[Webkit-unassigned] [Bug 184029] ContentSecurityPolicy::upgradeInsecureRequestIfNeeded() should be called from the main thread
bugzilla-daemon at webkit.org
bugzilla-daemon at webkit.org
Mon Mar 26 18:31:50 PDT 2018
https://bugs.webkit.org/show_bug.cgi?id=184029
--- Comment #2 from Chris Dumez <cdumez at apple.com> ---
ASSERTION FAILED: isMainThread()
./page/SecurityOrigin.cpp(150) : WebCore::SecurityOrigin::SecurityOrigin(const WebCore::URL &)
1 0x3b4db35fd WTFCrash
2 0x3a7ae4674 WebCore::SecurityOrigin::SecurityOrigin(WebCore::URL const&)
3 0x3a7ae482d WebCore::SecurityOrigin::SecurityOrigin(WebCore::URL const&)
4 0x3a7ae4c57 WebCore::SecurityOrigin::create(WebCore::URL const&)
5 0x3a7b6fb4f WebCore::ContentSecurityPolicy::upgradeInsecureRequestIfNeeded(WebCore::URL&, WebCore::ContentSecurityPolicy::InsecureRequestType) const
6 0x3a88089f6 WebCore::XMLHttpRequest::open(WTF::String const&, WebCore::URL const&, bool)
7 0x3a8808d69 WebCore::XMLHttpRequest::open(WTF::String const&, WTF::String const&, bool, WTF::String const&, WTF::String const&)
8 0x3a654d46a WebCore::jsXMLHttpRequestPrototypeFunctionOpen2Body(JSC::ExecState*, WebCore::JSXMLHttpRequest*, JSC::ThrowScope&)
9 0x3a654cd85 WebCore::jsXMLHttpRequestPrototypeFunctionOpenOverloadDispatcher(JSC::ExecState*, WebCore::JSXMLHttpRequest*, JSC::ThrowScope&)
10 0x3a65416be long long WebCore::IDLOperation<WebCore::JSXMLHttpRequest>::call<&(WebCore::jsXMLHttpRequestPrototypeFunctionOpenOverloadDispatcher(JSC::ExecState*, WebCore::JSXMLHttpRequest*, JSC::ThrowScope&)), (WebCore::CastedThisErrorBehavior)0>(JSC::ExecState&, char const*)
11 0x3a654144c WebCore::jsXMLHttpRequestPrototypeFunctionOpen(JSC::ExecState*)
--
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webkit.org/pipermail/webkit-unassigned/attachments/20180327/7e81e3da/attachment-0001.html>
More information about the webkit-unassigned
mailing list