trunk topcrash [@ nsNSSCertificate::GetCommonName]

VERIFIED FIXED

Status

--
critical
VERIFIED FIXED
16 years ago
2 years ago

People

(Reporter: jcarpenter0524, Assigned: ssaux)

Tracking

({crash, topcrash})

Other Branch
x86
Windows NT
crash, topcrash

Firefox Tracking Flags

(Not tracked)

Details

(crash signature)

(Reporter)

Description

16 years ago
This stack signature is a topcrasher for the trunk 

nsNSSCertificate::GetCommonName   19 
Min/Max Seconds since last crash: 1 - 15758
Min/Max Runtime: 550 - 99405
Crash data range: 2002-09-26 to 2002-10-02
Build ID range: 2002092608 to 2002100108
Stack Trace: 

	 nsNSSCertificate::GetCommonName
[c:/builds/seamonkey/mozilla/security/manager/ssl/src/nsNSSCertificate.cpp  line
405]
	 XPTC_InvokeByIndex
[c:/builds/seamonkey/mozilla/xpcom/reflect/xptcall/src/md/win32/xptcinvoke.cpp 
line 106]
	 XPCWrappedNative::CallMethod
[c:/builds/seamonkey/mozilla/js/src/xpconnect/src/xpcwrappednative.cpp  line 1996]
	 XPC_WN_GetterSetter
[c:/builds/seamonkey/mozilla/js/src/xpconnect/src/xpcwrappednativejsops.cpp 
line 1299]
	 js_Invoke	[c:/builds/seamonkey/mozilla/js/src/jsinterp.c  line 841]
	 js_InternalInvoke	[c:/builds/seamonkey/mozilla/js/src/jsinterp.c  line 932]
	 js_GetProperty	[c:/builds/seamonkey/mozilla/js/src/jsobj.c  line 2549]
	 js_Interpret	[c:/builds/seamonkey/mozilla/js/src/jsinterp.c  line 2640]
	 js_Invoke	[c:/builds/seamonkey/mozilla/js/src/jsinterp.c  line 857]
	 js_InternalInvoke	[c:/builds/seamonkey/mozilla/js/src/jsinterp.c  line 932]
	 JS_CallFunctionValue	[c:/builds/seamonkey/mozilla/js/src/jsapi.c  line 3433]
	 nsJSContext::CallEventHandler
[c:/builds/seamonkey/mozilla/dom/src/base/nsJSEnvironment.cpp  line 1044]
	 nsJSEventListener::HandleEvent
[c:/builds/seamonkey/mozilla/dom/src/events/nsJSEventListener.cpp  line 184]
	 nsEventListenerManager::HandleEventSubType
[c:/builds/seamonkey/mozilla/content/events/src/nsEventListenerManager.cpp  line
1183]
	 nsEventListenerManager::HandleEvent
[c:/builds/seamonkey/mozilla/content/events/src/nsEventListenerManager.cpp  line
1854]
	 GlobalWindowImpl::HandleDOMEvent
[c:/builds/seamonkey/mozilla/dom/src/base/nsGlobalWindow.cpp  line 766]
	 DocumentViewerImpl::LoadComplete
[c:/builds/seamonkey/mozilla/content/base/src/nsDocumentViewer.cpp  line 970]
	 nsDocShell::EndPageLoad
[c:/builds/seamonkey/mozilla/docshell/base/nsDocShell.cpp  line 4152]
	 nsWebShell::EndPageLoad
[c:/builds/seamonkey/mozilla/docshell/base/nsWebShell.cpp  line 814]
	 nsDocShell::OnStateChange
[c:/builds/seamonkey/mozilla/docshell/base/nsDocShell.cpp  line 4086]
	 nsDocLoaderImpl::FireOnStateChange
[c:/builds/seamonkey/mozilla/uriloader/base/nsDocLoader.cpp  line 1218]
	 nsDocLoaderImpl::doStopDocumentLoad
[c:/builds/seamonkey/mozilla/uriloader/base/nsDocLoader.cpp  line 870]
	 nsDocLoaderImpl::DocLoaderIsEmpty
[c:/builds/seamonkey/mozilla/uriloader/base/nsDocLoader.cpp  line 768]
	 nsDocLoaderImpl::OnStopRequest
[c:/builds/seamonkey/mozilla/uriloader/base/nsDocLoader.cpp  line 699]
	 nsLoadGroup::RemoveRequest
[c:/builds/seamonkey/mozilla/netwerk/base/src/nsLoadGroup.cpp  line 703]
	 nsJARChannel::OnStopRequest
[c:/builds/seamonkey/mozilla/netwerk/protocol/jar/src/nsJARChannel.cpp  line 612]
	 nsOnStopRequestEvent::HandleEvent
[c:/builds/seamonkey/mozilla/netwerk/base/src/nsRequestObserverProxy.cpp  line 213]
	 PL_HandleEvent	[c:/builds/seamonkey/mozilla/xpcom/threads/plevent.c  line 645]
	 PL_ProcessPendingEvents	[c:/builds/seamonkey/mozilla/xpcom/threads/plevent.c 
line 578]
	 _md_EventReceiverProc	[c:/builds/seamonkey/mozilla/xpcom/threads/plevent.c 
line 1336]
 
