fixed the webshell leak in <textarea> and <input type=text|password> the problem was the new nsWebShell::SetDocument() call was indirectly causing nsHTMLDocument to instantiate a parser and fire off a parse. bad circular references ensued. The fix is to use the "aCommand" param to pass a hint to the nsHTMLDocument, telling it there's no need to involve a parser. in the simple case, we no longer leak webshells. That is, if you open mozilla.exe, look at a page (whether it has a text control on it or not), and shut down the app, no webshell is leaked. If I browse around, sometimes we still leak a webshell somewhere. I haven't figured out exactly where that is yet. A guess is history, which is in the process of being reworked anyway. r=mscott a=chofmann git-svn-id: svn://10.0.0.236/trunk@55797 18797224-902f-48f8-a5cc-f745e15eee43
135 KiB
135 KiB