Closed Bug 292936 Opened 20 years ago Closed 9 years ago

Crash debugging XUL App from remote session

Categories

(Core :: XPConnect, defect)

x86
Windows XP
defect
Not set
critical

Tracking

()

RESOLVED INVALID

People

(Reporter: bc, Unassigned)

Details

(Keywords: crash)

Ok, this is kind of weird on how to reproduce...

0. Don't set MOZ_NO_REMOTE
1. Install Spider <http://bclary.com/2004/07/10/mozilla-spiders>
2. Run as chrome app firefox -chrome chrome://spider/content
3. Start firefox again so that the XUL app is running and a separate window is
running Firefox.
4. Open Venkman
5. Run Spider with a user hook script (see the Spider page) which contains a
line with the keyword debugger;
6. Crash

This code has a line with debugger; followed by a function call which calls
dump, I might be able to reduce this.

_output(_iobuf * 0x10261848, const char * 0x030a8238, char * 0x0012cf48) line
677 + 31 bytes
printf(const char * 0x030a7dd8) line 60 + 18 bytes
xpc_DumpJSStack(JSContext * 0x02ae9060, int 1, int 1, int 0) line 295 + 10 bytes
xpc_DebuggerKeywordHandler(JSContext * 0x02ae9060, JSScript * 0x02eb4218,
unsigned char * 0x02eb4257, long * 0x0012d7f0, void * 0x00000000) line 369 + 15
bytes
js_Interpret(JSContext * 0x02ae9060, unsigned char * 0x02eb4257, long *
0x0012d9a0) line 5026 + 38 bytes
js_Invoke(JSContext * 0x02ae9060, unsigned int 0, unsigned int 0) line 1340 + 19
bytes
js_Interpret(JSContext * 0x02ae9060, unsigned char * 0x0250880f, long *
0x0012e404) line 3610 + 15 bytes
js_Invoke(JSContext * 0x02ae9060, unsigned int 1, unsigned int 2) line 1340 + 19
bytes
nsXPCWrappedJSClass::CallMethod(nsXPCWrappedJSClass * const 0x024f9bb0,
nsXPCWrappedJS * 0x024f9c40, unsigned short 3, const nsXPTMethodInfo *
0x029a53e8, nsXPTCMiniVariant * 0x0012e754) line 1339 + 22 bytes
nsXPCWrappedJS::CallMethod(nsXPCWrappedJS * const 0x024f9c40, unsigned short 3,
const nsXPTMethodInfo * 0x029a53e8, nsXPTCMiniVariant * 0x0012e754) line 450
PrepareAndDispatch(nsXPTCStubBase * 0x024f9c40, unsigned int 3, unsigned int *
0x0012e804, unsigned int * 0x0012e7f4) line 117 + 31 bytes
SharedStub() line 147
nsEventListenerManager::HandleEventSubType(nsListenerStruct * 0x024f9d68,
nsIDOMEvent * 0x02521ae8, nsIDOMEventTarget * 0x02f59170, unsigned int 1,
unsigned int 4) line 1563 + 20 bytes
nsEventListenerManager::HandleEvent(nsEventListenerManager * const 0x024f9ca8,
nsPresContext * 0x02ee5960, nsEvent * 0x0012ee0c, nsIDOMEvent * * 0x0012ed7c,
nsIDOMEventTarget * 0x02f59170, unsigned int 4, nsEventStatus * 0x0012ee34) line
1667
nsXULElement::HandleDOMEvent(nsPresContext * 0x02ee5960, nsEvent * 0x0012ee0c,
nsIDOMEvent * * 0x0012ed7c, unsigned int 4, nsEventStatus * 0x0012ee34) line 2194
nsXULElement::HandleChromeEvent(nsXULElement * const 0x02efdd6c, nsPresContext *
0x02ee5960, nsEvent * 0x0012ee0c, nsIDOMEvent * * 0x0012ed7c, unsigned int 4,
nsEventStatus * 0x0012ee34) line 2869 + 35 bytes
