) nothing bad happens. The special value 0x800 was created when the following code (in the same file) was called with an argc of 1: ... } else if (funobj) { /* Leave an extra slot for a secret final argument that indicates to the called function how "late" the timeout is. */ timeout->mArgv = (jsval *) PR_MALLOC((argc - 1) * sizeof(jsval)); if (!timeout->mArgv) { timeout->Release(scx); ... This gives us a malloc() with 0 as arg. On FreeBSD, a malloc(0) returns some constant value (which is 0x800 on my architecture) which, in fact, does not actually point to a usable memory region. While one can argue what result SHOULD be returned in case of doing a malloc(0), firefox seems to behave properly if it receives NULL as a result (since the timeout gets released immediately in this case). The behaviour of FreeBSD can be changed according to the the malloc(3) manpage by setting some malloc flags: ... V Attempting to allocate zero bytes will return a NULL pointer instead of a valid pointer. (The default behavior is to make a minimal allocation and return a pointer to it.) This option is provided for System V compatibility. This option is incompatible with the ``X'' option. ... So I gave it a try by running MALLOC_OPTIONS=V firefox and firefox didn't crash anymore and prefbar was running. Therefore I come to the point that: 1. It isn't prefbar's fault, it only reveals the problem. 2. It is an interaction of firefox and FreeBSD's funky malloc() implementation. ------- Comment #20 From j. schade 2006-06-28 13:23:25 ------- > If I understand you right, then the problem is solved immediately if you use > "MALLOC_OPTIONS=V firefox"? Yes. I have added it to /usr/X11R6/lib/firefox/run-mozilla.sh. Other options are the use of /etc/malloc.conf or _malloc_options (see the malloc manpage). > If so, then this is in fact a core bug. I'm unable to fix it with PrefBar code > so I could finally mark this heavy bug fixed. I would say "yes". However, I would like to see others confirm that it works on their systems as well. > Do you allow me to paste your whole comment as new core-bug to > bugzilla.mozilla.org? Of course. However, I don't know if we should consider it a firefox bug. IF malloc(0) returns NULL (as it does with MALLOC_OPTIONS=V) firefox behaves properly. If it is wise to return something Non-NULL (as it is done in FreeBSD) is a different question. I will send a message to the -hackers list and we will see. ------- Comment #21 From j. schade 2006-06-29 08:33:38 ------- OK, I have just learned from the freebsd-hackers list (thanks to the people who answered there) that: The C standard explicitly allows both behaviours, and requires the implementation to choose one of them. If it returns a non-NULL pointer, though, that pointer can *only* be used for passing back to free(). It may *not* be dereferenced. So firefox is wrong, and actually broken. So we can safely consider it as a bug in firefox. A patch could be: --- mozilla/dom/src/base/nsGlobalWindow.cpp.ORI Fri Apr 21 23:36:30 2006 +++ mozilla/dom/src/base/nsGlobalWindow.cpp Thu Jun 29 14:29:12 2006 @@ -6079,7 +6079,7 @@ indicates to the called function how "late" the timeout is. */ timeout->mArgv = (jsval *) PR_MALLOC((argc - 1) * sizeof(jsval)); - if (!timeout->mArgv) { + if (!timeout->mArgv || argc==1) { timeout->Release(scx); return NS_ERROR_OUT_OF_MEMORY; However, I have no idea if the whole (argc - 1) construct could be wrong since I don't know what this function is exactly doing :-) Reproducible: Didn't try Steps to Reproduce: To reproduce this bug you may need to install PrefBar Version 3.3 or higher. Actual Results: SeaMonkey segfaults on FreeBSD if you try to setup PrefBar Expected Results: No crash ;-)
330,873
2,804,859
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9a1) Gecko/20060315 Firefox/1.6a1 Seems like some strange redrawing/flickering is happening. Reproducible: Always Steps to Reproduce: 1. Load Firefox 2. Go to web site. 3. Go to page icon in location bar. 4. Drag Icon. 5. Approach Bookmarks menu 6. See Firefox Draw menu 7. See it do nothing else except flop around and flicker while drawing menu 8. Kill firefox 9. Curse Actual Results: Browser hangs, renders desktop unusable. Expected Results: Menu opens, I drop page in, life continues, I might have some cheese.
327,510
2,778,799
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 Browsing Newsgroups. When switching from one newsgroup to another within the save news server, the following bug sometimes appears as a fullscreen display on my pc. I have not been able to isolate it to a specific action. XML Parsing Error: no element found Location: jar:file:///C:/PROGRA~1/MOZILL~2/chrome/toolkit.jar!/content/global/netError.xhtml Line Number 1, Column 1: Reproducible: Sometimes Steps to Reproduce: 1. Create News.softvelocity.com newscroup account 2. Subscribe to 17 + newsgroups 3. Download messages = max messages or > 2000 per newsgroup 4. Switch between newsgroups... Bug appears randomly. I spend 90% of my day in these newsgroups posting and reading (Software Development newsgroups)
265,721
2,303,591
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X; en) AppleWebKit/125.5 (KHTML, like Gecko) Safari/125.9 Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8a5) Gecko/20041020 Firefox/0.9.1+ I added mozilla specific CSS to my browser QA software - http://toadstool.se/software/iexploder2/ and caught this one. It crashes in FireFox 0.10.0 and the 20041020 nightly build. It seems that if you mix -moz-key-equivalent with a textarea, you get a crash. Reproducible: Always Steps to Reproduce: Stack Trace: Thread 0 Crashed: 0 org.mozilla.firefox 0x00940314 0x1000 + 0x93f314 1 org.mozilla.firefox 0x002b1578 nsRuleNode::WalkRuleTree(nsStyleStructID, nsStyleContext*, nsRuleData*, nsCSSStruct*) + 0xf0 2 org.mozilla.firefox 0x002b0ab8 nsRuleNode::GetUIResetData(nsStyleContext*) + 0x8c 3 org.mozilla.firefox 0x002b8010 nsRuleNode::GetStyleData(nsStyleStructID, nsStyleContext*, int) + 0x1d8 4 org.mozilla.firefox 0x00346cec nsStyleContext::GetStyleData(nsStyleStructID) + 0x50
325,321
2,762,488
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322) Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060130 Firefox/1.6a1 Deer Park Alpha (latest nightly) crashes on the following: Reproducible: Always Steps to Reproduce: 1. Take a select box with fixed width. 2. remove a <option>-element with Javascript code: el.options[i] = null; 3. click there, where the item was. Actual Results: Deer Park crashes. Expected Results: It should mark the Javascript as invalid? Or interprete it correctly? For me this looks like a null-Pointer-exception :)
313,990
2,676,319
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8) Gecko/20051026 Firefox/1.5 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8) Gecko/20051026 Firefox/1.5 If the bookmarkbackups/ directory in your profile is unreadable (not chmod +r), Firefox will crash on startup. If it is readable, even if it's not writable or executable, it won't crash. Reproducible: Always Steps to Reproduce: 1. chmod 000 bookmarkbackups/ 2. Start Firefox Actual Results: Firefox crashes Expected Results: Firefox would start up normally, though it certainly wouldn't make a backup of bookmarks.html. Standard Firefox nightly, empty profile. It was also confirmed on a trunk CVS build by Mook in #firefox. Here's what he had to say about what causes it: <Mook> http://lxr.mozilla.org/mozilla/source/browser/components/bookmarks/src/nsBookmarksService.cpp#4395 backupFileNames.mImpl is null <Mook> strange, hasMoreElements is 0... <Mook> hmm, existingBackups->mRawPtr is null <Mook> Peng: file it as http://lxr.mozilla.org/mozilla/source/browser/components/bookmarks/src/nsBookmarksService.cpp#4377 existingBackups needs a null check. <Mook> Of course, you probably know better than I do :) <Mook> well, existingBackups is null, so http://lxr.mozilla.org/mozilla/source/browser/components/bookmarks/src/nsBookmarksService.cpp#4383 crashes due to dereferencing a null nsCOMPtr. That's mostly over my head, of course. :P
314,457
2,682,997
###!!! ASSERTION: Adding child where we already have a child? This will likely misbehave: 'Error', file c:/mozilla/docshell/shistory/src/nsSHEntry.cpp, line 528 STEPS TO REPRODUCE: 1. Load http://www.neothermic.com/ 2. Hit either the reload button on the toolbar or hit Ctrl+R SeaMonkey, winxp home, build from today, bfcache enabled (in case it matters)
311,288
2,647,908
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b5) Gecko/20051003 Firefox/1.4.1 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b5) Gecko/20051003 Firefox/1.4.1 If the "Software Update" dialog box (which indicates that a new software update is ready to install) appears while I am typing (say, into a textarea on a Web page), it immediately steals keyboard focus, and causes Firefox to restart upon the next press of the space bar. This is because the button labelled "Restart Firefox Now" is pre-selected as the default option, and pressing the space bar counts as pressing the currently selected button as soon as the dialog appears. Reproducible: Always Steps to Reproduce: 1. Install branch build 20051002 2. Make sure "Automatically download and install the update" is turned on in prefs. 3. Start typing in textarea 4. Continue until software update for 20051003 is downloaded Actual Results: Software update window appears with "Restart Firefox Now" pre-selected; next press of space bar causes Firefox to immediately restart, losing browser session. Expected Results: Pressing space bar immediately after the dialog appears should not cause any action in the dialog - a space bar pressed immediately after a dialog opens ought to be ignored, as it could be part of something the user was typing before the dialog appeared. Three possible solutions. (1) A one-second timeout after the dialog appears, before the space bar becomes active. Or: (2) The dialog does not steal keyboard focus (after all, it is not modal). Or: (3) The "Restart Firefox Now" button is not pre-selected when the dialog appears. Data loss issue. I lost my browsing session and what I had been typing into the form when it happened. Related to, but more serious than, bug #305383.
263,596
2,288,184
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7) Gecko/20040803 Firefox/0.9.3 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7) Gecko/20040803 Firefox/0.9.3 The failure occurs because the cert identified by the nickname [email protected] does not have an email address in the cert. NSS looks for the email address in the cert, and finds none. CERT_FindSMimeProfile calls PK11_FindSMimeProfile with a NULL pointer for the emailAddr argument, and the latter function does not check the pointer for NULL before calling strlen with it. Reproducible: Always Steps to Reproduce: echo foobar > passwd dd if=/dev/urandom of=rand.seed count=1 certutil -N -f passwd -d . certutil -S -s "cn=netauth ca,dc=netauth,dc=com" -n "netauth.com" \ -f passwd -z rand.seed -x -t "C,C,C" -d . certutil -R -s "cn=jimi hendrix,ou=people,dc=netauth,dc=com" \ -z rand.seed -f passwd -o jimi.req -d . certutil -C -i jimi.req -o jimi.crt -f passwd -z rand.seed \ -c netauth.com -d . certutil -A -n [email protected] -f passwd -t "P,P,P" -i jimi.crt -d . certutil -R -s "cn=tom jones,ou=people,dc=netauth,dc=com" \ -z rand.seed -f passwd -o tom.req -d . certutil -C -i tom.req -o tom.crt -f passwd -z rand.seed \ -c netauth.com -d . certutil -A -n [email protected] -f passwd -t "P,P,P" -i tom.crt -d . cmsutil -E -r [email protected] -i jimi.txt -d . -p foobar -o jimi.env Actual Results: cmsutil -E -r [email protected] -i jimi.txt -d . -p foobar -o jimi.env Segmentation fault (core dumped) Expected Results: cmsutil would create a CMS enveloped data message for [email protected], jimi.env cmsutil segfaults
244,304
2,157,106
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7) Gecko/20040517 Camino/0.8b Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7) Gecko/20040517 Camino/0.8b The Firefox nightly build 20040521 opens up, bounces in the dock a few times and quits. No errors or anything. If I take a look at the console I only get: *** loading the extensions datasource Reproducible: Always Steps to Reproduce: 1. Download todays nightly 2. Launch it 3. Actual Results: Crahes without errors Expected Results: Launched normally I'm using Mac OS X 10.3.3
244,454
2,158,209
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.8a1) Gecko/20040520 Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.8a1) Gecko/20040520 When visiting the above URL and the page has loaded Mozilla crashes each time. I tested this on Windows 98 and Linux. JavaScript has to be activated, I have no Plugins installed. Reproducible: Always Steps to Reproduce: 1. Make sure JavaScript for browser is on 2. Type URL and enter 3. Wait until the page has loaded Actual Results: Crash Expected Results: Don't crash MOZILLA verursachte einen Fehler durch eine ungültige Seite in Modul <Unbekannt> bei 0000:0182968d. Register: EAX=00000000 CS=0167 EIP=0182968d EFLGS=00010282 EBX=0182d6a4 SS=016f ESP=0064eefc EBP=0064ef10 ECX=0182d6a4 DS=016f ESI=00000000 FS=133f EDX=018296c4 ES=016f EDI=0182d6a4 GS=0000 Bytes bei CS:EIP: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Stapelwerte: 60294079 00000000 01837398 0182db10 0182d6a4 0064ef3c 602940fe 01d889b0 01d6f9e0 01d6f9f8 0064f040 018f5b84 00000000 017ed644 01837398 01837398 Nothing on Linux, Mozilla just disappears.
245,053
2,162,811
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7) Gecko/20040529 Firefox/0.8.0+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7) Gecko/20040529 Firefox/0.8.0+ When starting the new Ffx builds (I have to do it three times, but you knew that), if the flag -profilemanager is used, the new Profile Manager is invoked. If you try to delete a profile, the profilemanager crashes. After that, even three tries does not revive Ffx. I have to clean out all the directories and start over. Reproducible: Always Steps to Reproduce: 1. Start Firefox with a shortcut or line command that includes "...firefox.exe" -profilemanager 2. When Profile Manager comes up, select Delete Profile. This will often produce the crash. 3. If asked whether or not to delete the files, choose Yes. Actual Results: Profile Manager crashed Expected Results: Profile should have been deleted. When one has generated several profiles, you can click on the next to last profile in the list of profiles, but not the last profile. Earlier you could click on the next to last profile and use the arrow key to get down to the last one. Not now.
245,327
2,165,259
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8a2) Gecko/20040601 Firefox/0.8.0+ Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8a2) Gecko/20040601 Firefox/0.8.0+ When I try to install a theme or to change one (with the theme manager), all tabs become "about:blank" and lose their history : I can't recover the pages I was reading... Reproducible: Always Steps to Reproduce: 1. Install a theme (for example with http://texturizer.net/firefox/themes/ ) or 1bis. Change the theme used Actual Results: All the tabs opened are "cleaned" : they display `about:blank` and have no history Expected Results: No change on tabs opened... (It occures to me also once with Mozilla 1.7a I think. So maybe it's a dupe, even if I haven't find anything related...)
