Open Bug 1972341 Opened 4 months ago Updated 3 months ago

Crash in [@ mozilla::dom::Event::GetTarget] on family 6 model 183 stepping 1

Categories

(Core :: DOM: Events, defect)

Unspecified
Windows 11
defect

Tracking

()

Tracking Status
firefox-esr115 --- unaffected
firefox-esr128 --- unaffected
firefox-esr140 --- wontfix
firefox139 - wontfix
firefox140 - wontfix
firefox141 - wontfix

People

(Reporter: mstange, Unassigned)

References

(Blocks 2 open bugs)

Details

(Keywords: crash, regression)

Crash Data

Couldn't see an existing bug about this crash, and it seems like a really frequent crash, #10 on https://crash-stats.mozilla.org/topcrashers/?product=Firefox&version=139.0.4

Crash report: https://crash-stats.mozilla.org/report/index/3cfcef58-d807-4950-bc46-efc1b0250616

Reason:

EXCEPTION_ACCESS_VIOLATION_READ

Top 10 frames:

0  xul.dll  mozilla::dom::Event::GetTarget() const  dom/events/Event.cpp:279
0  xul.dll  mozilla::dom::Event_Binding::get_target(JSContext*, JS::Handle<JSObject*>, vo...  dom/bindings/EventBinding.cpp:262
1  ?  @0x0000033c865c2b5f
2  xul.dll  <unknown in xul.pdb>
3  xul.dll  js::AutoCheckRecursionLimit::checkLimitImpl(unsigned long long, void*) const  js/public/friend/StackLimits.h:198
3  xul.dll  js::AutoCheckRecursionLimit::checkWithStackPointerDontReport(JSContext*, void...  js/public/friend/StackLimits.h:267
3  xul.dll  js::AutoCheckRecursionLimit::checkDontReport(JSContext*) const  js/public/friend/StackLimits.h:251
3  xul.dll  js::AutoCheckRecursionLimit::check(JSContext*) const  js/public/friend/StackLimits.h:233
3  xul.dll  CallJSNative(JSContext*, bool (*)(JSContext*, unsigned int, JS::Value*), js::...  js/src/vm/Interpreter.cpp:478
3  xul.dll  js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstru...  js/src/vm/Interpreter.cpp:590

[Tracking Requested - why for this release]: Appears to be a regression in 139.

Judging by the Nightly graph, caused by something that landed in late April / early May.

Group: core-security → dom-core-security

These look like null deref crashes. What is the reason you marked this as a security bug?

Flags: needinfo?(mstange.moz)

Olli, any guesses here? Maybe the event is unlinked? I don't see a ton of information in the stack unfortunately.

Flags: needinfo?(smaug)

(In reply to Andrew McCreight [:mccr8] from comment #2)

These look like null deref crashes. What is the reason you marked this as a security bug?

I was extra cautious because I wasn't sure and wasn't fully awake yet. Can you make the bug non-security-sensitive?

Flags: needinfo?(mstange.moz)
Group: dom-core-security
Keywords: regression

AutoCheckRecursionLimit on the stack seems valid, but higher up, not so sure.

Flags: needinfo?(smaug)

The bug is marked as tracked for firefox140 (beta) and tracked for firefox141 (nightly). We have limited time to fix this, the soft freeze is in 2 days. However, the bug still isn't assigned.

:hsinyi, could you please find an assignee for this tracked bug? If you disagree with the tracking decision, please talk with the release managers.

For more information, please visit BugBot documentation.

Flags: needinfo?(htsai)

The stacks don't really make any sense here. As is, I'm not sure this bug is actionable.

How can we make it actionable? Based on the graph it looks very real.
75.3% parent process
24.7% content process

Maybe someone can load the minidump into visual studio and check if the stack makes more sense there?

Looking at the correlations tab for crashes with this signature I see this:

(96.84% in signature vs 07.23% overall) CPU Info = family 6 model 183 stepping 1

So I think this is a CPU bug (this is the exact CPU as in bug 1876939).

Blocks: cpu-bugs
See Also: → 1876939
Summary: Crash in [@ mozilla::dom::Event::GetTarget] → Crash in [@ mozilla::dom::Event::GetTarget] on family 6 model 183 stepping 1
Flags: needinfo?(htsai)
Severity: -- → S2

[Tracking Requested - why for this release]: I think the tracking should be dropped for this bug. I don't think we should track a CPU bug. The crash volume isn't too high.

Severity: S2 → S3
You need to log in before you can comment on or make changes to this bug.