nsGlobalWindow::HandleDOMEvent(nsPresContext * 0x02ee5960, nsEvent * 0x0012ee0c,
nsIDOMEvent * * 0x0012ed7c, unsigned int 7, nsEventStatus * 0x0012ee34) line 898
DocumentViewerImpl::LoadComplete(DocumentViewerImpl * const 0x02f81270, unsigned
int 0) line 987 + 35 bytes
nsDocShell::EndPageLoad(nsIWebProgress * 0x02f6b084, nsIChannel * 0x024fa210,
unsigned int 0) line 4561
nsWebShell::EndPageLoad(nsIWebProgress * 0x02f6b084, nsIChannel * 0x024fa210,
unsigned int 0) line 665
nsDocShell::OnStateChange(nsDocShell * const 0x02f6b138, nsIWebProgress *
0x02f6b084, nsIRequest * 0x024fa210, unsigned int 131088, unsigned int 0) line 4487
nsDocLoader::FireOnStateChange(nsIWebProgress * 0x02f6b084, nsIRequest *
0x024fa210, int 131088, unsigned int 0) line 1195
nsDocLoader::doStopDocumentLoad(nsIRequest * 0x024fa210, unsigned int 0) line 832
nsDocLoader::DocLoaderIsEmpty() line 729
nsDocLoader::OnStopRequest(nsIRequest * 0x0304d358, nsISupports * 0x00000000,
unsigned int 0) line 653
nsLoadGroup::RemoveRequest(nsLoadGroup * const 0x02ef6518, nsIRequest *
0x0304d358, nsISupports * 0x00000000, unsigned int 0) line 732 + 44 bytes
PresShell::RemoveDummyLayoutRequest() line 6934 + 42 bytes
DummyLayoutRequestEvent::HandleEvent() line 6834
HandleDummyLayoutRequestPLEvent(PLEvent * 0x03020598) line 6843
PL_HandleEvent(PLEvent * 0x03020598) line 698 + 10 bytes
PL_ProcessPendingEvents(PLEventQueue * 0x024a1da0) line 633 + 9 bytes
_md_EventReceiverProc(HWND__ * 0x003d01fe, unsigned int 49395, unsigned int 0,
long 38411680) line 1435 + 9 bytes
USER32! 77d48734()
USER32! 77d48816()
USER32! 77d489cd()
USER32! 77d48a10()
nsAppShell::Run(nsAppShell * const 0x025330a0) line 135
nsAppStartup::Run(nsAppStartup * const 0x02533000) line 145
XRE_main(int 5, char * * 0x01a47030, const nsXREAppData * 0x011f101c kAppData)
line 2012 + 35 bytes
main(int 5, char * * 0x01a47030) line 60 + 18 bytes
mainCRTStartup() line 338 + 17 bytes
KERNEL32! 7c816d4f()

in c runtime output.c

                    while (i-- && *p)

local vars

	i	2147483646
+	pwch	0x00000000 ""
+	p	0x00000001 ""
+	stream	0x10261848
+	format	0x030a8238 "vg%2Bxml&autorun=true"
    this = [object Object]
5 anonymous(evt = [object Event @ 0x304be08])
["chrome://spider/content/spider.js":638]
    this = [object XULElement @ 0x2f6c0d0]
6 [native frame]
"
+	argptr	0x0012cf48 ""
	fldwidth	2
+	prefix	0x0012ccb8 ""
	no_output	0
	radix	16
	precision	-1
	hexadd	39
	charsout	1117
+	buffer	{...}
	ch	115 's'
	textlen	1
+	text	{...}
	bufferiswide	0
	state	7
	wchar	29957
	prefixlen	0
	chclass	8
	capexp	0
	flags	0
Assignee: dbradley → nobody
QA Contact: pschwartau → xpconnect
Yikes, complicated steps to reproduce.  bc, does this still crash for you?
> 4. Open Venkman

iirc  Venkman is gone
Severity: major → critical
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → INVALID
You need to log in before you can comment on or make changes to this bug.