252,789
2,212,822
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.0.3705; .NET CLR 1.1.4322) Build Identifier: I just update to the tip timetracking group is empty new bug may be created but modifications result in a positive value required 'hours worked' must be positive error. Reproducible: Always Steps to Reproduce:
253,354
2,217,059
BUILD: Anything current STEPS TO REPRODUCE: 1) Open a browser window 2) Inspect it (the chrome, not the document) 3) Select the <window> node 4) Click on the "Style Rules" view over on the right 5) Select any rule (the last one will do). 6) Right-click on any property in that rule's declaration and remove it. You are now living on borrowed time; trigger some restyles to crash. FURTHER INFORMATION: In a debug build, you get: WARNING: NS_ENSURE_TRUE(index != -1) failed, file /home/bzbarsky/mozilla/xlib/mozilla/content/html/style/src/nsCSSStyleSheet.cpp, line 2135 ###!!! ASSERTION: container didn't take ownership: 'Not Reached', file /home/bzbarsky/mozilla/xlib/mozilla/content/html/style/src/nsCSSStyleRule.cpp, line 1072 JavaScript error: , line 0: uncaught exception: [Exception... "Component returned failure code: 0x8000ffff (NS_ERROR_UNEXPECTED) [nsIDOMCSSStyleDeclaration.removeProperty]" nsresult: "0x8000ffff (NS_ERROR_UNEXPECTED)" location: "JS frame :: chrome://inspector/content/viewers/styleRules/styleRules.js :: anonymous :: line 265" data: no] ANALYSIS: The assert is easy to explain. The problem is that we share rule lists between stylesheets. So the rules pointed to by the rulenodes corresponding to the <window> element are in a stylesheet inner that's shared by several sheets. Now since we sort of sneak up on these rules through the rulenodes, the sheet doesn't know we have pointers to them, so the inner remains shared. When we actually change the declaration, we wind up in CSSStyleSheetImpl::ReplaceStyleRule (called via the various DeclarationChanged() methods). Here we call WillDirty(), which finally clones the inner. But now the sheet has brand-new rules and aOld is a rule in the _old_ inner, not the new one). Hence the IndexOf() returns -1 and we bail out with NS_ERROR_UNEXPECTED. This returns us to CSSStyleRuleImpl::DeclarationChanged where we blithely ignore the error return and return our newly-minted clone. This returns us to DOMCSSDeclarationImpl::DeclarationChanged, where we call Release() on mRule. But since no replacement ever took place, we were holding the only ref to mRule, so we fall into the "set mRule to null and bail out" branch. I'm not _quite_ sure about the crash itself. We crash when enumerating the rulehash, which suggests that we have a deleted rule hanging out in there or something... but I'm not sure the above process leads to that directly.
250,758
2,199,067
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7) Gecko/20040626 Firefox/0.9.1 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7) Gecko/20040626 Firefox/0.9.1 The link which is given in the post should open the website www.clubic.com This works fine when left-clicking, but Firefox crashes when middle-clicking on it to open the link in a new tab Reproducible: Always Steps to Reproduce: 1. Go to http://forum.clubic.com/forum2.php3?cat=17&post=7846&config=&cache=cache&sondage=&p=1&trash=&subcat=&owntopic=0&page=1#t76124 2. There is a link is this post to http://www.tbirdtheyuri.est.le.maître.du.monde.clubic.com/ 3. Middle-click on this link Actual Results: Firefox crashes
292,549
2,491,247
Steps to reproduce: 0) Build ff trunk 1) Start TestGtkEmbed 2) Load www.gnome.org Result: Crash. ###!!! ASSERTION: A box layout method was called but InitBoxMetrics was never called: 'metrics', file /opt/source/firefox-trunk/mozilla/layout/generic/nsFrame.cpp, line 5644 Break: at file /opt/source/firefox-trunk/mozilla/layout/generic/nsFrame.cpp, line 5644 #0 0xb68ca472 in nsFrame::BoxReflow (this=0x8318290, aState=@0xbfffe644, aPresContext=0x8303e80, aDesiredSize=@0xbfffe3b0, aReflowState=@0xbfffe760, aStatus=@0xbfffe404, aX=6900, aY=6000, aWidth=0, aHeight=0, aMoveFrame=1) at /opt/source/firefox-trunk/mozilla/layout/generic/nsFrame.cpp:5306 #1 0xb68c9f79 in nsFrame::DoLayout (this=0x8318290, aState=@0xbfffe644) at /opt/source/firefox-trunk/mozilla/layout/generic/nsFrame.cpp:5109 #2 0xb6a5a07e in nsIFrame::Layout (this=0x8318290, aState=@0xbfffe644) at /opt/source/firefox-trunk/mozilla/layout/xul/base/src/nsBox.cpp:800 #3 0xb6a6073e in nsBoxFrame::LayoutChildAt (aState=@0xbfffe644, aBox=0x8318290, aRect=@0xbfffe4d0) at /opt/source/firefox-trunk/mozilla/layout/xul/base/src/nsBoxFrame.cpp:2681 #4 0xb68e1d31 in nsGfxScrollFrameInner::LayoutScrollbars (this=0x8318074, aState=@0xbfffe644, aContentArea=@0xbfffe580, aOldScrollArea=@0xbfffe600, aScrollArea=@0xbfffe664) at /opt/source/firefox-trunk/mozilla/layout/generic/nsGfxScrollFrame.cpp:2306 #5 0xb68dd68f in nsHTMLScrollFrame::Reflow (this=0x8318028, aPresContext=0x8303e80, aDesiredSize=@0xbfffe830, aReflowState=@0xbfffe760, aStatus=@0xbfffe9e8) at /opt/source/firefox-trunk/mozilla/layout/generic/nsGfxScrollFrame.cpp:746 #6 0xb68bb8c2 in nsContainerFrame::ReflowChild (this=0x8317e04, aKidFrame=0x8318028, aPresContext=0x8303e80, aDesiredSize=@0xbfffe830, aReflowState=@0xbfffe760, aX=0, aY=0, aFlags=0, aStatus=@0xbfffe9e8) at /opt/source/firefox-trunk/mozilla/layout/generic/nsContainerFrame.cpp:890 #7 0xb694ec49 in ViewportFrame::Reflow (this=0x8317e04, aPresContext=0x8303e80, aDesiredSize=@0xbfffea10, aReflowState=@0xbfffe920, aStatus=@0xbfffe9e8) at /opt/source/firefox-trunk/mozilla/layout/generic/nsViewportFrame.cpp:238 #8 0xb68789c2 in PresShell::InitialReflow (this=0x8316db0, aWidth=6900, aHeight=6000) at /opt/source/firefox-trunk/mozilla/layout/base/nsPresShell.cpp:2850 #9 0xb6ac06f4 in nsContentSink::StartLayout (this=0x82ff4e8, aIsFrameset=0) at /opt/source/firefox-trunk/mozilla/content/base/src/nsContentSink.cpp:921 [...] 5(gdb) p metrics $1 = (nsBoxLayoutMetrics *) 0x0 306 if (metrics->mStyleChange) { This is with TestGtkEmbed on my own build from cvs; but I've also found talkback for this crash: 5490302, 5490297, 5473329 from firefox and thunderbird. A build from Friday (2005-04-29) didn't show this crash; saturday night's (2005-04-30) did.
282,737
2,418,474
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322) Build Identifier: Bugzilla 2.18 I did a query, I went to change columns, I removed the time tracking columns and bam I got a software error. Reproducible: Always Steps to Reproduce: 1. Run a query with columns Orig Est Time & percent complete turned on 2. Press change columns 3. turn off orig est and percent complete 4. press change columns 5. BAM! death. Actual Results: BAM! death. Software error: DBD::mysql::st execute failed: You have an error in your SQL syntax. Check the manual that corresponds to your MySQL server version for the right syntax to use near '.bug_idSUMldtime.work_timeCOUNTDISTINCTldtime.bug_whenCOUNTbugs [for Statement "SELECT bugs.bug_id, bugs.bug_severity, bugs.priority, bugs.bug_status, bugs.resolution, bugs.bug_severity, bugs.priority, bugs.rep_platform, map_assigned_to.realname, bugs.bug_status, bugs.resolution, bugs.short_desc, bugs.estimated_time, 100SUMldtime.work_timeCOUNTDISTINCTldtime.bug_whenCOUNTbugs.bug_idSUMldtime.work _timeCOUNTDISTINCTldtime.bug_whenCOUNTbugs.bug_idbugs.remaining_timeASpercentage _complete FROM bugs, profiles AS map_assigned_to LEFT JOIN bug_group_map ON bug_group_map.bug_id = bugs.bug_id AND bug_group_map.group_id NOT IN (12,3,8,4,13,1,6,9,11,2,5,10,7) LEFT JOIN cc ON cc.bug_id = bugs.bug_id AND cc.who = 1 WHERE bugs.assigned_to = map_assigned_to.userid AND (bugs.bug_id IN ('1304','1001','1155','920','1037','1083','1161','1165','1169','1172','1295','13 11','855','1101','1250','940','1303','514','1282','1305','1306','1087','438','64 4','799','800','1128','1207','1237','416','1249','452','801','1064','413','446', '1199','867','872','1071','1012','1171','913')) AND ((bug_group_map.group_id IS NULL) OR (bugs.reporter_accessible = 1 AND bugs.reporter = 1) OR (bugs.cclist_accessible = 1 AND cc.who IS NOT NULL) OR (bugs.assigned_to = 1) ) GROUP BY bugs.bug_id ORDER BY bugs.resolution,map_assigned_to.realname,bugs.estimated_time,map_assigned_to.rea lname,bugs.resolution,map_assigned_to.realname,bugs.bug_status,percentage_comple te,bugs.resolution,map_assigned_to.realname,bugs.resolution,bugs.estimated_time, map_assigned_to.realname,bugs.resolution,bugs.estimated_time,bugs.resolution,map _assigned_to.realname,bugs.estimated_time,map_assigned_to.realname,bugs.bug_seve rity,bugs.priority,bugs.bug_severity,bugs.bug_id "] at Bugzilla/DB.pm line 62 Bugzilla::DB::SendSQL('SELECT bugs.bug_id, bugs.bug_severity, bugs.priority, bugs.bu...') called at /var/www/html/bugzilla/buglist.cgi line 766 For help, please send mail to the webmaster ([email protected]), giving this error message and the time and date of the error. Expected Results: No death. I havn't tried this a lot, but it seems that I cannot pass by it now.
289,169
2,466,341
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8b) Gecko/20050217 Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8b) Gecko/20050217 Parsing elements which are declared with type FIXED, either in an external DTD (that gets loaded since it's in a chrome:// XUL application), or in the internal subset as in the example below, makes the whole application to freeze, to the extent where the only way I can find of stopping it is killing the process with "killall mozilla-bin". It works fine with Mozilla 1.7.x, up to 1.7.6. Fails with any 1.8ax and 1.8bx I've tried, up to 1.8b1. The bug #284296 seems a bit similar, but not the same: https://bugzilla.mozilla.org/show_bug.cgi?id=284296 Reproducible: Always Steps to Reproduce: 1. Evaluate the following into the JavaScript console: (new DOMParser()).parseFromString('<?xml version="1.0"?>\n<!DOCTYPE omdoc [\n<!ATTLIST title xmlns CDATA #FIXED "http://purl.org/DC">\n<!ATTLIST creator xmlns CDATA #FIXED "http://purl.org/DC">\n]>\n<omdoc><metadata><title>Some title</title><creator role="aut">Some Author</creator></metadata></omdoc>', 'text/xml') Actual Results: Mozilla freezes. Expected Results: Display "[object XMLDocument]" as result.
1,228,788
10,971,521
Created attachment 8693286 testcase 1. Create a fresh profile with prefs.js: user_pref("media.navigator.permission.disabled", true); user_pref("browser.tabs.remote.autostart", false); user_pref("browser.tabs.remote.autostart.1", false); user_pref("browser.tabs.remote.autostart.2", false); 2. Load the testcase. 3. ⌘Q as soon as the orange recording icon appears in the address bar. Result: 30% of the time, shutdown succeeds but everything leaks 70% of the time, shutdown stalls and eventually aborts with the following message: FATAL ERROR: AsyncShutdown timeout in profile-before-change Conditions: [{"name":"Media shutdown: blocking on media thread","state":"(none)","filename":"dom/media/MediaManager.cpp","lineNumber":1600,"stack":"Media shutdown"}] At least one completion condition failed to complete within a reasonable amount of time. Causing a crash to ensure that we do not leave the user with an unresponsive process draining resources.
1,230,473
10,988,154
User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Ubuntu Chromium/45.0.2454.101 Chrome/45.0.2454.101 Safari/537.36 Steps to reproduce: 1. On Ubuntu 15.10, go to http://jsfiddle.net/6tsyptoh/2/ . 2. Trigger a compositionstart event. For example, press backtick twice in the UK (Extended WinKeys) keyboard layout. (Various IMEs I've tried seem to cause the same results) Actual results: The browser segfaults after the listener returns. You can get the same effect by replacing the "blur(); focus()" with an alert(), in which case the segfault does not happen until the alert dialog is closed. Expected results: No segfault (though the IME may be interrupted)
1,270,235
11,382,485
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.94 Safari/537.36 Steps to reproduce: 1. Visit: http://codepen.io/quill/pen/xVmqbE 2. Click on the button 3. Type 'a' (any printable character should do) FF 46.0.1: https://crash-stats.mozilla.com/report/index/7fcb93fc-520c-4e31-a6f8-ae0d62160504 FF 48.0a2: https://crash-stats.mozilla.com/report/index/c9bbb09f-947f-4b7e-b50e-d1f6a2160504 Actual results: Firefox crashes Expected results: Probably nothing since the selection was added to a node that is no longer in the DOM, typing into it should do nothing.
1,270,916
11,389,236
This bug was filed from the Socorro interface and is report bp-6c34c50b-23e3-4ca4-8ea2-91c142160506. ============================================================= Crash in private browsing sometimes.
1,259,728
11,277,380
Created attachment 8734720 crash.txt User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_3) AppleWebKit/601.4.4 (KHTML, like Gecko) Version/9.0.3 Safari/601.4.4 Steps to reproduce: Hello, When the 'onsignalingstatechange' event handler, is invoked and the 'iceConnectionState' of the events target is 'closed' I'm trying to stop any localStreams (with 'getLocalStreams'): peerConnection.onsignalingstatechange = function (e) { if (e.target.iceConnectionState === 'closed') { var streams = e.target.getLocalStreams(); ... } } This causes the browser to crash. (Attached is the crash report). Firefox: 45.0.1 OS X: 10.11.3 Actual results: Firefox crashed when invoking 'getLocalStreams'. Expected results: I'm guessing it should throw an error message similar to "PeerConnection invalid state".
1,053,456
9,180,519
User Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0 (Beta/Release) Build ID: 20140715214327 Steps to reproduce: 1. Open new e10s window 2. Load https://svn.resiprocate.org/rep/resiprocate/ 3. See the "Untrusted Connection" page 4. Click "I Understand the Risks" and "Add Exception" button Actual results: nothing (button is clickable, but no response) Expected results: should open a new dialog to import the site certificate This behaves exactly the same as 989875.
1,201,401
10,690,647
This bug was filed from the Socorro interface and is report bp-71e78d27-f874-4476-bd9f-8d1d92150903. ============================================================= > 0 CoreVideo CVCGDisplayLink::getDisplayTimes(unsigned long long*, unsigned long long*, unsigned long long*) > 1 CoreVideo CVHWTime::update(double, bool*, bool*) > 2 CoreVideo CVXTime::update() > 3 CoreVideo CVDisplayLink::runIOThread() > 4 CoreVideo startIOThread(void*) > Ø 5 libsystem_pthread.dylib libsystem_pthread.dylib@0x4059 > Ø 6 libsystem_pthread.dylib libsystem_pthread.dylib@0x3fd6 > Ø 7 libsystem_pthread.dylib libsystem_pthread.dylib@0x13ec > 8 CoreVideo CVDisplayLink::isRunning() According to the comments and the summary of same reports, this may be reproduced when user uses external display on OS X 10.10. Looks like we hit a bug of OS X 10.10. If we could avoid the bug in our side, it's great.
