[Webkit-unassigned] [Bug 206903] New: inspector/heap/getRemoteObject.html is a flaky crash
bugzilla-daemon at webkit.org
bugzilla-daemon at webkit.org
Tue Jan 28 12:49:06 PST 2020
https://bugs.webkit.org/show_bug.cgi?id=206903
Bug ID: 206903
Summary: inspector/heap/getRemoteObject.html is a flaky crash
Product: WebKit
Version: Other
Hardware: Unspecified
OS: Unspecified
Status: NEW
Severity: Normal
Priority: P2
Component: Web Inspector
Assignee: webkit-unassigned at lists.webkit.org
Reporter: ap at webkit.org
CC: drousso at apple.com,
inspector-bugzilla-changes at group.apple.com,
webkit-bot-watchers-bugzilla at group.apple.com,
webkit-bug-importer at group.apple.com
Now that inspector/heap/getRemoteObject.html is unskipped on WK2, it's flakily crashing again.
Thread 0 Crashed:: Dispatch queue: com.apple.main-thread
0 com.apple.JavaScriptCore 0x0000000107fd0773 WTFCrashWithInfo(int, char const*, char const*, int) + 19 (Assertions.h:618)
1 com.apple.JavaScriptCore 0x0000000107c58f29 Inspector::InjectedScriptModule::ensureInjected(Inspector::InjectedScriptManager*, Inspector::InjectedScript const&) + 2121 (JSString.h:788)
2 com.apple.WebCore 0x0000000103919240 WebCore::CommandLineAPIModule::injectIfNeeded(Inspector::InjectedScriptManager*, Inspector::InjectedScript const&) + 112 (CommandLineAPIModule.cpp:44)
3 com.apple.JavaScriptCore 0x0000000107c4e0b3 Inspector::InjectedScriptManager::injectedScriptFor(JSC::JSGlobalObject*) + 1011 (InjectedScriptBase.h:53)
4 com.apple.JavaScriptCore 0x0000000107cdbadf Inspector::InspectorHeapAgent::getRemoteObject(WTF::String&, int, WTF::String const*, WTF::RefPtr<Inspector::Protocol::Runtime::RemoteObject, WTF::DumbPtrTraits<Inspector::Protocol::Runtime::RemoteObject> >&) + 175 (InspectorHeapAgent.cpp:251)
5 com.apple.JavaScriptCore 0x0000000107c8303c Inspector::HeapBackendDispatcher::getRemoteObject(long, WTF::RefPtr<WTF::JSONImpl::Object, WTF::DumbPtrTraits<WTF::JSONImpl::Object> >&&) + 860 (InspectorBackendDispatchers.cpp:4137)
6 com.apple.JavaScriptCore 0x0000000107c81b4f Inspector::HeapBackendDispatcher::dispatch(long, WTF::String const&, WTF::Ref<WTF::JSONImpl::Object, WTF::DumbPtrTraits<WTF::JSONImpl::Object> >&&) + 1071 (utility:925)
7 com.apple.JavaScriptCore 0x0000000107c5aadd Inspector::BackendDispatcher::dispatch(WTF::String const&) + 2349 (Ref.h:60)
8 com.apple.WebKit 0x00000001011aaa14 void IPC::handleMessage<Messages::WebPage::SendMessageToTargetBackend, WebKit::WebPage, void (WebKit::WebPage::*)(WTF::String const&, WTF::String const&)>(IPC::Decoder&, WebKit::WebPage*, void (WebKit::WebPage::*)(WTF::String const&, WTF::String const&)) + 85
9 com.apple.WebKit 0x00000001011a6de0 WebKit::WebPage::didReceiveWebPageMessage(IPC::Connection&, IPC::Decoder&) + 4284
10 com.apple.WebKit 0x0000000100c950e8 IPC::MessageReceiverMap::dispatchMessage(IPC::Connection&, IPC::Decoder&) + 114
11 com.apple.WebKit 0x000000010108bc5a WebKit::WebProcess::didReceiveMessage(IPC::Connection&, IPC::Decoder&) + 28 (WebProcess.cpp:745)
12 com.apple.WebKit 0x0000000100c7e414 IPC::Connection::dispatchMessage(std::__1::unique_ptr<IPC::Decoder, std::__1::default_delete<IPC::Decoder> >) + 176 (Connection.cpp:1079)
13 com.apple.WebKit 0x0000000100c7e613 IPC::Connection::dispatchOneIncomingMessage() + 199 (Connection.cpp:1146)
14 com.apple.JavaScriptCore 0x00000001073ffea4 WTF::RunLoop::performWork() + 228 (RunLoop.cpp:107)
15 com.apple.JavaScriptCore 0x0000000107400142 WTF::RunLoop::performWork(void*) + 34 (RunLoopCF.cpp:39)
--
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webkit.org/pipermail/webkit-unassigned/attachments/20200128/68dc9304/attachment.htm>
More information about the webkit-unassigned
mailing list