Closed
Bug 28222
Opened 25 years ago
Closed 25 years ago
Assertion in nsXULWindow::NotifyObservers
Categories
(Core :: XUL, defect, P3)
Tracking
()
RESOLVED
FIXED
People
(Reporter: viggen, Assigned: travis)
References
()
Details
I use WinNT4sp5. I downloaded and tested a nightly build #2000021708.
When visiting the link www.annatennis.nu I clicked on the link that said 'About'
and mozilla crashed on me.
The linkname is "about.php3"
On one computer DrSolomon showed:
"mozilla.exe
Exception: access violation (0x0000005), Adress: 0x60176496"
and on another computer DrSolomon didn't show, but instead I got mozilla popup
saying:
"Microsoft Visual C++ Runtime Library
Program C:\bin\mozilla.exe
R6025
- pure virtual function call"
When I tried to reproduce the bug in build M13 the menu disappeared, but when
typing the url in the url-window it showed the page properly.
This is also true in build #2000021708 (page loads properly if full url is
given).
I think that a javascript popup-window might be responsible for the crash.
Comment 1•25 years ago
|
||
When trying to reproduce this I got an assertion in
nsXULWindow::NotifyObservers. The stack trace is below.
NTDLL! 77f9f9df()
nsDebug::Assertion(const char * 0x01061bd8, const char * 0x01061b8c, const char
* 0x01061b54, int 1071) line 189 + 13 bytes
nsDebug::WarnIfFalse(const char * 0x01061bd8, const char * 0x01061b8c, const
char * 0x01061b54, int 1071) line 247 + 21 bytes
nsXULWindow::NotifyObservers(nsXULWindow * const 0x01f87ff0, const unsigned
short * 0x0012e5f0, const unsigned short * 0x0012e84c) line 1071 + 96 bytes
nsContentTreeOwner::SetJSDefaultStatus(nsContentTreeOwner * const 0x02bb9554,
const unsigned short * 0x0012e84c) line 214 + 35 bytes
GlobalWindowImpl::SetDefaultStatus(GlobalWindowImpl * const 0x02b6c540, const
nsString & {...}) line 797
SetWindowProperty(JSContext * 0x02b6c630, JSObject * 0x02acf140, long -45, long
* 0x0012f070) line 803
js_Interpret(JSContext * 0x02b6c630, long * 0x0012f270) line 1631 + 769 bytes
js_Execute(JSContext * 0x02b6c630, JSObject * 0x02acf140, JSScript * 0x02b95d50,
JSFunction * 0x00000000, JSStackFrame * 0x00000000, unsigned int 0, long *
0x0012f270) line 836 + 13 bytes
JS_EvaluateUCScriptForPrincipals(JSContext * 0x02b6c630, JSObject * 0x02acf140,
JSPrincipals * 0x02b95cdc, const unsigned short * 0x0012f7cc, unsigned int 37,
const char * 0x02b95e40, unsigned int 8, long * 0x0012f270) line 2740 + 27 bytes
nsJSContext::EvaluateString(nsJSContext * const 0x02b69c20, const nsString &
{...}, void * 0x02acf140, nsIPrincipal * 0x02b95cd8, const char * 0x02b95e40,
unsigned int 8, const char * 0x00329468, nsString & {...}, int * 0x0012f2d0)
line 292 + 53 bytes
HTMLContentSink::EvaluateScript(nsString & {...}, int 8, const char *
0x00329468) line 4100
HTMLContentSink::ProcessSCRIPTTag(const nsIParserNode & {...}) line 4292
HTMLContentSink::AddLeaf(HTMLContentSink * const 0x02d01470, const nsIParserNode
& {...}) line 2951 + 12 bytes
CNavDTD::AddLeaf(const nsIParserNode * 0x0226a090) line 3217 + 22 bytes
CNavDTD::AddHeadLeaf(nsIParserNode * 0x0226a090) line 3333 + 17 bytes
CNavDTD::HandleStartToken(CToken * 0x01ff8c90) line 1387 + 12 bytes