1,202,230
10,700,751
Steps to reproduce: 1. Launch the Buddy Up app. 2. Tap on the "Gear" button at the right top corner of the screen. 3. Tap on the "Create account or sign in" button 4. Tap on "Don't have an account? Register" button. 5. Type a valid email address, username and password 6. Tap on "Create Account" button. Expected result: "Confirm Account" page appears with a "Cancel Sign Up" button. Actual result: Blank page appears Note: User can not dismiss that page even after restarting the app or by verifying the account (by following the link in the sent email), the only way is to re-install the app. console errors: TypeError: cancel_button is null email_confirmation_controller.js:47:7 Error: (main/email_confirmation.html) [Line 2, Column 10] Error: Unable to call `_`, which is undefined or falsey regression searching results: https://github.com/mozilla/buddyup/commit/9acf86651442106df4e1ba9a90cdbe6aac7b3795 (no bug, works fine) (some commits that can not be tested) https://github.com/mozilla/buddyup/commit/6f191663ac6b1f5cc999193ef83576d64c71e51d (first testable commit with the bug)
1,203,737
10,717,920
This bug was filed from the Socorro interface and is report bp-5f2606a8-cf08-47eb-bc13-fec312150910. ============================================================= Repro Steps: 1) Update a Aries to 20150909215207 2) Open up the browser and go to m.youtube.com 3) Tap on the 3 dots by the search icon to open up the menu and tap on "Desktop". 4) On the desktop version of "Youtube", look towards the top of the page and tap "switch to mobile". 5) Tap on a video to play it and keep locking and unlocking the phone. Actual: Youtube will crash after unlocking the phone. Expected: Youtube does not crash and video plays normally after unlocking the phone. Notes: Environmental Variables: Device: Aries 2.5 Build ID: 20150909215207 Gaia: 47459eead04385e22f967012b824f5abdddcfb7c Gecko: dd2a1d737a64d9a3f23714ec5cc623ec8933b51f Gonk: 2916e2368074b5383c80bf5a0fba3fc83ba310bd Version: 43.0a1 (2.5) Firmware Version: D5803_23.1.A.1.28_NCB.ftf User Agent: Mozilla/5.0 (Mobile; rv:43.0) Gecko/43.0 Firefox/43.0 Repro frequency: 1/10 attempts 10% See attached: logcat, video
1,186,967
10,530,281
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:42.0) Gecko/20100101 Firefox/42.0 Build ID: 2015072302 Steps to reproduce: I double-clicked on empty space within the tab-bar (mouse button 1). Actual results: Firefox crashed. Expected results: Nothing notable. You can find further information under https://crash-stats.mozilla.com/report/index/2129a096-a23d-4cb0-b376-953722150723 I compile firefox myself from the nightly repository. This bug has been there for months, firefox beeing linked against several versions of gtk3.
1,214,675
10,837,687
Reproducible with latest 43.0a2 Developer Edition and 44.0a1 Nightly, both e10s enabled/disabled Affected platform: Windows 7 64-bit, Windows 8 64-bit, Ubuntu 14.04 32-bit Steps to reproduce: 1. Start Firefox and Click on Hello icon (chat bubble with smiley face). 2. Click on "Start a conversation" and share any window. 3. Restart/Close Firefox. Expected result: No crash. Actual result: bp-4b0b12bb-0cf9-40ee-8764-dd34a2151014 Additional info: 1. This signature showed up only at the first crash. The next signatures look like bug 1116884, although is reproducible with e10s disabled too: bp-158d7b26-caa0-46ca-acc3-db7742151014 bp-0a3b3c90-bff5-4d5c-821c-a7c662151014 bp-32df93c4-53c7-48e7-b66a-b6d922151014 2. Not reproducible with 42 beta 6 nor with Mac OS X 10.10.4.
1,139,497
9,985,732
[Tracking Requested - why for this release]: I'm filing this as separate as bug 846239 has a specific 3rd party connection and we probably have a different one here. We have those signatures at 2.1% (#2) + 1.6% (#8) on early 37.0b2 data, so pretty significant volume in general (see links in Crash Signature field for reports and stats). Correlations aren't exactly clear to me, I'm pasting them here because Socorro seems to not correctly show them in its UI (those are for yesterday, from https://crash-analysis.mozilla.com/crash_analysis/20150303/20150303_Firefox_37.0-interesting-modules.txt.gz if you want to look yourself): zzz_AsmCodeRange_Begin | BaseThreadInitThunk|0xc000070a / 0x00000000 (599 crashes) 89% (533/599) vs. 18% (16185/87854) rtutils.dll 88% (529/599) vs. 18% (15957/87854) rasman.dll 88% (529/599) vs. 18% (15957/87854) rasapi32.dll 78% (465/599) vs. 13% (11132/87854) SensApi.dll 97% (584/599) vs. 43% (38036/87854) urlmon.dll 50% (302/599) vs. 7% (5888/87854) d3d10.dll 50% (302/599) vs. 7% (5888/87854) d3d10core.dll 98% (586/599) vs. 58% (51192/87854) apphelp.dll 51% (307/599) vs. 18% (15769/87854) d3d10_1core.dll 51% (307/599) vs. 18% (15769/87854) d3d10_1.dll 26% (155/599) vs. 1% (721/87854) npggNT.des 32% (189/599) vs. 10% (8989/87854) igd10umd32.dll 100% (599/599) vs. 85% (75070/87854) RpcRtRemote.dll 98% (585/599) vs. 84% (73794/87854) wship6.dll 100% (598/599) vs. 86% (75770/87854) Wldap32.dll 100% (599/599) vs. 87% (76092/87854) WSHTCPIP.DLL 15% (92/599) vs. 2% (2050/87854) D3Dx10_40.dll 17% (99/599) vs. 4% (3620/87854) atiuxpag.dll 17% (99/599) vs. 4% (3724/87854) aticfx32.dll 17% (99/599) vs. 4% (3814/87854) atidxx32.dll 100% (599/599) vs. 89% (78025/87854) samlib.dll 100% (599/599) vs. 89% (78265/87854) Wpc.dll 100% (599/599) vs. 89% (78266/87854) wevtapi.dll 100% (599/599) vs. 89% (78274/87854) explorerframe.dll 100% (599/599) vs. 89% (78472/87854) pnrpnsp.dll 100% (599/599) vs. 89% (78496/87854) duser.dll 100% (599/599) vs. 89% (78496/87854) dui70.dll 98% (585/599) vs. 87% (76822/87854) sspicli.dll 99% (594/599) vs. 89% (78327/87854) ntdsapi.dll 98% (585/599) vs. 88% (77269/87854) FWPUCLNT.DLL 100% (599/599) vs. 91% (79550/87854) lpk.dll 100% (599/599) vs. 91% (80266/87854) NapiNSP.dll 100% (599/599) vs. 91% (80378/87854) DWrite.dll 100% (599/599) vs. 92% (80610/87854) cryptsp.dll 99% (593/599) vs. 91% (79741/87854) d2d1.dll 10% (62/599) vs. 2% (1899/87854) iNetSafe.dll 10% (62/599) vs. 2% (1972/87854) safemon.dll 15% (91/599) vs. 7% (6286/87854) ncrypt.dll 99% (594/599) vs. 91% (80194/87854) nlaapi.dll 99% (593/599) vs. 91% (80141/87854) d3d11.dll 99% (593/599) vs. 91% (80143/87854) dxgi.dll 98% (585/599) vs. 90% (79471/87854) iertutil.dll 100% (599/599) vs. 93% (81689/87854) profapi.dll 98% (585/599) vs. 91% (79678/87854) wininet.dll 9% (51/599) vs. 2% (1518/87854) I18N.dll 100% (599/599) vs. 93% (81924/87854) propsys.dll 100% (599/599) vs. 93% (81930/87854) devobj.dll 100% (599/599) vs. 93% (81930/87854) samcli.dll 100% (599/599) vs. 93% (81942/87854) sechost.dll 100% (599/599) vs. 93% (81947/87854) wkscli.dll 100% (599/599) vs. 93% (81947/87854) CRYPTBASE.dll 100% (599/599) vs. 93% (81947/87854) netutils.dll 100% (599/599) vs. 93% (81947/87854) srvcli.dll 100% (599/599) vs. 93% (81948/87854) KERNELBASE.dll 100% (599/599) vs. 93% (82088/87854) cfgmgr32.dll 100% (599/599) vs. 94% (82207/87854) powrprof.dll 99% (593/599) vs. 93% (81409/87854) MMDevAPI.dll 100% (599/599) vs. 94% (82377/87854) winnsi.dll 100% (599/599) vs. 94% (82377/87854) nsi.dll 100% (599/599) vs. 94% (82393/87854) IPHLPAPI.DLL 100% (599/599) vs. 94% (82394/87854) dwmapi.dll 7% (42/599) vs. 1% (798/87854) DETOURED.DLL 7% (42/599) vs. 1% (834/87854) SCDETOUR.DLL 100% (598/599) vs. 94% (82399/87854) wbemcomn.dll 99% (592/599) vs. 93% (81718/87854) nssckbi.dll 99% (592/599) vs. 93% (81846/87854) nssdbm3.dll 99% (592/599) vs. 93% (81859/87854) softokn3.dll 10% (59/599) vs. 4% (3812/87854) bcryptprimitives.dll 100% (599/599) vs. 95% (83103/87854) msctf.dll 99% (592/599) vs. 93% (82141/87854) freebl3.dll 6% (36/599) vs. 1% (635/87854) ScDetour.Dll 6% (36/599) vs. 1% (663/87854) Detoured.dll 100% (598/599) vs. 95% (83122/87854) wbemprox.dll 99% (594/599) vs. 94% (82558/87854) fastprox.dll 99% (594/599) vs. 94% (82635/87854) wbemsvc.dll RtlpCallQueryRegistryRoutine | BaseThreadInitThunk|0xc000070a / 0x00000000 (470 crashes) 75% (352/470) vs. 18% (15769/87854) d3d10_1core.dll 75% (352/470) vs. 18% (15769/87854) d3d10_1.dll 50% (236/470) vs. 1% (721/87854) npggNT.des 98% (461/470) vs. 58% (51192/87854) apphelp.dll 28% (131/470) vs. 4% (3814/87854) atidxx32.dll 27% (128/470) vs. 4% (3620/87854) atiuxpag.dll 27% (125/470) vs. 4% (3724/87854) aticfx32.dll 25% (118/470) vs. 4% (3392/87854) nvwgf2um.dll 31% (144/470) vs. 10% (8989/87854) igd10umd32.dll 29% (137/470) vs. 13% (11132/87854) SensApi.dll 23% (107/470) vs. 7% (5888/87854) d3d10.dll 23% (107/470) vs. 7% (5888/87854) d3d10core.dll 29% (138/470) vs. 14% (12092/87854) WLIDNSP.DLL 100% (470/470) vs. 85% (75070/87854) RpcRtRemote.dll 31% (144/470) vs. 16% (14326/87854) mdnsNSP.dll 98% (462/470) vs. 84% (73794/87854) wship6.dll 100% (470/470) vs. 86% (75770/87854) Wldap32.dll 100% (470/470) vs. 87% (76092/87854) WSHTCPIP.DLL 17% (81/470) vs. 4% (3812/87854) bcryptprimitives.dll 100% (470/470) vs. 87% (76822/87854) sspicli.dll 13% (63/470) vs. 1% (840/87854) nvspcap.dll 31% (144/470) vs. 18% (16185/87854) rtutils.dll 30% (140/470) vs. 18% (15957/87854) rasman.dll 30% (140/470) vs. 18% (15957/87854) rasapi32.dll 100% (470/470) vs. 89% (78025/87854) samlib.dll 97% (454/470) vs. 85% (75076/87854) AudioSes.dll 100% (470/470) vs. 89% (78265/87854) Wpc.dll 100% (470/470) vs. 89% (78266/87854) wevtapi.dll 100% (470/470) vs. 89% (78274/87854) explorerframe.dll 100% (470/470) vs. 89% (78472/87854) pnrpnsp.dll 100% (470/470) vs. 89% (78496/87854) duser.dll 100% (470/470) vs. 89% (78496/87854) dui70.dll 11% (50/470) vs. 1% (467/87854) guard32.dll 11% (50/470) vs. 1% (501/87854) fltLib.dll 100% (470/470) vs. 91% (79550/87854) lpk.dll 23% (109/470) vs. 14% (12347/87854) idmmkb.dll 97% (456/470) vs. 88% (77269/87854) FWPUCLNT.DLL 100% (470/470) vs. 91% (80194/87854) nlaapi.dll 100% (470/470) vs. 91% (80266/87854) NapiNSP.dll 100% (470/470) vs. 91% (80378/87854) DWrite.dll 100% (470/470) vs. 92% (80610/87854) cryptsp.dll 29% (137/470) vs. 21% (18642/87854) bcrypt.dll 8% (37/470) vs. 0% (395/87854) DpOSet.dll 8% (37/470) vs. 0% (396/87854) DpOFeedb.dll 100% (470/470) vs. 93% (81689/87854) profapi.dll 98% (459/470) vs. 91% (79741/87854) d2d1.dll 100% (470/470) vs. 93% (81924/87854) propsys.dll 100% (470/470) vs. 93% (81930/87854) devobj.dll 100% (470/470) vs. 93% (81930/87854) samcli.dll 100% (470/470) vs. 93% (81942/87854) sechost.dll 100% (470/470) vs. 93% (81947/87854) wkscli.dll 100% (470/470) vs. 93% (81947/87854) CRYPTBASE.dll 100% (470/470) vs. 93% (81947/87854) netutils.dll 100% (470/470) vs. 93% (81947/87854) srvcli.dll 100% (470/470) vs. 93% (81948/87854) KERNELBASE.dll 100% (470/470) vs. 93% (82088/87854) cfgmgr32.dll 98% (459/470) vs. 91% (80141/87854) d3d11.dll 98% (459/470) vs. 91% (80143/87854) dxgi.dll 100% (470/470) vs. 94% (82207/87854) powrprof.dll 100% (470/470) vs. 94% (82377/87854) winnsi.dll 100% (470/470) vs. 94% (82377/87854) nsi.dll 100% (470/470) vs. 94% (82393/87854) IPHLPAPI.DLL 100% (470/470) vs. 94% (82394/87854) dwmapi.dll 100% (470/470) vs. 94% (82399/87854) wbemcomn.dll 99% (466/470) vs. 93% (81718/87854) nssckbi.dll 99% (466/470) vs. 93% (81846/87854) nssdbm3.dll 99% (466/470) vs. 93% (81859/87854) softokn3.dll 97% (456/470) vs. 91% (80095/87854) psapi.dll 99% (466/470) vs. 93% (82141/87854) freebl3.dll 100% (470/470) vs. 95% (83103/87854) msctf.dll 100% (470/470) vs. 95% (83122/87854) wbemprox.dll 6% (29/470) vs. 1% (720/87854) avcuf32.dll zzz_AsmCodeRange_End | BaseThreadInitThunk|0xc000070a / 0x00000000 (162 crashes) 91% (148/162) vs. 18% (15957/87854) rasman.dll 91% (148/162) vs. 18% (15957/87854) rasapi32.dll 91% (148/162) vs. 18% (16185/87854) rtutils.dll 85% (138/162) vs. 13% (11132/87854) SensApi.dll 70% (113/162) vs. 7% (5888/87854) d3d10.dll 70% (113/162) vs. 7% (5888/87854) d3d10core.dll 57% (93/162) vs. 1% (721/87854) npggNT.des 99% (161/162) vs. 43% (38036/87854) urlmon.dll 70% (113/162) vs. 18% (15769/87854) d3d10_1core.dll 70% (113/162) vs. 18% (15769/87854) d3d10_1.dll 97% (157/162) vs. 58% (51192/87854) apphelp.dll 28% (45/162) vs. 4% (3392/87854) nvwgf2um.dll 23% (37/162) vs. 4% (3620/87854) atiuxpag.dll 23% (37/162) vs. 4% (3724/87854) aticfx32.dll 23% (37/162) vs. 4% (3814/87854) atidxx32.dll 100% (162/162) vs. 85% (75070/87854) RpcRtRemote.dll 96% (156/162) vs. 82% (72200/87854) normaliz.dll 100% (162/162) vs. 86% (75770/87854) Wldap32.dll 100% (162/162) vs. 87% (76092/87854) WSHTCPIP.DLL 97% (157/162) vs. 84% (73794/87854) wship6.dll 100% (162/162) vs. 