Closed Bug 162515 Opened 22 years ago Closed 21 years ago

Mime inline text parsing triggers assertion in nsDependentString::Rebind()

Categories

(MailNews Core :: MIME, defect)

x86
Windows 2000
defect
Not set
normal

Tracking

(Not tracked)

VERIFIED DUPLICATE of bug 112656

People

(Reporter: kinmoz, Assigned: bugzilla)

Details

Attachments

(1 file)

In my 08/12/02 Win32 Commercial Debug build I'm seeing an assertion being
triggered in nsDependentString::Rebind():

  NS_ASSERTION(!*aEndPtr, "nsDependentString must wrap only null-terminated
strings");

The assertion is preceded by a comment that explains the conditions under which
it will happen, and how to fix the problem.

The assertion seems to be triggered during some mime inline text parsing. Here's
the stack to the assertion:


NTDLL! 77fa018c()
nsDebug::Assertion(const char * 0x1010c284 `string', const char * 0x1010c2c8
`string', const char * 0x1010c24c `string', int 86) line 280 + 13 bytes
nsDependentString::Rebind(const unsigned short * 0x0721d9e6, const unsigned
short * 0x0721d9f0) line 86 + 34 bytes
nsDependentString::Rebind(const unsigned short * 0x0721d9e6, unsigned int 5) line 96
nsDependentString::nsDependentString(const unsigned short * 0x0721d9e6, unsigned
int 5) line 99 + 51 bytes
mozTXTToHTMLConv::ItMatchesDelimited(const unsigned short * 0x0721d9e6, int 5,
const unsigned short * 0x01d816c0, int 4, mozTXTToHTMLConv::LIMTYPE LT_IGNORE,
mozTXTToHTMLConv::LIMTYPE LT_IGNORE) line 545 + 315 bytes
mozTXTToHTMLConv::GlyphHit(const unsigned short * 0x0721d9e6, int 5, int 0,
nsString & {...}, int & 0) line 825 + 68 bytes
mozTXTToHTMLConv::ScanTXT(const unsigned short * 0x0721d9e2, int 7, unsigned int
4, nsString & {...}) line 1015 + 49 bytes
mozTXTToHTMLConv::CalculateURLBoundaries(const unsigned short * 0x0721d980, int
70, const unsigned int 56, const unsigned int 6, mozTXTToHTMLConv::modetype
abbreviated, const unsigned int 49, const unsigned int 66, nsString & {...},
nsString & {...}, int & 2555904, int & 10) line 357
mozTXTToHTMLConv::FindURL(const unsigned short * 0x0721d980, int 70, const
unsigned int 56, const unsigned int 6, nsString & {...}, int & 805357373, int &
1242324) line 472
mozTXTToHTMLConv::ScanTXT(const unsigned short * 0x0721d980, int 70, unsigned
int 6, nsString & {...}) line 1093 + 48 bytes
mozTXTToHTMLConv::ScanTXT(mozTXTToHTMLConv * const 0x07691b18, const unsigned
short * 0x0721d980, unsigned int 6, unsigned short * * 0x0763ac60) line 1267
MimeInlineTextPlain_parse_line(char * 0x04df86a0, int 70, MimeObject *
0x0773b0d8) line 445 + 62 bytes
MimeInlineText_convert_and_parse_line(char * 0x04df86a0, int 70, MimeObject *
0x0773b0d8) line 420 + 20 bytes
MimeInlineText_open_dam(char * 0x00000000, int 0, MimeObject * 0x0773b0d8) line
468 + 48 bytes
MimeInlineText_parse_eof(MimeObject * 0x0773b0d8, int 0) line 227 + 13 bytes
MimeInlineTextPlain_parse_eof(MimeObject * 0x0773b0d8, int 0) line 267 + 14 bytes
MimeContainer_parse_eof(MimeObject * 0x07853230, int 0) line 141 + 16 bytes
MimeContainer_parse_eof(MimeObject * 0x03ee0598, int 0) line 141 + 16 bytes
MimeMessage_parse_eof(MimeObject * 0x03ee0598, int 0) line 535 + 14 bytes
mime_display_stream_complete(_nsMIMESession * 0x04d85d10) line 929 + 16 bytes
nsStreamConverter::OnStopRequest(nsStreamConverter * const 0x04e29b80,
nsIRequest * 0x07cb1538, nsISupports * 0x00000000, unsigned int 0) line 1033 +
13 bytes
nsDocumentOpenInfo::OnStopRequest(nsDocumentOpenInfo * const 0x0770d1d0,
nsIRequest * 0x07cb1538, nsISupports * 0x00000000, unsigned int 0) line 256
nsStreamListenerTee::OnStopRequest(nsStreamListenerTee * const 0x07f634a0,
nsIRequest * 0x07cb1538, nsISupports * 0x00000000, unsigned int 0) line 66
nsOnStopRequestEvent0::HandleEvent(nsOnStopRequestEvent0 * const 0x04ce87a0)
line 319 + 33 bytes
nsStreamListenerEvent0::HandlePLEvent(PLEvent * 0x04ce87b0) line 113 + 12 bytes
PL_HandleEvent(PLEvent * 0x04ce87b0) line 596 + 10 bytes
PL_ProcessPendingEvents(PLEventQueue * 0x01311e58) line 526 + 9 bytes
_md_EventReceiverProc(HWND__ * 0x000a022c, unsigned int 49462, unsigned int 0,
long 19996248) line 1077 + 9 bytes
USER32! 77e11b60()
USER32! 77e11cca()
USER32! 77e183f1()
nsAppShellService::Run(nsAppShellService * const 0x01dfa6a0) line 452
main1(int 1, char * * 0x00277410, nsISupports * 0x00000000) line 1519 + 32 bytes
main(int 1, char * * 0x00277410) line 1883 + 37 bytes
mainCRTStartup() line 338 + 17 bytes
KERNEL32
This email attachment causes the assertion to be hit twice.
I should've mentioned that this my Win32 Debug TRUNK build, and that the
assertions are triggered when I click on the message's subject in the subject
pane to read it.
QA Contact: gayatri → stephend
Blocks: 160540

*** This bug has been marked as a duplicate of 112656 ***
Status: NEW → RESOLVED
Closed: 21 years ago
Resolution: --- → DUPLICATE
Verified dup.
Status: RESOLVED → VERIFIED
No longer blocks: 160540
Product: MailNews → Core
Product: Core → MailNews Core
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: