Closed Bug 28222 Opened 25 years ago Closed 25 years ago

Assertion in nsXULWindow::NotifyObservers

Categories

(Core :: XUL, defect, P3)

x86
Windows NT
defect

Tracking

()

RESOLVED FIXED

People

(Reporter: viggen, Assigned: travis)

References

()

Details

I use WinNT4sp5. I downloaded and tested a nightly build #2000021708. When visiting the link www.annatennis.nu I clicked on the link that said 'About' and mozilla crashed on me. The linkname is "about.php3" On one computer DrSolomon showed: "mozilla.exe Exception: access violation (0x0000005), Adress: 0x60176496" and on another computer DrSolomon didn't show, but instead I got mozilla popup saying: "Microsoft Visual C++ Runtime Library Program C:\bin\mozilla.exe R6025 - pure virtual function call" When I tried to reproduce the bug in build M13 the menu disappeared, but when typing the url in the url-window it showed the page properly. This is also true in build #2000021708 (page loads properly if full url is given). I think that a javascript popup-window might be responsible for the crash.
When trying to reproduce this I got an assertion in nsXULWindow::NotifyObservers. The stack trace is below. NTDLL! 77f9f9df() nsDebug::Assertion(const char * 0x01061bd8, const char * 0x01061b8c, const char * 0x01061b54, int 1071) line 189 + 13 bytes nsDebug::WarnIfFalse(const char * 0x01061bd8, const char * 0x01061b8c, const char * 0x01061b54, int 1071) line 247 + 21 bytes nsXULWindow::NotifyObservers(nsXULWindow * const 0x01f87ff0, const unsigned short * 0x0012e5f0, const unsigned short * 0x0012e84c) line 1071 + 96 bytes nsContentTreeOwner::SetJSDefaultStatus(nsContentTreeOwner * const 0x02bb9554, const unsigned short * 0x0012e84c) line 214 + 35 bytes GlobalWindowImpl::SetDefaultStatus(GlobalWindowImpl * const 0x02b6c540, const nsString & {...}) line 797 SetWindowProperty(JSContext * 0x02b6c630, JSObject * 0x02acf140, long -45, long * 0x0012f070) line 803 js_Interpret(JSContext * 0x02b6c630, long * 0x0012f270) line 1631 + 769 bytes js_Execute(JSContext * 0x02b6c630, JSObject * 0x02acf140, JSScript * 0x02b95d50, JSFunction * 0x00000000, JSStackFrame * 0x00000000, unsigned int 0, long * 0x0012f270) line 836 + 13 bytes JS_EvaluateUCScriptForPrincipals(JSContext * 0x02b6c630, JSObject * 0x02acf140, JSPrincipals * 0x02b95cdc, const unsigned short * 0x0012f7cc, unsigned int 37, const char * 0x02b95e40, unsigned int 8, long * 0x0012f270) line 2740 + 27 bytes nsJSContext::EvaluateString(nsJSContext * const 0x02b69c20, const nsString & {...}, void * 0x02acf140, nsIPrincipal * 0x02b95cd8, const char * 0x02b95e40, unsigned int 8, const char * 0x00329468, nsString & {...}, int * 0x0012f2d0) line 292 + 53 bytes HTMLContentSink::EvaluateScript(nsString & {...}, int 8, const char * 0x00329468) line 4100 HTMLContentSink::ProcessSCRIPTTag(const nsIParserNode & {...}) line 4292 HTMLContentSink::AddLeaf(HTMLContentSink * const 0x02d01470, const nsIParserNode & {...