87% (76822/87854) sspicli.dll 100% (162/162) vs. 89% (78025/87854) samlib.dll 100% (162/162) vs. 89% (78265/87854) Wpc.dll 100% (162/162) vs. 89% (78266/87854) wevtapi.dll 100% (162/162) vs. 89% (78274/87854) explorerframe.dll 100% (162/162) vs. 89% (78327/87854) ntdsapi.dll 21% (34/162) vs. 10% (8989/87854) igd10umd32.dll 100% (162/162) vs. 89% (78472/87854) pnrpnsp.dll 100% (162/162) vs. 89% (78496/87854) duser.dll 100% (162/162) vs. 89% (78496/87854) dui70.dll 100% (162/162) vs. 91% (79550/87854) lpk.dll 100% (162/162) vs. 91% (79741/87854) d2d1.dll 97% (157/162) vs. 88% (77269/87854) FWPUCLNT.DLL 99% (161/162) vs. 90% (79471/87854) iertutil.dll 100% (162/162) vs. 91% (80141/87854) d3d11.dll 100% (162/162) vs. 91% (80143/87854) dxgi.dll 100% (162/162) vs. 91% (80194/87854) nlaapi.dll 100% (162/162) vs. 91% (80266/87854) NapiNSP.dll 100% (162/162) vs. 91% (80378/87854) DWrite.dll 100% (162/162) vs. 92% (80610/87854) cryptsp.dll 22% (36/162) vs. 14% (12347/87854) idmmkb.dll 100% (162/162) vs. 93% (81409/87854) MMDevAPI.dll 7% (12/162) vs. 0% (67/87854) WTFastDrv.dll 100% (162/162) vs. 93% (81689/87854) profapi.dll 100% (162/162) vs. 93% (81718/87854) nssckbi.dll 100% (162/162) vs. 93% (81846/87854) nssdbm3.dll 100% (162/162) vs. 93% (81859/87854) softokn3.dll 100% (162/162) vs. 93% (81924/87854) propsys.dll 100% (162/162) vs. 93% (81930/87854) devobj.dll 100% (162/162) vs. 93% (81930/87854) samcli.dll 100% (162/162) vs. 93% (81942/87854) sechost.dll 100% (162/162) vs. 93% (81947/87854) CRYPTBASE.dll 100% (162/162) vs. 93% (81947/87854) netutils.dll 100% (162/162) vs. 93% (81947/87854) srvcli.dll 100% (162/162) vs. 93% (81947/87854) wkscli.dll 100% (162/162) vs. 93% (81948/87854) KERNELBASE.dll 100% (162/162) vs. 93% (82088/87854) cfgmgr32.dll 100% (162/162) vs. 93% (82141/87854) freebl3.dll 100% (162/162) vs. 94% (82207/87854) powrprof.dll 100% (162/162) vs. 94% (82377/87854) nsi.dll 100% (162/162) vs. 94% (82377/87854) winnsi.dll 100% (162/162) vs. 94% (82393/87854) IPHLPAPI.DLL 100% (162/162) vs. 94% (82394/87854) dwmapi.dll 100% (162/162) vs. 94% (82399/87854) wbemcomn.dll 10% (17/162) vs. 4% (3812/87854) bcryptprimitives.dll 6% (10/162) vs. 0% (127/87854) escortdrv.dll 6% (10/162) vs. 0% (127/87854) escengine.dll 100% (162/162) vs. 94% (82558/87854) fastprox.dll 100% (162/162) vs. 94% (82635/87854) wbemsvc.dll 6% (10/162) vs. 0% (218/87854) safetycrt.dll 96% (156/162) vs. 91% (79678/87854) wininet.dll 100% (162/162) vs. 95% (83103/87854) msctf.dll 100% (162/162) vs. 95% (83122/87854) wbemprox.dll 6% (9/162) vs. 0% (338/87854) PrxerDrv.dll 6% (9/162) vs. 0% (361/87854) PrxerNsp.dll RtlQueryRegistryValues | BaseThreadInitThunk|0xc000070a / 0x00000000 (73 crashes) 77% (56/73) vs. 13% (11132/87854) SensApi.dll 81% (59/73) vs. 18% (15957/87854) rasapi32.dll 81% (59/73) vs. 18% (15957/87854) rasman.dll 81% (59/73) vs. 18% (16185/87854) rtutils.dll 62% (45/73) vs. 7% (5888/87854) d3d10.dll 62% (45/73) vs. 7% (5888/87854) d3d10core.dll 62% (45/73) vs. 18% (15769/87854) d3d10_1core.dll 62% (45/73) vs. 18% (15769/87854) d3d10_1.dll 86% (63/73) vs. 43% (38036/87854) urlmon.dll 100% (73/73) vs. 58% (51192/87854) apphelp.dll 37% (27/73) vs. 10% (8989/87854) igd10umd32.dll 23% (17/73) vs. 0% (208/87854) sprotector.dll 23% (17/73) vs. 0% (323/87854) mshtml.dll 22% (16/73) vs. 1% (467/87854) guard32.dll 22% (16/73) vs. 1% (501/87854) fltLib.dll 22% (16/73) vs. 1% (720/87854) avcuf32.dll 100% (73/73) vs. 84% (73794/87854) wship6.dll 100% (73/73) vs. 85% (75070/87854) RpcRtRemote.dll 100% (73/73) vs. 86% (75770/87854) Wldap32.dll 14% (10/73) vs. 0% (159/87854) SetPointSmoothFirefox.dll 18% (13/73) vs. 4% (3814/87854) atidxx32.dll 100% (73/73) vs. 87% (76092/87854) WSHTCPIP.DLL 14% (10/73) vs. 1% (551/87854) lpxpcom.dll 100% (73/73) vs. 87% (76822/87854) sspicli.dll 100% (73/73) vs. 88% (77269/87854) FWPUCLNT.DLL 100% (73/73) vs. 89% (78025/87854) samlib.dll 15% (11/73) vs. 4% (3620/87854) atiuxpag.dll 100% (73/73) vs. 89% (78265/87854) Wpc.dll 100% (73/73) vs. 89% (78266/87854) wevtapi.dll 100% (73/73) vs. 89% (78274/87854) explorerframe.dll 100% (73/73) vs. 89% (78327/87854) ntdsapi.dll 15% (11/73) vs. 4% (3724/87854) aticfx32.dll 100% (73/73) vs. 89% (78472/87854) pnrpnsp.dll 100% (73/73) vs. 89% (78496/87854) duser.dll 100% (73/73) vs. 89% (78496/87854) dui70.dll 100% (73/73) vs. 91% (79550/87854) lpk.dll 100% (73/73) vs. 91% (79741/87854) d2d1.dll 100% (73/73) vs. 91% (80095/87854) psapi.dll 100% (73/73) vs. 91% (80141/87854) d3d11.dll 100% (73/73) vs. 91% (80143/87854) dxgi.dll 100% (73/73) vs. 91% (80266/87854) NapiNSP.dll 100% (73/73) vs. 91% (80378/87854) DWrite.dll 100% (73/73) vs. 92% (80610/87854) cryptsp.dll 22% (16/73) vs. 14% (12092/87854) WLIDNSP.DLL 100% (73/73) vs. 93% (81409/87854) MMDevAPI.dll 8% (6/73) vs. 1% (840/87854) nvspcap.dll 11% (8/73) vs. 4% (3392/87854) nvwgf2um.dll 100% (73/73) vs. 93% (81689/87854) profapi.dll 100% (73/73) vs. 93% (81718/87854) nssckbi.dll 100% (73/73) vs. 93% (81846/87854) nssdbm3.dll 100% (73/73) vs. 93% (81859/87854) softokn3.dll 100% (73/73) vs. 93% (81924/87854) propsys.dll 100% (73/73) vs. 93% (81930/87854) devobj.dll 100% (73/73) vs. 93% (81930/87854) samcli.dll 100% (73/73) vs. 93% (81935/87854) rasadhlp.dll 100% (73/73) vs. 93% (81942/87854) sechost.dll 100% (73/73) vs. 93% (81947/87854) CRYPTBASE.dll 100% (73/73) vs. 93% (81947/87854) netutils.dll 100% (73/73) vs. 93% (81947/87854) srvcli.dll 100% (73/73) vs. 93% (81947/87854) wkscli.dll 100% (73/73) vs. 93% (81948/87854) KERNELBASE.dll 100% (73/73) vs. 93% (82088/87854) cfgmgr32.dll 8% (6/73) vs. 2% (1490/87854) nvapi.dll 100% (73/73) vs. 93% (82141/87854) freebl3.dll 100% (73/73) vs. 94% (82207/87854) powrprof.dll 7% (5/73) vs. 0% (425/87854) apcrtldr.dll 7% (5/73) vs. 1% (472/87854) IdcSrvStub.dll 100% (73/73) vs. 94% (82377/87854) nsi.dll 100% (73/73) vs. 94% (82377/87854) winnsi.dll 100% (73/73) vs. 94% (82393/87854) IPHLPAPI.DLL 100% (73/73) vs. 94% (82394/87854) dwmapi.dll 100% (73/73) vs. 94% (82399/87854) wbemcomn.dll 100% (73/73) vs. 94% (82558/87854) fastprox.dll 97% (71/73) vs. 91% (80194/87854) nlaapi.dll 100% (73/73) vs. 94% (82635/87854) wbemsvc.dll 100% (73/73) vs. 95% (83103/87854) msctf.dll 100% (73/73) vs. 95% (83122/87854) wbemprox.dll 7% (5/73) vs. 2% (1518/87854) I18N.dll
1,115,055
9,728,185
Just experienced this crash: bp-3d6e5f21-7f80-4a00-95d4-c5c7d2141223 No STR, happened just mid-browsing. Signature nsEditorEventListener::MouseDown(nsIDOMMouseEvent* UUID 3d6e5f21-7f80-4a00-95d4-c5c7d2141223 Date Processed 2014-12-23 18:08:50.124238 Uptime 1977 Last Crash 181066 seconds before submission Install Age 16737 since version was first installed. Install Time 2014-12-23 13:29:31 Product Firefox Version 37.0a1 Build ID 20141222030202 Release Channel nightly OS Windows NT OS Version 6.3.9600 Build Architecture amd64 Build Architecture Info family 6 model 69 stepping 1 | 4 Crash Reason EXCEPTION_ACCESS_VIOLATION_READ Crash Address 0x8 User Comments App Notes AdapterVendorID: 0x8086, AdapterDeviceID: 0x0a16, AdapterSubsysID: 079b1025, AdapterDriverVersion: 10.18.10.3960 Has dual GPUs. GPU #2: AdapterVendorID2: 0x10de, AdapterDeviceID2: 0x0fe4, AdapterSubsysID2: 079b1025, AdapterDriverVersion2: 9.18.13.4475D3D11-WARP? D3D11-WARP- D2D? D2D1.1? D2D1.1+ D2D+ DWrite? DWrite+ D3D11 Layers? D3D11 Layers+ WebGL? EGL? EGL+ GL Context? GL Context+ WebGL+ Processor Notes sp-processor06_phx1_mozilla_com.18221:2012; MozillaProcessorAlgorithm2015; skunk_classifier: reject - not a plugin hang EMCheckCompatibility False Winsock LSP MSAFD Tcpip [TCP/IP] : 2 : 1 : %SystemRoot%\system32\mswsock.dll MSAFD Tcpip [UDP/IP] : 2 : 2 : MSAFD Tcpip [RAW/IP] : 2 : 3 : %SystemRoot%\system32\mswsock.dll MSAFD Tcpip [TCP/IPv6] : 2 : 1 : MSAFD Tcpip [UDP/IPv6] : 2 : 2 : %SystemRoot%\system32\mswsock.dll MSAFD Tcpip [RAW/IPv6] : 2 : 3 : RSVP TCPv6 Service Provider : 2 : 1 : %SystemRoot%\system32\mswsock.dll RSVP TCP Service Provider : 2 : 1 : RSVP UDPv6 Service Provider : 2 : 2 : %SystemRoot%\system32\mswsock.dll RSVP UDP Service Provider : 2 : 2 : MSAFD RfComm [Bluetooth] : 2 : 1 : %SystemRoot%\system32\mswsock.dll Adapter Vendor ID 0x8086 Adapter Device ID 0x0a16 Total Virtual Memory 140737488224256 Available Virtual Memory 140733764722688 System Memory Use Percentage 60 Available Page File 5930143744 Available Physical Memory 3337252864 Bugzilla - Report this bug in Firefox Core Plugins Toolkit Related Bugs Crashing Thread Frame Module Signature Source 0 xul.dll nsEditorEventListener::MouseDown(nsIDOMMouseEvent*) editor/libeditor/nsEditorEventListener.cpp 1 xul.dll nsEditorEventListener::HandleEvent(nsIDOMEvent*) editor/libeditor/nsEditorEventListener.cpp 2 xul.dll mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, nsIDOMEvent**, mozilla::dom::EventTarget*, nsEventStatus*) dom/events/EventListenerManager.cpp 3 xul.dll mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) dom/events/EventDispatcher.cpp 4 xul.dll mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, nsIDOMEvent*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsCOMArray<mozilla::dom::EventTarget>*) dom/events/EventDispatcher.cpp 5 xul.dll PresShell::HandleEventInternal(mozilla::WidgetEvent*, nsEventStatus*) layout/base/nsPresShell.cpp 6 xul.dll PresShell::HandlePositionedEvent(nsIFrame*, mozilla::WidgetGUIEvent*, nsEventStatus*) layout/base/nsPresShell.cpp 7 xul.dll PresShell::HandleEvent(nsIFrame*, mozilla::WidgetGUIEvent*, bool, nsEventStatus*) layout/base/nsPresShell.cpp 8 xul.dll nsViewManager::DispatchEvent(mozilla::WidgetGUIEvent*, nsView*, nsEventStatus*) view/nsViewManager.cpp 9 xul.dll nsView::HandleEvent(mozilla::WidgetGUIEvent*, bool) view/nsView.cpp 10 xul.dll nsWindow::DispatchEvent(mozilla::WidgetGUIEvent*, nsEventStatus&) widget/windows/nsWindow.cpp 11 xul.dll nsWindow::DispatchWindowEvent(mozilla::WidgetGUIEvent*) widget/windows/nsWindow.cpp 12 xul.dll nsWindow::DispatchMouseEvent(unsigned int, unsigned __int64, __int64, bool, short, unsigned short) widget/windows/nsWindow.cpp 13 xul.dll nsWindow::ProcessMessage(unsigned int, unsigned __int64&, __int64&, __int64*) widget/windows/nsWindow.cpp 14 xul.dll nsWindow::WindowProcInternal(HWND__*, unsigned int, unsigned __int64, __int64) widget/windows/nsWindow.cpp 15 xul.dll CallWindowProcCrashProtected xpcom/base/nsCrashOnException.cpp 16 xul.dll nsWindow::WindowProc(HWND__*, unsigned int, unsigned __int64, __int64) widget/windows/nsWindow.cpp 17 user32.dll DispatchMessageWorker 18 user32.dll EnumDisplaySettingsA 19 user32.dll DispatchMessageWorker 20 xul.dll CallWindowProcCrashProtected xpcom/base/nsCrashOnException.cpp 21 xul.dll mozilla::BackgroundHangThread::FindThread() xpcom/threads/BackgroundHangMonitor.cpp 22 xul.dll mozilla::HangMonitor::NotifyActivity(mozilla::HangMonitor::ActivityType) xpcom/threads/HangMonitor.cpp 23 xul.dll nsAppShell::ProcessNextNativeEvent(bool) widget/windows/nsAppShell.cpp 24 xul.dll nsBaseAppShell::OnProcessNextEvent(nsIThreadInternal*, bool, unsigned int) widget/nsBaseAppShell.cpp 25 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp 26 xul.dll mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp 27 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc 28 xul.dll MessageLoop::Run() ipc/chromium/src/base/message_loop.cc 29 xul.dll nsBaseAppShell::Run() widget/nsBaseAppShell.cpp 30 xul.dll nsAppShell::Run() widget/windows/nsAppShell.cpp 31 xul.dll nsAppStartup::Run() toolkit/components/startup/nsAppStartup.cpp 32 xul.dll XREMain::XRE_mainRun() toolkit/xre/nsAppRunner.cpp 33 xul.dll XREMain::XRE_main(int, char** const, nsXREAppData const*) toolkit/xre/nsAppRunner.cpp 34 xul.dll XRE_main toolkit/xre/nsAppRunner.cpp 35 firefox.exe do_main browser/app/nsBrowserApp.cpp 36 firefox.exe NS_internal_main(int, char**) browser/app/nsBrowserApp.cpp 37 firefox.exe wmain toolkit/xre/nsWindowsWMain.cpp 38 firefox.exe __tmainCRTStartup f:/dd/vctools/crt/crtw32/startup/crt0.c:255 39 kernel32.dll BaseThreadInitThunk 40 firefox.exe fast_error_exit f:/dd/vctools/crt/crtw32/startup/crt0.c:322
723,441
6,028,359
Name: Firefox Version: 13.0a1 User Agent: Mozilla/5.0 (Windows NT 5.1; rv:13.0a1) Gecko/20120201 Firefox/13.0a1 Reproducible: Always Steps to reproduce: go to http://a-khromenkov.narod.ru/ Actual Results: Huge memory (up to 2Gb) and CPU (up to 100%) consumption and then FireFox crashing. Expected Results: Download svg file through ajax and render svg to canvas through img html element.
