[Webkit-unassigned] [Bug 251835] The Document object is leaked on some pages using media (like YouTube.com)

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Tue Apr 25 14:12:51 PDT 2023


https://bugs.webkit.org/show_bug.cgi?id=251835

--- Comment #4 from Ryan Reno <rreno at apple.com> ---
Simon suggested I use the GCHeapInspector tool to investigate further. That tool found a Function object as being the shortest path to the leaked HTMLDocument. In particular, the function "queryHandler" is marked (GC root - DOMGCOutput). This object appears to be part of a custom element "<iron-media-query>" from the desktop_polymer.js resource delivered by the YouTube page.

This matches something I noticed in both the RefPtr instrumentation and when putting a breakpoint in the DOMGCOutputConstraint::executeImplImpl function - CustomElementReactionStack is involved in the stack trace of both the un-derefed instrumentation and in the breakpoint in the constrain. There were many hits on the constraint - mostly by GC threads - but the CustomElementReactionStack was an interesting hit from the main thread. In fact the only other time that breakpoint got hit was in a stack containing the HTMLDocumentParser.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webkit.org/pipermail/webkit-unassigned/attachments/20230425/882a9da0/attachment.htm>


More information about the webkit-unassigned mailing list