1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 1.2 +++ b/image/test/crashtests/crashtests.list Wed Dec 31 06:09:35 2014 +0100 1.3 @@ -0,0 +1,47 @@ 1.4 +asserts(0-2) load ownerdiscard.html # bug 804291, bug 807211 1.5 + 1.6 +load 83804-1.gif 1.7 +load 89341-1.gif 1.8 +load 463696.bmp 1.9 +load 570451.png 1.10 + 1.11 +load colormap-range.gif 1.12 + 1.13 +# the following tests were inspired by bug 525326 1.14 +# they have image sizes of 65535x65535 which is larger than we allow 1.15 +load invalid-size.gif 1.16 +# this image has a valid size for the first frame, but the second frame is 65535x65535 1.17 +# AddressSanitizer sometimes fails with a CHECK on an allocation caused by this. 1.18 +skip-if(AddressSanitizer) load invalid-size-second-frame.gif 1.19 + 1.20 +# Animated gifs with a very large canvas, but tiny actual content. 1.21 +load delaytest.html?523528-1.gif 1.22 +load delaytest.html?523528-2.gif 1.23 + 1.24 +# this would have exposed the leak discovered in bug 642902 1.25 +load invalid-icc-profile.jpg 1.26 + 1.27 +# maximum (256) width and height icons that we currently (due to bug 668068) 1.28 +# interpret as 0-width and 0-height. 1.29 +load 256-width.ico 1.30 +load 256-height.ico 1.31 + 1.32 +# A 3-frame animated GIF with an inordinate delay between the second and third 1.33 +# frame. 1.34 +HTTP load delayedframe.sjs 1.35 + 1.36 +load 681190.html 1.37 +skip-if(Android&&smallScreen) skip-if(B2G) load 694165-1.xhtml # nexus-s Android 2.3.6, bug 876275 for B2G on a VM 1.38 +load 732319-1.html 1.39 +load 844403-1.html 1.40 + 1.41 +load truncated-second-frame.png # bug 863975 1.42 + 1.43 +# Bug 863958 1.44 +# This icon's size is such that it leads to multiple writes to the PNG decoder 1.45 +# after we've gotten our size. 1.46 +load multiple-png-hassize.ico 1.47 + 1.48 +# Bug 856615 1.49 +# Asserts in the debug build 1.50 +load 856616.gif