702,487
5,848,300
This bug was filed from the Socorro interface and is report bp-ea810b4c-1943-4a29-b46a-ca6622111107 . ============================================================= Crashing Thread Frame Module Signature [Expand] Source 0 libxul.so PK11PasswordPromptRunnable::RunOnTargetThread nsCharTraits.h:378 1 libxul.so PK11PasswordPrompt security/manager/ssl/src/nsNSSCallbacks.cpp:827 2 libnss3.so PK11_DoPassword pk11auth.c:535 3 libnss3.so PK11_Authenticate pk11auth.c:334 4 libxul.so nsSecretDecoderRing::Decrypt security/manager/ssl/src/nsSDR.cpp:147 5 libxul.so nsSecretDecoderRing::DecryptString security/manager/ssl/src/nsSDR.cpp:212 6 libxul.so NS_InvokeByIndex_P xpcom/reflect/xptcall/src/md/unix/xptcinvoke_arm.cpp:194 7 libxul.so XPCWrappedNative::CallMethod js/xpconnect/src/XPCWrappedNative.cpp:2907 8 libxul.so XPC_WN_CallMethod js/xpconnect/src/XPCWrappedNativeJSOps.cpp:1553 9 libxul.so js::InvokeKernel js/src/jscntxtinlines.h:297 10 libxul.so js::Interpret js/src/jsinterp.cpp:3948 11 libxul.so js::RunScript js/src/jsinterp.cpp:584 12 libxul.so js::Invoke js/src/jsinterp.cpp:647 13 libxul.so JS_CallFunctionValue js/src/jsapi.cpp:5144 14 libxul.so nsXPCWrappedJSClass::CallMethod js/xpconnect/src/XPCWrappedJSClass.cpp:1533 15 libxul.so nsXPCWrappedJS::CallMethod js/xpconnect/src/XPCWrappedJS.cpp:553 16 libxul.so PrepareAndDispatch xpcom/reflect/xptcall/src/md/unix/xptcstubs_arm.cpp:131 17 libxul.so libxul.so@0x947d0b 18 libxul.so NS_InvokeByIndex_P xpcom/reflect/xptcall/src/md/unix/xptcinvoke_arm.cpp:194 19 libxul.so XPCWrappedNative::CallMethod js/xpconnect/src/XPCWrappedNative.cpp:2907 20 libxul.so XPC_WN_CallMethod js/xpconnect/src/XPCWrappedNativeJSOps.cpp:1553 21 libxul.so js::InvokeKernel js/src/jscntxtinlines.h:297 22 libxul.so js::Interpret js/src/jsinterp.cpp:3948 23 libxul.so js::RunScript js/src/jsinterp.cpp:584 24 libxul.so js::Invoke js/src/jsinterp.cpp:647 25 libxul.so JS_CallFunctionValue js/src/jsapi.cpp:5144 26 libxul.so nsXPCWrappedJSClass::CallMethod js/xpconnect/src/XPCWrappedJSClass.cpp:1533 27 libxul.so nsXPCWrappedJS::CallMethod js/xpconnect/src/XPCWrappedJS.cpp:553 28 libxul.so PrepareAndDispatch xpcom/reflect/xptcall/src/md/unix/xptcstubs_arm.cpp:131 29 libxul.so libxul.so@0x947d0b 30 libxul.so NS_InvokeByIndex_P xpcom/reflect/xptcall/src/md/unix/xptcinvoke_arm.cpp:194 31 libxul.so XPCWrappedNative::CallMethod js/xpconnect/src/XPCWrappedNative.cpp:2907 32 libxul.so XPC_WN_CallMethod js/xpconnect/src/XPCWrappedNativeJSOps.cpp:1553 33 libxul.so js::InvokeKernel js/src/jscntxtinlines.h:297 34 libxul.so js::Interpret js/src/jsinterp.cpp:3948 35 libxul.so js::RunScript js/src/jsinterp.cpp:584 36 libxul.so js::Invoke js/src/jsinterp.cpp:647 37 libxul.so JS_CallFunctionValue js/src/jsapi.cpp:5144 38 libxul.so nsXPCWrappedJSClass::CallMethod js/xpconnect/src/XPCWrappedJSClass.cpp:1533 39 libxul.so nsXPCWrappedJS::CallMethod js/xpconnect/src/XPCWrappedJS.cpp:553 40 libxul.so PrepareAndDispatch xpcom/reflect/xptcall/src/md/unix/xptcstubs_arm.cpp:131 41 libxul.so libxul.so@0x947d0b 42 libxul.so NS_InvokeByIndex_P xpcom/reflect/xptcall/src/md/unix/xptcinvoke_arm.cpp:194 43 libxul.so XPCWrappedNative::CallMethod js/xpconnect/src/XPCWrappedNative.cpp:2907 44 libxul.so XPC_WN_CallMethod js/xpconnect/src/XPCWrappedNativeJSOps.cpp:1553 45 libxul.so js::InvokeKernel js/src/jscntxtinlines.h:297 46 libxul.so js::Interpret js/src/jsinterp.cpp:3948 47 libxul.so js::RunScript js/src/jsinterp.cpp:584 48 libxul.so js::InvokeGetterOrSetter js/src/jsinterp.cpp:647 49 libxul.so js_GetPropertyHelper js/src/jsscopeinlines.h:279 50 libxul.so js::Interpret js/src/jsinterp.cpp:3478 51 libxul.so js::RunScript js/src/jsinterp.cpp:584 52 libxul.so js::InvokeGetterOrSetter js/src/jsinterp.cpp:647 53 libxul.so js_GetPropertyHelper js/src/jsscopeinlines.h:279 54 libxul.so js::Interpret js/src/jsinterp.cpp:3478 55 libxul.so js::RunScript js/src/jsinterp.cpp:584 56 libxul.so js::InvokeGetterOrSetter js/src/jsinterp.cpp:647 57 libxul.so js_GetPropertyHelper js/src/jsscopeinlines.h:279 58 libxul.so js::Interpret js/src/jsinterp.cpp:3478 59 libxul.so js::RunScript js/src/jsinterp.cpp:584 60 libxul.so js::InvokeGetterOrSetter js/src/jsinterp.cpp:647 61 libxul.so js_GetPropertyHelper js/src/jsscopeinlines.h:279 62 libxul.so js::Interpret js/src/jsinterp.cpp:3478 63 libxul.so js::RunScript js/src/jsinterp.cpp:584 64 libxul.so js::InvokeKernel js/src/jsinterp.cpp:647 65 libxul.so js_fun_call js/src/jsinterp.h:148 66 libxul.so js::InvokeKernel js/src/jscntxtinlines.h:297 67 libxul.so js::Interpret js/src/jsinterp.cpp:3948 68 libxul.so js::RunScript js/src/jsinterp.cpp:584 69 libxul.so js::InvokeKernel js/src/jsinterp.cpp:647 70 libxul.so js_fun_call js/src/jsinterp.h:148 71 libxul.so js::InvokeKernel js/src/jscntxtinlines.h:297 72 libxul.so js::Interpret js/src/jsinterp.cpp:3948 73 libxul.so js::RunScript js/src/jsinterp.cpp:584 74 libxul.so js::InvokeKernel js/src/jsinterp.cpp:647 75 libxul.so js_fun_call js/src/jsinterp.h:148 76 libxul.so js::InvokeKernel js/src/jscntxtinlines.h:297 77 libxul.so js::Interpret js/src/jsinterp.cpp:3948 78 libxul.so js::RunScript js/src/jsinterp.cpp:584 79 libxul.so js::InvokeKernel js/src/jsinterp.cpp:647 80 libxul.so js_fun_call js/src/jsinterp.h:148 81 libxul.so js::InvokeKernel js/src/jscntxtinlines.h:297 82 libxul.so js::Interpret js/src/jsinterp.cpp:3948 83 libxul.so js::RunScript js/src/jsinterp.cpp:584 84 libxul.so js::InvokeKernel js/src/jsinterp.cpp:647 85 libxul.so js_fun_call js/src/jsinterp.h:148 86 libxul.so js::InvokeKernel js/src/jscntxtinlines.h:297 87 libxul.so js::Interpret js/src/jsinterp.cpp:3948 88 libxul.so js::RunScript js/src/jsinterp.cpp:584 89 libxul.so js::InvokeKernel js/src/jsinterp.cpp:647 90 libxul.so js::CallOrConstructBoundFunction js/src/jsinterp.h:148 91 libxul.so js::Invoke js/src/jscntxtinlines.h:297 92 libxul.so JS_CallFunctionValue js/src/jsapi.cpp:5144 93 libxul.so nsXPCWrappedJSClass::CallMethod js/xpconnect/src/XPCWrappedJSClass.cpp:1533 94 libxul.so nsXPCWrappedJS::CallMethod js/xpconnect/src/XPCWrappedJS.cpp:553 95 libxul.so PrepareAndDispatch xpcom/reflect/xptcall/src/md/unix/xptcstubs_arm.cpp:131 96 libxul.so libxul.so@0x947d0b 97 libxul.so nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:631
901,450
7,711,471
Steps to reproduce: After you add a ics calendar, and Sync this calendar : lightning does a infinite loop and the server is saturated with more and more big logs generated ; (I'm used DavMail gateway, but the problem is similar with any others gateway) Actual results: Infinite refresh loop, high CPU usage Expected results: Mark calendar as (temporarily) not available In this case, the server returns a 503 service unavailable, but lighnint doesn't check this condition. The fix is simple: just detect server error (between 500 and 599 return code) and abort sync.
855,498
7,251,826
Created attachment 730380 Log output + callstack Reproduce steps: 1. Open URL 2. Quit the browser using Ctrl+Q (Cmd+Q on Mac) within 10 seconds or so. These are the same reproduce steps as Bug 842749, except that now that the JS re-entrancy has been fixed, the browser is ironically much less responsive during crashtests/822197.html. This is presumably "more correct" since this crashtest contains JS creating 70 PeerConnections in a for-loop. E.g. you have to work hard on a Mac now to right-click the Nightly icon in the taskbar while this is running and see anything other than "Force Quit". If I wait it out (takes about 30 seconds), e.g. until right-click on Nightly produces the "Quit" option, or until the beachball-of-death on the mac stops, then Firefox exits cleanly. However, if I manage to get the Quit in early, either by right-clicking on Nightly just as the page loaded, or hit Cmd+Q sometime during the run, then it hangs every time for me in the same place: #0 __psynch_mutexwait () #1 pthread_mutex_lock () #2 in PR_Lock () #3 mozilla::Mutex::Lock()@BlockingResourceBase.cpp:228 #4 mozilla::BaseAutoLock<mozilla::Mutex>::BaseAutoLock() @Mutex.h:153 #5 mozilla::BaseAutoLock<mozilla::Mutex>::BaseAutoLock() @Mutex.h:154 #6 CSF::CC_SIPCCService::removeCCObserver() @CC_SIPCCService.cpp:742 #7 CSF::CallControlManagerImpl::disconnect() @CallControlManagerImpl.cpp:234 #8 CSF::CallControlManagerImpl::destroy() @CallControlManagerImpl.cpp:57 #9 sipcc::PeerConnectionCtx::Cleanup() @PeerConnectionCtx.cpp:221
863,159
7,329,079
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:20.0) Gecko/20100101 Firefox/20.0 Build ID: 20130326150557 Steps to reproduce: Loaded the PDF located at http://www.informatik.tuwien.ac.at/lehre/services/epilog/poster-mauser.pdf with Firefox internal pdf viewer Actual results: Firefox allocated a huge amount of pixmap-data while loading the pdf (over 1.1GB), after resizing the view a few times Firefox caused X to crash (over 4GB of pixmaps allocated) Expected results: Firefox should not require such large temporary pixmaps, other viewers are able to render the PDF without problems.
799,142
6,708,103
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0 Build ID: 20121005155445 Steps to reproduce: I tried to close Firefox when I'm playing Browser Hunt. http://ie.microsoft.com/testdrive/performance/browserhunt/default.xhtml Actual results: Firefox sometimes crashed because of access violation. I debugged my builds of Firefox 15.0.1, 16.0 and trunk, and I found out that ~TimerEventAllocator() was called before TimerEventAllocator::Free() was called, when Firefox crashed as mentioned above. Expected results: All TimerEventAllocator::Free() calls should be completed before call of ~TimerEventAllocator().
736,695
6,148,263
This bug was filed from the Socorro interface and is report bp-e8bdcfd6-c965-429f-b50a-605402120317 . ============================================================= Reproducible: Always Steps to Reproduce: 1. Start Nightly with new profile 2. Install Video DownloadHelper 4.9.8 and Restart browser ( https://addons.mozilla.org/ja/firefox/addon/video-downloadhelper/ ) 3. Open Customize Toolbar (Alt V T C) If browser does not crash, carry out the following STR. 4. Drag & drop an Icon of Video DownloadHelper to Toolbar from palette. 5. Click Done 6. Open Customize Toolbar (Alt V T C) Actual Results: Browser crashes Expected Results: Shoud not.
