You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@xalan.apache.org by bu...@apache.org on 2003/09/28 11:09:01 UTC

DO NOT REPLY [Bug 23461] New: - "Memory leak" in xpath evaluations

DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=23461>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=23461

"Memory leak" in xpath evaluations

           Summary: "Memory leak" in xpath evaluations
           Product: XalanJ2
           Version: 2.5
          Platform: PC
        OS/Version: Windows NT/2K
            Status: NEW
          Severity: Major
          Priority: Other
         Component: org.apache.xpath
        AssignedTo: xalan-dev@xml.apache.org
        ReportedBy: t.butcher@elsevier.com


Java heap memory is used up whenever evaluating an xpath expression on a DOM 
Document.

The 'leakage' goes away if the following lines in the constructor  
XPathResultImpl(short type, XObject result, Node contextNode)  
(XPathResultImpl.java) are commented out:

if (((m_resultType == XPathResult.ORDERED_NODE_ITERATOR_TYPE) ||
    (m_resultType == XPathResult.UNORDERED_NODE_ITERATOR_TYPE))&&
    (contextNode instanceof EventTarget)) {
        ((EventTarget)contextNode).addEventListener("MutationEvents",this,true);
}