Closed
Bug 474866
Opened 16 years ago
Closed 16 years ago
Plugins not instantiated upon second visit to page on Linux
Categories
(Core Graveyard :: Plug-ins, defect, P1)
Tracking
(Not tracked)
VERIFIED
FIXED
mozilla1.9.1b3
People
(Reporter: kbrussel, Assigned: jst)
References
Details
(Keywords: verified1.9.1)
Attachments
(2 files)
1.48 KB,
patch
|
jaas
:
review+
bzbarsky
:
superreview+
|
Details | Diff | Splinter Review |
5.63 KB,
patch
|
mrbkap
:
review+
mrbkap
:
superreview+
|
Details | Diff | Splinter Review |
On Linux, upon the second visit to a web page containing a plugin such as a Java applet, the plugin is not being instantiated by the browser. To reproduce:
Get JDK 6u12 from https://jdk6.dev.java.net/ (I used the self-extracting JRE jar file), symlink lib/i386/libnpjp2.so into the Firefox plugins directory, and go to http://java.sun.com/products/plugin/1.5.0/demos/applets.html . Click the Clock example. Once the page loads and the clock is running, click the back button. Then click the Clock link again. There will be a hole in the page where the applet should be. The Java Plug-In doesn't appear to be receiving an NPP_New call.
This is a blocker for us.
Flags: blocking1.9.1?
Assignee | ||
Comment 1•16 years ago
|
||
Yeah, this is bad. Regression from bug 472439.
Assignee: nobody → jst
Depends on: 472439
Flags: blocking1.9.1? → blocking1.9.1+
Priority: -- → P1
Target Milestone: --- → mozilla1.9.1b3
<3 plugin code.
Assignee | ||
Comment 3•16 years ago
|
||
This fixes this bug by reverting part of the change that caused this. This makes us leave the peer in the instance while a plugin is cached in the active plugins list in the plugin host, but it makes the code break the reference from the peer to the owner when a plugin is inserted into that list. This fixes the problem in this bug, and does not appear to regress the leak fix that caused this.
Attachment #358527 -
Flags: superreview?(bzbarsky)
Attachment #358527 -
Flags: review?(joshmoz)
![]() |
||
Updated•16 years ago
|
Attachment #358527 -
Flags: superreview?(bzbarsky) → superreview+
![]() |
||
Comment 4•16 years ago
|
||
Comment on attachment 358527 [details] [diff] [review]
Fix.
Looks ok if we're really completely guaranteed that cast is safe. Might be worth using a QI here (with some sort of QI-to-CID setup like nsStandardURL uses, say).
Assignee | ||
Comment 5•16 years ago
|
||
We rely on that cast being safe elsewhere already. At least at http://mxr.mozilla.org/mozilla-central/source/modules/plugin/base/src/nsPluginHostImpl.cpp#3530, so we should be no less safe now. The interfaces for this stuff should probably just go away for 3.2 anyways, so I'd rather not add more to the mess unless it's needed here.
OS: Linux → All
Hardware: x86 → All
Attachment #358527 -
Flags: review?(joshmoz) → review+
Assignee | ||
Comment 6•16 years ago
|
||
So this landed this morning but had to be backed out due to tinderbox showing leaks again, even if I didn't see any increase in leaks here locally. I've got a new patch coming that for me now for the first time shows no leaks when running the test content/base/test/test_bug391728.html, so I think the next patch is good to go. The new patch does what bent suggested as an option when fixing the plugin test leaks that caused this, which was to make the nsPluginInstancePeer have a weak reference to its owner.
Assignee | ||
Comment 7•16 years ago
|
||
Attachment #358803 -
Flags: superreview?(mrbkap)
Attachment #358803 -
Flags: review?(mrbkap)
Comment 8•16 years ago
|
||
Comment on attachment 358803 [details] [diff] [review]
Better fix, that really doesn't leak locally.
jst explained what's going on here over IRC to me.
Attachment #358803 -
Flags: superreview?(mrbkap)
Attachment #358803 -
Flags: superreview+
Attachment #358803 -
Flags: review?(mrbkap)
Attachment #358803 -
Flags: review+
Assignee | ||
Comment 9•16 years ago
|
||
Comment 10•16 years ago
|
||
It looks like this caused bug 475646
Comment 11•16 years ago
|
||
Hi Murali, when you do Linux plugin testing on beta 3, can you also verify this bug is fixed at the same time? Thanks, Tony
Comment 12•16 years ago
|
||
Verified as fixed
Updated•16 years ago
|
Status: RESOLVED → VERIFIED
Comment 13•16 years ago
|
||
Verified on the branch and not on trunk
Keywords: fixed1.9.1 → verified1.9.1
Updated•3 years ago
|
Product: Core → Core Graveyard
You need to log in
before you can comment on or make changes to this bug.
Description
•