[Webkit-unassigned] [Bug 193222] New: Leak of ScrollCompletionCallbackData (16 bytes) in com.apple.WebKit.WebContent running WebKit layout tests

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Mon Jan 7 16:05:50 PST 2019


https://bugs.webkit.org/show_bug.cgi?id=193222

            Bug ID: 193222
           Summary: Leak of ScrollCompletionCallbackData (16 bytes) in
                    com.apple.WebKit.WebContent running WebKit layout
                    tests
           Product: WebKit
           Version: WebKit Local Build
          Hardware: Unspecified
                OS: Unspecified
            Status: NEW
          Keywords: InRadar
          Severity: Normal
          Priority: P2
         Component: Tools / Tests
          Assignee: webkit-unassigned at lists.webkit.org
          Reporter: ddkilzer at webkit.org
                CC: lforschler at apple.com, simon.fraser at apple.com

Leak of ScrollCompletionCallbackData (16 bytes) in com.apple.WebKit.WebContent running WebKit layout tests.

$ ./Tools/Scripts/run-webkit-tests --no-build --debug --batch-size=1000 --child-processes=1 --verbose --leaks --no-retry --no-show-results tiled-drawing/scrolling/fast-scroll-div-latched-div.html tiled-drawing/scrolling/fast-scroll-div-latched-mainframe.html tiled-drawing/scrolling/fast-scroll-iframe-latched-iframe-with-handler.html

NOTE: Requires changes to run-webkit-tests to support --leaks with WebKit2.

STACK OF 1 INSTANCE OF 'ROOT LEAK: <0x7f91c7812670>':
[thread 0x115af25c0]:
28  libdyld.dylib                      0x7fff6611008d start + 1
27  com.apple.WebKit.WebContent           0x10a6217bb invocation function for block in WebKit::XPCServiceEventHandler(NSObject<OS_xpc_object>*) + 0  XPCServiceMain.mm:46
26  com.apple.WebKit.WebContent           0x10a621636 WebKit::XPCServiceMain(int, char const**) + 547  XPCServiceMain.mm:0
25  libxpc.dylib                       0x7fff663469e5 _xpc_copy_xpcservice_dictionary + 0
24  libxpc.dylib                       0x7fff66346ee6 _xpc_objc_main + 555
23  com.apple.Foundation               0x7fff3b21b28f -[NSRunLoop(NSRunLoop) run] + 76
22  com.apple.Foundation               0x7fff3b21b3ba -[NSRunLoop(NSRunLoop) runMode:beforeDate:] + 280
21  com.apple.CoreFoundation           0x7fff38e96be6 CFRunLoopRunSpecific + 467
20  com.apple.CoreFoundation           0x7fff38e976c4 __CFRunLoopRun + 2187
19  com.apple.CoreFoundation           0x7fff38eb611d __CFRunLoopDoTimers + 333
18  com.apple.CoreFoundation           0x7fff38eb65e8 __CFRunLoopDoTimer + 871
17  com.apple.CoreFoundation           0x7fff38eb6a35 __CFRUNLOOP_IS_CALLING_OUT_TO_A_TIMER_CALLBACK_FUNCTION__ + 20
16  com.apple.WebCore                     0x10cc96d2f WebCore::timerFired(__CFRunLoopTimer*, void*) + 31  MainThreadSharedTimerCF.cpp:75
15  com.apple.WebCore                     0x10cc75739 WebCore::ThreadTimers::sharedTimerFiredInternal() + 185  ThreadTimers.cpp:120
14  com.apple.WebCore                     0x10cb7f40f WebCore::DOMTimer::fired() + 607  InspectorInstrumentation.h:279
13  com.apple.WebCore                     0x10c5622e6 WebCore::ScheduledAction::execute(WebCore::Document&) + 150  atomic:1026
12  com.apple.WebCore                     0x10c562654 WebCore::ScheduledAction::executeFunctionInContext(JSC::JSGlobalObject*, JSC::JSValue, WebCore::ScriptExecutionContext&) + 468  ScheduledAction.cpp:118
11  com.apple.WebCore                     0x10c533454 WebCore::JSExecState::profiledCall(JSC::ExecState*, JSC::ProfilingReason, JSC::JSValue, JSC::CallType, JSC::CallData const&, JSC::JSValue, JSC::ArgList const&, WTF::NakedPtr<JSC::Exception>&) + 100  JSExecState.h:74
10  com.apple.JavaScriptCore              0x1107aa9fb JSC::profiledCall(JSC::ExecState*, JSC::ProfilingReason, JSC::JSValue, JSC::CallType, JSC::CallData const&, JSC::JSValue, JSC::ArgList const&, WTF::NakedPtr<JSC::Exception>&) + 187  CallData.cpp:41
9   com.apple.JavaScriptCore              0x110563f25 JSC::Interpreter::executeCall(JSC::ExecState*, JSC::JSObject*, JSC::CallType, JSC::CallData const&, JSC::JSValue, JSC::ArgList const&) + 469  JITCodeInlines.h:39
8   com.apple.JavaScriptCore              0x10ff8b919 vmEntryToJavaScript + 200  LowLevelInterpreter64.asm:295
7   com.apple.JavaScriptCore              0x10ff9aa61 llint_entry + 61326  LowLevelInterpreter.asm:899
6                                      0x232c32c0102d 0x232c32c01000 + 45
5   com.apple.JavaScriptCore              0x10ffc808f long long JSC::APICallbackFunction::call<JSC::JSCallbackFunction>(JSC::ExecState*) + 495  APICallbackFunction.h:63
4   com.apple.WebKitTestRunner.InjectedBundle        0x572a2324b WTR::JSEventSendingController::callAfterScrollingCompletes(OpaqueJSContext const*, OpaqueJSValue*, OpaqueJSValue*, unsigned long, OpaqueJSValue const* const*, OpaqueJSValue const**) + 65  JSEventSendingController.cpp:0
3   com.apple.WebKitTestRunner.InjectedBundle        0x572a10a81 WTR::EventSendingController::callAfterScrollingCompletes(OpaqueJSValue const*) + 95  EventSendingController.cpp:628
2   libc++abi.dylib                    0x7fff6383ff48 operator new(unsigned long) + 40
1   libsystem_malloc.dylib             0x7fff662bd783 malloc + 24
0   libsystem_malloc.dylib             0x7fff662bd82b malloc_zone_malloc + 139 
====
    1 (16 bytes) ROOT LEAK: 0x7f91c7812670 [16]

-- 
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webkit.org/pipermail/webkit-unassigned/attachments/20190108/5af50b88/attachment-0001.html>


More information about the webkit-unassigned mailing list