Return-Path: Delivered-To: apmail-myfaces-dev-archive@www.apache.org Received: (qmail 16204 invoked from network); 2 Apr 2008 22:29:03 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 2 Apr 2008 22:29:03 -0000 Received: (qmail 13221 invoked by uid 500); 2 Apr 2008 22:29:02 -0000 Delivered-To: apmail-myfaces-dev-archive@myfaces.apache.org Received: (qmail 13186 invoked by uid 500); 2 Apr 2008 22:29:02 -0000 Mailing-List: contact dev-help@myfaces.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "MyFaces Development" Delivered-To: mailing list dev@myfaces.apache.org Received: (qmail 13175 invoked by uid 99); 2 Apr 2008 22:29:02 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 02 Apr 2008 15:29:02 -0700 X-ASF-Spam-Status: No, hits=-2000.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.140] (HELO brutus.apache.org) (140.211.11.140) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 02 Apr 2008 22:28:19 +0000 Received: from brutus (localhost [127.0.0.1]) by brutus.apache.org (Postfix) with ESMTP id 64207234C0B7 for ; Wed, 2 Apr 2008 15:26:24 -0700 (PDT) Message-ID: <1702636036.1207175184409.JavaMail.jira@brutus> Date: Wed, 2 Apr 2008 15:26:24 -0700 (PDT) From: "Davide Bonicelli (JIRA)" To: dev@myfaces.apache.org Subject: [jira] Commented: (TRINIDAD-1030) IE7 memory leak In-Reply-To: <928625177.1206648444575.JavaMail.jira@brutus> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org [ https://issues.apache.org/jira/browse/TRINIDAD-1030?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12584847#action_12584847 ] Davide Bonicelli commented on TRINIDAD-1030: -------------------------------------------- I set up a plain Trinidad page to run some tests and I've added a javascript function that is invoked on "onunload". The function sets to null all the global variables defined in Common1_0_X.js. Running the page in sIEve without the script, shows how no memory is released when the page is refreshed. When instead the script is added to the page, some of the memory is released. This shows how Common1_0_X.js is leaking memory in IE. The script probably breakes some Circular References and/or Closures. You find the file with the script in the attachment files as "leak.jspx". > IE7 memory leak > --------------- > > Key: TRINIDAD-1030 > URL: https://issues.apache.org/jira/browse/TRINIDAD-1030 > Project: MyFaces Trinidad > Issue Type: Bug > Components: Components > Affects Versions: 1.0.5-core, 1.0.6-core, 1.0.7-core > Environment: IE7 running on Windows XP. > Reporter: Davide Bonicelli > Priority: Minor > > Pages generated with Trinidad can cause a memory leaks in IE7. > This problem can be verified using sIEve to track the memory usage of IE while automatically refreshing a page generated with Trinidad. > The problem does not affect all the pages generated with Trinidad, thus it is probably connected to some Trinidad tags. > The bug can be reproduced running sIEve on the Trinidad Online Demo (http://www.irian.at/trinidad-demo/faces/index.jspx). > It is possible to notice how pages like "index.jspx", "tree.jspx" and "outputText.jspx" cause the memory leak. > "componentDemos.jspx" is an example of page not causing memory leak. > sIEve does not identify any memory leak in the affected pages, but the memory usage of IE keeps increasing. The leakage could be then caused by what Microsoft describes as the "DOM Insertion Order Leak Model" that is transparent to most leak-detection algorithms. -- This message is automatically generated by JIRA. - You can reply to this email to add a comment to the issue online.