buster%netscape.com 0edefdc22a bug 21187
fixed the webshell leak in <textarea> and <input type=text|password>
the problem was the new nsWebShell::SetDocument() call was indirectly
causing nsHTMLDocument to instantiate a parser and fire off a parse.
bad circular references ensued. The fix is to use the "aCommand" param
to pass a hint to the nsHTMLDocument, telling it there's no need to
involve a parser.

in the simple case, we no longer leak webshells.  That is, if you open
mozilla.exe, look at a page (whether it has a text control on it or
not), and shut down the app, no webshell is leaked.  If I browse around,
sometimes we still leak a webshell somewhere.  I haven't figured out
exactly where that is yet.  A guess is history, which is in the process
of being reworked anyway.

r=mscott
a=chofmann
1999-12-09 07:21:34 +00:00
..
1999-12-09 07:21:34 +00:00