Closed
Bug 33155
Opened 25 years ago
Closed 23 years ago
MLK: POP password dialog
Categories
(SeaMonkey :: MailNews: Message Display, defect, P3)
SeaMonkey
MailNews: Message Display
Tracking
(Not tracked)
VERIFIED
DUPLICATE
of bug 103676
Future
People
(Reporter: bruce, Assigned: sspitzer)
Details
(Keywords: memory-leak)
Got this leak out of beard's leak data.
malloc
PR_Malloc
nsAllocatorImpl::Alloc(unsigned int)
nsAllocator::Alloc(unsigned int)
nsStr::Alloc(nsStr&, unsigned int)
nsStr::Realloc(nsStr&, unsigned int)
nsStr::EnsureCapacity(nsStr&, unsigned int)
nsStr::GrowCapacity(nsStr&, unsigned int)
nsString::SetCapacity(unsigned int)
nsString::ToNewUnicode() const
SINGSIGN_PromptPassword
nsWalletlibService::PromptPasswordURL(const unsigned short*, unsigned short**,
const char*, int, nsIPrompt*, int*)
nsWebShellWindow::PromptPassword(const char*, int, const unsigned short*, const
unsigned short*, unsigned short**, int*)
nsMsgIncomingServer::GetPasswordWithUI(const unsigned short*, const unsigned
short*, nsIMsgWindow*, char**)
nsPop3Protocol::GetPassword(char**)
nsPop3Protocol::SendPassword()
nsPop3Protocol::ProcessProtocolState(nsIURI*, nsIInputStream*, unsigned int,
unsigned int)
nsMsgProtocol::OnDataAvailable(nsIChannel*, nsISupports*, nsIInputStream*,
unsigned int, unsigned int)
nsOnDataAvailableEvent::HandleEvent()
nsStreamListenerEvent::HandlePLEvent(PLEvent*)
PL_HandleEvent
PL_ProcessPendingEvents
nsEventQueueImpl::ProcessPendingEvents()
nsEventQueueImpl::ProcessPendingEvents()
nsEventQueueImpl::ProcessPendingEvents()
nsMacNSPREventQueueHandler::ProcessPLEventQueue()
nsMacNSPREventQueueHandler::RepeatAction(const EventRecord&)
Repeater::DoRepeaters(const EventRecord&)
nsMacMessagePump::DispatchEvent(int, EventRecord*)
nsMacMessagePump::DoMessagePump()
Assignee | ||
Comment 1•25 years ago
|
||
thanks for logging this, bruce.
I'll take this one.
Assignee: selmer → sspitzer
Assignee | ||
Comment 2•25 years ago
|
||
hmm, we are using an nsXPIDLString in mailnews, so we shouldn't be leaking this.
the leak may be internal to the wallet code, in singsign.cpp
I'll have to investigate.
Assignee | ||
Comment 3•25 years ago
|
||
moving to m16. not an m15 blocker. I still need to investigate.
Target Milestone: --- → M16
Comment 4•25 years ago
|
||
Triage to M17. Please add beta2 keyword if this must make beta2. Please let me
know if this must be done by M16 feature freeze.
Target Milestone: M16 → M17
Comment 5•24 years ago
|
||
it looks like this is in wallet code. reassigning to morse.
Assignee: sspitzer → morse
Comment 6•24 years ago
|
||
I'm not so sure wallet is the culprit here. Yes, wallet (actually
single-signon to be precise) does allocate a string for the password that was
requested. And it returns that string back to the caller of PromptPassword.
Then it's up to the caller to do what it wants with that string and eventually
release it. And the caller in this case is nsPop3Protocol.
Reassigning back to sspitzer.
Assignee: morse → sspitzer
Assignee | ||
Comment 8•24 years ago
|
||
accepting all "future" bugs to get them off my "new" bug radar.
Status: NEW → ASSIGNED
Comment 9•24 years ago
|
||
The last comment in this bug was 6 months ago. Does anyone know whether this
leak still even exists? (there have been changes to the code you know :-)
If this leak still exists I think we should nominate for 1.0 because - well - we
can dream can't we?
Comment 10•24 years ago
|
||
Is it just me, or does
http://lxr.mozilla.org/seamonkey/source/mailnews/base/util/nsMsgIncomingServer.cpp#736
need getter_Copies() or else it will leak? Can someone please verify?
Assignee | ||
Comment 11•24 years ago
|
||
no, a getter_Copies() is not needed there. (aPassword isn't a nsXPIDLCString.)
QA Contact: lchiang → stephend
I can't tell from the stack, but I'm pretty sure this was bug 103676, which
David fixed and I verified.
Comment 13•23 years ago
|
||
I haven't seen this leak, so I suspect it's either fixed, or a dup of bug
103676, which is also fixed.
resolving.
*** This bug has been marked as a duplicate of 103676 ***
Status: ASSIGNED → RESOLVED
Closed: 23 years ago
Resolution: --- → DUPLICATE
verified dup.
Status: RESOLVED → VERIFIED
Updated•20 years ago
|
Product: Browser → Seamonkey
You need to log in
before you can comment on or make changes to this bug.
Description
•