Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <window xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul"
2 onload="document.getElementById('trigger');">
3 <box style="display: none">
4 <bindings xmlns="http://www.mozilla.org/xbl">
5 <binding id="crash">
6 <implementation>
7 <constructor>
8 // Fetch it
9 var obj = this.getElementsByTagName("box")[0];
10 // And make it preserve its wrapper. Note that this will happen
11 // while we're wrapping our box as the parent for id="trigger",
12 // so then we'll unwind and things will be bad.
13 if (obj) obj.expando = 5;
14 </constructor>
15 </implementation>
16 </binding>
17 </bindings>
18 <box style="-moz-binding:url(#crash);">
19 <box id="trigger"/>
20 </box>
21 </box>
22 <!-- Make sure we load our XBL before we try to run our test -->
23 <box style="-moz-binding:url(#crash);"/>
24 </window>