}) line 2951 + 12 bytes CNavDTD::AddLeaf(const nsIParserNode * 0x0226a090) line 3217 + 22 bytes CNavDTD::AddHeadLeaf(nsIParserNode * 0x0226a090) line 3333 + 17 bytes CNavDTD::HandleStartToken(CToken * 0x01ff8c90) line 1387 + 12 bytes CNavDTD::HandleToken(CNavDTD * const 0x02c11138, CToken * 0x0225ffa0, nsIParser * 0x02bdc5f0) line 765 + 12 bytes CNavDTD::BuildModel(CNavDTD * const 0x02c11138, nsIParser * 0x02bdc5f0, nsITokenizer * 0x02d12288, nsITokenObserver * 0x00000000, nsIContentSink * 0x02d01470) line 504 + 20 bytes nsParser::BuildModel() line 1085 + 34 bytes nsParser::ResumeParse(nsIDTD * 0x00000000, int 0) line 1000 + 11 bytes nsParser::EnableParser(int 1) line 691 + 15 bytes CSSLoaderImpl::Cleanup(URLKey & {...}, SheetLoadData * 0x02ce2ac0) line 669 CSSLoaderImpl::SheetComplete(nsICSSStyleSheet * 0x00000000, SheetLoadData * 0x02ce2ac0) line 745 CSSLoaderImpl::ParseSheet(nsIUnicharInputStream * 0x02c9e268, SheetLoadData * 0x02ce2ac0, int & 1, nsICSSStyleSheet * & 0x02cf0a70) line 780 CSSLoaderImpl::DidLoadStyle(nsIStreamLoader * 0x02ce2c58, nsString & {...}, SheetLoadData * 0x02ce2ac0, unsigned int 0) line 813 + 24 bytes SheetLoadData::OnStreamComplete(SheetLoadData * const 0x02ce2ac0, nsIStreamLoader * 0x02ce2c58, nsISupports * 0x00000000, unsigned int 0, unsigned int 1014, const char * 0x02c9e738) line 613 nsStreamLoader::OnStopRequest(nsStreamLoader * const 0x02ce2c5c, nsIChannel * 0x02ce2cb0, nsISupports * 0x00000000, unsigned int 0, const unsigned short * 0x00000000) line 111 + 75 bytes InterceptStreamListener::OnStopRequest(InterceptStreamListener * const 0x02c0d690, nsIChannel * 0x02ce2cb0, nsISupports * 0x00000000, unsigned int 0, const unsigned short * 0x00000000) line 1117 nsHTTPChannel::ResponseCompleted(nsIChannel * 0x02c8e1d4, nsIStreamListener * 0x02c0d690, unsigned int 0, const unsigned short * 0x00000000) line 1318 + 36 bytes nsHTTPResponseListener::OnStopRequest(nsHTTPResponseListener * const 0x02c07688, nsIChannel * 0x02c8e1d4, nsISupports * 0x02ce2cb0, unsigned int 0, const unsigned short * 0x00000000) line 255 nsOnStopRequestEvent::HandleEvent(nsOnStopRequestEvent * const 0x02c49cb8) line 279 nsStreamListenerEvent::HandlePLEvent(PLEvent * 0x02c49d00) line 93 + 12 bytes PL_HandleEvent(PLEvent * 0x02c49d00) line 526 + 10 bytes PL_ProcessPendingEvents(PLEventQueue * 0x00e316c0) line 487 + 9 bytes _md_EventReceiverProc(HWND__ * 0x00470b8c, unsigned int 49508, unsigned int 0, long 14882496) line 975 + 9 bytes USER32! 77e13eb0() USER32! 77e1401a() USER32! 77e192da() nsAppShellService::Run(nsAppShellService * const 0x00e31138) line 401 main1(int 1, char * * 0x00b770c0, nsISplashScreen * 0x00000000) line 651 + 32 bytes main(int 1, char * * 0x00b770c0) line 770 + 17 bytes mainCRTStartup() line 338 + 17 bytes KERNEL32! 77e87903()
Status: UNCONFIRMED → NEW
Ever confirmed: true
Summary: Crash when visiting a link → Assertion in nsXULWindow::NotifyObservers
updating component.
Assignee: cbegle → trudelle
Component: Browser-General → XP Toolkit/Widgets
QA Contact: asadotzler → paulmac
travis, isn't that your area?
Assignee: trudelle → travis
*IGNORE* - more massive spam, changing open XPToolkit bug's QA contact to jrgm@netscape.com
QA Contact: paulmac → jrgm
This bug is fixed.
Status: NEW → RESOLVED
Closed: 25 years ago
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.