Closed
Bug 157968
Opened 22 years ago
Closed 22 years ago
"View Page Info" / Links crashes browser
Categories
(SeaMonkey :: Page Info, defect)
Tracking
(Not tracked)
VERIFIED
DUPLICATE
of bug 154692
People
(Reporter: bugzilla, Assigned: db48x)
References
()
Details
From Bugzilla Helper: User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.1a+) Gecko/20020715 BuildID: 2002071508 When I open http://www.atvnuernberg-badminton.de.vu, a second window is is opened via JS. On this window, if you press right mouse-button, open "View Page Info", click on "Links", Mozilla crashes! See incidents: TB8414047M TB8414009M TB8413962Q (Btw: would be really nice if you could copy & paste the incident-numbers from talkback!) Reproducible: Always Steps to Reproduce: 1. open http://www.atvnuernberg-badminton.de.vu & wait until second window opens 2. press right mouse-button over the new window & select "View Page Info" 3. click on "Links" Actual Results: *** MOZILLA-CRASH! *** Expected Results: List of links Well, I am not really sure if it is really critical. This function is not used that frequently, I guess :-)
Comment 1•22 years ago
|
||
js_GetProperty(JSContext * 0x054d9ef0, JSObject * 0x055d5950, long 24535168, long * 0x0012b5e8) line 2520 + 3 bytes js_Interpret(JSContext * 0x054d9ef0, long * 0x0012b798) line 2574 + 2032 bytes js_Invoke(JSContext * 0x054d9ef0, unsigned int 1, unsigned int 2) line 805 + 13 bytes nsXPCWrappedJSClass::CallMethod(nsXPCWrappedJSClass * const 0x057bf218, nsXPCWrappedJS * 0x057d4da8, unsigned short 3, const nsXPTMethodInfo * 0x01600540, nsXPTCMiniVariant * 0x0012bc8c) line 1193 + 21 bytes nsXPCWrappedJS::CallMethod(nsXPCWrappedJS * const 0x057d4da8, unsigned short 3, const nsXPTMethodInfo * 0x01600540, nsXPTCMiniVariant * 0x0012bc8c) line 430 PrepareAndDispatch(nsXPTCStubBase * 0x057d4da8, unsigned int 3, unsigned int * 0x0012bd3c, unsigned int * 0x0012bd2c) line 115 + 31 bytes SharedStub() line 139 nsTreeWalker::TestNode(nsIDOMNode * 0x04608e00, short * 0x0012bdc0) line 596 + 34 bytes nsTreeWalker::ChildOf(nsIDOMNode * 0x04608aec, int -1, int 0, int 6, nsIDOMNode * * 0x0012c4ec) line 534 + 21 bytes nsTreeWalker::FirstChildOf(nsIDOMNode * 0x04608aec, int 0, int 6, nsIDOMNode * * 0x0012c4ec) line 318 + 28 bytes nsTreeWalker::ChildOf(nsIDOMNode * 0x046089c0, int -1, int 0, int 5, nsIDOMNode * * 0x0012c4ec) line 551 + 32 bytes nsTreeWalker::FirstChildOf(nsIDOMNode * 0x046089c0, int 0, int 5, nsIDOMNode * * 0x0012c4ec) line 318 + 28 bytes nsTreeWalker::ChildOf(nsIDOMNode * 0x046082e0, int -1, int 0, int 4, nsIDOMNode * * 0x0012c4ec) line 551 + 32 bytes nsTreeWalker::FirstChildOf(nsIDOMNode * 0x046082e0, int 0, int 4, nsIDOMNode * * 0x0012c4ec) line 318 + 28 bytes nsTreeWalker::ChildOf(nsIDOMNode * 0x05529eb0, int -1, int 0, int 3, nsIDOMNode * * 0x0012c4ec) line 551 + 32 bytes nsTreeWalker::FirstChildOf(nsIDOMNode * 0x05529eb0, int 0, int 3, nsIDOMNode * * 0x0012c4ec) line 318 + 28 bytes nsTreeWalker::ChildOf(nsIDOMNode * 0x0552fa40, int -1, int 0, int 2, nsIDOMNode * * 0x0012c4ec) line 551 + 32 bytes nsTreeWalker::FirstChildOf(nsIDOMNode * 0x0552fa40, int 0, int 2, nsIDOMNode * * 0x0012c4ec) line 318 + 28 bytes nsTreeWalker::ChildOf(nsIDOMNode * 0x0419add0, int -1, int 0, int 1, nsIDOMNode * * 0x0012c4ec) line 551 + 32 bytes nsTreeWalker::FirstChildOf(nsIDOMNode * 0x0419add0, int 0, int 1, nsIDOMNode * * 0x0012c4ec) line 318 + 28 bytes nsTreeWalker::ChildOf(nsIDOMNode * 0x0420adcc, int -1, int 0, int 0, nsIDOMNode * * 0x0012c4ec) line 551 + 32 bytes nsTreeWalker::FirstChildOf(nsIDOMNode * 0x0420adcc, int 0, int 0, nsIDOMNode * * 0x0012c4ec) line 318 + 28 bytes nsTreeWalker::NextInDocumentOrderOf(nsIDOMNode * 0x0420adcc, int 0, int -1, nsIDOMNode * * 0x0012c4ec) line 404 + 27 bytes nsTreeWalker::NextNode(nsTreeWalker * const 0x057d4e10, nsIDOMNode * * 0x0012c4ec) line 269 XPTC_InvokeByIndex(nsISupports * 0x057d4e10, unsigned int 15, unsigned int 1, nsXPTCVariant * 0x0012c4ec) line 106 XPCWrappedNative::CallMethod(XPCCallContext & {...}, XPCWrappedNative::CallMode CALL_METHOD) line 1994 + 42 bytes XPC_WN_CallMethod(JSContext * 0x054d9ef0, JSObject * 0x055d5708, unsigned int 0, long * 0x057b2fe8, long * 0x0012c7c8) line 1266 + 14 bytes js_Invoke(JSContext * 0x054d9ef0, unsigned int 0, unsigned int 0) line 788 + 23 bytes js_Interpret(JSContext * 0x054d9ef0, long * 0x0012d608) line 2743 + 15 bytes ... ... A page with a java applet crashes PI at the moment.. *** This bug has been marked as a duplicate of 154692 ***
Status: NEW → RESOLVED
Closed: 22 years ago
Resolution: --- → DUPLICATE
Updated•20 years ago
|
Product: Browser → Seamonkey
You need to log in
before you can comment on or make changes to this bug.
Description
•