CNavDTD::HandleToken(CNavDTD * const 0x02c11138, CToken * 0x0225ffa0, nsIParser
* 0x02bdc5f0) line 765 + 12 bytes
CNavDTD::BuildModel(CNavDTD * const 0x02c11138, nsIParser * 0x02bdc5f0,
nsITokenizer * 0x02d12288, nsITokenObserver * 0x00000000, nsIContentSink *
0x02d01470) line 504 + 20 bytes
nsParser::BuildModel() line 1085 + 34 bytes
nsParser::ResumeParse(nsIDTD * 0x00000000, int 0) line 1000 + 11 bytes
nsParser::EnableParser(int 1) line 691 + 15 bytes
CSSLoaderImpl::Cleanup(URLKey & {...}, SheetLoadData * 0x02ce2ac0) line 669
CSSLoaderImpl::SheetComplete(nsICSSStyleSheet * 0x00000000, SheetLoadData *
0x02ce2ac0) line 745
CSSLoaderImpl::ParseSheet(nsIUnicharInputStream * 0x02c9e268, SheetLoadData *
0x02ce2ac0, int & 1, nsICSSStyleSheet * & 0x02cf0a70) line 780
CSSLoaderImpl::DidLoadStyle(nsIStreamLoader * 0x02ce2c58, nsString & {...},
SheetLoadData * 0x02ce2ac0, unsigned int 0) line 813 + 24 bytes
SheetLoadData::OnStreamComplete(SheetLoadData * const 0x02ce2ac0,
nsIStreamLoader * 0x02ce2c58, nsISupports * 0x00000000, unsigned int 0, unsigned
int 1014, const char * 0x02c9e738) line 613
nsStreamLoader::OnStopRequest(nsStreamLoader * const 0x02ce2c5c, nsIChannel *
0x02ce2cb0, nsISupports * 0x00000000, unsigned int 0, const unsigned short *
0x00000000) line 111 + 75 bytes
InterceptStreamListener::OnStopRequest(InterceptStreamListener * const
0x02c0d690, nsIChannel * 0x02ce2cb0, nsISupports * 0x00000000, unsigned int 0,
const unsigned short * 0x00000000) line 1117
nsHTTPChannel::ResponseCompleted(nsIChannel * 0x02c8e1d4, nsIStreamListener *
0x02c0d690, unsigned int 0, const unsigned short * 0x00000000) line 1318 + 36
bytes
nsHTTPResponseListener::OnStopRequest(nsHTTPResponseListener * const 0x02c07688,
nsIChannel * 0x02c8e1d4, nsISupports * 0x02ce2cb0, unsigned int 0, const
unsigned short * 0x00000000) line 255
nsOnStopRequestEvent::HandleEvent(nsOnStopRequestEvent * const 0x02c49cb8) line
279
nsStreamListenerEvent::HandlePLEvent(PLEvent * 0x02c49d00) line 93 + 12 bytes
PL_HandleEvent(PLEvent * 0x02c49d00) line 526 + 10 bytes
PL_ProcessPendingEvents(PLEventQueue * 0x00e316c0) line 487 + 9 bytes
_md_EventReceiverProc(HWND__ * 0x00470b8c, unsigned int 49508, unsigned int 0,
long 14882496) line 975 + 9 bytes
USER32! 77e13eb0()
USER32! 77e1401a()
USER32! 77e192da()
nsAppShellService::Run(nsAppShellService * const 0x00e31138) line 401
main1(int 1, char * * 0x00b770c0, nsISplashScreen * 0x00000000) line 651 + 32
bytes
main(int 1, char * * 0x00b770c0) line 770 + 17 bytes
mainCRTStartup() line 338 + 17 bytes
KERNEL32! 77e87903()
Status: UNCONFIRMED → NEW
Ever confirmed: true
Summary: Crash when visiting a link → Assertion in nsXULWindow::NotifyObservers
Comment 2•25 years ago
|
||
updating component.
Assignee: cbegle → trudelle
Component: Browser-General → XP Toolkit/Widgets
QA Contact: asadotzler → paulmac
Comment 4•25 years ago
|
||
*IGNORE* - more massive spam, changing open XPToolkit bug's QA contact to
jrgm@netscape.com
QA Contact: paulmac → jrgm
This bug is fixed.
Status: NEW → RESOLVED
Closed: 25 years ago
Resolution: --- → FIXED
You need to log in
before you can comment on or make changes to this bug.
Description
•