layout/generic/crashtests/text-overflow-bug666751-1.html

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

michael@0 1 <html class="reftest-wait"><head><script>
michael@0 2 function finish() {
michael@0 3 window.removeEventListener("MozAfterPaint", finish, false);
michael@0 4 document.documentElement.removeAttribute("class");
michael@0 5 }
michael@0 6 </script>
michael@0 7 </head><body onload="window.addEventListener('MozAfterPaint', finish, false); document.body.style.backgroundColor='lime';">
michael@0 8 <div style="overflow: scroll; text-indent: -100px; white-space: pre; text-overflow: ellipsis;"><span style="font-family: -moz-fixed; white-space: normal;"></code><p style="position: fixed;">m
michael@0 9 </p>
michael@0 10 </div>
michael@0 11
michael@0 12 </body></html>

mercurial