[Webkit-unassigned] [Bug 184029] ContentSecurityPolicy::upgradeInsecureRequestIfNeeded() should be called from the main thread

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Mon Mar 26 18:31:50 PDT 2018


https://bugs.webkit.org/show_bug.cgi?id=184029

--- Comment #2 from Chris Dumez <cdumez at apple.com> ---
ASSERTION FAILED: isMainThread()
./page/SecurityOrigin.cpp(150) : WebCore::SecurityOrigin::SecurityOrigin(const WebCore::URL &)
1   0x3b4db35fd WTFCrash
2   0x3a7ae4674 WebCore::SecurityOrigin::SecurityOrigin(WebCore::URL const&)
3   0x3a7ae482d WebCore::SecurityOrigin::SecurityOrigin(WebCore::URL const&)
4   0x3a7ae4c57 WebCore::SecurityOrigin::create(WebCore::URL const&)
5   0x3a7b6fb4f WebCore::ContentSecurityPolicy::upgradeInsecureRequestIfNeeded(WebCore::URL&, WebCore::ContentSecurityPolicy::InsecureRequestType) const
6   0x3a88089f6 WebCore::XMLHttpRequest::open(WTF::String const&, WebCore::URL const&, bool)
7   0x3a8808d69 WebCore::XMLHttpRequest::open(WTF::String const&, WTF::String const&, bool, WTF::String const&, WTF::String const&)
8   0x3a654d46a WebCore::jsXMLHttpRequestPrototypeFunctionOpen2Body(JSC::ExecState*, WebCore::JSXMLHttpRequest*, JSC::ThrowScope&)
9   0x3a654cd85 WebCore::jsXMLHttpRequestPrototypeFunctionOpenOverloadDispatcher(JSC::ExecState*, WebCore::JSXMLHttpRequest*, JSC::ThrowScope&)
10  0x3a65416be long long WebCore::IDLOperation<WebCore::JSXMLHttpRequest>::call<&(WebCore::jsXMLHttpRequestPrototypeFunctionOpenOverloadDispatcher(JSC::ExecState*, WebCore::JSXMLHttpRequest*, JSC::ThrowScope&)), (WebCore::CastedThisErrorBehavior)0>(JSC::ExecState&, char const*)
11  0x3a654144c WebCore::jsXMLHttpRequestPrototypeFunctionOpen(JSC::ExecState*)

-- 
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webkit.org/pipermail/webkit-unassigned/attachments/20180327/7e81e3da/attachment-0001.html>


More information about the webkit-unassigned mailing list