771,655
6,451,235
Steps to reproduce: 1. Open Aurora in a profile with NoScript installed. 2. Go to Aurora>Web Developer>Debugger or press Ctrl+Shift+S. 3. Notice a white flash in the lower part of the window but no debugger showing up. 4. Open the Addons Manager. 5. Disable or remove NoScript. 6. Go to Aurora>Web Developer>Debugger or press Ctrl+Shift+S. 7. The debugger shows up. The expected would be the debugger showing up no matter what addon is installed. Windows 7 and Mozilla/5.0 (Windows NT 6.1; rv:15.0) Gecko/20120706 Firefox/15.0a2
980,635
8,503,113
Build Information Device: Buri Build ID: Platform Version: 30.0a1 Description [fxos-bug-bash-1.4] Steps to Reproduce 1. start factory 2. go to import contacts ans select google 3. sign in then go to the page to ask to manage contacts 4. The accept should show on the screen Expected Results have a button on that is visible Actual Results you have to scroll to the right to accept the oauth Other Notes maybe have a custom accept form? Reproduction Frequency:
995,123
8,649,541
Half-way through loading www.bnt.bg, current nightly build freezes. I surf through a lot of sites automatically and Nightly has been more prone to freezing during the last week or so. Not necessarily reproducable, but I can repro this time.
129,980
1,213,567
Build ID: 2002031008 on Win2k. Steps to reproduce: 1. Load URL http://www2.victoriassecret.com/bodybyvictoria/ , 2. Observe it never finishes loading, page remains blank, 3. Right click on 'body' of page, 4. Mozilla crashes. Stephen, can you retreive Talkback data please: TB3874239G ?
131,065
1,223,255
Build: 2002-03-14-08 Platform : All Expected Results: Object content should render based on the height (percent) attribute What I got: Object content is not rendered Steps to reproduce: 1) Download both attached test cases 2) Open object_percent_w_h_text.xml 3) The test case contains two objects. First object doesn't render it's content but the second object does.
131,531
1,227,092
From Bugzilla Helper: User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:0.9.9) Gecko/20020311 BuildID: 2002031104 mail/new craches when offline - download sync now all boxes checked Reproducible: Always Steps to Reproduce: 1.mail /news 2.offline 3.download/sync now 4.OK - crash Actual Results: MOZILLA caused an invalid page fault in module <unknown> at 0000:01cccb99. Registers: EAX=01cccb88 CS=0167 EIP=01cccb99 EFLGS=00010246 EBX=027c750c SS=016f ESP=0064d300 EBP=0064d328 ECX=0064d324 DS=016f ESI=027c74a0 FS=2fd7 EDX=0064d2e8 ES=016f EDI=00000000 GS=0000 Bytes at CS:EIP: cb cc 01 98 cb cc 01 98 cb cc 01 a0 cb cc 01 a0 Stack dump: 60844fd1 027c74a0 0064d324 00000000 027c7500 80000000 6086e869 0216d110 610f650e 00000000 0064d34c 60845024 00000000 027c7500 80000000 0216d11c
132,355
1,233,757
From Bugzilla Helper: User-Agent: Mozilla/5.0 Galeon/1.2.0 (X11; Linux i686; U;) Gecko/20020313 BuildID: .99 and 2002022613 On the page at http://babelfish.altavista.com/, when I click in the Web page field (the field that already has "http://" entered) and hit CTRL-Del more then once, mozilla crashes. I think it may be a JavaScript problem... Reproducible: Always Steps to Reproduce: 1. Go to http://babelfish.altavista.com/ 2. Click in the "Web page" field 3. Hit CTRL-Del twice Actual Results: The browser crashed Expected Results: The text "http://" should have been removed from the field and no futher action taken. The following code seems to be the culprit: <script language=JavaScript> function chooseRadio(form) { form.checked = true; } </script> <input type="radio" name=tt value="test1" CHECKED> <input name=url size=38 style="width:400" value="http://" ONFOCUS="chooseRadio(this.form.tt[0])"> You can test it here: http://www.darkpact.com/test1.html
132,418
1,234,292
Build: 2002-03-20-03 Platform: OS X and OS 9 Expected Result: Dragging a file to attachment field should work and not crash the pplication What I got: Application crashes Steps to reproduce: 1) Open a new message 2) Drag a file from the desktop (like html or text file) into the attachments field 3) Crash occurs Stack trace from crash reporter: Date/Time: 2002-03-20 14:31:00 -0800 OS Version: 10.1.3 (Build 5Q45) Command: Mozilla PID: 304 Exception: EXC_BAD_ACCESS (0x0001) Codes: KERN_PROTECTION_FAILURE (0x0002) at 0x00000000 Thread 0 Crashed: #0 0x01b5ca18 in nsIOService::GetURLSpecFromFile(nsIFile *, nsACString &) #1 0x01b5ca14 in nsIOService::GetURLSpecFromFile(nsIFile *, nsACString &) #2 0x005bf8ec in XPTC_InvokeByIndex #3 0x005bf7e0 in XPTC_InvokeByIndex #4 0x01a8c9c4 in 0x1a8c9c4 #5 0x01a92e9c in XPC_WN_CallMethod(JSContext *, JSObject *, unsigned int, long *, long *) #6 0x01a0b97c in js_Invoke #7 0x01a13a50 in 0x1a13a50 #8 0x01a0b9d4 in js_Invoke #9 0x01a0bc20 in js_InternalInvoke #10 0x019ecd9c in JS_CallFunctionValue #11 0x025eb2f0 in nsJSContext::CallEventHandler(void *, void *, unsigned int, void *, int *, int) #12 0x02609f44 in nsJSEventListener::HandleEvent(nsIDOMEvent *) #13 0x01efcb40 in HandleEventSubType__22nsEventListenerManagerFP16nsListenerStru #14 0x01efeb9c in 0x1efeb9c #15 0x02132734 in HandleDOMEvent__12nsXULElementFP14nsIPresContextP7nsEventPP11n #16 0x02132840 in HandleDOMEvent__12nsXULElementFP14nsIPresContextP7nsEventPP11n #17 0x02132840 in HandleDOMEvent__12nsXULElementFP14nsIPresContextP7nsEventPP11n #18 0x027af4e4 in HandleEventInternal__9PresShellFP7nsEventP7nsIViewUiP13nsEvent #19 0x027af1e4 in PresShell::HandleEvent(nsIView *, nsGUIEvent *, nsEventStatus *) #20 0x02a337c8 in nsViewManager::HandleEvent(nsView *, nsGUIEvent *, int) #21 0x02a294dc in nsView::HandleEvent(nsViewManager *, nsGUIEvent *, int) #22 0x02a32b38 in 0x2a32b38 #23 0x02a28b68 in HandleEvent(nsGUIEvent *) #24 0x023db9a0 in nsWindow::DispatchEvent(nsGUIEvent *, nsEventStatus &) #25 0x023dba7c in nsWindow::DispatchWindowEvent(nsGUIEvent &) #26 0x023dbbe0 in nsWindow::DispatchMouseEvent(nsMouseEvent &) #27 0x023ec540 in nsMacEventHandler::DragEvent(unsigned int, Point, unsigned short) #28 0x023eb204 in nsMacWindow::DragEvent(unsigned int, short, short, unsigned short, int *) #29 0x023fc078 in nsDragHelperService::Drop(OpaqueDragRef *, nsIEventSink *, int *) #30 0x023e77f4 in DragReceiveHandler__11nsMacWindowFP15OpaqueWindowPtrPvP13Opaqu #31 0x731f876c in CarbonReceiveMapper #32 0x73d73f64 in DoDropMessage #33 0x73d7e890 in MessageHandler #34 0x701a4894 in __CFMessagePortPerform #35 0x7018f3b0 in __CFRunLoopDoSource1 #36 0x7017c1e0 in __CFRunLoopRun #37 0x701b7100 in CFRunLoopRunSpecific #38 0x7017b8e0 in CFRunLoopRunInMode #39 0x7312d8f4 in RunEventLoopInModeUntilEventArrives #40 0x731c2bbc in RunEventLoopUntilEventArrives #41 0x731a144c in GetNextEventMatchingMask #42 0x731ae408 in WNEInternal #43 0x731c5508 in WaitNextEvent #44 0x023f19a4 in nsMacMessagePump::GetEvent(EventRecord &) #45 0x023f174c in nsMacMessagePump::DoMessagePump(void) #46 0x023f10dc in nsAppShell::Run(void) #47 0x023a42fc in nsAppShellService::Run(void) #48 0x004cc224 in main1(int, char **, nsISupports *) #49 0x004cccfc in main Thread 1: #0 0x7000497c in syscall #1 0x70557600 in BSD_waitevent #2 0x70554b80 in CarbonSelectThreadFunc #3 0x7002054c in _pthread_body Thread 2: #0 0x7003f4c8 in semaphore_wait_signal_trap #1 0x7003f2c8 in _pthread_cond_wait #2 0x705593ec in CarbonOperationThreadFunc #3 0x7002054c in _pthread_body Thread 3: #0 0x70044cf8 in semaphore_timedwait_signal_trap #1 0x70044cd8 in semaphore_timedwait_signal #2 0x70283ea4 in TSWaitOnConditionTimedRelative #3 0x7027d748 in TSWaitOnSemaphoreCommon #4 0x702c2078 in TimerThread #5 0x7002054c in _pthread_body Thread 4: #0 0x7003f4c8 in semaphore_wait_signal_trap #1 0x7003f2c8 in _pthread_cond_wait #2 0x70250ab0 in TSWaitOnCondition #3 0x7027d730 in TSWaitOnSemaphoreCommon #4 0x70243d14 in AsyncFileThread #5 0x7002054c in _pthread_body Thread 5: #0 0x7003f4c8 in semaphore_wait_signal_trap #1 0x7003f2c8 in _pthread_cond_wait #2 0x7055b884 in CarbonInetOperThreadFunc #3 0x7002054c in _pthread_body Thread 6: #0 0x70000978 in mach_msg_overwrite_trap #1 0x70005a04 in mach_msg #2 0x7017bf98 in __CFRunLoopRun #3 0x701b7100 in CFRunLoopRunSpecific #4 0x7017b8e0 in CFRunLoopRunInMode #5 0x7061be08 in XIOAudioDeviceManager::NotificationThread(XIOAudioDeviceManager *) #6 0x706141c0 in CAPThread::Entry(CAPThread *) #7 0x7002054c in _pthread_body Thread 7: #0 0x70044cf8 in semaphore_timedwait_signal_trap #1 0x70044cd8 in semaphore_timedwait_signal #2 0x7003f2b8 in _pthread_cond_wait #3 0x70283ea4 in TSWaitOnConditionTimedRelative #4 0x70270138 in MPWaitOnQueue #5 0x70777cd8 in TNodeSyncTask::SyncTaskProc(void *) #6 0x702831a8 in PrivateMPEntryPoint #7 0x7002054c in _pthread_body Thread 8: #0 0x70000978 in mach_msg_overwrite_trap #1 0x70005a04 in mach_msg #2 0x70026a2c in _pthread_become_available #3 0x70026724 in pthread_exit #4 0x70020550 in _pthread_body PPC Thread State: srr0: 0x01b5ca18 srr1: 0x0200f030 vrsave: 0x00000004 xer: 0x20000020 lr: 0x01b5ca14 ctr: 0x00551b30 mq: 0x00000000 r0: 0x01b5ca14 r1: 0xbfffc860 r2: 0x01b8a000 r3: 0x050f5480 r4: 0x00000002 r5: 0x00000000 r6: 0x050f5480 r7: 0x00000000 r8: 0x00000000 r9: 0xbfffca10 r10: 0x054d5fa4 r11: 0x021a2178 r12: 0x000ed9c8 r13: 0x04c77120 r14: 0x01d21f70 r15: 0x00000010 r16: 0x018eb910 r17: 0x00000000 r18: 0x00000002 r19: 0x00000002 r20: 0xbfffccc8 r21: 0xbfffcb30 r22: 0x00000000 r23: 0x050f54c0 r24: 0xbfffc8a8 r25: 0x01b6a578 r26: 0x01b9251c r27: 0x00115b74 r28: 0x00115674 r29: 0x01b91c18 r30: 0x001152f0 r31: 0x00115168
142,206
1,323,858
From Bugzilla Helper: User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0rc2) Gecko/20020503 BuildID: 2002050306 (1.0 branch) http://www.thai.net/navigate/ (a Thai page for Netscape and Mozilla) sends CPU to 100% for me and never seems to come back. Mozilla locks up utterly and I can't do anything else with it until I kill it. The page loads fine in IE 5.5 and Opera 6 of course :-) Note that the page does not even load in Mozilla before the 100% CPU thing happens. Reproducible: Always Steps to Reproduce: 1. Go to http://www.thai.net/navigate/ Actual Results: Mozilla hangs taking 100% of CPU, before even displaying the page Expected Results: Displayed the page and not hung I have the (Win2000) Thai language pack installed on this box.
137,864
1,285,168
Build: 2002-04-16-03 Platform: OS X 10.1.3 Expected Results: Placing focus (by mousing down) in recipient field should cause popup menu to appear What I got: The app crashes Steps to reproduce: 1) Select New - Message from File menu. 2) Place cursor in recipient field and type a name to activate auto-fill from your address book. 3) When a person's name appears in field, simply mouse down. 4) Insert and Format menus "flash" in menu bar then crash occurs.
127,839
1,190,565
Reproducable: always. Steps to reproduce: 1. Import the attached file into the Bookmarks. 2. Move the mouse over the Bookmarks drop-down tree, so Moz will try to show the bookmarks sub-menu created from the imported file. 3. It hangs. ALL windows, even those unrelated to this bookmark operation. Additional comments. The conditions needed in order to hang Mozilla are: -- There must be a special character in the bookmark name. Copyright symbol (R) _as_a_single_character_ do it, looks that some another special characters as well. -- That happens ONLY with the bokmarks exported from the previous versions of Mozilla. Boookmarks, re-created from the same sites in the Moz 0.9.8 work just fine. -- That happens ONLY in the submenus of the Bookmarks drop-down menu. "Manage Bookmarks" window show the same bookmarks just fine. It seems to be related to the outliner bug 116845.
129,006
1,203,361
From Bugzilla Helper: User-Agent: Mozilla/5.0 (Windows; U; WinNT4.0; en-US; rv:0.9.8+) Gecko/20020304 BuildID: 2002030403 When loading xml file, which is invalidate, the mozilla crashes to the next validate xml file. The invalidate file could be like <comment name="foo>sometext</comment> or <item><comment name="foo">sometext</comment</item> Reproducible: Always Steps to Reproduce: 1.Generate an invalidate xml file 2.Correct the file and press Reload 3.The mozilla crashes Actual Results: Crash Expected Results: In invalidate file Mozilla should tell user that file couldn't be loaded (now nothing happends). The correct file should be loaded without crash. I think this could be duplicate to bug #123953.
133,168
1,240,921
[CVS tree from 2002-03-24-19] [Not sure about component, please reassign at will] I have noticed a rather funny crasher that happens if you run "make" in the xpinstall/packager directory at the same time as you run mozilla from dist/bin. Here are the steps to reproduce: 1) Start a cvs build from the .../dist/bin/ directory. For me that is mozilla/obj-i686-pc-linux-gnu/dist/bin/. 2) In another xterm, go to xpinstall/packager and run "make". Result: Mozilla will die after a few seconds with a "bus error". This is 100% reproducable, so I assume that the packaging process is doing something with the binaries and libraries that makes the browser crash. I do not have a debug build right now, so I cannot get a stack trace for you.
