Closed
Bug 16559
Opened 25 years ago
Closed 25 years ago
HTTP debug problem when starting mozilla
Categories
(Core :: Networking, defect, P3)
Tracking
()
VERIFIED
WORKSFORME
M14
People
(Reporter: ppandit, Assigned: gagan)
Details
Using a debug build from October 14 on Windows NT
Running a testcase - reloading many times
mozilla hangs so I kill the process and restart
Upon starting, got this trace.
Killed the process and restarted again and got the same trace again
Rebooted the system and restarted mozilla and got the same trace
Pressed F5 to continue.
TDLL! DbgBreakPoint@0 address 0x77f76148
nsDebug::Break(const char * 0x07a95608, int 642) line 254
nsDebug::Error(const char * 0x07a95640, const char * 0x07a95608, int 642) line
305 + 13 bytes
nsHTTPChannel::Open() line 642 + 21 bytes
nsHTTPChannel::AsyncRead(nsHTTPChannel * const 0x079c4890, unsigned int 0, int
-1, nsISupports * 0x00000000, nsIStreamListener * 0x079c4b70) line 256 + 8 bytes
nsDocumentBindInfo::Bind(nsIURI * 0x079c3040, nsILoadGroup * 0x0781cfb0,
nsIInputStream * 0x00000000, const unsigned short * 0x00000000) line 1079 + 45
bytes
nsDocLoaderImpl::LoadDocument(nsDocLoaderImpl * const 0x0781b050, nsIURI *
0x079c3040, const char * 0x002cc064, nsIContentViewerContainer * 0x07819290,
nsIInputStream * 0x00000000, nsISupports * 0x00000000, unsigned int 0, const
unsigned int 0, const unsigned short * 0x00000000) line 508 + 32 bytes
nsWebShell::DoLoadURL(nsIURI * 0x079c3040, const char * 0x002cc064,
nsIInputStream * 0x00000000, unsigned int 0, const unsigned int 0, const
unsigned short * 0x00000000) line 2115 + 57 bytes
nsWebShell::LoadURI(nsWebShell * const 0x07819290, nsIURI * 0x079c3040, const
char * 0x002cc064, nsIInputStream * 0x00000000, int 1, unsigned int 0, const
unsigned int 0, nsISupports * 0x00000000, const unsigned short * 0x00000000)
line 2181 + 32 bytes
nsWebShell::LoadURL(nsWebShell * const 0x07819290, const unsigned short *
0x079c14e0, const char * 0x002cc064, nsIInputStream * 0x00000000, int 1,
unsigned int 0, const unsigned int 0, nsISupports * 0x00000000, const unsigned
short * 0x00000000) line 2341 + 52 bytes
nsWebShell::LoadURL(nsWebShell * const 0x07819290, const unsigned short *
0x079c14e0, nsIInputStream * 0x00000000, int 1, unsigned int 0, const unsigned
int 0, nsISupports * 0x00000000, const unsigned short * 0x00000000) line 1917
nsBrowserInstance::LoadUrl(nsBrowserInstance * const 0x078223a0, const unsigned
short * 0x079c14e0) line 991 + 37 bytes
nsBrowserInstance::LoadInitialPage(nsBrowserInstance * const 0x078223a0) line
1070 + 22 bytes
XPTC_InvokeByIndex(nsISupports * 0x078223a0, unsigned int 8, unsigned int 0,
nsXPTCVariant * 0x0012dcf4) line 135
nsXPCWrappedNativeClass::CallWrappedMethod(JSContext * 0x07314550,
nsXPCWrappedNative * 0x079c0890, const XPCNativeMemberDescriptor * 0x079c0b58,
nsXPCWrappedNativeClass::CallMode CALL_METHOD, unsigned int 0, long *
0x00f3bd7c, long * 0x0012de94) line 782 + 44 bytes
WrappedNative_CallMethod(JSContext * 0x07314550, JSObject * 0x0746fe00, unsigned
int 0, long * 0x00f3bd7c, long * 0x0012de94) line 186 + 34 bytes
js_Invoke(JSContext * 0x07314550, unsigned int 0, unsigned int 0) line 672 + 26
bytes
js_Interpret(JSContext * 0x07314550, long * 0x0012e70c) line 2248 + 15 bytes
js_Invoke(JSContext * 0x07314550, unsigned int 0, unsigned int 0) line 688 + 13
bytes
js_Interpret(JSContext * 0x07314550, long * 0x0012ef40) line 2248 + 15 bytes
js_Invoke(JSContext * 0x07314550, unsigned int 0, unsigned int 0) line 688 + 13
