Closed Bug 99155 Opened 24 years ago Closed 23 years ago

Memory leak of 244 bytes from 1 block allocated in NS_NewScriptGlobalObject

Categories

(SeaMonkey :: MailNews: Message Display, defect, P3)

x86
Windows 2000
defect

Tracking

(Not tracked)

VERIFIED WORKSFORME

People

(Reporter: stephend, Assigned: sspitzer)

References

Details

(Keywords: memory-leak)

Attachments

(1 file)

MLK: Memory leak of 244 bytes from 1 block allocated in NS_NewScriptGlobalObject(nsIScriptGlobalObject * *) Distribution of leaked blocks 244 bytes from 1 block of 244 bytes (0x04b2f960) Allocation location new(UINT)+0xc [new.cpp:23 ip=0x002da05c] NS_NewScriptGlobalObject(nsIScriptGlobalObject * *)+0xf7 [c:\moz_src\mozilla\dom\src\base\nsGlobalWindow.cpp:3964 ip=0x08e58477] nsDOMSOFactory::NewScriptGlobalObject(nsIScriptGlobalObject * *)+0x24 [c:\moz_src\mozilla\dom\src\build\nsDOMFactory.cpp:135 ip=0x08e13134] nsDocShell::EnsureScriptEnvironment(void)+0x27f [c:\moz_src\mozilla\docshell\base\nsDocShell.cpp:5944 ip=0x08bbd1df] nsWebShell::GetInterface(nsID const&,void * *)+0x4c6 [c:\moz_src\mozilla\docshell\base\nsWebShell.cpp:287 ip=0x08b63fa6] nsGetInterface::()(nsID const&,void * *)const+0x1bc [c:\moz_src\mozilla\xpcom\base\nsIInterfaceRequestor.cpp:38 ip=0x1004cecc] nsCOMPtr<nsIDOMWindowInternal>::assign_from_helper(nsCOMPtr_helper const&,nsID const&)+0x62 [.\..\..\..\dist\include\nsCOMPtr.h:971 ip=0x04755bf2] nsCOMPtr<nsIDOMWindowInternal>::nsCOMPtr<nsIDOMWindowInternal>(nsCOMPtr_helper const&)+0x77 [.\..\..\..\dist\include\nsCOMPtr.h:552 ip=0x04767147] nsAppShellService::GetHiddenWindowAndJSContext(nsIDOMWindowInternal * *,JSContext * *)+0x1f6 [c:\moz_src\mozilla\xpfe\appshell\src\nsAppShellService.cpp:763 ip=0x04779db8]
We need more info here, if we leak a window object, we need to know when to track down the cause. What are the steps to reproduce this leak? In general, we're pretty good about not leaking window objects.
Login to a POP3 account, hit NewMsg. Type qatest36@netscape.com as the recipient, type test in the subject field, and test in the body. Hit Send. Read message, delete message and shutdown (didn't delete trash).
Stephen, can you get a longer stack trace of the code where the leaked object is created? The reason I'm asking is that it looks like the leak comes from nsAppShellService::GetHiddenWindowAndJSContext(), but according to lxr there's no code in mozilla that calls that method, appart from nsAppShellService itself, and those calls don't leak the window (not directly at least).
jst, sorry, that's all Purify gave me. Note that Purify, on occasion has known to be out-of-whack, or just plain non-informative. I'm happy to mark this WON'TFIX or INVALID. I just went on a leak-filing spree for mail, and this crept up in the logs. Only information I can offer is that it might be related to the nsMsgProgressWindow? We have other leaks (60 bytes) there...
Stephend, I think these are way too many actions. You will need to isolate them.
Since this is mailnews related I'm handing this off to the mailnews component/product, I'm willing ot help out with this if this turns out to be a leak in the DOM code, but as I said, in general we don't leak window objects in the browser so I'm guessing that there's an unbalanced refcount somewhere in the mailnews code.
Assignee: jst → sspitzer
Component: DOM Core → Mail Window Front End
Product: Browser → MailNews
QA Contact: stummala → esther
Is the following just a bogus warning or what? nsMsgComposeSendListener: Success on the message copy operation! WARNING: requested removal of nonexistent window , file c:\moz_src\mozilla\embedding\components\windowwatcher\src\nsWindowWatcher .cpp, line 846 WEBSHELL- = 2
QA Contact: esther → stephend
Seem to be leaking hidden window. Marking nsbeta1+ but willing to downgrade if it's really a one-time only leak.
Keywords: nsbeta1+
Priority: -- → P3
If we can prove this is happening more than once, we should bring this back.
Blocks: 122274
Status: NEW → ASSIGNED
Keywords: nsbeta1+nsbeta1-
I don't see this any longer, sorry for the bogus report back then.
Status: ASSIGNED → RESOLVED
Closed: 23 years ago
Resolution: --- → WORKSFORME
verified
Status: RESOLVED → VERIFIED
Product: Browser → Seamonkey
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: