gfx/tests/crashtests/595727-1.html

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

michael@0 1 <!DOCTYPE html>
michael@0 2 <html class="reftest-wait">
michael@0 3 <head>
michael@0 4 <script>
michael@0 5
michael@0 6 function doTest()
michael@0 7 {
michael@0 8 var r = document.documentElement;
michael@0 9 while(r.firstChild) { r.removeChild(r.firstChild); }
michael@0 10 var body = document.createElementNS("http://www.w3.org/1999/xhtml", "body");
michael@0 11 r.appendChild(body);
michael@0 12 body.contentEditable = "true";
michael@0 13 document.execCommand("inserthtml", false, "<span style=\"position:relative;left:0.8px\">a<select></select>a</span>");
michael@0 14
michael@0 15 document.documentElement.removeAttribute("class");
michael@0 16 }
michael@0 17
michael@0 18 document.addEventListener("MozReftestInvalidate", doTest, false);
michael@0 19 </script>
michael@0 20 </head>
michael@0 21
michael@0 22 <body></body>
michael@0 23 </html>

mercurial