138,292
1,289,577
Most of the crashes we were seeing in nsImageBoxListener::FrameChanged were eliminated by the fix for bug 135222 (those crashes were noted in bug 120639). However, there have been a few recent incidents reported with the same stack signature and trace. People have been crashing at 2 URLs consistently: http://news.walla.co.il http://www.caranddriver.com Here's the most recent crash reported by Talkback: Incident ID 5322265 Stack Signature nsImageListener::FrameChanged f0971e0e Trigger Time 2002-04-17 19:00:58 Email Address URL visited caranddriver.com Build ID 2002041606 Product ID MozillaTrunk Platform Win32 Operating System Windows NT 5.0 build 2195 Module gklayout.dll Trigger Reason Access violation User Comments Stack Trace nsImageListener::FrameChanged [d:\builds\seamonkey\mozilla\layout\html\base\src\nsImageFrame.cpp, line 2383] imgRequestProxy::FrameChanged [d:\builds\seamonkey\mozilla\modules\libpr0n\src\imgRequestProxy.cpp, line 294] imgRequest::FrameChanged [d:\builds\seamonkey\mozilla\modules\libpr0n\src\imgRequest.cpp, line 336] imgContainer::Notify [d:\builds\seamonkey\mozilla\modules\libpr0n\src\imgContainer.cpp, line 459] nsTimerImpl::Fire [d:\builds\seamonkey\mozilla\xpcom\threads\nsTimerImpl.cpp, line 352] nsTimerManager::FireNextIdleTimer [d:\builds\seamonkey\mozilla\xpcom\threads\nsTimerImpl.cpp, line 584] nsAppShell::Run [d:\builds\seamonkey\mozilla\widget\src\windows\nsAppShell.cpp, line 134] nsAppShellService::Run [d:\builds\seamonkey\mozilla\xpfe\appshell\src\nsAppShellService.cpp, line 309] main1 [d:\builds\seamonkey\mozilla\xpfe\bootstrap\nsAppRunner.cpp, line 1430] main [d:\builds\seamonkey\mozilla\xpfe\bootstrap\nsAppRunner.cpp, line 1765] WinMain [d:\builds\seamonkey\mozilla\xpfe\bootstrap\nsAppRunner.cpp, line 1783] WinMainCRTStartup() KERNEL32.DLL + 0xd326 (0x77e8d326) And Vadim (cc'd in this bug) has also been crashing...he should be posting his stack and any other info soon.
138,349
1,290,099
User agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:0.9.9+) Build Gecko/20020418 Netscape6/6.2.1+ OS : WINXP Distorted print preview seen on my.yahoo.com there is extra white spaces all over the right side of the page Steps to reproduce : go to my.yahoo.com. file| print preview scroll down this document Observe white space allover right hand side of the page. Screen shot fallows..
139,251
1,297,173
I have a mail from an AOL account, and this mail has an eml attachment. When I forward inline to this mail, I don't see the original mail is quoted. Steps to reproduce: 1. From netscape server account, send a html mail to AOL account. 2. From AOL account on AOL client, forward this mail back to your netscape server account. 3. From netscape server account, do forward inline, you can see the original mail is not quoted. Testing mail to follow.
236,921
2,096,217
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7a) Gecko/20040219 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7a) Gecko/20040219 When using the DOM inspector to inspect an element with style 'display: none' and 'border-color: inherit', attempting to view 'computed style' crashes with what looks like a null object dereference (invalid memory address 0x0000001c). Reproducible: Always Steps to Reproduce: 1. Load the attached HTML page in Mozilla. 2. Navigate DOM inspector to the div whose text is 'this is the inner div'. Note: This is a LOT easier if you have the 'InspectThis' extension installed. 3. Once the proper div is selected, attempt to change the view from 'DOM Node' to 'Computed Style'. Actual Results: *boom* Expected Results: I expected to see the computed style rules for the selected div :)
233,625
2,069,476
User-Agent: Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.5) Gecko/20031007 Firebird/0.6 StumbleUpon/1.73 The new Firefox Windows installer - for a custom install location - put the Firefox files into the top level of my d:\Program Files directory. I did not want this, so I uninstalled it from the Windows Control Panel Uninstall applet. It did not uninstall so I logged in as adminstrator and then ran the uninstall. THe unintall took a long time with lots of disk activity. At the end of it, about 2/3 of the folders in Program Files had been deleted. I lost dozens of applications, many of them requiring serial numbers to reinstall, and all the associated configuration, etc. Included in the carnage were two other Mozilla installations and my Thunderbird 0.4 installation, and Winzip which of course I needed to unzip replacements. This is DANGEROUS. Reproducible: Didn't try Steps to Reproduce: 1. 2. 3. Expected Results: 1) The installer should have made clear where the files were going to be put. I had navigated to d:\Program Files, then typed in Mozilla Firefox 0.8, but the last step of the path was not reflected in the edit box. However, some installers add the last step anyway. So the destination was not clear, and the installer had not folled my commands. 2) The uninstaller should NEVER touch ANY files it has not installed.
234,331
2,074,714
User-Agent: Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7a) Gecko/20040211 There is some problem with the parameter check in document.getBoxObjectFor(), Mozilla crashes when getBoxObjectFor() is called with an undefined value as a parameter. That's what Windows XP shows about the crash: AppName: mozilla.exe AppVer: 1.7.20040.21109 ModName: gklayout.dll ModVer: 1.7.20040.21109 Offset: 00118b23 The Incident ID is TB30286417Y (produced with Mozilla 1.4 Build 2003062408 - somehow I can't make the feedback agent work with the newer releases). Reproducible: Always Steps to Reproduce: 1. Open the JavaScript URL Actual Results: The browser crashes
222,954
1,984,393
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.5) Gecko/20031007 Firebird/0.7 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.5) Gecko/20031007 Firebird/0.7 The Mozilla Firebird crashes after modification in options dialog with multissesion of browser. all sessions browser crash. Reproducible: Always Steps to Reproduce: 1.Open the browser 2.>tools 3.>options 4.>modified one 5.open an second browser session "Ctrl+n" or MozillaFirebird.exe ! 6.tools 7.options... Actual Results: all sessions browser crash. Expected Results: 1. restriction message on new session Firebird calling or apply change between !? 2.apply button in options dialog box !? on windows 2000 Xp Pro, XP mce ...?
227,282
2,018,420
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.6b) Gecko/20031201 Firebird/0.7+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.6b) Gecko/20031201 Firebird/0.7+ When setting Mozilla Firebird to automatically save files in a certain folder (eg Desktop or Downloads), it should not automatically overwrite files if a file with the same file name already exists. I tested this by downloading MozillaFB nightlies, which never have different file names (MozillaFirebird-win32.zip). Reproducible: Always Steps to Reproduce: 1. Make sure Download manager is set to "save all files in this folder" 2. Download a file that has the same name as a file that already exists in said folder (try http://ftp.mozilla.org/pub/mozilla.org/firebird/nightly/latest-trunk/) 3. Actual Results: Firebird doesn't prompt whether or not the file should be overwritten. Expected Results: A small dialog box should come up to say something to the effect of "A file by that name already exists. Overwrite?" It appears that if you ask firebird to prompt you where to download each individual file, then it does indeed ask whether or not it should overwrite (this may be more of a function of Windows than of Firebird though)
228,672
2,028,599
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.5) Gecko/20031007 Firebird/7.02 Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.5) Gecko/20031007 Firebird/0.7 Downloaded the firebird installer from Dec 11th and ran it. I accidentally installed to d:\internet when I wanted to install to d:\internet\MozillaFirebird. The install ran and installed Firebird, but it also deleted several folders in d:\internet, including Thunderbird (d:\internet\Thunderbird) and Netscape 4.7 (d:\internet\Netscape). Sorry, haven't tried to reproduce this, it is just too destructive. Reproducible: Didn't try Steps to Reproduce: 1. Run installer. 2. Install to a folder that contains other folders, such as a Thunderbird install. Actual Results: Thunderbird folder is deleted. Expected Results: No folders are deleted, except possibly an existing Firebird install. Before trying the install, I had renamed the previous version from d:\internet\MozillaFirebird to d:\internet\MozillaFirebird-0.7. After the install, the only three folders left in d:\internet were MozillaFirebird-0.7 (previous version), d:\internet\Mozilla (Mozilla suite 1.4) and d:\internet\MozillaFirebird (new install). I had also copied the whole Phoenix profile folder to make a backup, but there didn't seem to be any problems there.
226,425
2,011,418
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.5) Gecko/20031107 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.5) Gecko/20031107 Mozilla crashes just loading this page. ---bug.xsl--- <?xml version="1.0" encoding="iso-8859-1"?> <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform"> <xsl:output method="html" indent="yes"/> <xsl:template match="/"> <html><body> <xsl:apply-templates select="document('dontmatter')"/> </body></html> </xsl:template> </xsl:stylesheet> ---bug.xml--- <?xml version="1.0" encoding="iso-8859-1"?> <?xml-stylesheet type="text/xsl" href="bug.xsl" ?> <text></text> Reproducible: Always Steps to Reproduce: 1. Load http://www.gentemsn.com/xml/bug.xml 2. 3. Actual Results: Crash and core dump Expected Results: Load the page succesfully
226,744
2,014,329
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.6a) Gecko/20031107 Firebird/0.7+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.6a) Gecko/20031107 Firebird/0.7+ Recent builds of the mozilla 1.6 alpha version crash when I use the stylesheet element in an xbl binding. Builds of at least 7 november 2003 don't crash. Builds of 24 november 2003 will crash. I don't get a talkback response or anything. Mozilla just disappears. Reproducible: Always Steps to Reproduce: 1. 2. 3.
178,855
1,624,791
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.2b) Gecko/20021107 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.2b) Gecko/20021107 Mozilla crashes when calling the URL http://www.xmlguru.de/html/_d/03demo/demo11.xml talkback ID : TB13630462K Reproducible: Always Steps to Reproduce: 1. call http://www.xmlguru.de/html/_d/03demo/demo11.xml Actual Results: Crash Expected Results: Show xml page I used a fresh install with a new created user without any additional plugins etc. This bug also exists in Mozilla 1.2b (Is this a dup of bug 174709 ?)
179,209
1,627,763
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.0.0) Gecko/20020530 Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.0.0) Gecko/20020530 Tested both with Mozilla 1.1 and (Phoenix) Gecko/20021108 Crashes as soon as you hover above a link that is not on the first line. Reproducible: Always Steps to Reproduce: 1. Check testcase
179,260
1,628,138
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.2b) Gecko/20020618 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.2b) Gecko/20020618 Any bugzilla query will do this URL: http://bugzilla.mozilla.org/buglist.cgi?bug_status=UNCONFIRMED&bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&field0-0-0=product&type0-0-0=substring&value0-0-0=test&field0-0-1=component&type0-0-1=substring&value0-0-1=test&field0-0-2=short_desc&type0-0-2=substring&value0-0-2=test&field0-0-3=status_whiteboard&type0-0-3=substring&value0-0-3=test Cookies: LASTORDER=bugs.delta_ts%2C%20bugs.bug_status%2C%20bugs.priority%2C%20map_assigned_to.login_name%2C%20bugs.bug_id COLUMNLIST=opendate changeddate severity priority platform status resolution component votes target_milestone summaryfull Doesn't do this in other browsers, so I'm guessing it's cookies.. possibly the fact I sort by assigned_to, but do not have it in the column list? Reproducible: Always Steps to Reproduce:
179,391
1,629,178
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.2b) Gecko/20021108 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.2b) Gecko/20021108 The latest nightly sometimes crashes on quit. Reproducible: Sometimes Steps to Reproduce: 1. Open Mozilla MailNews and Navigator. 2. Surf, read some mail. 3. Exit Mozilla. Actual Results: Crash Expected Results: No crash Talkback IDs: TB13760592Z TB13757274Z TB13747567Z TB13746932W TB13746916Z This is a regression that has startet at some point between 2002-31-10 and 2002-11-08.
179,683
1,631,281
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.3a) Gecko/20021111 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.3a) Gecko/20021111 The page at http://www.vtex.lt/sagu/mozilla/pp.html is displayes with any problem, but print preview generates blank page.Also trying to print preview for the second time browser crashes. Reproducible: Always Steps to Reproduce: 1.Start mozilla 2.Goto to http://www.vtex.lt/sagu/mozilla/pp.html 3.File->Print Preview (blank page) 4.Close print preview 5.File->Print Preview (browser crashes)
189,751
1,715,572
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.2) Gecko/20021126 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.2) Gecko/20021126 code below will crash mozilla: <form method="post"> <table><tr><td><input type="browse"></td></tr></table> </form> put it in a webpage somewhere, goto that page with mozilla, note that mozilla is no longer running. Swear, Curse. Reproducible: Always Steps to Reproduce: Expected Results: Something other than a crash, I dunno what <input type="browse"> is supposed to do, but presumably not crash.
190,003
1,717,635
Overview Description: After clicking on link at www.amazon.com with pipelinging enabled, I cannot browse anywhere else - no other links will open. Steps to Reproduce: 1.) In prefs, enable pipelining for direct connections 2.) Go to http://www.amazon.com 3.) Select the books tab 4.) In "Search books" type in some text (such as 'dragon') 5.) Under "See matches in", click on "Science Fiction" 6.) Click on one of the resulting recomended books Actual Results: Hour glass and throbber spins. Pressing stop or waiting for these to stop results in pages links not working. Clicking on any link afterwards results in more spinning. Expected Results: You should be able to open links and browse to other sites. Build Date & Platform Bug Found: Win NT 2003012108 Additional info: Had to shut down in order to use browser again. Disabling pipeling worked fine. Server is Apache. Didn't work when searching for other topics either.
187,437
1,694,677
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3b) Gecko/20021228 Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3b) Gecko/20021228 found in http://www.mozillazine.org/forums/viewtopic.php?t=3717 Crash with win32 build 12/28 and later These are the steps: - go to www.zvon.org - click on "XML with XSLT" from the menu Phoenix dies with a "Pure virtual call" error... Seems to work fine under the Linux builds... It´s beyond my knowledge, perhaps someone can look if that bug is a dupe of bug #79937 ? My Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3b) Gecko/20021228 crashes, but if I right-click on that link, I can download a xml-file. Didn´t look at it yet, just had the idea while filing this bug. Crash data from that forum: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.3a) Gecko/20021228 Phoenix/0.5 when i dload the file and the stylesheet and open in mozilla (Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.3b) Gecko/20021230) i get a grey screen, but no crash. looks ok in ie 2002-11-14 Phoenix build. No crash. Same with Mozilla 2002-12-12. However, it does crash my 2003-01-01 Mozilla build. Reproducible: Always Steps to Reproduce: 1.go to www.zvon.org 2.click on "XML with XSLT" from the menu Actual Results: browser died, error message box from virtual C++ Runtime came up. Expected Results: not crashed ;-)
188,278
1,703,105
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.2.1) Gecko/20021130 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.2.1) Gecko/20021130 I wask working on a php script when I found out that the following string loaded by mozilla results in a crash (when not surrounded by any HTML). An example is the link I made. The script outputs ONLY the text below. &#114:&#111:&#098:&#101:&#114:&#116:&# Reproducible: Always Steps to Reproduce: 1. Load URL Actual Results: Mozilla hung. It took my system (Thinkpad 1.8GHz P4 w/512MB RAM) about 4 minutes to get the Task Manager open. Despite it didn't render completely, I was able to see that the Available system memory dropped down to 4000k, and the Paging file was off the chart. CPU wasn't to bad. But my hard drive was burning. My guess is there is a memory leak or something. Expected Results: Should have displayed output without stress.
