fixed the webshell leak in <textarea> and <input type=text|password>
the problem was the new nsWebShell::SetDocument() call was indirectly
causing nsHTMLDocument to instantiate a parser and fire off a parse.
bad circular references ensued. The fix is to use the "aCommand" param
to pass a hint to the nsHTMLDocument, telling it there's no need to
involve a parser.
in the simple case, we no longer leak webshells. That is, if you open
mozilla.exe, look at a page (whether it has a text control on it or
not), and shut down the app, no webshell is leaked. If I browse around,
sometimes we still leak a webshell somewhere. I haven't figured out
exactly where that is yet. A guess is history, which is in the process
of being reworked anyway.
r=mscott
a=chofmann
git-svn-id: svn://10.0.0.236/trunk@55797 18797224-902f-48f8-a5cc-f745e15eee43