 	Source File :
c:/builds/seamonkey/mozilla/security/manager/ssl/src/nsNSSCertificate.cpp line : 405


COMMENTs/URLs:

     (11896145)	URL: http://www.deviantart.com/deviation/736353
     (11869901)	URL: http://www.ntfs.org
     (11869879)	URL: http://www.ntfs.org
     (11869879)	Comments: Visiting the default page.
     (11859398)	URL:
https://support.nocster.net:449/review/?id=155959&secid=bUn_hPnAoa
     (11859110)	URL: https://secure.scothost.co.uk/
     (11815394)	URL: http://software.hp.com/LIA64/
     (11815394)	Comments: Clicking on the above link from the URL    
http://www.lia64.org/book/sw.php3    caused the browser to crash.    
     (11749341)	URL: www.redhat.com
     (11749341)	Comments: just went to the page
(Reporter)

Updated

16 years ago
Keywords: crash, topcrash
(Reporter)

Updated

16 years ago
Keywords: zt4newcrash
isn't this a PSM or NSS bug ?

Updated

16 years ago
Severity: normal → critical

Comment 2

16 years ago
-> kaie... he did some recent string work that touched GetCommonName.  this must
be related to that.  although i suspect it is the age old problem of a user
unzipping a new build ontop of an old build biting us again.
Assignee: darin → ssaux
Component: Networking: HTTP → Client Library
Product: Browser → PSM
QA Contact: httpqa → junruh
Version: other → unspecified

Comment 3

16 years ago
I assigned a similar bug to Installer - bug 172255
I heard bryner say on IRC that nightlies aren't rebuilding typelibs properly,
which has led to all sorts of topcrashes in recent builds.  Could that be the
problem here?

/be

Updated

16 years ago
Blocks: 168066

Comment 5

16 years ago
yes psm.xpt was the third big xpt file, and it has the same features as
browser.xpt and mail.xpt. Based on the stack this could probably yet another victim.

If you want that bug fixed for 1.2, it looks like we're tracking it as bug
172586 (I know we've moved the discussion around a lot, sorry).

Comment 6

16 years ago
Yes, the check-in for bug 169932 is probably the source. Changes wstring to AString

Comment 7

16 years ago
Fixed by changes made for bug 172586. Hasn't happened on the Trunk since 10/7.
Status: NEW → RESOLVED
Last Resolved: 16 years ago
Resolution: --- → FIXED

Comment 8

16 years ago
*** Bug 172255 has been marked as a duplicate of this bug. ***

Comment 9

16 years ago
verified.
Status: RESOLVED → VERIFIED

Updated

14 years ago
Component: Security: UI → Security: UI
Product: PSM → Core
Crash Signature: [@ nsNSSCertificate::GetCommonName]
Product: Core → Core Graveyard
You need to log in before you can comment on or make changes to this bug.