180,805
1,640,971
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3a) Gecko/20021115 Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.3a) Gecko/20021115 Text zoom (up or down to any value) on this page causes a crash. With js disabled there is no content, and subsequently no crash. Thought this might be bug 175711, but they say no. This probably ought to be a dupe of something because it also crashes in NS 7.0. It does not crash in NS 6.2. Reproducible: Always Steps to Reproduce: 1. go to http://www.the-webwizard.co.uk/ 2. zoom text (CTRL+/-, or use View menu) Actual Results: boom Expected Results: text size gets bigger or smaller depending on zoom factor crash in GKLAYOUT.DLL - attempted to use a null data pointer variable. Talkback IDs TB14075081G, TB14074908W
182,107
1,652,275
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.2b) Gecko/20021026 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.2b) Gecko/20021026 In the page http://oldpeculiar.org/etc/mozilla_z-index_bug.html, the text in the form input elements (input type="text" and textarea) should be of the colour #3C3E3C (as set in the stylesheet) but instead the text is invisible, even when selected with the cursor. Moving the div with ID background to above the form elements in the source shows how the page should appear, as does setting the z-index of that div to a value greater than or equal to zero. Reproducible: Always Steps to Reproduce: 1. View the source for http://oldpeculiar.org/etc/mozilla_z-index_bug.html; this URL has effectively the most barebones markup required to generate this bug. Actual Results: The text in the form input elements is invisible, as described in the details. Expected Results: The text should instead be the colour #3C3E3C.
186,745
1,689,263
User-Agent: w3m/0.3.2.2+cvs-1.645-m17n-20021222 (FreeBSD 5.0-CURRENT i386) Build Identifier: Don't use mapped IPv6 address when connecting IPv4 node. see http://www.freebsd.org/cgi/cvsweb.cgi/ports/www/mozilla/files/patch-nsprpub%3a%3apr%3a%3asrc%3a%3apthreads%3a%3aptio.c If users has no IPv4 connection, they cannot access IPv4 node. Reproducible: Always Steps to Reproduce: 1. access from IPv6 only network to IPv4 node. Actual Results: cannot access to IPv4 node. Mozilla returns 'timeout' message. FreeBSD ports already fixed this problem locally. But, this is not a fundamental solution. We want to fix original 'Mozilla'.
170,225
1,555,763
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.2b) Gecko/20020920 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.2b) Gecko/20020920 A website I was developing started to core dump mozilla from build 2002091908 (build 20020915xx doesn't core dump). After much work I tracked it down to body { font-family: Verdana, Arial, Helvetica, sans-serif; } .menu-bottom-sep { font-size: 1px; /* <--- 1px core dumps */ color: #000000; background-color: #FFFFFF; } This doesn't core dump body { } .menu-bottom-sep { font-size: 1px; color: #000000; background-color: #FFFFFF; } nor does this body { font-family: Verdana, Arial, Helvetica, sans-serif; } .menu-bottom-sep { font-size: 2px; color: #000000; background-color: #FFFFFF; } The webpage given in the url is the bare minimum I could get the test case down to. If you take out the span it doesn't core dump. Reproducible: Always Steps to Reproduce: 1.Load nightly build 2002190908 (20021909xx?) 2.Go to webpage in URL Actual Results: (with build 2002092021) /usr/local/tmp/package/run-mozilla.sh: line 444: 9566 Floating point exception(core dumped) "$prog" ${1+"$@"} Expected Results: Page should show a '|' at font-size 1px Nightlies are built without symbols? Is it worth posting the back strack? When build 2002190908 core dumps it says /usr/local/tmp/mozilla-19092002/run-mozilla.sh: line 444: 9607 Floating point exception(core dumped) "$prog" ${1+"$@"}
171,334
1,565,187
Build ID: 2002-09-27-08, Windows 2000. Summary / Steps to Reproduce: According to my Talkback stack, trying to view http://www.wheelhouse.com, crashes in: 1021 zParentChain->ConvertFromParentCoords(&ancestorX, &ancestorY); Robert, sorry to implicate you, but looks like you were last here ;-( Probably fallout from bug 168294. sView::GetClippedRect [c:/builds/seamonkey/mozilla/view/src/nsView.cpp, line 1021] nsViewManager::UpdateView [c:/builds/seamonkey/mozilla/view/src/nsViewManager.cpp, line 1610] nsViewManager::UpdateView [c:/builds/seamonkey/mozilla/view/src/nsViewManager.cpp, line 1479] nsViewManager::SetViewContentTransparency [c:/builds/seamonkey/mozilla/view/src/nsViewManager.cpp, line 2899] nsHTMLContainerFrame::CreateViewForFrame [c:/builds/seamonkey/mozilla/layout/html/base/src/nsHTMLContainerFrame.cpp, line 667] nsCSSFrameConstructor::ConstructFrameByDisplayType [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 6382] nsCSSFrameConstructor::ConstructFrameInternal [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 7435] nsCSSFrameConstructor::ConstructFrame [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 7284] nsCSSFrameConstructor::ProcessChildren [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 12254] nsCSSFrameConstructor::ConstructTableCellFrame [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 2929] nsCSSFrameConstructor::TableProcessChild [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 3192] nsCSSFrameConstructor::TableProcessChildren [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 3087] nsCSSFrameConstructor::ConstructTableRowFrame [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 2773] nsCSSFrameConstructor::TableProcessChild [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 3178] nsCSSFrameConstructor::TableProcessChildren [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 3087] nsCSSFrameConstructor::ConstructTableRowGroupFrame [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 2664] nsCSSFrameConstructor::TableProcessChild [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 3172] nsCSSFrameConstructor::TableProcessChildren [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 3087] nsCSSFrameConstructor::ConstructTableFrame [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 2545] nsCSSFrameConstructor::ConstructFrameByDisplayType [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 6603] nsCSSFrameConstructor::ConstructFrameInternal [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 7435] nsCSSFrameConstructor::ConstructFrame [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 7284] nsCSSFrameConstructor::ProcessInlineChildren [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 13743] nsCSSFrameConstructor::ConstructInline [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 13519] nsCSSFrameConstructor::ConstructFrameByDisplayType [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 6476] nsCSSFrameConstructor::ConstructFrameInternal [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 7435] nsCSSFrameConstructor::ConstructFrame [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 7284] nsCSSFrameConstructor::ProcessBlockChildren [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 13438] nsCSSFrameConstructor::ConstructBlock [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 13387] nsCSSFrameConstructor::ConstructFrameByDisplayType [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 6545] nsCSSFrameConstructor::ConstructFrameInternal [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 7435] nsCSSFrameConstructor::ConstructFrame [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 7284] nsCSSFrameConstructor::ContentAppended [c:/builds/seamonkey/mozilla/layout/html/style/src/nsCSSFrameConstructor.cpp, line 8537] StyleSetImpl::ContentAppended [c:/builds/seamonkey/mozilla/content/base/src/nsStyleSet.cpp, line 1527] PresShell::ContentAppended [c:/builds/seamonkey/mozilla/layout/html/base/src/nsPresShell.cpp, line 5286] nsDocument::ContentAppended [c:/builds/seamonkey/mozilla/content/base/src/nsDocument.cpp, line 2113] nsHTMLDocument::ContentAppended [c:/builds/seamonkey/mozilla/content/html/document/src/nsHTMLDocument.cpp, line 1407] HTMLContentSink::NotifyAppend [c:/builds/seamonkey/mozilla/content/html/document/src/nsHTMLContentSink.cpp, line 5271] SinkContext::FlushTags [c:/builds/seamonkey/mozilla/content/html/document/src/nsHTMLContentSink.cpp, line 2228] HTMLContentSink::OpenHead [c:/builds/seamonkey/mozilla/content/html/document/src/nsHTMLContentSink.cpp, line 3246] CNavDTD::OpenHead [c:/builds/seamonkey/mozilla/htmlparser/src/CNavDTD.cpp, line 3115] CNavDTD::AddHeadLeaf [c:/builds/seamonkey/mozilla/htmlparser/src/CNavDTD.cpp, line 3840] CNavDTD::HandleStartToken [c:/builds/seamonkey/mozilla/htmlparser/src/CNavDTD.cpp, line 1763] CNavDTD::HandleToken [c:/builds/seamonkey/mozilla/htmlparser/src/CNavDTD.cpp, line 913] CNavDTD::BuildModel [c:/builds/seamonkey/mozilla/htmlparser/src/CNavDTD.cpp, line 530] nsParser::BuildModel [c:/builds/seamonkey/mozilla/htmlparser/src/nsParser.cpp, line 1890] nsParser::ResumeParse [c:/builds/seamonkey/mozilla/htmlparser/src/nsParser.cpp, line 1754] nsParser::OnDataAvailable [c:/builds/seamonkey/mozilla/htmlparser/src/nsParser.cpp, line 2390] nsDocumentOpenInfo::OnDataAvailable [c:/builds/seamonkey/mozilla/uriloader/base/nsURILoader.cpp, line 246] nsHttpChannel::OnDataAvailable [c:/builds/seamonkey/mozilla/netwerk/protocol/http/src/nsHttpChannel.cpp, line 3035] nsOnDataAvailableEvent::HandleEvent [c:/builds/seamonkey/mozilla/netwerk/base/src/nsStreamListenerProxy.cpp, line 204] PL_HandleEvent [c:/builds/seamonkey/mozilla/xpcom/threads/plevent.c, line 647] PL_ProcessPendingEvents [c:/builds/seamonkey/mozilla/xpcom/threads/plevent.c, line 580] _md_EventReceiverProc [c:/builds/seamonkey/mozilla/xpcom/threads/plevent.c, line 1330] nsAppShellService::Run [c:/builds/seamonkey/mozilla/xpfe/appshell/src/nsAppShellService.cpp, line 472] main1 [c:/builds/seamonkey/mozilla/xpfe/bootstrap/nsAppRunner.cpp, line 1538] main [c:/builds/seamonkey/mozilla/xpfe/bootstrap/nsAppRunner.cpp, line 1886] WinMain [c:/builds/seamonkey/mozilla/xpfe/bootstrap/nsAppRunner.cpp, line 1906] WinMainCRTStartup() KERNEL32.DLL + 0x1ca90 (0x77e9ca90) Additional Info: x86 Registers: EAX: 00000000 EBX: 02da7158 ECX: 00000000 EDX: 029419c8 ESI: 00000000 EDI: 00000000 ESP: 0012e548 EBP: 0012e56c EIP: 61381ede CF pf AF zf SF of IF df nt RF vm IOPL: 0 CS: 001b DS: 0023 SS: 0023 ES: 0023 FS: 0038 GS: 0000 Code Around the PC: 61381ede 2b792c sub edi,[ecx+0x2c] 61381ee1 8b7130 mov esi,[ecx+0x30] 61381ee4 8b4908 mov ecx,[ecx+0x8] 61381ee7 2975fc sub [ebp-0x4],esi 61381eea 3bcb cmp ecx,ebx 61381eec 75f0 jnz 61381ede 61381eee 897df8 mov [ebp-0x8],edi 61381ef1 8bda mov ebx,edx 61381ef3 85db test ebx,ebx 61381ef5 746c jz 61381f63 61381ef7 8b5358 mov edx,[ebx+0x58] 61381efa 33f6 xor esi,esi 61381efc 8bca mov ecx,edx
176,030
1,601,191
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.2b) Gecko/20021016 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.2b) Gecko/20021014 Netscape/7.0+ Tested on Windows Me, Windows 98, Windows 2000 and Windows XP. Repeatable on a P3 and a Celeron box. Using Build 2002101404 go to the following sites and try to print them: www.sonystyle.com www.techweb.com www.usairways.com (does not crash when using W2000 or XP) www.nytimes.com (does not crash when using W2000 or XP) www.grolier.com (does not crash when using W2000 or XP) www.half.com (does not crash when using W2000 or XP) www.noaa.gov (does not crash when using W2000 or XP) Expected result: Print site Actual result: Browser crashes after clicking on OK to print site. Talkback loads and is able to send info back most of the time. Site does not get printed, except for www.noaa.gov which has the first page printed out before crashing. Reproducible: Always Steps to Reproduce: 1.Go to the mentioned URL's 2.Once the page is loaded click on the print icon, use ctrl+p or file-print 3.Watch it crash :-( Actual Results: Mozilla crashes. Sometimes NS Quality Feedback Agent pop up. (sorry could not find Talkback ID - if there was one) Expected Results: Print out the site. Also got the same results on celeron box, using Win XP and Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv 1.2b) Gecko/2002101612
159,358
1,464,892
From Bugzilla Helper: User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.1b) Gecko/20020725 BuildID: 2002072504 When trying to print or preview an html page with a 2 or more pages table with a <thead> element, Mozilla 1.1 crashes. It doesn't append with Mozilla 1.0 Reproducible: Always Steps to Reproduce: 1. Open the html page 2. Go to print preview 3. Click on the next page button or 1. Open the html page 2. Go to print 3. Print the page Actual Results: Crash Expected Results: Print or preview
159,995
1,470,616
Build ID: Latest commercial 1.0 branch build, Windows 2000. NOTE: This only affects messages with attachments. Simple messages with nothing in them are fine. Summary: Crash in nsDocLoaderImpl::doStopDocumentLoad trying to cancel print of a message. Steps to Reproduce: 1. Try to cancel the print of this message - news://news.mozilla.org:119/[email protected] Expected Results: Message print dialog disappears, nothing else happens. Actual Results: We crash in: 0x03024bb0 nsDocLoaderImpl::doStopDocumentLoad [d:\builds\seamonkey\mozilla\uriloader\base\nsDocLoader.cpp, line 834] nsDocLoaderImpl::DocLoaderIsEmpty [d:\builds\seamonkey\mozilla\uriloader\base\nsDocLoader.cpp, line 732] nsDocLoaderImpl::OnStopRequest [d:\builds\seamonkey\mozilla\uriloader\base\nsDocLoader.cpp, line 663] nsLoadGroup::RemoveRequest [d:\builds\seamonkey\mozilla\netwerk\base\src\nsLoadGroup.cpp, line 531] imgRequestProxy::OnStopRequest [d:\builds\seamonkey\mozilla\modules\libpr0n\src\imgRequestProxy.cpp, line 392] imgRequest::OnStopRequest [d:\builds\seamonkey\mozilla\modules\libpr0n\src\imgRequest.cpp, line 648] ProxyListener::OnStopRequest [d:\builds\seamonkey\mozilla\modules\libpr0n\src\imgLoader.cpp, line 707] nsMsgProtocol::OnStopRequest [d:\builds\seamonkey\mozilla\mailnews\base\util\nsMsgProtocol.cpp, line 344] nsNNTPProtocol::OnStopRequest [d:\builds\seamonkey\mozilla\mailnews\news\src\nsNNTPProtocol.cpp, line 1245] nsOnStopRequestEvent::HandleEvent [d:\builds\seamonkey\mozilla\netwerk\base\src\nsRequestObserverProxy.cpp, line 213] PL_HandleEvent [d:\builds\seamonkey\mozilla\xpcom\threads\plevent.c, line 597] PL_ProcessPendingEvents [d:\builds\seamonkey\mozilla\xpcom\threads\plevent.c, line 530] _md_EventReceiverProc [d:\builds\seamonkey\mozilla\xpcom\threads\plevent.c, line 1078] nsAppShellService::Run [d:\builds\seamonkey\mozilla\xpfe\appshell\src\nsAppShellService.cpp, line 458] main1 [d:\builds\seamonkey\mozilla\xpfe\bootstrap\nsAppRunner.cpp, line 1492] main [d:\builds\seamonkey\mozilla\xpfe\bootstrap\nsAppRunner.cpp, line 1839] WinMain [d:\builds\seamonkey\mozilla\xpfe\bootstrap\nsAppRunner.cpp, line 1857] WinMainCRTStartup() KERNEL32.dll + 0x2847c (0x77ea847c)
149,279
1,380,585
From Bugzilla Helper: User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.0.0+) Gecko/20020603 BuildID: 20020604 Whenever I try to read a post on Slo-Tech forum, Mozilla 20020604 crashes. I now reverted back to build 20020603 and on this build Mozilla dosn't crash. Reproducible: Always Steps to Reproduce: 1. Start Mozilla 2. Go to the URL 3. Browse the forum and try to open a post Actual Results: Mozilla crashes when opening a post. Expected Results: Mozilla displays a post without a crash.