bytes
js_Interpret(JSContext * 0x07314550, long * 0x0012f774) line 2248 + 15 bytes
js_Invoke(JSContext * 0x07314550, unsigned int 1, unsigned int 2) line 688 + 13
bytes
js_InternalCall(JSContext * 0x07314550, JSObject * 0x00f1dc38, long 15947360,
unsigned int 1, long * 0x0012f8f4, long * 0x0012f8ac) line 765 + 15 bytes
JS_CallFunction(JSContext * 0x07314550, JSObject * 0x00f1dc38, JSFunction *
0x0739f160, unsigned int 1, long * 0x0012f8f4, long * 0x0012f8ac) line 2650 + 32
bytes
nsJSContext::CallFunction(nsJSContext * const 0x073146c0, void * 0x00f1dc38,
void * 0x0739f160, unsigned int 1, void * 0x0012f8f4, int * 0x0012f8f0) line 231
+ 39 bytes
nsJSEventListener::HandleEvent(nsIDOMEvent * 0x079b5b90) line 103 + 48 bytes
nsEventListenerManager::HandleEvent(nsIPresContext & {...}, nsEvent *
0x0012fc4c, nsIDOMEvent * * 0x0012faf4, unsigned int 7, nsEventStatus &
nsEventStatus_eIgnore) line 1025 + 21 bytes
GlobalWindowImpl::HandleDOMEvent(GlobalWindowImpl * const 0x07314714,
nsIPresContext & {...}, nsEvent * 0x0012fc4c, nsIDOMEvent * * 0x0012faf4,
unsigned int 1, nsEventStatus & nsEventStatus_eIgnore) line 2889
nsWebShell::OnEndDocumentLoad(nsWebShell * const 0x016941d4, nsIDocumentLoader *
0x01694150, nsIChannel * 0x077971b0, unsigned int 0, nsIDocumentLoaderObserver *
0x016941d4) line 3348 + 34 bytes
nsDocLoaderImpl::FireOnEndDocumentLoad(nsDocLoaderImpl * 0x01694150, nsIChannel
* 0x077971b0, unsigned int 0) line 847
nsDocLoaderImpl::OnStopRequest(nsDocLoaderImpl * const 0x01694154, nsIChannel *
0x07824620, nsISupports * 0x00000000, unsigned int 0, const unsigned short *
0x00000000) line 728
nsLoadGroup::RemoveChannel(nsLoadGroup * const 0x016940e0, nsIChannel *
0x07824620, nsISupports * 0x00000000, unsigned int 0, const unsigned short *
0x00000000) line 597 + 39 bytes
nsFileChannel::OnStopRequest(nsFileChannel * const 0x07824624, nsIChannel *
0x07824450, nsISupports * 0x00000000, unsigned int 0, const unsigned short *
0x00000000) line 423
nsOnStopRequestEvent::HandleEvent(nsOnStopRequestEvent * const 0x07826bb0) line
293
nsStreamListenerEvent::HandlePLEvent(PLEvent * 0x07826910) line 164 + 12 bytes
PL_HandleEvent(PLEvent * 0x07826910) line 534 + 10 bytes
PL_ProcessPendingEvents(PLEventQueue * 0x00d24fd0) line 493 + 9 bytes
_md_EventReceiverProc(HWND__ * 0x08270126, unsigned int 49413, unsigned int 0,
long 13782992) line 963 + 9 bytes
USER32! DispatchMessageWorker@8 + 135 bytes
USER32! DispatchMessageA@4 + 11 bytes
nsAppShell::Run(nsAppShell * const 0x00d784a0) line 74
nsAppShellService::Run(nsAppShellService * const 0x00d235d0) line 468
main1(int 1, char * * 0x00cb4a60) line 593 + 12 bytes
main(int 1, char * * 0x00cb4a60) line 703 + 13 bytes
mainCRTStartup() line 338 + 17 bytes
KERNEL32! BaseProcessStart@4 + 64 bytes
Updated•25 years ago
|
Assignee: don → gagan
Component: Browser-General → Necko
could you give some more details about your test case? Like how do we reproduce
this behaviour? thx.
Updated•25 years ago
|
Target Milestone: M14
Bulk move of all Necko (to be deleted component) bugs to new Networking
component.
Comment 4•25 years ago
|
||
No instructions to reproduce, and extremely old. Closing. Reopen if still an
issue.
Status: ASSIGNED → RESOLVED
Closed: 25 years ago
Resolution: --- → WORKSFORME
Not seeing this in recent debug builds on Windows NT
Mark as VERIFIED
Status: RESOLVED → VERIFIED
You need to log in
before you can comment on or make changes to this bug.
Description
•